diff options
author | Simon Garrelou <simon@sixfoisneuf.fr> | 2023-05-25 13:36:31 +0200 |
---|---|---|
committer | Simon Garrelou <simon@sixfoisneuf.fr> | 2023-05-25 13:36:31 +0200 |
commit | aa21318384d4f765a14abf62f23caed076987993 (patch) | |
tree | 6f90c1412b041d033eb8d4363bfde22b600ac0dd | |
parent | afa92bfbc77207be03cc429c83c229b0eeaf053c (diff) | |
download | wgmgr-aa21318384d4f765a14abf62f23caed076987993.tar.gz wgmgr-aa21318384d4f765a14abf62f23caed076987993.zip |
Add section about Wireguard configuration to README
-rw-r--r-- | README.md | 19 |
1 files changed, 17 insertions, 2 deletions
@@ -1,6 +1,6 @@ | |||
1 | # Wireguard configuration manager | 1 | # Wireguard server manager |
2 | 2 | ||
3 | `wgmgr` is a command-line configuration manager for the [Wireguard](https://wireguard.org) VPN solution. It expects a traditional client-server relationship, and cannot be used to handle meshed networks. | 3 | `wgmgr` is a command-line manager for the server part of the [Wireguard](https://wireguard.org) VPN solution. It expects a traditional client-server relationship, and cannot be used to handle meshed networks. |
4 | 4 | ||
5 | It handles client creation and removal, and will auto-generate the corresponding private and public keys. It can also generate the configuration file for each client. | 5 | It handles client creation and removal, and will auto-generate the corresponding private and public keys. It can also generate the configuration file for each client. |
6 | 6 | ||
@@ -53,6 +53,21 @@ Options: | |||
53 | -V, --version Print version | 53 | -V, --version Print version |
54 | ``` | 54 | ``` |
55 | 55 | ||
56 | ## Wireguard configuration file | ||
57 | |||
58 | This software will parse and edit the Wireguard configuration file specified in `/etc/wgmgr.conf`. While several protections are in place, be advised that this software *might* permanently destroy your Wireguard configuration. Always have backups! | ||
59 | |||
60 | Each new client is added to the configuration file with a `[Peer]` stanza like the following: | ||
61 | |||
62 | ``` | ||
63 | # The Peer Name | ||
64 | [Peer] | ||
65 | AllowedIPs = 10.8.0.2/32 | ||
66 | PublicKey = GSiujJjngvyLTR0/93l/EUGIs7ohDpKDhoa0WrEXJnA= | ||
67 | ``` | ||
68 | |||
69 | The corresponding private key will be stored in `/etc/wireguard/private_keys/The Peer Name`. Permissions should automatically be set to `rw-------` (600), preventing anyone but root from reading it. | ||
70 | |||
56 | ## Reporting bugs | 71 | ## Reporting bugs |
57 | 72 | ||
58 | Please report any bugs you find to [bugs+wgmgr@sixfoisneuf.fr](mailto:bugs+wgmgr@sixfoisneuf.fr). Contributions are welcomed, as long as they follow the [git send-email](https://git-send-email.io) format. | 73 | Please report any bugs you find to [bugs+wgmgr@sixfoisneuf.fr](mailto:bugs+wgmgr@sixfoisneuf.fr). Contributions are welcomed, as long as they follow the [git send-email](https://git-send-email.io) format. |