Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

WireGuard support for VPNator #1

Open
wants to merge 11 commits into
base: master
Choose a base branch
from
Open

WireGuard support for VPNator #1

wants to merge 11 commits into from

Conversation

Lymkwi
Copy link
Contributor

@Lymkwi Lymkwi commented May 14, 2020

These few commits implement a second playbook, copy of the first one, that can deploy a remote VPN using wireguard in much the same way we did so far using openvpn.

The structure is kept the same, mostly, and the same tags are used.

Important note : I haven't yet squashed commits c751db5 through 976f322. These laid the foundation for the playbook, but the last commit introduced the real structure we should use for the playbook. I do plan to merge them eventually though.

Once everything is reviewed and fixed, I may squash everything into a single commit.

Lymkwi added 5 commits May 9, 2020 11:25
Many modifications remain to be made, targets have
to be cleaned a bit more, and routing does not work
quite yet. Still working on this.
This playbook will, however, deploy functional wg
tunneling for a Debian10 server provided that you
have full-upgrade'd it and rebooted before.
 - Remove whitespaces
 - Look for localhost wireguard private key even when restricting to
 `local_install` tag
 - Target remote install also launches remote start, but no longer
   the opposite
 - Don't install a specific header package, find the kernel version
   and retrieve the appropriate package
 - Substitute `wg0` for `tun0` in fireqos configuration template
@Lymkwi Lymkwi added the enhancement New feature or request label May 14, 2020
@Lymkwi
Copy link
Contributor Author

Lymkwi commented Sep 29, 2021

Still needed before merge :

  • A second playbook to prepare our servers
  • Adding wireguard-tools to installed packages
  • Benchmarks

@SkytAsul
Copy link
Member

Pourquoi cette PR n'a jamais abouti ? 😅

@Lymkwi
Copy link
Contributor Author

Lymkwi commented Mar 22, 2024

Parce que OVH considère le moindre flux de traffic UDP avec des petits spikes comme du spam 🙃 impossible d'utiliser wg sans trigger leur antispam, en tout cas d'après nos tests

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants