<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Wireguard — LowEndSpirit</title>
        <link>https://staging.lowendspirit.com/index.php?p=/</link>
        <pubDate>Thu, 09 Apr 2026 17:36:35 +0000</pubDate>
        <language>en</language>
            <description>Wireguard — LowEndSpirit</description>
    <atom:link href="https://staging.lowendspirit.com/index.php?p=/discussions/tagged/wireguard/feed.rss" rel="self" type="application/rss+xml"/>
    <item>
        <title>Adguard Free VS Adguard Premium</title>
        <link>https://staging.lowendspirit.com/index.php?p=/discussion/5235/adguard-free-vs-adguard-premium</link>
        <pubDate>Tue, 10 Jan 2023 07:00:08 +0000</pubDate>
        <category>General</category>
        <dc:creator>ElonBezos</dc:creator>
        <guid isPermaLink="false">5235@/index.php?p=/discussions</guid>
        <description><![CDATA[<p>edited because i was drunk, this should be simple questions:</p>

<p>What is the differences between Adguard Free &amp; Premium (ex: Family lifetime plan)?</p>

<p>do the free one block ads at network level or just in web browser?</p>

<p>i'm thinkin to buy family lifetime plan on Stacksocial to get rid android in app ads</p>
]]>
        </description>
    </item>
    <item>
        <title>VPS IPv6 /64 for SLAAC at home via wireguard?</title>
        <link>https://staging.lowendspirit.com/index.php?p=/discussion/2621/vps-ipv6-64-for-slaac-at-home-via-wireguard</link>
        <pubDate>Sat, 06 Mar 2021 05:49:18 +0000</pubDate>
        <category>Help</category>
        <dc:creator>topogio</dc:creator>
        <guid isPermaLink="false">2621@/index.php?p=/discussions</guid>
        <description><![CDATA[<p>I'm looking to hand out public IPv6 addresses from my VPS /64 to my clients at home via SLAAC if possible. I have so far been able to get a single IPv6 public address to work via ndp_proxy (instructions <a rel="nofollow" href="https://github.com/burghardt/easy-wg-quick#enabling-ndp-proxy-instead-of-default-ipv6-masquerading" title="here">here</a>) BUT I have been unsuccessful at allowing multiple IPv6 thru the wireguard tunnel to become available to clients.</p>

<p>Here is a dirty diagram of how things would look like:</p>

<ol>
<li><p>VPS <br />
2602:fed2:8888:106:: /64 assigned<br />
eth0 = 2602:fed2:8888:106::1<br />
wg0 = 2602:fed2:8888:106:100::1<br />
-- wg tunnel --</p></li>
<li><p>Home client<br />
wg0 = 2602:fed2:8888:106:100::10 (this will become a 'default gateway' at home - receiving traffic from multiple hosts)<br />
eth0 = 192.168.1.100</p></li>
</ol>

<p>-- client 1 fowards packets to 192.168.1.100 asking for an IPv6 address. Hoping it automatically gets one from the available /64 space.</p>

<p>VPS provider won't give more IPv6 space than /64 unfortunately <img src="https://staging.lowendspirit.com/plugins/emojiextender/emoji/twitter/frown.png" title=":(" alt=":(" height="18" /> - I haven't tried asking for a /128 for a ptp thats routed to it - I was reading that may work but dont know.</p>

<p>I did try /etc/ndppd.conf with this config but did not see any requests comming from wg0 instance:</p>

<pre><code>proxy eth0 {
  autowire yes
  rule 2602:fed2:8888:106::/64 {
      iface wghub
  }
}

</code></pre>

<p>Anyone with experience that could comment?</p>
]]>
        </description>
    </item>
    <item>
        <title>How to run wireguard in OpenVZ?</title>
        <link>https://staging.lowendspirit.com/index.php?p=/discussion/4404/how-to-run-wireguard-in-openvz</link>
        <pubDate>Sat, 30 Jul 2022 07:06:40 +0000</pubDate>
        <category>Technical</category>
        <dc:creator>ataribasementcluster</dc:creator>
        <guid isPermaLink="false">4404@/index.php?p=/discussions</guid>
        <description><![CDATA[<p>I have a bunch of old LES OpenVZ servers from Inception and wanted to run wireguard there (servers, although in wireguard everyone's a peer). However, when I try to run wireguard, I get</p>

<pre><code># wg-quick up wg0
[#] ip link add wg0 type wireguard
RTNETLINK answers: Operation not supported
Unable to access interface: Protocol not supported
[#] ip link delete dev wg0
Cannot find device "wg0"
</code></pre>

<p>Is it impossible to run wireguard in these containers or is it a PEBKAC issue? Do you recommend any of the userspace wireguard implementations and, if so, which?</p>
]]>
        </description>
    </item>
    <item>
        <title>WireGuard automated installer | Ubuntu, Debian, CentOS, Fedora</title>
        <link>https://staging.lowendspirit.com/index.php?p=/discussion/974/wireguard-automated-installer-ubuntu-debian-centos-fedora</link>
        <pubDate>Thu, 30 Apr 2020 18:50:33 +0000</pubDate>
        <category>General</category>
        <dc:creator>Nyr</dc:creator>
        <guid isPermaLink="false">974@/index.php?p=/discussions</guid>
        <description><![CDATA[<p>Lightweight <strong><a rel="nofollow" href="https://github.com/Nyr/wireguard-install" title="WireGuard installer">WireGuard installer</a></strong>, written entirely in bash.</p>

<p><strong>GitHub:</strong><br />
<a href="https://github.com/Nyr/wireguard-install" rel="nofollow">https://github.com/Nyr/wireguard-install</a></p>

<p><strong>One-liner:</strong><br />
<code>wget https://github.com/Nyr/wireguard-install/raw/master/wireguard-install.sh &amp;&amp; bash wireguard-install.sh</code></p>

<p><strong>Supported distros:</strong><br />
- Ubuntu<br />
- Debian<br />
- Centos<br />
- Fedora<br />
- AlmaLinux<br />
- Rocky Linux</p>

<p><strong>FAQ:</strong></p>

<p><strong>Will it work in my Raspberry Pi?</strong><br />
Probably, I don't have one to test. Install the raspberrypi-kernel-headers package and hope for the best. But you should consider using a distribution with built-in kernel support when it becomes available.</p>

<p><strong>OpenVZ support?</strong><br />
Yes, via boringtun.</p>

<p><strong>Can you add x feature?</strong><br />
Maybe, if it's worth it. But I'll keep the installer simple and functional, so keep that in mind. Niche features are unlikely to be implemented.</p>

<p><strong>I like the project, how can I help?</strong><br />
Tell other people about it! wireguard-install is new and many people do not yet know about it. Some other low-quality tools based on my <a rel="nofollow" href="https://github.com/Nyr/openvpn-install" title="openvpn-install">openvpn-install</a> work exist, with credits and copyright notices removed. It's a sad sight to me after nearly a decade maintaining openvpn-install.</p>
]]>
        </description>
    </item>
    <item>
        <title>Using part of the IPv6 /64 block to provide public ips to wireguard clients</title>
        <link>https://staging.lowendspirit.com/index.php?p=/discussion/1848/using-part-of-the-ipv6-64-block-to-provide-public-ips-to-wireguard-clients</link>
        <pubDate>Tue, 29 Sep 2020 22:33:34 +0000</pubDate>
        <category>Technical</category>
        <dc:creator>jnraptor</dc:creator>
        <guid isPermaLink="false">1848@/index.php?p=/discussions</guid>
        <description><![CDATA[<p>Thanks to <a href="https://staging.lowendspirit.com/index.php?p=/profile/MaxKVM" rel="nofollow">@MaxKVM</a> for providing an awesome hosting service. I have a ticket with them that they and their upstream provider have not been able to resolve, and I would like to get a second opinion here.</p>

<p>I get a /64 block of IPv6 address of which 1 is allocated to the eth0 interface on my VPS. I then allocate a /112 block to Wireguard outside of the eth0 address, and statically assign IPv6 address from this block to wireguard clients.</p>

<p>MaxKVM does not do routed IPv6, but uses on-link IPv6, so I have to enable proxy_ndp on my VPS so that the eth0 interface would respond to neighbor solication (NS) messages with a neighbor advertisement (NA) for addresses in the /112 block.</p>

<pre><code>sudo sysctl -w net.ipv6.conf.all.proxy_ndp = 1
sudo ip -6 neigh add proxy 2402:xxxx:xxxx:xxxx::200:4 dev eth0
</code></pre>

<p>When I try to ping an external IPv6 address on my wireguard client, the upstream router of the VPS would then ask who has the 2402:xxxx:xxxx:xxxx::200:4 address so that it knows where to route the response to. The issue though is that the upstream router is sending NS messages with a fe80::xxxx:xxxx:xxxx:fdc0 (IPv6 EUI-64 address) and expecting a reply back to that fe80 address. See tcpdump output below.</p>

<pre><code>jon@max1 /etc: sudo tcpdump -i eth0 -v 'icmp6[icmp6type]=icmp6-neighborsolicit or icmp6[icmp6type]=icmp6-neighboradvert'
04:32:07.414482 IP6 (class 0xc0, hlim 255, next-header ICMPv6 (58) payload length: 32) fe80::xxxx:xxxx:xxxx:fdc0 &gt; ff02::1:ff00:4: [icmp6 sum ok] ICMP6, neighbor solicitation, length 32, who has 2402:xxxx:xxxx:xxxx::200:4
      source link-address option (1), length 8 (1): xx:xx:xx:xx:fd:c0
04:32:07.482930 IP6 (hlim 255, next-header ICMPv6 (58) payload length: 32) fe80::yyyy:yyyy:yyyy:2d51 &gt; fe80::xxxx:xxxx:xxxx:fdc0: [icmp6 sum ok] ICMP6, neighbor advertisement, length 32, tgt is 2402:xxxx:xxxx:xxxx::200:4, Flags [solicited]
      destination link-address option (2), length 8 (1): xx:xx:xx:xx:2d:51
04:32:07.550926 IP6 (hlim 255, next-header ICMPv6 (58) payload length: 32) fe80::yyyy:yyyy:yyyy:2d51 &gt; fe80::xxxx:xxxx:xxxx:fdc0: [icmp6 sum ok] ICMP6, neighbor solicitation, length 32, who has fe80::xxxx:xxx:xxxx:fdc0
      source link-address option (1), length 8 (1): xx:xx:xx:xx:2d:51
</code></pre>

<p>Since I enabled ndp proxying, my VPS tries to respond back to the router's fe80 address with a NA, but determines that it cannot, and sends a NS asking for how to route to that address. As a result, my wireguard client gets a host unreachable error because it gets no response.</p>

<p>However, if I ping the global IPv6 address that is the IPv6 gateway (which is also the router) from the wireguard client, I will see a NS coming from that global IPv6 address. And because it is the gateway, my VPS has no problems with responding with a NA and IPv6 starts working on my wireguard client.</p>

<pre><code>04:39:34.124527 IP6 (class 0xc0, hlim 255, next-header ICMPv6 (58) payload length: 32) 2402:zzzz:zzzz::1 &gt; ff02::1:ff00:4: [icmp6 sum ok] ICMP6, neighbor solicitation, length 32, who has 2402:xxxx:xxxx:xxxx::200:4
      source link-address option (1), length 8 (1): xx:xx:xx:xx:fd:c0
04:39:34.718943 IP6 (hlim 255, next-header ICMPv6 (58) payload length: 32) &lt;My Public IPv6 address&gt; &gt; 2402:zzzz:zzzz::1: [icmp6 sum ok] ICMP6, neighbor advertisement, length 32, tgt is 2402:xxxx:xxxx:xxxx::200:4, Flags [solicited]
      destination link-address option (2), length 8 (1): xx:xx:xx:xx:2d:51
</code></pre>

<p>Is it normal to block ICMPv6 access to the fe80 address of the upstream router?</p>

<p>For now though, I have switch to NATed IPv6 for my wireguard clients, but what a waste of the /64 block though.</p>

<p>Thanks<br />
Jonathan</p>
]]>
        </description>
    </item>
    <item>
        <title>iptables rules for WireGuard VPN on NAT OpenVZ VPS running Debian 10?</title>
        <link>https://staging.lowendspirit.com/index.php?p=/discussion/2379/iptables-rules-for-wireguard-vpn-on-nat-openvz-vps-running-debian-10</link>
        <pubDate>Wed, 06 Jan 2021 08:53:23 +0000</pubDate>
        <category>Help</category>
        <dc:creator>Freek</dc:creator>
        <guid isPermaLink="false">2379@/index.php?p=/discussions</guid>
        <description><![CDATA[<p>I'm trying to setup WireGuard VPN (TunSafe for that matter) on my NAT OpenVZ VPS running Debian 10. I have an ansible playbook I created to set it up on 'regular' KVM VPSes that I used. The issue I have is with the iptables rules that are needed to route/forward the traffic between the client and the server properly; they don't seem to work.</p>

<p>On my KVM VPSes, I'm using the iptables rule <code>iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE</code><br />
which would translate to <code>iptables -t nat -A POSTROUTING -o venet0 -j MASQUERADE</code> for OpenVZ I figured. However, iptables on my OpenVZ NAT VPS complains 'Chain 'MASQUERADE' does not exist'.</p>

<p>I already switched to the legacy version of iptables instead of nf using <code>update-alternatives –config iptables</code> but the error remains. And indeed, if I run <code>iptables -L</code> I see only three chains: INPUT, FORWARD and OUTPUT...</p>

<p>In the meantime I found this set of iptables rules that makes the VPN connection work:</p>

<pre><code>#Forwarding
iptables -A FORWARD -i venet0 -o tun0 -j ACCEPT
iptables -A FORWARD -i tun0 -o venet0 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
iptables -t nat -A POSTROUTING -o tun0 -j MASQUERADE
#Hardening?
iptables -A INPUT -i tun0 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
iptables -A INPUT -i tun0 -j DROP
</code></pre>

<p>However, apart from being 5 rules instead of just 1 simple rule, I'm not sure if the rules above are too permissive.</p>

<p>Since I'm no iptables hero myself,  I was hoping someone could help me out here in figuring out the correct set of iptables rules to get WireGuard running on my NAT VPS.</p>

<p>Thanks! <img src="https://staging.lowendspirit.com/plugins/emojiextender/emoji/twitter/smile.png" title=":)" alt=":)" height="18" /></p>
]]>
        </description>
    </item>
    <item>
        <title>Wireguard now in Ubuntu distro repos across 16.04, 18.04, 19.10, 20.04</title>
        <link>https://staging.lowendspirit.com/index.php?p=/discussion/1671/wireguard-now-in-ubuntu-distro-repos-across-16-04-18-04-19-10-20-04</link>
        <pubDate>Mon, 24 Aug 2020 13:58:59 +0000</pubDate>
        <category>Technical</category>
        <dc:creator>vimalware</dc:creator>
        <guid isPermaLink="false">1671@/index.php?p=/discussions</guid>
        <description><![CDATA[<p>Ref: my discovery post about wireguard on Ubuntu no longer needing a 3rd party PPA for installation : <a href="https://talk.lowendspirit.com/discussion/comment/35886/#Comment_35886" rel="nofollow">https://talk.lowendspirit.com/discussion/comment/35886/#Comment_35886</a></p>

<blockquote><div>
  <p>Wireguard is now in bionic-updates.<br />
  PPA+dkms no longer required for bionic users.</p>
</div></blockquote>

<p>Apparently, there was an official announce by Jason Donenfeld (author) on the mailing list on the next  day : Aug 3, 2020.</p>

<p>You can safely remove the PPA config from /etc/apt/sources.d/ if you were previously on it on the supported OSes.<br />
<a href="https://lists.zx2c4.com/pipermail/wireguard/2020-August/005737.html" rel="nofollow">https://lists.zx2c4.com/pipermail/wireguard/2020-August/005737.html</a></p>

<blockquote><div>
  <p>Hi folks,</p>
  
  <p>At long last, Ubuntu now supports WireGuard on releases 20.04, 19.10,<br />
  18.04, and 16.04, which means we've got all currently supported LTS<br />
  releases covered. For that reason, we're in the process of sunsetting<br />
  the PPA that previously provided packages to some users. This email<br />
  details possible changes users might consider.</p>
  
  <p>The right way to install WireGuard on Ubuntu now consists of a single<br />
  command:</p>

<pre><code>$ sudo apt install wireguard
</code></pre>
  
  <p>This "wireguard" package will <em>automatically</em> pull in either one or two<br />
  packages with it:</p>
  
  <p>1) wireguard-tools: this will always be pulled in and provides wg(8)<br />
       and wg-quick(8).<br />
    2) wireguard-dkms: this will only be pulled in if your kernel doesn't<br />
       already come with WireGuard.</p>
  
  <p>As suggested by (2), most Ubuntu kernels now come with WireGuard out of<br />
  the box, even older releases, to which WireGuard has been backported.<br />
  This is great news and will result in much better reliability during<br />
  upgrades, as well as smoother compatibility with SecureBoot.</p>
  
  <p>--snipped--</p>
</div></blockquote>

<p>As a very good general recommendation for people new to wireguard ,<br />
USE <a href="https://github.com/Nyr/wireguard-install/" rel="nofollow">https://github.com/Nyr/wireguard-install/</a>  (read the README first)</p>

<p>I have reviewed nyr's wireguard-install script and I am satisfied that it is well done.<br />
I compared it with a manually configured wireguard tunnel, and all the defaults seem sensible.<br />
Anything that saves you time should be welcomed.<br />
Shoutout to <a href="https://staging.lowendspirit.com/index.php?p=/profile/nyr" rel="nofollow">@nyr</a>, a long time LET/S MVP.</p>
]]>
        </description>
    </item>
    <item>
        <title>Any good WireGuard auto-install scripts out there?</title>
        <link>https://staging.lowendspirit.com/index.php?p=/discussion/537/any-good-wireguard-auto-install-scripts-out-there</link>
        <pubDate>Sat, 25 Jan 2020 22:16:41 +0000</pubDate>
        <category>Technical</category>
        <dc:creator>Amitz</dc:creator>
        <guid isPermaLink="false">537@/index.php?p=/discussions</guid>
        <description><![CDATA[<p>Cheers my dears!</p>

<p>I wonder: Are you aware of any good <a rel="nofollow" href="https://www.wireguard.com">Wireguard</a> auto-install scripts like the one that <a href="https://staging.lowendspirit.com/index.php?p=/profile/Nyr" rel="nofollow">@Nyr</a> provides for OpenVPN? <br />
Would be very grateful for your hints!</p>

<p>Thanks a lot in advance &amp; one love,<br />
the Amitz &amp; his brother</p>
]]>
        </description>
    </item>
   </channel>
</rss>
