Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: wireguard Clear Filter

Show HN: TailGuard – Bridge your WireGuard router into Tailscale via a container

TailGuard A simple Docker container app which allows connecting existing WireGuard servers to the Tailscale network, in case the device running WireGuard is locked in and/or does not support Tailscale binaries. The network topology will look roughly like this: +---------+ | device1 |\ +---------+ \ VPS +---------+ \ +---------+ +-----------+ +-----------+ | device2 |----| tailnet |----| TailGuard |<---->| WireGuard | +---------+ / +---------+ +-----------+ +-----------+ +---------+ / | device

Setting up a home VPN server with WireGuard

Motivation For a moderately security conscious geek like myself, there can be a number of reasons to want to set up a home VPN server: Accessing your home computer via screen sharing without exposing it to the Internet (and thereby to potential evil-doers). Accessing servers with IP white lists (common case for security hardened IT systems). Accessing county-IP-filtered things like Netflix while travelling. Browsing privately from insecure WiFi networks. Getting access to services that are blo

Using the Internet without IPv4 connectivity

Using the Internet without IPv4 connectivity A few days ago my ISP broke the IPv4 connectivity from my router after a power cut. Fortunately IPv6 connectivity still worked fine, but only a small fraction of websites were accessible. In this post I'll cover how Linux, WireGuard, and Hetzner came to the rescue - keeping the whole internet usable with only an IPv6 connection. Opinions expressed are solely my own and do not express the views or opinions of my employer. Background One morning I

Using the internet without IPv4 connectivity

Using the Internet without IPv4 connectivity A few days ago my ISP broke the IPv4 connectivity from my router after a power cut. Fortunately IPv6 connectivity still worked fine, but only a small fraction of websites were accessible. In this post I'll cover how Linux, WireGuard, and Hetzner came to the rescue - keeping the whole internet usable with only an IPv6 connection. Opinions expressed are solely my own and do not express the views or opinions of my employer. Background One morning I

Locally hosting an internet-connected server

[Interface] PrivateKey = privkeyhere ListenPort = 51820 Address = localaddr/32 [Peer] Endpoint = VPS:51820 PublicKey = pubkeyhere AllowedIPs = VPS/0 [Interface] Address = vpswgaddr/32 SaveConfig = true ListenPort = 51820 PrivateKey = privkeyhere [Peer] PublicKey = pubkeyhere AllowedIPs = localaddr/32 321.985.520.309 867.420.696.005 iptables -t nat -A PREROUTING -p tcp -d 321.985.520.309 -j DNAT --to-destination 867.420.696.005 321.985.520.309 867.420.696.005 net.

Linux kernel WireGuard can go 'fast' on decent hardware

I'm used to thinking of encryption as a slow thing that can't deliver anywhere near to network saturation, even on basic gigabit Ethernet connections. This is broadly the experience we see with our current VPN servers, which struggle to turn in more than relatively anemic bandwidth with OpenVPN and L2TP, and so for a long time I assumed it would also be our experience with WireGuard if we tried to put anything serious behind it. I'd seen the 2023 Tailscale blog post about this but discounted it