> from https://lists.zx2c4.com/pipermail/wireguard/2018-April/002595.html:
> > PS: you write that the "tool does not handle collisions", but does it
> > recognize and/or warn about them? I.e. if a peer with the newly
> > suggested IP exists already - will it warn?
>
> No, no detection is attempte
WireGuard doesn't always work with my devices.
I ran out of options for troubleshooting it so I'm writing here, hoping
for a stable solution. I see it's not a strict devel-only mailing list
but if I'm off-topic I apologize in advance and I'll fade-out in the
background, waiting for better times
Weird. Once again, I did not receive this answer and saw it on the
online archive.
from https://lists.zx2c4.com/pipermail/wireguard/2018-April/002598.html:
> > I could add this to the script, but I figured that for the number of
> > peers I have and for the network ranges I am using, it is utterly
i once had written a script for some openWRT (lede) Routers for Freifunk,
first of all, take ipV6 inside your tunnel, and mix localnet V6
Addresses with the MAC - this way you get a very distinct pair of V6
Address and Key
This assumes that a Server has fixed ip and key.
keyline in Setup is this
u
On 12.04.2018 13:42, Christophe-Marie Duquesne wrote:
> And for certain reasons I prefer to use ip4.
I'd recommend a closer look at those reasons.
In other words: whatever problem prevents you from using IPv6, get them
fixed.
--
-- Matthias Urlichs
signature.asc
Description: OpenPGP digital
On 04/12/2018 01:42 PM, Christophe-Marie Duquesne wrote:
Long story short, you need a proper central server that will find the
next ip address, or you need to stick to ipv6 (and in that case the
address space makes it pointless to do that check).
I think one option is to use the DHCPv4-over-
Hi Riccardo,
Welcome! Not off-topic at all.
Your config looks fine to my eyes; I don't think you _need_ different ports per
endpoint, but I might be wrong.
With your tcpdump, if you can see incoming ICMP requests you should see
outgoing ones too -- make sure they're not coming in on wg0 and g
On 04/09/2018 10:17 PM, Ing. Luis Felipe Domínguez Vega wrote:
Hello people, i currently installed wireguard (So easy !!), but i have a problem
i have ping from server -> client, but not client -> server, when in server I
execute tcpdump -i empresa only i see ICMP request and not response
Hi Luis,
On Tue, Apr 10, 2018 at 3:16 PM, Ing. Luis Felipe Domínguez Vega
wrote:
> 1 - Can I change the length (to 4096 bits for example) of private key? or is
> not neccesary, I am a little paranoic with this kind of security cipher.
>
No. WireGuard uses cryptographic primitives which are
stat
On 8 December 2017 at 19:45, Jason A. Donenfeld wrote:
> Absolutely not. If something like this lands, it will be called
> "Description=" or the like, as another attribute of a peer. There's no
> reason to make the section parser more complicated, when this is
> essentially just another key value
Good evening
the question of such plan:
Is the number of nodes that I can specify in configs be limited? Those if
I'm using a software to organize a ptp network on a principle, for example
500 minus 1 node, this will work?
--
With best regards,
Vyacheslav Yakushev,
Unix system administrator
I installed Wireguard on my Asus router.
Some sites work but others slow or do not response.
I tried adjust MTU but no luck.
Kernel makes following error messages.
Apr 1 16:17:43 kernel: ^[[0;33;41mBLOG ERROR blog_request :blog_key
corruption when adding flow net_p=ffc0100cba60 dir=0
old_ke
First of all a BIG thanks to developers for great job!
There is a main office with WG running on Lede reboot (17.01.4) with ports
51820 and 51821. Until I've two peers, one pointing to port 51820 and 2nd to
51821 everything worked fine.
Now I want to add another one peer to have 3 remote peers i
Hi Vyacheslav,
Yes - Wireguard can handle that easily.
>From one of Jason's posts earlier in the month: "I have a script I run
during development that sets up thousands of interfaces, *each with
**hundreds of thousands of peers* [...]"
So ... you'll be fine :)
E
--
The max is 1048576 per interface, but if this becomes a problem, I can
increase this significantly.
[PS: I'm back from holidays now and I'll be working through the
mailing list backlog over the next few days.]
___
WireGuard mailing list
WireGuard@lists.z
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hello,
A new snapshot, `0.0.20180413`, has been tagged in the git repository.
Please note that this snapshot is, like the rest of the project at this point
in time, experimental, and does not consitute a real release that would be
considered secure
16 matches
Mail list logo