Wireguard VPN

From Kicksecure
Jump to navigation Jump to search

todo

Documentation for this is incomplete. Contributions are happily considered! See this for potential alternatives.

Installation

[edit]

Note: In Kicksecure 13 and above (Debian trixie based), likely iptables will be no longer required.

Install package(s) wireguard wireguard-tools iptables resolvconf following these instructions:

1 Platform specific notice.

2 Update the package lists and upgrade the system.

sudo apt update && sudo apt full-upgrade

3 Install the wireguard wireguard-tools iptables resolvconf package(s).

Using apt command line --no-install-recommends option is in most cases optional.

sudo apt install --no-install-recommends wireguard wireguard-tools iptables resolvconf

4 Platform specific notice.

  • Kicksecure: No special notice.
  • Kicksecure-Qubes: Shut down Template and restart App Qubes based on it as per Qubes Template Modification.

5 Done.

The procedure of installing package(s) wireguard wireguard-tools iptables resolvconf is complete.

Configuration

[edit]

Open file /etc/wireguard/wg0.conf in an editor with administrative ("root") rights.

1 Select your platform.

Kicksecure

2 Notes.

  • Sudoedit guidance: See Open File with Root Rights for details on why using sudoedit improves security and how to use it.
  • Editor requirement: Close Featherpad (or the chosen text editor) before running the sudoedit command.

3 Open the file with root rights.

sudoedit /etc/wireguard/wg0.conf

Kicksecure-Qubes

2 Notes.

  • Sudoedit guidance: See Open File with Root Rights for details on why using sudoedit improves security and how to use it.
  • Editor requirement: Close Featherpad (or the chosen text editor) before running the sudoedit command.
  • Template requirement: When using Kicksecure-Qubes, this must be done inside the Template.

3 Open the file with root rights.

sudoedit /etc/wireguard/wg0.conf

4 Notes.

  • Shut down Template: After applying this change, shut down the Template.
  • Restart App Qubes: All App Qubes based on the Template need to be restarted if they were already running.
  • Qubes persistence: See also Qubes Persistence
  • General procedure: This is a general procedure required for Qubes and is unspecific to Kicksecure-Qubes.

Others and Alternatives

2 Notes.

  • Example only: This is just an example. Other tools could achieve the same goal.
  • Troubleshooting and alternatives: If this example does not work for you, or if you are not using Kicksecure, please refer to Open File with Root Rights.

3 Open the file with root rights.

sudoedit /etc/wireguard/wg0.conf

Paste.

Note: Adjust.

[Interface] PrivateKey = Address = DNS = DNS = [Peer] PublicKey = PresharedKey = AllowedIPs = Endpoint = PersistentKeepalive = 25

Start

[edit]

open vpn

sudo wg-quick up wg0

Stop

[edit]

close vpn

sudo wg-quick down wg0

Autostart

[edit]

sudo systemctl enable wg-quick@wg0


Notification image

We believe security software like Kicksecure needs to remain Open Source and independent. Would you help sustain and grow the project? Learn more about our 13 year success story and maybe DONATE!