Replies: 52 comments 13 replies
-
I like it. Just saw the release myself. I've read a couple of blogs about this along the way as it has seemed relevant to this project and you know, just linux computing in general. The providers have to support it and it's a separate set of configs I guess? Or is there some interoperability here (sounds too good to be true). |
Beta Was this translation helpful? Give feedback.
-
Hi, I'm also using Wireguard.
|
Beta Was this translation helpful? Give feedback.
-
PIA supports it but has not provided any guidance on setting it up outside of their official clients. https://www.privateinternetaccess.com/forum/discussion/38293/wireguard-on-linux |
Beta Was this translation helpful? Give feedback.
-
Indeed, PIA's client has option to use the WireGuard protocol. Not seen similar update yet for the likes of ExpressVPN client, VPNunlimited client, nor external clients.
|
Beta Was this translation helpful? Give feedback.
-
Looks like NordVPN is officially supporting WireGuard natively now: https://nordvpn.com/blog/one-very-strong-reason-to-be-excited-about-nordlynx/ |
Beta Was this translation helpful? Give feedback.
-
PrivateVPN are doing testing currently |
Beta Was this translation helpful? Give feedback.
-
Mullvad is also supporting and advising Wireguard: |
Beta Was this translation helpful? Give feedback.
-
Torguard also supports Wireguard, and the speed difference is significant. An option to use Wireguard instead of OpenVPN would be awesome. |
Beta Was this translation helpful? Give feedback.
-
vpnunlimited also supports wireguard with config file option |
Beta Was this translation helpful? Give feedback.
-
FYI VPN.ac also support Wireguard since March last year: https://vpn.ac/knowledgebase/120/WireGuard-Status.html |
Beta Was this translation helpful? Give feedback.
-
Windscribe also support WireGuard. |
Beta Was this translation helpful? Give feedback.
-
I too would like to see this docker start using wireguard. I've looked into this, and I found some scripts that will do the connection and get the tokens for wireguard to connect. I hope these scripts will come in handy, really looking forward to using wireguard in this docker! PIA: Cheers, and thanks for the great work! |
Beta Was this translation helpful? Give feedback.
-
That's fantastic work @PaulR1978. @haugene I'd be happy to lend a hand on implementation. |
Beta Was this translation helpful? Give feedback.
-
There are a few wireguard docker containers which might be a good guidance how wireguard could be configured in a docker context, i.e. https://hub.docker.com/r/linuxserver/wireguard |
Beta Was this translation helpful? Give feedback.
-
Great stuff 👍 Thanks for posting, I think these links will be great during implementation! I'm really looking forward to implementing this and would love some assistance @mattstrayer. There are two reasons I want to wait just a little. One of them is that I live in the North (Oslo) and we're probably getting the last wave of warm weather these days. So it's a bit selfish, but the rain and cold is coming and then there will be more time for coding then. Unnecessary sacrifice of points with the gf to insist on locking myself in my room in the sun. But, secondly and more important. We are doing a rewrite of the project structure now. That work has begun on the dev branch and I have another feature branch in the works. The idea is to make the project more modularised so that everything isn't such a "lump" as it is today. The scripts have just grown with new features and now is the time to extract some of the functionality and handle it more generally. At the end of this I also think that the separation between openvpn and transmission will be clearer, so it would be easier to swap the startup from openvpn to wireguard. Once I have merged the next big feature branch I will create a feature branch for wireguard, and then I'm happy to accept and play with any PRs to see how we can build this. But I think there will be many merge conflicts if we start before that. Anyways, let's aim for having Wireguard a part of the 3.0 release of the image 😄 |
Beta Was this translation helpful? Give feedback.
-
Are there any bits of code/configuration you can share which can help progress this ticket? Perhaps push them to a fork and link from here? Thanks. |
Beta Was this translation helpful? Give feedback.
-
I don't mind sharing what little I have accomplished at all, I just don't know if this thread is the right place to write a little guide in. Seeing as it my approach doesn't involve "haugene/docker-transmission-openvpn" but instead three other containers. I just don't want to "clutter" this thread with information that's not relevant to getting a "haugene/docker-transmission-wireguard". I've never forked in my life, but maybe that is the right way to go - I'll look into it :) |
Beta Was this translation helpful? Give feedback.
-
You could start a post in the discussion section. |
Beta Was this translation helpful? Give feedback.
-
I don't know how helpful I can be but if there is anything that can be done to help move forward w/ this I'm happy to try and give a hand :-) |
Beta Was this translation helpful? Give feedback.
-
IPvanish has officially made Wireguard the default VPN connection in their Android app today. |
Beta Was this translation helpful? Give feedback.
-
Hey guys 👋 I finally got around to actually coding something here, and since I'm using PIA as my provider that is the one I've implemented (limited) support for now. I hope that some of you will test it and that we can have a discussion on how to implement more providers here. First. What has been implemented? Something like this should hopefully work 🤞
NB: Before you mount any volumes... As the UID/GID support is not in place yet, Transmission is run as root and any downloaded files will be owned by root as well. Stuff can happen to your transmission-home folder if you mount your existing setup directly. So think twice before doing that. What's the next steps? But then there are providers like PIA where you need to auth, get a token and fetch the IP from the server you're about to connect to. Then we need some scripting. Should there be any common tooling, or just implement it per provider? As you can see from the wireguard branch I've written this new code in Python. I'm tempted to migrate this project to Python as the scripting language. It has some overhead but it's nice to write in a language that is easier to read and has more library support. WDYT? |
Beta Was this translation helpful? Give feedback.
-
Following up on the post above. I just pushed some new changes that allows for mounting a WireGuard config file for the container to use. I signed up for a month of Mullvad service and that's how they do it. You log on and download the config you want. I had to remove the IPv6 part of the
Compared to the config above there are two changes. I'm not setting any of the provider specific environment variables and that will trigger the container to look for a config at Hopefully this will enable a lot more to do some testing 😄 Next steps in the development is probably to get a better code structure and find an elegant way to dynamically load provider specific code (if any) without doing if/elif/elif/elif/else for all the possible providers. I've started something, but let's see where it goes. And then I guess it's time to start looking at UID/GID as well as port-forwarding for PIA after that. |
Beta Was this translation helpful? Give feedback.
-
btw it looks like some of the transmission setting overrides work in the wireguard build:
|
Beta Was this translation helpful? Give feedback.
-
Curious to know if this has gained any more interest? Thanks again for the great work |
Beta Was this translation helpful? Give feedback.
-
As for using wireguard with Nordvpn, there is no easy integration in the project. A possible setup, would be to use a first container based on https://github.com/sfiorini/NordVPN-Wireguard script to generate wireguard configuration, then a simple env settings should be enough to use wireguard with this project (when ready ;) ) Integrating these two (non existing at the moment) containers into one, would had too many nordvpn specific files into a "generic" project. I guess the maintainers will not be fond of. |
Beta Was this translation helpful? Give feedback.
-
I’m trying to setup this Wireguard container with Mullvad on Ubuntu 22.04 and getting the following error: |
Beta Was this translation helpful? Give feedback.
-
Any updates on haugene supported implementation of Wireguard, particularly for NordVPN? |
Beta Was this translation helpful? Give feedback.
-
For NordVPN/NordLynx could this simple script be implemented?
The qrencode could of course be omitted. Result:
The Keys have been obfuscated. No reason anymore to let NordVPN users create their own - always the same - and therefore "insecure" and slow Wireguard configs. Imho. |
Beta Was this translation helpful? Give feedback.
-
Hey, getting this error:
Checking to see if it's something I've done or because this fireguard branch is just not working :) |
Beta Was this translation helpful? Give feedback.
-
For anyone still interested in the implementation here, I've made another attempt at it. Opened a new discussion here: #2608 I suggest we close this one and move the conversation as there's a new image to test and this is a bit outdated now |
Beta Was this translation helpful? Give feedback.
-
With Wireguard hitting 1.0 and becoming part of the Linux 5.6+ kernel, I'd like to request Wireguard be added in addition or in place of OpenVPN. Mostly for its decreased overhead on CPU limited hosts.
Beta Was this translation helpful? Give feedback.
All reactions