WireGuard is a modern, simple, and secure VPN that utilizes start-of-the-art cryptography. Considered an alternative to OpenVPN, it can be used to create secure connections. Its goals are to be fast, simple, lean, and easy to configure. Wireguard consists of two components: userspace tools and a kernel module.
Wireguard is written and maintained by Jason A. Donenfeld (zx2c4), a Gentoo developer.
Official and potentially more up-to-date installation instructions can be found upstream.
Kernels less than 5.6
Linux kernels less than 5.6 (<=5.5) did not include Wireguard as a feature in the upstream kernel code. Adding Wireguard support to these (older) kernels is possible via additional modules emerged below.
Attempting to add WireGuard support without having a few specific kernel symbols enabled will cause the emerge to fail. A few of the symbols are dependencies and can only be set by setting other options. Perform the necessary work to have the following symbols enabled before moving on to the next section:
- CONFIG_NET - For basic networking support.
- CONFIG_INET - For basic IP support.
- CONFIG_NET_UDP_TUNNEL - For sending and receiving UDP packets.
- CONFIG_NF_CONNTRACK - For determining the source address when constructing ICMP packets.
- CONFIG_NETFILTER_XT_MATCH_HASHLIMIT - For ratelimiting when under DoS attacks.
- CONFIG_IP6_NF_IPTABLES - Only if using CONFIG_IPV6 for ratelimiting when under DoS attacks.
- CONFIG_CRYPTO_BLKCIPHER - For doing scatter-gather I/O.
- CONFIG_PADATA - For parallel crypto (only available on multi-core machines).
[*] Networking support --> Networking options --> [*] TCP/IP networking [*] IP: Foo (IP protocols) over UDP [*] Network packet filtering framework (Netfilter) --> [*] Advanced netfilter configuration Core Netfilter Configuration --> [*] Netfilter connection tracking support [*] Netfilter Xtables support [*] "hashlimit" match support [*] IPv6: Netfilter Configuration (only if using IPv6) [*] Cryptographic API --> [*] Cryptographic algorithm manager [*] Parallel crypto engine
Kernel 5.6 and higher
Starting with kernel 5.6, Wireguard is included in the upstream kernel sources. It is enabled via the following menuconfig option:
Device Drivers ---> [*] Network device support ---> [*] Network core driver support <*> WireGuard secure network tunnel
USE flags for net-vpn/wireguard-tools Required tools for WireGuard, such as wg(8) and wg-quick(8)
Install the wireguard-tools package to generate encryption keys and manage Wireguard interfaces:
emerge --ask net-vpn/wireguard-tools
Less than 5.6
For Linux kernels less than 5.6 also install the modules:
emerge --ask net-vpn/wireguard-modules
Kernel module loading
When Wireguard support has been added as a module, be sure to instruct the selected init system to load the WireGuard kernel modules when the system boots. This will be slightly different for each init system.
Be sure the modules service is set to run in the boot runlevel:
rc-update add modules boot
systemd users will need to create a new file in the /etc/modules-load.d/ directory in order to instruct the module loading service to get the module loaded on boot:
Generate a keypair
Before using WireGuard a keypair has to be generated. This can be accomplished using wg(8):
$(umask 077; wg genkey | tee privatekey | wg pubkey > publickey)
Various network management methods are available to supervise Wireguard tunnels.
Configuration can be automated using the wg-quick utility, which will create tunnels using configuration files in the /etc/wireguard file.
For more information on wg-quick consult man 8 wg-quick.
The net-misc/netifrc scripts (typically used with OpenRC) can be used to quickly bring Wireguard interfaces. Presuming a correctly defined /etc/wireguard/wg0.conf file has been created:
ln -s /etc/init.d/wg-quick /etc/init.d/wg-quick.wg0
rc-update add wg-quick.wg0 default
To bring up the interface now:
Avoid using wg-quick
Using the wg-quick USE flag will add virtual/resolvconf as dependency. For systems that want to keep the resolv.conf file from being modified by external utilities this might be a deal breaker. net-misc/netifrc now has native support for wireguard and wg-quick is no longer required. This assumes the wireguard interface configuration is defined in /etc/wg0.conf:
Create the symlink and bring the interface up when the system boots:
ln -s /etc/init.d/net.lo /etc/init.d/net.wg0
rc-update add net.wg0 default
Bring the wireguard interface up:
rc-service net.wg0 start
Wireguard is officially supported by NetworkManager as of version 1.16. That stated, as of version 1.26.6, managing Wireguard is only possible through the nmcli command.
NetworkManager requires runtime dependencies (command-line interface tools) from the net-vpn/wireguard-tools package in order to manage connection profiles. Be sure this package has been emerged before attempting to use nmcli command.
In order for non-root users to edit network connections, each user must be added to the plugdev group.
After creating a Wireguard configuration file (such as wg0.conf), the file can be imported into NetworkManager as a connection profile:
nmcli connection import type wireguard file /path/to/wg0.conf
After the configuration has been imported, the connection can be activated via:
nmcli connection up wg0
See the NetworkManager article for more details on managing connection profiles.
When removing Wireguard support be sure to each for all installed packages:
emerge --ask --search wireguard
For example, to remove the userspace tools:
emerge --ask --depclean --verbose net-vpn/wireguard-tools
Rebuilding modules on kernel upgrades for kernels less than 5.6
When upgrading to a newer kernel that is less than version 5.6 (version 4.9.x LTS is a fitting example), it is important to re-emerge the Wireguard kernel modules. This is handled by default when using genkernel, but can be quickly performed using the following auto-generated Portage set:
emerge --ask @module-rebuild
- OpenVPN — software that enables the creation of secure point-to-point or site-to-site connections.
- http://lkml.iu.edu/hypermail/linux/kernel/1606.3/02833.html - The initial Request for Comments post to the Kernel Mailing List.
- https://latacora.singles/there-will-be - A blog post complementing WireGuard.