README.md 3.37 KB
Newer Older
cmulk's avatar
cmulk committed
1
# wireguard-docker
cmulk's avatar
cmulk committed
2
3
Wireguard setup in Docker on Debian  kernel meant for a simple personal VPN
There are currently 2 branches, stretch and buster. Use the branch that corresponds to your host machine if the kernel module install feature is going to be used.
cmulk's avatar
cmulk committed
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18

## Overview
This docker image and configuration is my simple version of a wireguard personal VPN, used for the goal of security over insecure (public) networks, not necessarily for Internet anonymity. The docker images uses debian stable, and the host OS must also use the debian stable kernel, since the image will build the wireguard kernel modules on first run. As such, the hosts /lib/modules directory also needs to be mounted to the container on the first run to install the module (see the Running section below). Thanks to [activeeos/wireguard-docker](https://github.com/activeeos/wireguard-docker) for the general structure of the docker image. It is the same concept just built on Ubuntu 16.04.

In my use case, I'm running the wireguard docker image on a free-tier Google Cloud Platform debian virtual machine and connect to it with Android, Linux, and a GL-Inet router as clients.

## Build
```
docker build -t wireguard:local github.com/cmulk/wireguard-docker
```

## Run
### First Run
If the wireguard kernel module is not already installed on the __host__ system, use this first run command to install it:
```
cmulk's avatar
cmulk committed
19
docker run -it --rm --cap-add sys_module -v /lib/modules:/lib/modules cmulk/wireguard-docker:stretch install-module
cmulk's avatar
cmulk committed
20
21
22
23
```

### Normal Run
```
cmulk's avatar
cmulk committed
24
docker run --cap-add net_admin --cap-add sys_module -v <config volume or host dir>:/etc/wireguard -p <externalport>:<dockerport>/udp cmulk/wireguard-docker:stretch
cmulk's avatar
cmulk committed
25
26
```
Example:
cmulk's avatar
cmulk committed
27
```
cmulk's avatar
cmulk committed
28
docker run --cap-add net_admin --cap-add sys_module -v wireguard_conf:/etc/wireguard -p 5555:5555/udp cmulk/wireguard-docker:stretch
cmulk's avatar
cmulk committed
29
```
cmulk's avatar
cmulk committed
30
31
32
### Generate Keys
This shortcut can be used to generate and display public/private key pairs to use for the server or clients
```
cmulk's avatar
cmulk committed
33
docker run -it --rm cmulk/wireguard-docker:stretch genkeys
cmulk's avatar
cmulk committed
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
```

## Configuration
Sample server configuration to go in /etc/wireguard:
```
[Interface]
Address = 192.168.20.1/24
PrivateKey = <server_private_key>
ListenPort = 5555

[Peer]
PublicKey = <client_public_key>
AllowedIPs = 192.168.20.2
```
Sample client configuration:
```
[Interface]
Address = 192.168.20.2/24
PrivateKey = <client_private_key>
ListenPort = 0 #needed for some clients to accept the config

[Peer]
PublicKey = <server_public_key>
Endpoint = <server_public_ip>:5555
AllowedIPs = 0.0.0.0/0,::/0 #makes sure ALL traffic routed through VPN
PersistentKeepalive = 25
```
cmulk's avatar
cmulk committed
61
62
## Other Notes
- This Docker image also has a iptables NAT (MASQUERADE) rule already configured to make traffic through the VPN to the Internet work.
cmulk's avatar
cmulk committed
63
- For some clients (a GL.inet router in my case) you may have trouble with HTTPS (SSL/TLS) due to the MTU on the VPN. Ping and HTTP work fine but HTTPS does not for some sites. This can be fixed with [MSS Clamping](https://www.tldp.org/HOWTO/Adv-Routing-HOWTO/lartc.cookbook.mtu-mss.html). This is simply a checkbox in the OpenWRT Firewall settings interface.
cmulk's avatar
cmulk committed
64
65
66
67
68
69
70

## docker-compose
Sample docker-compose.yml
```
version: "2"
services:
 vpn:
cmulk's avatar
cmulk committed
71
  image: cmulk/wireguard-docker:stretch
cmulk's avatar
cmulk committed
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
  volumes:
   - data:/etc/wireguard
  networks:
   - net
  ports:
   - 5555:5555/udp
  restart: unless-stopped
  cap_add:
   - NET_ADMIN
   - SYS_MODULE

networks:
  net:

volumes:
 data:
  driver: local
```