{"id":262,"date":"2023-06-07T10:29:42","date_gmt":"2023-06-07T02:29:42","guid":{"rendered":"https:\/\/dailyrenewblog.com\/?p=262"},"modified":"2023-06-07T10:29:42","modified_gmt":"2023-06-07T02:29:42","slug":"%e6%90%ad%e5%bb%ba%e5%9f%ba%e4%ba%8ewireguard%e7%9a%84vpn","status":"publish","type":"post","link":"https:\/\/dailyrenewblog.com\/?p=262","title":{"rendered":"\u642d\u5efa\u57fa\u4e8eWireGuard\u7684VPN"},"content":{"rendered":"\n<p style=\"font-size:15px\">\u7cfb\u7edf\u4e3adebian bookworm<\/p>\n\n\n\n<p style=\"font-size:21px\">1\u65b9\u4fbf\u8d77\u89c1\u5207\u6362\u5230root\u7528\u6237<\/p>\n\n\n\n<p><code>sudo su<\/code><\/p>\n\n\n\n<p style=\"font-size:21px\">2.\u5b89\u88c5WireGuard<\/p>\n\n\n\n<p><code>apt update &amp;&amp; apt install wireguard wireguard-tools openresolv -y<\/code><\/p>\n\n\n\n<p style=\"font-size:21px\">3.\u670d\u52a1\u5668\u9700\u8981\u5f00\u542fipv4\u8f6c\u53d1<\/p>\n\n\n\n<p><code>echo \"net.ipv4.ip_forward = 1\" &gt;&gt; \/etc\/sysctl.conf &amp;&amp; sysctl -p \/etc\/sysctl.conf<\/code><\/p>\n\n\n\n<p style=\"font-size:21px\">4.\u751f\u6210\u79c1\u94a5\u4e0e\u516c\u94a5,\u9ed8\u8ba4\u7684\u914d\u7f6e\u6587\u4ef6\u5939\u50a8\u5b58\u5728<code>\/etc\/wireguard<\/code>\u76ee\u5f55<\/p>\n\n\n\n<p><code>cd \/etc\/wireguard<\/code><\/p>\n\n\n\n<p><code>#\u751f\u6210server\u7684\u516c\u94a5\u4e0e\u79c1\u94a5<\/code><\/p>\n\n\n\n<p><code>wg genkey &gt; server.key &amp;&amp; wg pubkey &lt; server.key &gt; server.key.pub<\/code><br \/><br \/><code>#\u751f\u6210\u5ba2\u6237\u7aef(client1)\u7684\u516c\u94a5\u4e0e\u79c1\u94a5<\/code><\/p>\n\n\n\n<p><code>wg genkey &gt; client1.key &amp;&amp; wg pubkey &lt; <code>client<\/code>1.key &gt; <code>client<\/code>1.key.pub<\/code><\/p>\n\n\n\n<p style=\"font-size:21px\">5.\u751f\u6210\u914d\u7f6e\u6587\u4ef6<\/p>\n\n\n\n<p style=\"font-size:19px\">\u5047\u8bbe<mark style=\"color:#fcb900;background-color:rgba(0,0,0,0)\" class=\"has-inline-color has-luminous-vivid-amber-color\">server<\/mark>\u6709\u516c\u7f51ip<mark style=\"color:#00d084;background-color:rgba(0,0,0,0)\" class=\"has-inline-color has-vivid-green-cyan-color\"><em>223.223.223.223<\/em> <\/mark>\uff0cWireGuard ip\u4e3a<mark style=\"color:#9b51e0;background-color:rgba(0,0,0,0)\" class=\"has-inline-color has-vivid-purple-color\"><em>172.16.100.1<\/em><\/mark>,<mark style=\"color:#fcb900;background-color:rgba(0,0,0,0)\" class=\"has-inline-color has-luminous-vivid-amber-color\">client1<\/mark>\u7684WireGuard ip\u4e3a<mark style=\"color:#9b51e0;background-color:rgba(0,0,0,0)\" class=\"has-inline-color has-vivid-purple-color\"><em>172.16.100.2<\/em><\/mark>\uff0c\u5ba2\u6237\u7aef<mark style=\"color:#fcb900;background-color:rgba(0,0,0,0)\" class=\"has-inline-color has-luminous-vivid-amber-color\">client1<\/mark>\u4e0d\u9700\u8981\u6709\u516c\u7f51ip\uff0cWireGuard\u5b50\u7f51\u63a9\u7801<mark style=\"background-color:rgba(0,0,0,0);color:#9b51e0\" class=\"has-inline-color has-vivid-purple-color\"><em>255.255.255.0<\/em><\/mark><\/p>\n\n\n\n<p style=\"font-size:19px\">\u521b\u5efa<mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-amber-color\">server<\/mark>\u914d\u7f6e\u6587\u4ef6<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<p><code> cat &lt;&lt; EOF &gt; wg0.conf<br \/>\n[Interface]<br \/>\nPrivateKey = $(cat server.key)<br \/>\nAddress = 172.16.100.1\/24<br \/>\nPostUp = iptables -A FORWARD -i wg0 -j ACCEPT;iptables -A FORWARD -o wg0 -j ACCEPT;iptables -t nat -A POSTROUTING -o <mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-green-cyan-color\"><em>eth0<\/em> <\/mark> -j MASQUERADE<br \/>\n#eth0\u4e3a\u7f51\u5361\u63a5\u53e3<br \/>\nPostDown = iptables -D FORWARD -i wg0 -j ACCEPT;iptables -D FORWARD -o wg0 -j ACCEPT;iptables -t nat -D POSTROUTING -o <mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-green-cyan-color\"><em>eth0<\/em> <\/mark> -j MASQUERADE<br \/>\nListenPort = 2408<br \/>\n[Peer] PublicKey = $(cat client1.key.pub)<br \/>\nAllowedIPs = 172.16.100.2\/32<br \/>\nEOF<\/code><\/p>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<p style=\"font-size:19px\">\u5728<mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-amber-color\">server<\/mark>\u4e0a\u542f\u52a8WireGuard\u5e76\u8bbe\u7f6e\u5f00\u673a\u81ea\u52a8\u542f\u52a8<\/p>\n\n\n\n<p><code>wg-quick up wg0 &amp;&amp; systemctl enable wg-quick@wg0<\/code><\/p>\n\n\n\n<p style=\"font-size:19px\">\u521b\u5efa<mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-amber-color\">clinet1<\/mark>\u914d\u7f6e\u6587\u4ef6<\/p>\n\n\n\n<p><code>cat &lt;&lt; EOF &gt; wg1.conf<br \/>\n[Interface]<br \/>\nPrivateKey = $(cat client1.key)<br \/>\nAddress = 172.16.100.2\/24<br \/>\nListenPort = 2408<br \/>\nDNS = 1.1.1.1,8.8.8.8<br \/>\n[Peer] PublicKey = $(cat server.key.pub)<br \/>\nAllowedIPs = 0.0.0.0\/0<br \/>\nEndpoint =<mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-green-cyan-color\"><em>233.233.233.233<\/em><\/mark>:2408<br \/>\nPersistentKeepalive = 25<br \/>\nEOF<\/code><\/p>\n\n\n\n<p style=\"font-size:19px\">\u53c2\u8003<strong>wg1.conf<\/strong>\uff0c\u8bbe\u7f6eWindows,Andriod,IOS\u7cfb\u7edf\u4e0b\u7684WireGuard\u5ba2\u6237\u7aef<\/p>\n\n\n\n<p style=\"font-size:19px\">\u4e3a\u4e86\u4fdd\u8bc1\u79c1\u94a5\u7684\u5b89\u5168\uff0c\u5c06\u914d\u7f6e\u6587\u4ef6\u548c\u79c1\u94a5\u6587\u4ef6\u5bf9\u666e\u901a\u7528\u6237\u4e0d\u53ef\u8bfb<\/p>\n\n\n\n<p><code>chmod 600 \/etc\/wireguard\/{server.key,wg0.conf,client1.key,wg1.conf}<\/code><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u7cfb\u7edf\u4e3adebian bookworm 1\u65b9\u4fbf\u8d77\u89c1\u5207\u6362\u5230root\u7528\u6237 sudo su 2.\u5b89\u88c5WireGuard [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-262","post","type-post","status-publish","format-standard","hentry","category-vpn"],"_links":{"self":[{"href":"https:\/\/dailyrenewblog.com\/index.php?rest_route=\/wp\/v2\/posts\/262","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dailyrenewblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dailyrenewblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dailyrenewblog.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dailyrenewblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=262"}],"version-history":[{"count":0,"href":"https:\/\/dailyrenewblog.com\/index.php?rest_route=\/wp\/v2\/posts\/262\/revisions"}],"wp:attachment":[{"href":"https:\/\/dailyrenewblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=262"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dailyrenewblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=262"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dailyrenewblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=262"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}