wg-access-server is a single binary file that contains a WireGuard VPN server and a web user interface for device management. We support user authentication, 1-click device enrollment that works with macOS, Linux, Windows, iOS/iPadOS and Android including QR codes. Furthermore, you can choose from different network isolation modes for a better control over connected devices. Generally speaking you can customize the project to your use-case with relative ease.
This project aims to provide a simple VPN solution for developers, homelab enthusiasts, and anyone else who is adventurous.
This is a fork of the original work of place1, maintained by Freifunk Munich. Since the upstream is currently unmaintained, we try to add new features and keep the project up to date and in a working state.
This fork supports IPv6. The VPN can run in dual-stack, IPv6-only or IPv4-only mode. NAT can be disabled separately for IPv4 and IPv6.
Contributions are always welcome so that we can offer new bug fixes, features and improvements to the users of this project.
- Pluggable authentication using OpenID Connect
- Authentication using GitLab
- PostgreSQL, MySQL or SQLite3 storage backend
- WireGuard client configuration QR codes
- IPv6 support in tunnel
- Caching DNS proxy (stub resolver)
- Client isolation (optional)
- WireGuard kernel module for improved performance and latency
- Automatic fallback to embedded userspace implementation for easy container deployment
- Dark Mode and Light Mode for user preference
Quick Links:
Here is a quick command to start the wg-access-server for the first time and try it out.
export WG_ADMIN_PASSWORD=$(tr -cd '[:alnum:]' < /dev/urandom | fold -w30 | head -n1)
export WG_WIREGUARD_PRIVATE_KEY="$(wg genkey)"
echo "Your automatically generated admin password for the wg-access-server's web interface: $WG_ADMIN_PASSWORD"
docker run \
-it \
--rm \
--cap-add NET_ADMIN \
--cap-add SYS_MODULE \
--device /dev/net/tun:/dev/net/tun \
--sysctl net.ipv6.conf.all.disable_ipv6=0 \
--sysctl net.ipv6.conf.all.forwarding=1 \
-v wg-access-server-data:/data \
-v /lib/modules:/lib/modules:ro \
-e "WG_ADMIN_PASSWORD=$WG_ADMIN_PASSWORD" \
-e "WG_WIREGUARD_PRIVATE_KEY=$WG_WIREGUARD_PRIVATE_KEY" \
-p 8000:8000/tcp \
-p 51820:51820/udp \
ghcr.io/freifunkmuc/wg-access-server:latest
Note: This command includes the SYS_MODULE
capability which essentially gives the container root privileges over the host system and an attacker could easily break out of the container. See the Docker instructions for the recommended way to run the container.
If the wg-access-server is accessible via LAN or a network you are in, you can directly connect your phone to the VPN. You have to call the webfrontent of the project for this. Normally, this is done via the IP address of the device or server on which the wg-access-server is running followed by the standard port 8000, via which the web interface can be reached. For most deployments something like this should work: http://192.168.0.XX:8000
If the project is running locally on the computer, you can easily connect to the web interface by connecting to http://localhost:8000 in the browser.
Please also read the Docker instructions for general information regarding Docker deployments.
Download the the docker-compose.yml file from the repo and run the following command.
export WG_ADMIN_PASSWORD=$(tr -cd '[:alnum:]' < /dev/urandom | fold -w30 | head -n1)
export WG_WIREGUARD_PRIVATE_KEY="$(wg genkey)"
echo "Your automatically generated admin password for the wg-access-server's web interface: $WG_ADMIN_PASSWORD"
docker-compose up
You can connect to the web server on the local machine browser at http://localhost:8000
If you open your browser to your machine's LAN IP address you'll be able to connect your phone using the UI and QR code!
The Helm chart included in this repository has been removed due to lack of expertise on our side and nobody answering
our call for aid.
If you are a Kubernetes/Helm user, please consider stepping up and taking over maintenance of the chart at
https://github.com/freifunkMUC/wg-access-server-chart.
See the Releases section
The software consists of a Golang server and a React app.
If you want to make changes to the project locally, you can do so relatively easily with the following steps.
- Run
cd website && npm install && npm start
to get the frontend running on:3000
. - Run
sudo go run ./main.go
to get the server running on:8000
.
Here are some notes on development configuration:
- sudo is required because the server uses iptables/ip to configure the VPN network
- access to the website is on
:3000
and API requests are redirected to:8000
thanks to webpack - in-memory storage and generated WireGuard keys are used
The client communicates with the server via gRPC web. You can edit the API specification in ./proto/*.proto
.
After changing a service or message definition, you must regenerate the server and client code:
./codegen.sh
cd website && npm run codegen
Or use the Dockerfile at proto/Dockerfile
:
docker build -f proto/Dockerfile --target proto-js -t wg-access-server-proto:js .
docker build -f proto/Dockerfile --target proto-go -t wg-access-server-proto:go .
docker run --rm -v `pwd`/proto:/proto -v `pwd`/website/src/sdk:/code/src/sdk wg-access-server-proto:js
docker run --rm -v `pwd`/proto:/code/proto wg-access-server-proto:go