WireGuard is an open-source software application and protocol that implements virtual private network (VPN) techniques to create secure point-to-point connections in routed or bridged configurations. It is run as a module inside the Linux kernel and aims for better performance than the IPsec and OpenVPN tunneling protocols. It is designed as a general purpose VPN for running on embedded interfaces and super computers alike, fit for many different circumstances. It uses UDP.
WireGuard is a peer-to-peer VPN service which may be configured depending on your use case. The protocol itself treats all peers equally, so there is nothing that distinguishes a server from a client. That said, this VPN protocol is highly flexible and can be used as a direct peer-to-peer communications channel, server-client type relationship or in a site-to-site configuration.
WireGuard generally relies on relies on public-key cryptography. This means you should generate private keys on the respective peers and exchange only their public keys. In addition for better security, you can also generate and exchange a pre-shared key. Each 2 peers should use a common pre-shared key.
WireGuard is time sensitive. If the peer's clock is out of sync, the VPN tunnel may refuse to pass traffic. The issue could be caused by incorrect NTP configuration, or race conditions between netifd and sysntpd services, or related to specific hardware. Setting time forward on the client side can work around the problem.
Generate a key pair of private and public keys.
wg genkey | tee wg.key | wg pubkey > wg.pub
Navigate to LuCI → System → Startup → Initscripts and click to network → Restart.
To create a new WireGuard interface go to LuCI → Network → Interfaces → Add new interface… and select WireGuard VPN from the Protocol dropdown menu.
The menu LuCI → Status → WireGuard Status shows information about the WireGuard VPN.