CollabVPN: Difference between revisions

Wikimedia didn't like my formatting, oops!
(added link to forkie.dev)
(Wikimedia didn't like my formatting, oops!)
(One intermediate revision by the same user not shown)
* It is currently hosted on a VPS at [https://www.urdn.com.ua/ Ukrainian Data Network] but there are plans to move it to her own ASN once she is an LIR at RIPE.
* WireGuard Endpoint: <code>collabvpn.julias.zone:80</code>
 
==== Used IP-Addresses ====
{| class="wikitable"
|+
!Used For
!Pool
|These IPv4 ports can be routed to peers on demand.
|}
 
=== Tutorials ===
 
==== Using systemd-networkd ====
 
# Create a file named <code>/etc/systemd/network/collabvpn.netdev</code>
# Put the following content into it: https://repo.julias.zone/collabvpn/netdev.txt
# Set the file permissions using <code>chown root:systemd-network /etc/systemd/network/collabvpn.netdev; chmod 0640 /etc/systemd/network/collabvpn.netdev</code>
# You can generate a keypair using <code>KEY=`wg genkey`; echo PrivateKey $KEY; echo PublicKey `echo $KEY | wg pubkey`</code>. IMPORTANT: Keep your PrivateKey PRIVATE, as the name states it. DO NOT share it with anyone.
# Put the PrivateKey into the config.
# Send Julia your PublicKey, see below. Wait for her to respond and then continue.
# Create a file named <code>/etc/systemd/network/collabvpn.network</code>
# Put the following content into it https://repo.julias.zone/collabvpn/network.txt
# Fill in your addresses. IMPORTANT: Do not fill in your /64 as your address, fill in your /128. Your /64 is routed over that address and will be unusable if configured improperly.
# Setup a NAT for IPv4, setup a router advertisements for IPv6 and you're good to go.
 
=== Requesting a Tunnel ===
 
* Further technical details like blocked ports
* Tutorial using ifupdown/wg-quick and radvd
* Extend tutorial for systemd-networkd to include DHCPv4 server and router advertisements
14

edits