SIGN IN / UP
    opened image

    VPN WireGuard has a high speed.
    The VPN client redirects all of its traffic through an encrypted tunnel to the server. The server applies NAT to the client's traffic, and as a result, it will appear as if the client is browsing the Internet with the server's IP address. SUPPORTS BOTH IPV4 AND IPV6


    You need to download the WireGuard client, with which we will connect to the server.
    For Windows 7, 8, 8.1, 10, 2012, 2016, 2019, for macOS X, for Android or IOS, you can download from the official website:
    https://www.wireguard.com/install/

    Supported repositories:

    Ubuntu >= 16.04
    Debian >= 10
    Fedora
    CentOS
    Arch Linux
    Oracle Linux



    1. INSTALLATION (Recommending install on Ubuntu 20.04)

     

    curl -O https://raw.githubusercontent.com/angristan/wireguard-install/master/wireguard-install.sh
    chmod +x wireguard-install.sh
    ./wireguard-install.sh

     

     


    It will install WireGuard (kernel module and tools) on the server, configure it, create a systemd service and a client config file.


    2. RUNING THE SCRIPT AGAIN CAN DELETE/CREATE USER, INSTALL/UNINSTALL WIREGUARD VPN

     

     

     

     

     

    ./wireguard-install.sh

     


    3. REGENERATE QR CODE IN THE CONSOLE

     

     

     

     

    qrencode -t ansiutf8 -l L < /root/*-client-*.conf

     



    4. IT IS POSSIBLE TO GENERATE A QR-CODE THROUGH THE ONLINE RESOURCE.

    http://qrcoder.ru/

    5. CHECKING ANONIMITY.

    https://browserleaks.com/ip - should not show Local IP address


    https://2ip.io/privacy/ - Can be achieved - Probability of using anonymization tools: 0%

    TIME ZONE DIFFERENCE
    Set the time (on a personal PC) of the server that is used as VPN

    BLOCKING ICMP MESSAGES IN LINUX

    echo "1" > /proc/sys/net/ipv4/icmp_echo_ignore_all

    For Ubuntu:

     

     

     

     

    echo "net.ipv4.icmp_echo_ignore_all = 1" >> /etc/sysctl.conf
    sysctl -p

     


    For Centos:

     

     

     

     

    echo "net.ipv4.icmp_echo_ignore_all = 1" >> /etc/sysctl.conf
    sysctl -p

     



    MANDATORY FOR ANDROID/IPHONE SMARTPHONES

    VPN fingerprint "fires" the use of VPN ipsec / vpn (mtu 1280)

    Force power on MTU 1500

    In the main configuration file /etc/wireguard/wg0.conf set MTU = 1500

     

     

     

     

    [Interface]
    PrivateKey = **********
    Address = *******
    ListenPort = ****
    MTU = 1500

     



    Also, in the client configuration file /root/*-client-*.conf, write MTU = 1500

     

     

     

     

    [Interface]
    PrivateKey = **********
    Address = *******
    MTU = 1500

     



    After that, you need to reload the wg0 interface:

     

     

     

     

     wg-quick down wg0 && wg-quick up wg0

     



    If you experience poor speed or page loading (Windows)

    In the main configuration file /etc/wireguard/wg0.conf set MTU = 1420
    In the client configuration file /root/*-client-*.conf, write MTU = 1420