Last active
December 10, 2022 10:46
-
-
Save Sayegh7/9184e3b7f4092459ca582f8d8d1143a5 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
if [ "$EUID" -ne 0 ]; then | |
echo "You need to run this script as root" | |
exit 1 | |
fi | |
if [ "$(systemd-detect-virt)" == "openvz" ]; then | |
echo "OpenVZ is not supported" | |
exit | |
fi | |
if [ "$(systemd-detect-virt)" == "lxc" ]; then | |
echo "LXC is not supported (yet)." | |
echo "WireGuard can technically run in an LXC container," | |
echo "but the kernel module has to be installed on the host," | |
echo "the container has to be run with some specific parameters" | |
echo "and only the tools need to be installed in the container." | |
exit | |
fi | |
# Check OS version | |
if [[ -e /etc/debian_version ]]; then | |
source /etc/os-release | |
OS=$ID # debian or ubuntu | |
elif [[ -e /etc/fedora-release ]]; then | |
OS=fedora | |
elif [[ -e /etc/centos-release ]]; then | |
OS=centos | |
elif [[ -e /etc/arch-release ]]; then | |
OS=arch | |
else | |
echo "Looks like you aren't running this installer on a Debian, Ubuntu, Fedora, CentOS or Arch Linux system" | |
exit 1 | |
fi | |
SERVER_PUB_IPV4="$(curl http://checkip.amazonaws.com)" | |
SERVER_PUB_NIC="eth0" | |
SERVER_WG_NIC="wg0" | |
SERVER_WG_IPV4="10.66.66.1" | |
SERVER_WG_IPV6="fd42:42:42::1" | |
SERVER_PORT=51820 | |
CLIENT_WG_IPV4="10.66.66.2" | |
CLIENT_WG_IPV6="fd42:42:42::2" | |
# Adguard DNS by default | |
CLIENT_DNS_1="176.103.130.130" | |
CLIENT_DNS_2="176.103.130.131" | |
# Ask for pre-shared symmetric key | |
IS_PRE_SYMM="n" | |
echo "IPv4 Detected" | |
ENDPOINT="$SERVER_PUB_IPV4:$SERVER_PORT" | |
# Install WireGuard tools and module | |
if [[ "$OS" = 'ubuntu' ]]; then | |
add-apt-repository ppa:wireguard/wireguard | |
apt-get update --assume-yes | |
apt-get install "linux-headers-$(uname -r)" --assume-yes | |
apt-get install wireguard iptables --assume-yes | |
elif [[ "$OS" = 'debian' ]]; then | |
echo "deb http://deb.debian.org/debian/ unstable main" > /etc/apt/sources.list.d/unstable.list | |
printf 'Package: *\nPin: release a=unstable\nPin-Priority: 90\n' > /etc/apt/preferences.d/limit-unstable | |
apt update | |
apt-get install "linux-headers-$(uname -r)" | |
apt install wireguard iptables | |
elif [[ "$OS" = 'fedora' ]]; then | |
dnf copr enable jdoss/wireguard | |
dnf install wireguard-dkms wireguard-tools iptables | |
elif [[ "$OS" = 'centos' ]]; then | |
curl -Lo /etc/yum.repos.d/wireguard.repo https://copr.fedorainfracloud.org/coprs/jdoss/wireguard/repo/epel-7/jdoss-wireguard-epel-7.repo | |
yum install epel-release | |
yum install wireguard-dkms wireguard-tools iptables | |
elif [[ "$OS" = 'arch' ]]; then | |
pacman -S linux-headers | |
pacman -S wireguard-tools iptables wireguard-arch | |
fi | |
# Make sure the directory exists (this does not seem the be the case on fedora) | |
mkdir /etc/wireguard > /dev/null 2>&1 | |
# Generate key pair for the server | |
SERVER_PRIV_KEY=$(wg genkey) | |
SERVER_PUB_KEY=$(echo "$SERVER_PRIV_KEY" | wg pubkey) | |
# Generate key pair for the server | |
CLIENT_PRIV_KEY=$(wg genkey) | |
CLIENT_PUB_KEY=$(echo "$CLIENT_PRIV_KEY" | wg pubkey) | |
# Add server interface | |
echo "[Interface] | |
Address = $SERVER_WG_IPV4/24,$SERVER_WG_IPV6/64 | |
ListenPort = $SERVER_PORT | |
PrivateKey = $SERVER_PRIV_KEY | |
PostUp = iptables -A FORWARD -i $SERVER_WG_NIC -j ACCEPT; iptables -t nat -A POSTROUTING -o $SERVER_PUB_NIC -j MASQUERADE; ip6tables -A FORWARD -i $SERVER_WG_NIC -j ACCEPT; ip6tables -t nat -A POSTROUTING -o $SERVER_PUB_NIC -j MASQUERADE | |
PostDown = iptables -D FORWARD -i $SERVER_WG_NIC -j ACCEPT; iptables -t nat -D POSTROUTING -o $SERVER_PUB_NIC -j MASQUERADE; ip6tables -D FORWARD -i $SERVER_WG_NIC -j ACCEPT; ip6tables -t nat -D POSTROUTING -o $SERVER_PUB_NIC -j MASQUERADE" > "/etc/wireguard/$SERVER_WG_NIC.conf" | |
# Add the client as a peer to the server | |
echo "[Peer] | |
PublicKey = $CLIENT_PUB_KEY | |
AllowedIPs = $CLIENT_WG_IPV4/32,$CLIENT_WG_IPV6/128" >> "/etc/wireguard/$SERVER_WG_NIC.conf" | |
# Create client file with interface | |
echo "[Interface] | |
PrivateKey = $CLIENT_PRIV_KEY | |
Address = $CLIENT_WG_IPV4/24,$CLIENT_WG_IPV6/64 | |
DNS = $CLIENT_DNS_1,$CLIENT_DNS_2" > "$HOME/$SERVER_WG_NIC-client.conf" | |
# Add the server as a peer to the client | |
echo "[Peer] | |
PublicKey = $SERVER_PUB_KEY | |
Endpoint = $ENDPOINT | |
AllowedIPs = 0.0.0.0/0,::/0" >> "$HOME/$SERVER_WG_NIC-client.conf" | |
# Add pre shared symmetric key to respective files | |
case "$IS_PRE_SYMM" in | |
[yY][eE][sS]|[yY]) | |
CLIENT_SYMM_PRE_KEY=$( wg genpsk ) | |
echo "PresharedKey = $CLIENT_SYMM_PRE_KEY" >> "/etc/wireguard/$SERVER_WG_NIC.conf" | |
echo "PresharedKey = $CLIENT_SYMM_PRE_KEY" >> "$HOME/$SERVER_WG_NIC-client.conf" | |
;; | |
esac | |
chmod 600 -R /etc/wireguard/ | |
# Enable routing on the server | |
echo "net.ipv4.ip_forward = 1 | |
net.ipv6.conf.all.forwarding = 1" > /etc/sysctl.d/wg.conf | |
sysctl --system | |
systemctl start "wg-quick@$SERVER_WG_NIC" | |
systemctl enable "wg-quick@$SERVER_WG_NIC" |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment