docker-wireguard/README.md

26 lines
1.6 KiB
Markdown
Raw Normal View History

2019-02-14 21:00:51 +01:00
# Wireguard
2019-05-13 07:21:16 +02:00
This is a simple docker image to run a wireguard client. It includes a killswitch to ensure that any traffic not encrypted via wireguard is dropped.
2019-02-14 21:00:51 +01:00
Wireguard is implemented as a kernel module, which is key to its performance and simplicity. However, this means that Wireguard _must_ be installed on the host operating system for this container to work properly. Instructions for installing Wireguard can be found [here](http://wireguard.com/install).
2019-05-13 07:21:16 +02:00
You will need a configuration file for your Wireguard interface. Many VPN providers will create this configuration file for you. For example, [here](http://mullvad.net/en/download/wireguard-config) is the configuration generator for Mullvad. Be sure to NOT include a killswitch in the configuration file, since the docker image already has one.
2019-02-14 21:00:51 +01:00
2020-09-10 04:58:55 +02:00
Now simply mount the configuration file and run! For example, if your configuration file is located at `/path/to/conf/mullvad.conf`:
2019-02-14 21:00:51 +01:00
```bash
2019-02-14 21:15:29 +01:00
docker run --name wireguard \
--cap-add NET_ADMIN \
--cap-add SYS_MODULE \
--sysctl net.ipv4.conf.all.src_valid_mark=1 \
2020-09-10 04:58:55 +02:00
-v /path/to/conf/mullvad.conf:/etc/wireguard/mullvad.conf \
2019-02-14 21:00:51 +01:00
jordanpotter/wireguard
```
Afterwards, you can link other containers to this one:
```bash
2019-02-14 21:15:29 +01:00
docker run -it --rm \
--net=container:wireguard \
2019-02-14 21:00:51 +01:00
appropriate/curl http://httpbin.org/ip
```