No description
Find a file
2019-02-14 15:14:17 -08:00
Dockerfile Add Dockerfile and entrypoint script 2019-02-14 12:03:36 -08:00
entrypoint.sh Add Dockerfile and entrypoint script 2019-02-14 12:03:36 -08:00
LICENSE Initial commit 2019-02-14 11:41:59 -08:00
README.md Add troubleshooting instructions for asymmetric routing 2019-02-14 15:14:17 -08:00

Wireguard

This is a simple docker image to run a wireguard client.

Wireguard is implemented as a kernel module, which is key to its performance and simplicity. However, this means that Wireguard must be installed on the host operating system for this container to work properly. Instructions for installing Wireguard can be found here.

You will need a configuration file for your Wireguard interface. Many VPN providers will create this configuration file for you. For example, here is the configuration generator for Mullvad.

Now simply mount the configuration file and run! For example, if your configuration file is located at /path/to/conf/mullvadus2.conf:

docker run --name wireguard                                          \
    --cap-add=NET_ADMIN                                              \
    -v /path/to/conf/mullvadus2.conf:/etc/wireguard/mullvadus2.conf  \
    jordanpotter/wireguard

Afterwards, you can link other containers to this one:

docker run -it --rm                                                  \
    --net=container:wireguard                                        \
    appropriate/curl http://httpbin.org/ip

Troubleshooting

Asymmetric Routing

If you see any errors similar to:

sysctl: setting key "net.ipv4.conf.all.rp_filter": Read-only file system
sysctl: setting key "net.ipv4.conf.default.rp_filter": Read-only file system

Then your host is set to discard packets when the route for outbound traffic differs from the route for incoming traffic. To correct this, you'll want to set these values in /etc/sysctl.conf:

net.ipv4.conf.default.rp_filter = 2
net.ipv4.conf.all.rp_filter = 2

Afterwards, reboot.