Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

what about ipv6? #2

Open
x0r2d2 opened this issue Jul 25, 2018 · 6 comments
Open

what about ipv6? #2

x0r2d2 opened this issue Jul 25, 2018 · 6 comments

Comments

@x0r2d2
Copy link

x0r2d2 commented Jul 25, 2018

Hello,

What about ipv6 and how to provide clients with global ipv6 address if I have /64 ipv6 subnet on server?

Thanks.

@iamckn
Copy link
Owner

iamckn commented Jul 26, 2018

I was going to do an ipv6 guide but someone else already did a brilliant write up. Follow his guide here - https://danrl.com/blog/2016/travel-wifi/

@x0r2d2
Copy link
Author

x0r2d2 commented Jul 26, 2018

@iamckn
For me, your guide is better, clear and can be done by copy paste!

Could you add to your existing guide (typical wireguard setup) ipv6/64 global addresses to wireguard clients, please?

@iamckn
Copy link
Owner

iamckn commented Jul 28, 2018

Alright, I'll add it to my to do list. I'll try to have it done in the next few weeks.

@listenlight
Copy link

after i finished the tutorial, blindly, tho it's the kind of tutorial that the midrange semi-pros like me have to rely on (thank you!) -- i found my vps had eth0, eth1, eth2, and wg0. I've started from scratch and left off ipv6 just to get through all the steps again, and feel the awesome -- thanks again 👍

@listenlight
Copy link

I'm looking at the recommended IPv6 tutorial, and it has not so much of your grace and patience. I hope you continue on this project. It's sure to help a lot of humans.

(ipv6 setup-- https://danrl.com/blog/2016/travel-wifi/)

@mrdotb
Copy link

mrdotb commented Oct 29, 2018

I manage to make ipv6 work.
Assuming you have already followed the tutorial.

Server side

ip6tables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
ip6tables -A FORWARD -i wg0 -j ACCEPT

Forward ipv6 activate net.ipv6.conf.all.forwarding=1 in /etc/sysctl.conf

On the conf file

[Interfaces]
...
[Peer]
PublicKey = ...
AllowedIPs = 10.200.200.2/32, fd86:ea04:1115::5/64

Client side

conf file

[Interfaces]
Address = 10.200.200.2/32, fd86:ea04:1115::5/64
...
[Peer]
...
AllowedIPs = 0.0.0.0/0, ::/0

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants