i like and widely use wireguard for my infrastructure. i’m also aware of it’s limitation and i know the tailscale project but never gave try. recently, i stumbled upon the headscale project, an opensource alternative to for the (closed) tailscale server. perfect, let’s give a try!
and, of course, i’m gooing to implement this with OpenBSD, what else ;)
… or how to host a Dualstacked Public Website behind a IPv4 NAT Box without Reverse Proxy, Portforwarding and other ugly stuff …
inspired by the following Post, i started a little project and redesigned the connectifity for my Hamster’s Webserver :)
i wrote a mail to the guys from tetaneutral.net and asked them for the wireguard vpn service with public ipv4/ipv6 adresses for my server. as i didn’t get any feedback, i had to implement the “Server” on my own.
wg genkey | tee keys/server-private.key | wg pubkey > keys/server-public.key
wg genkey | tee keys/client001-private.key | wg pubkey > keys/client001-public.key
wg genkey | tee keys/client002-private.key | wg pubkey > keys/client002-public.key
wg genkey | tee keys/client003-private.key | wg pubkey > keys/client003-public.key
chmod 600 keys/*private.key
... snip ...
set skip on { lo0 enc0 tun2 }# WG Stuffmatch out log on egress inet from (tun2:network) nat-to (egress:0)match out log on egress inet6 from (tun2:network) nat-to (egress)... snip ...
# Block allblock log
... snip ...
# Allow Wireguard from anypass in log quick inet proto { tcp udp } from any to (self) port {51820}pass in log quick inet6 proto { tcp udp } from any to (self) port {51820}... snip ...
Reboot Server and active all config
reboot
cd /etc/wireguard
Update Config Script
cat << 'EOF' > wg_update_config.sh
# !/bin/sh
wg setconf tun2 server.conf
wg show
exit 0
EOFchmod 755 wg_update_config.sh