2018-12-23

<erictapen> by the way, does anyone use Wireguard with nixos and is able to use crpytokey routing?

2018-12-22

<{^_^}> [nixpkgs] @dywedir merged pull request #52665 → wireguard-tools: 0.0.20181119 -> 0.0.20181218 → https://git.io/fhJtP
<{^_^}> [nixpkgs] @r-ryantm opened pull request #52665 → wireguard-tools: 0.0.20181119 -> 0.0.20181218 → https://git.io/fhJtP

2018-12-18

<ivan> I have a Hydra and builder on localhost. is there any reason why a few things like wireguard, ripgrep would be available in /var/lib/hydra/cache but not in /nix? https://gist.github.com/ivan/ae51aa586ef663121341f5893c2ee711

2018-12-16

<edef> sphalerite: even setting wireguard to null there doesn't cause any errors
<sphalerite> edef: I think it'd be a matter of making an overlay that looks something like self: super: {linuxPackagesFor = kernel: let superLinuxPackages = super.linuxPackagesFor kernel; in superLinuxPackages // { wireguard = superLinuxPackages.wireguard.override {…}; }
<edef> sphalerite: out-of-tree, i'm hacking on wireguard and want to override it with my own source/patches

2018-12-07

<{^_^}> [nixpkgs] @c0bw3b merged pull request #50809 → wireguard: don't modprobe if boot.isContainer is set → https://git.io/fpWzz

2018-11-22

<aswanson> srhb: I just followed what I've seen in the nixos.wiki and a few other guides I've found for wireguard. Just about everything I've seen has included the /24, with a /32 for the peer allowed ips on the server
<aswanson> srhb: The server is functioning fine with my smartphone of all things but I can't get wireguard on nixos to send all traffic through wireguard
<srhb> aswanson: Not sure I completely understand the question. I have a NixOS client that tunnels all traffic through wireguard... Is that what you're asking about?
<aswanson> anyone gotten a wireguard tunnel that routes all traffic through a vps with a nixos client? I can get it working when I restrict the client's peer ip address but nothing makes it to the external interface when I open it up to `0.0.0.0/0` as outlined in the nixos wiki

2018-11-21

<{^_^}> [nixpkgs] @Mic92 merged pull request #50833 → wireguard-tools: 0.0.20181018 -> 0.0.20181119 → https://git.io/fpW7f

2018-11-20

<{^_^}> [nixpkgs] @dywedir opened pull request #50833 → wireguard-tools: 0.0.20181018 -> 0.0.20181119 → https://git.io/fpW7f
<{^_^}> [nixpkgs] @sorki opened pull request #50809 → wireguard: don't modprobe if boot.isContainer is set → https://git.io/fpWzz

2018-11-18

<aswanson> I've been trying to get wireguard working for a while and feel like I'm missing something crucial with how NAT works on nixos. The nixos wiki says it should be enough to just enable NAT and specify the external interface and internal wireguard interface but I don't see any sort of NAT chains in iptables after running nixos-rebuild

2018-11-15

<v0|d> aswanson: do you have wireguard package in systemPackages?
<aswanson> anyone running wireguard on their nixos instance? I'm trying to get it running and the service fails to start after nixos-rebuild. The journal says modprobe can't find the wireguard module

2018-11-10

<ivan> oops I did a nixos-rebuild switch --upgrade on a remote machine (incl a kernel upgrade) and that somehow took down wireguard and didn't bring it back up again

2018-11-04

<Mic92> openvpn, tinc, wireguard seems to be popular choices

2018-10-29

<cransom> disasm: well, it works-ish. the things that don't (wireguard, didn't look into that further) and v6 prefix delegation (I had manual set things for that in dhcpcd.conf, so i dind't expect that to work out of box). but otherwise, it did all the vlan interfaces and routing properly. so far as i can tell right now

2018-10-27

<{^_^}> [nixpkgs] @Mic92 merged pull request #48866 → wireguard-tools: 0.0.20181007 -> 0.0.20181018 → https://git.io/fxij5

2018-10-24

<mbrock> I'm so happy about discovering WireGuard VPN

2018-10-23

<{^_^}> [nixpkgs] @r-ryantm opened pull request #48866 → wireguard-tools: 0.0.20181007 -> 0.0.20181018 → https://git.io/fxij5

2018-10-19

<joko> Does anyone know if it is possible to define a network in systemd-networkd to be manually enabled? I would like to setup wireguard as a client and I would like to be able to manual enable it

2018-10-17

<ivan> do you need this cisco system involved? if not you can set up tunnels with wireguard

2018-10-13

<{^_^}> [nixpkgs] @fpletz pushed to master « wireguard: 0.0.20181006 -> 0.0.20181007 »: https://git.io/fxBNQ
<{^_^}> [nixpkgs] @Mic92 merged pull request #48315 → wireguard: 0.0.20180925 -> 0.0.20181006 → https://git.io/fxBdR
<{^_^}> [nixpkgs] @yegortimoshenko opened pull request #48315 → wireguard: 0.0.20180925 -> 0.0.20181006 → https://git.io/fxBdR

2018-10-09

<hyper_ch2> weird... just rebooted office server after upgrading.... it did reboot, I unlocked it remotely.... it auto-started the running VMs... . I can access the VMs just fine but I can't access the host server anymore... not through vpn (openvpn and wireguard) and not through ssh

2018-10-03

<{^_^}> [nixpkgs] @Mic92 pushed commit from @r-ryantm to release-18.09 « wireguard-tools: 0.0.20180918 -> 0.0.20180925 »: https://git.io/fxINm
<{^_^}> [nixpkgs] @Mic92 merged pull request #47703 → wireguard-tools: 0.0.20180918 -> 0.0.20180925 → https://git.io/fxIE6
<{^_^}> [nixpkgs] @r-ryantm opened pull request #47703 → wireguard-tools: 0.0.20180918 -> 0.0.20180925 → https://git.io/fxIE6

2018-09-29

<{^_^}> [nixpkgs] @Mic92 merged pull request #47520 → wireguard-tools: Fix build → https://git.io/fxfIf
<{^_^}> [nixpkgs] @aneeshusa opened pull request #47520 → wireguard-tools: Fix build → https://git.io/fxfIf

2018-09-20

<{^_^}> [nixpkgs] @Mic92 pushed commit from @r-ryantm to release-18.09 « wireguard-tools: 0.0.20180904 -> 0.0.20180918 »: https://git.io/fAH5L
<{^_^}> [nixpkgs] @Mic92 merged pull request #46933 → wireguard-tools: 0.0.20180904 -> 0.0.20180918 → https://git.io/fAHS3
<{^_^}> [nixpkgs] @r-ryantm opened pull request #46933 → wireguard-tools: 0.0.20180904 -> 0.0.20180918 → https://git.io/fAHS3

2018-09-18

<c15ade4> oldandwise: yeah - i did a hack and used user mode network + a wireguard vpn to give my vpn an ip address

2018-09-17

<Ashy> Wireguard would be nice but I guess as always, patches welcome right? :P
<Ashy> Does that mean ssh tunnels or is there support for wireguard now?

2018-09-08

<das_j> Like wireguard keys

2018-09-05

<{^_^}> [nixpkgs] @Mic92 pushed to release-18.03 « wireguard: 0.0.20180519 -> 0.0.20180904 »: https://git.io/fA0nd
<{^_^}> [nixpkgs] @Mic92 pushed commit from @dywedir to release-18.09 « wireguard: 0.0.20180809 -> 0.0.20180904 »: https://git.io/fA0G3
<{^_^}> [nixpkgs] @Mic92 merged pull request #46093 → wireguard: 0.0.20180809 -> 0.0.20180904 → https://git.io/fARQs
<{^_^}> [nixpkgs] @dywedir opened pull request #46093 → wireguard: 0.0.20180809 -> 0.0.20180904 → https://git.io/fARQs

2018-09-02

<{^_^}> [nixpkgs] @xeji pushed commit from @yorickvP to master « wireguard: change preStop to postStop, require network.target (#45569) »: https://git.io/fAlox
<{^_^}> [nixpkgs] @xeji merged pull request #45569 → wireguard: change preStop to postStop, require network.target → https://git.io/fAtue

2018-08-30

<c15ade4> elvishjerricco: thats awesome, I have just setup wireguard but have the problem of a pointless roundtrip when I am at home

2018-08-28

<seku> ofc. just curious why wireguard went for ChaCha20 instead of AES

2018-08-27

<yorick> gchristensen: the wireguard job is a oneshot, so it can't restart
<yorick> gchristensen: so I'm setting up wireguard, but if it fails (dns failure or systemd weirdness), then we can't reach the thing and need to get physical access
<srk> yorick: I'm about to try wireguard, looks nice
<ekleog> yeah, wireguard is among my list of things to try someday
* etu is planning to use wireguard in the future for his private use anyways

2018-08-24

<yorick> Mic92: oh, that means that the wireguard private key ends up in the nix store
<{^_^}> #45569 (by yorickvP, 3 hours ago, open): wireguard: change preStop to postStop, require network.target
<yorick> wireguard failure means we have to get a plane ticket to fix the device, sadly
<Mic92> yorick: I think if you don't have dhcp then it would stop after configuring the device. The bigger problem I see is this privateKeyFile thing. I think for the meantime it would be better to just add wireguard support to networkd itself.
<arianvp> would really make using networkd to setup wireguard optional preferably
<yorick> Mic92: what do you think of the wireguard PR that turns it into a networkd thing?
<{^_^}> [nixpkgs] @yorickvP opened pull request #45569 → wireguard: change preStop to postStop, require network.target → https://git.io/fAtue

2018-08-23

<Watcher7> My curent NOS of choice lacks wireguard support, so I plan on sticking NixOS infront of it in the mean time.
<Watcher7> Also potentially using it as a wireguard appliance to replace some of my IPSec tunnels.

2018-08-22

<octe> My /nix is ~14GB after running "nix-collect-garbage -d" on a pretty small server installation (nginx, wireguard, nodejs). Is this normal?
<hyper_ch2> ha, finally figured out how I can route all my traffic from my droid through wireguard vpn through my home server and also use hotspot functionality so that all tethered devices also route through the vpn

2018-08-20

<{^_^}> [nixpkgs] @dguibert opened pull request #45392 → wireguard via sytemd netlink → https://git.io/fAfSq

2018-08-18

<inquisitiv3> What Wireguard derivation should one install? I get serveral matchees when I search with `nix search wireguard`. The two last hits seems promising (`nixpkgs.wireguard` and `nixpkgs.linuxPackages.wireguard`), but I'm not sure which of them I should install.

2018-08-17

<{^_^}> [nixpkgs] @Mic92 merged pull request #45126 → wireguard: 0.0.20180802 -> 0.0.20180809 → https://git.io/fNhTG

2018-08-16

<{^_^}> [nixpkgs] @r-ryantm opened pull request #45126 → wireguard: 0.0.20180802 -> 0.0.20180809 → https://git.io/fNhTG

2018-08-10

<tobiasBora> clever: storing a list of client/key in a sql database populated by a web app, and I'd like to use this database to re-generate the configuration of wireguard.
<dhess> tobiasBora: I had assumed all you wanted to do from the web app was add Wireguard public (client) keys to a list of all client keys. If you want to generate more complicated config, then that gets way more dangerous.
<tobiasBora> dhess: ok thank you! I'm not sure to understand why I need to the import statement though... the web app will never change any nix file then, so I don't see how it could raise a type error in case of a malicious attacker that tries to trick the generated file. What you mean is to write in nix a code that parse the file and generate a well-typed list right to provide the the wireguard configuration right?
<dhess> tobiasBora: if you're super careful, you could do something like this: in your /etc/nixos/configuration.nix file, add an "import" statement that reads a list of Wireguard public keys from a file that is generated by your web app, and then use the result of that import as the list of client public keys in the configuration.nix file
<tobiasBora> I'd like to configure an http front-end to add client keys to the configuration file of the vpn-like tool wireguard. However, as far as I can say, wireguard cannot deal with sql databases, so I was wondering how I could deal with a configuration file that could be changed by an http server… The only solution I see for now would be to ask to the server to modify on the go the nix configuration file and run

2018-08-09

<sigtrm> But for the rpi I really wanted something that used musl, and both Alpine and Void supports wireguard on aarch64, just couldn't get it working
<__monty__> sigtrm: I think I have wireguard working on arch. Can't remember any difficulty.
<sigtrm> If this works now then I am basically on distro nr 4 and finally gotten wireguard working
<sigtrm> So I don't need to add wireguard to systemPackages and extraModulePackages?
<makefu> i have wireguard running, however i am on the stable channel
<symphorien> hum there is no wireguard nixos test
<clever> symphorien: is wireguard still in extraModulePackages?
<sigtrm> modprobe: FATAL: Module wireguard not found in directory /run/booted-system/kernel-modules/lib/modules/4.15.12
<clever> sigtrm: thats from march and it lacks wireguard-tools, you need to `sudo nix-channel --update`, which will update the versions for everything
<clever> sigtrm: did you add wireguard-tools to your configuration.nix?
<sigtrm> Anyone know why I am getting this? "attribute 'wireguard-tools' missing, at /etc/nixos/configuration.nix:52:5"

2018-08-08

<{^_^}> [nixpkgs] @xeji pushed commit from @dywedir to master « wireguard: 0.0.20180708 -> 0.0.20180802 (#44490) »: https://git.io/fN9Rq
<{^_^}> [nixpkgs] @xeji merged pull request #44490 → wireguard: 0.0.20180708 -> 0.0.20180802 → https://git.io/fNXCn
<{^_^}> [nixpkgs] @xeji closed pull request #44763 → wireguard-tools: 0.0.20180708 -> 0.0.20180802 → https://git.io/fN9sU
<{^_^}> [nixpkgs] @leenaars opened pull request #44763 → wireguard-tools: 0.0.20180708 -> 0.0.20180802 → https://git.io/fN9sU

2018-08-07

<kisik21> Probably Alpine didn't have a wireguard module built for linux-rpi
<sigtrm> Thank you, with Alpine they had wireguard with official aarch64 support but for some reason it didn't support the rpi kernel, only the vanilla kernel
<kisik21> sigtrm: I think NixOS could handle it. It handles wireguard, from what I know. Saw some options in configuration.nix
<sigtrm> Quick question, does anyone know if you can run nixos on an rpi 3 and have wireguard running on it? I have tried several distros on my rpi 3 and they mostly fail with wireguard so I'd like to know if anyone had any success with it

2018-08-05

<{^_^}> [nixpkgs] @dywedir opened pull request #44490 → wireguard: 0.0.20180708 -> 0.0.20180802 → https://git.io/fNXCn

2018-07-18

<pstn> So anybody got a working wireguard configuration with working routes running on nixos? I'd like to see what's the difference to mine.
<pstn> srk: I've got the device and this route in my table `10.23.42.0/24 dev wireguard-xndr proto kernel scope link src 10.23.42.2`
<pstn> Failing ip command: `ip route replace 10.23.42.1/24 dev wireguard-xndr table main`

2018-07-11

<{^_^}> [nixpkgs] @xeji pushed commit from @r-ryantm to master « wireguard: 0.0.20180625 -> 0.0.20180708 (#43318) »: https://git.io/fNkOC
<{^_^}> [nixpkgs] @xeji merged pull request #43318 → wireguard: 0.0.20180625 -> 0.0.20180708 → https://git.io/fNTjp
<{^_^}> [nixpkgs] @r-ryantm opened pull request #43318 → wireguard: 0.0.20180625 -> 0.0.20180708 → https://git.io/fNTjp

2018-07-09

<colemickens> But boot.kernelModules = ["wireguard"]; doesn't seem to help...
<colemickens> When I enable a wireguard interface in configuration.nix, the right thing happens.

2018-07-08

<bpye> It would be nice if NixOS had better support for running things in namespaces, I know there is the containers support but the NAT support seemed to blow up when combined with Wireguard :(

2018-06-26

<{^_^}> [nixpkgs] @Mic92 pushed to master « wireguard: 0.0.20180613 -> 0.0.20180625 »: https://git.io/f4QaW
<{^_^}> [nixpkgs] @yegortimoshenko closed pull request #42438 → wireguard: 0.0.20180613 -> 0.0.20180620 → https://git.io/f4SqI

2018-06-23

<{^_^}> [nixpkgs] @r-ryantm opened pull request #42438 → wireguard: 0.0.20180613 -> 0.0.20180620 → https://git.io/f4SqI

2018-06-22

<__monty__> Toxvpn sounds similar to wireguard-p2p, any big differences I'm overlooking?

2018-06-14

<{^_^}> [nixpkgs] @yegortimoshenko pushed to master « wireguard{,-go,-tools}: 0.0.20180531 -> 0.0.20180613 »: https://git.io/vhPtv

2018-06-12

<colemickens> FWIW, I resolved my Wireguard issue, or at least the service starts.
<joepie91> anyway, in the long term I want a semi-permanent wireguard connection going to my home PC
<joepie91> colemickens: I don't recall the exact issue but I had trouble with wireguard as well a while ago when I tried to set it up
<colemickens> If anyone here uses WireGuard and could weigh in, I'd appreciate it mightily: https://github.com/NixOS/nixpkgs/issues/41874

2018-06-11

<{^_^}> [nixpkgs] @yegortimoshenko pushed to master « wireguard-go: drop redundant relative import patch »: https://git.io/vhaRy

2018-06-10

<colemickens> but it just fails with: Jun 09 17:19:29 chimera wireguard-wg0-start[19275]: RTNETLINK answers: File exists

2018-06-09

<samueldr> colemickens: while I don't, do ask, I have seen many nixos users talk about how they use wireguard
<colemickens> Does anyone here use wireguard?
<colemickens> Can I have NM and also have wireguard interfaces defined statically in configuration.nix?
<{^_^}> [nixpkgs] @xeji closed pull request #41710 → wireguard-go: remove from tree → https://git.io/vhg0t
<{^_^}> [nixpkgs] @xeji merged pull request #41735 → wireguard-go: 0.0.20180519 -> 0.0.20180531 → https://git.io/vh2Lp
<{^_^}> [nixpkgs] @yegortimoshenko opened pull request #41735 → wireguard-go: 0.0.20180519 -> 0.0.20180531 → https://git.io/vh2Lp

2018-06-08

<{^_^}> [nixpkgs] @zx2c4 opened pull request #41710 → wireguard-go: remove from tree → https://git.io/vhg0t
<{^_^}> [nixpkgs] @Mic92 merged pull request #41649 → wireguard: 0.0.20180524 -> 0.0.20180531 → https://git.io/vhzO2

2018-06-07

<{^_^}> [nixpkgs] @zx2c4 opened pull request #41649 → wireguard: 0.0.20180524 -> 0.0.20180531 → https://git.io/vhzO2

2018-06-04

<BlessJah> Does anyone here use wireguard with wg-quick or improved rule-based routing (one that uses fwmark)? It doesn't work for me when fwmark is used and firewall is enabled (?)

2018-05-28

<{^_^}> [nixpkgs] @xeji pushed commit from @r-ryantm to master « wireguard: 0.0.20180519 -> 0.0.20180524 (#41031) »: https://git.io/vhYZ5
<{^_^}> [nixpkgs] @xeji merged pull request #41031 → wireguard: 0.0.20180519 -> 0.0.20180524 → https://git.io/vhIB6

2018-05-24

<{^_^}> [nixpkgs] @r-ryantm opened pull request #41031 → wireguard: 0.0.20180519 -> 0.0.20180524 → https://git.io/vhIB6

2018-05-22

<tilpner> __monty__ - Put those two files into your wireguard-p2p checkout, then run nix-build
<sphalerite> oh right, rust-wireguard
<{^_^}> → e9e044ab by @yegortimoshenko: wireguard-tools: clean up, wrap w/ wireguard-go on Darwin
<{^_^}> [nixpkgs] @yegortimoshenko merged pull request #40907 → wireguard-tools: clean up, wrap w/ wireguard-go on Darwin → https://git.io/vhvYs
<{^_^}> [nixpkgs] @yegortimoshenko opened pull request #40907 → wireguard-tools: clean up, wrap w/ wireguard-go on Darwin → https://git.io/vhvYs
<{^_^}> → 8d575415 by @zx2c4: wireguard: fix up text, maintainer, and version
<{^_^}> [nixpkgs] @yegortimoshenko merged pull request #40903 → wireguard: fix up text, maintainer, and version → https://git.io/vhvq9
<{^_^}> [nixpkgs] @zx2c4 opened pull request #40903 → wireguard: fix up text, maintainer, and version → https://git.io/vhvq9
<{^_^}> [nixpkgs] @yegortimoshenko pushed to master « wireguard-go: fix hash »: https://git.io/vhvqJ
<{^_^}> [nixpkgs] @yegortimoshenko closed pull request #40901 → wireguard-go: remove from tree → https://git.io/vhvLg
<{^_^}> → 0f2de933 by @zx2c4: wireguard: bump version and limit platforms
<{^_^}> [nixpkgs] @yegortimoshenko merged pull request #40902 → wireguard: bump version and limit platforms → https://git.io/vhvLh
<{^_^}> [nixpkgs] @zx2c4 opened pull request #40902 → wireguard: bump version and limit platforms → https://git.io/vhvLh
<{^_^}> [nixpkgs] @zx2c4 opened pull request #40901 → wireguard-go: remove from tree → https://git.io/vhvLg

2018-05-21

<{^_^}> [nixpkgs] @Mic92 pushed commit from R. RyanTM to release-18.03 « wireguard: 0.0.20180514 -> 0.0.20180519 »: https://git.io/vpjdE
<{^_^}> [nixpkgs] @Mic92 merged pull request #40822 → wireguard: 0.0.20180514 -> 0.0.20180519 → https://git.io/vphbd
<{^_^}> → 410be1aa by R. RyanTM: wireguard: 0.0.20180514 -> 0.0.20180519

2018-05-20

<{^_^}> [nixpkgs] @r-ryantm opened pull request #40822 → wireguard: 0.0.20180514 -> 0.0.20180519 → https://git.io/vphbd

2018-05-19

<{^_^}> → a9defaef by @yegortimoshenko: top-level: remove wireguard attr
<{^_^}> → 60d96d77 by @yegortimoshenko: top-level/aliases: add wireguard -> wireguard-tools alias
<{^_^}> → 865abfa6 by @kirelagin: wireguard: Enable tools on other platforms
<{^_^}> [nixpkgs] @Mic92 merged pull request #40744 → WireGuard: Make tools available on other platforms → https://git.io/vpp0h
<{^_^}> → 3b44015e by @kirelagin: wireguard-go: use postPatch instead of patchPhase
<{^_^}> → 5f3480e0 by @kirelagin: wireguard-go: use deps2nix for dependencies
<{^_^}> → b599f672 by @kirelagin: wireguard-go: init at 0.0.20180514
<{^_^}> [nixpkgs] @Mic92 merged pull request #40758 → wireguard-go: init at 0.0.20180514 → https://git.io/vpp9a
<{^_^}> [nixpkgs] @kirelagin opened pull request #40758 → wireguard-go: init at 0.0.20180514 → https://git.io/vpp9a

2018-05-18

<{^_^}> [nixpkgs] @kirelagin opened pull request #40744 → WireGuard: Make tools available on other platforms → https://git.io/vpp0h

2018-05-12

<__monty__> All I did was nix-shell -p rustup cargo, rustup default nightly, cargo install wireguard-p2p. Now I've cloned bulletinboard-dht and am running cargo build --release in the repo because the readme said it was need but it's not a dependency and cargo install couldn't find it.
<__monty__> Wireguard-p2p requires nightly according to the readme and depends on bulletinboard-dht which has a deb and an rpm (and cargo build --release but not cargo install).

2018-05-11

<mt_caret_> I'm trying to deploy a wireguard server via nixops, but I get 'Cannot find device "wg0"' (https://gist.github.com/mt-caret/6d8aa904bd0ce8fdb94ba949d2f69363)

2018-05-09

<ghostyy> have any of you guys gotten wireguard working in nixos
<ghostyy> specifically i dont want my wireguard private keys in my configuration.nix

2018-04-22

<{^_^}> [nixpkgs] @thoughtpolice pushed commit from @abbradar to master « wireguard service: use scripts instead of ExecStarts/Stops »: https://git.io/vpOgO
<{^_^}> [nixpkgs] @thoughtpolice merged pull request #38333 → wireguard service: use scripts instead of ExecStarts/Stops → https://git.io/vxie3

2018-04-09

<Guest29> Anyone use Wireguard? I've followed the Nixos Wiki, but cannot seem to get it working for the life of me.

2018-04-02

<{^_^}> [nixpkgs] @abbradar opened pull request #38333 → wireguard service: use scripts instead of ExecStarts/Stops → https://git.io/vxie3

2018-03-27

<srhb> Phew.. Finally got some workable wireguard rules up. I wish I could just stick all my regular interfaces in a different namespace and hide them away from my user.
<srhb> Huh, the wireguard module is really weird. It appears to add a default route just fine, but then there's no route to reach the actual wireguard endpoint via some other means. How does that make sense?
<srhb> hyper_ch: Did you use wireguard?
<srhb> Anyone with wireguard experience on? I'm trying it out for the first time, and it looks from wg show like I'm connected (handshakes and transfer look alive) but I can't ping anything at all. allowed ips is 0.0.0.0/0. Any clues to how I might debug this?

2018-03-12

<{^_^}> → a0cc592c by @jfrankenau: wireguard: 0.0.20180218 -> 0.0.20180304
<{^_^}> [nixpkgs] @fpletz merged pull request #36818 → wireguard: 0.0.20180218 -> 0.0.20180304 → https://git.io/vxewe

2018-03-11

<{^_^}> [nixpkgs] @jfrankenau opened pull request #36818 → wireguard: 0.0.20180218 -> 0.0.20180304 → https://github.com/NixOS/nixpkgs/pull/36818

2018-03-02

<disasm> gchristensen, clever: I'm praying we don't have any power outages in the next week... I made a number of commits to my home network repo that weren't pushed after my last rsync on my laptop before I took it in for repairs. Not the end of the world, but got to reconstruct in my head everything I did since then if I have to redeploy to copy the keys back up for wireguard.

2018-02-23

<NixOS_GitHub> nixpkgs/master 1c3b6d5 xeji: wireguard: 0.0.20180202 -> 0.0.20180218
<NixOS_GitHub> [nixpkgs] xeji opened pull request #35406: wireguard: 0.0.20180202 -> 0.0.20180218 (master...wireguard) https://git.io/vAa2x

2018-02-15

<makefu> regarding gsoc, weirdly enough wireguard was chosen for a gsoc project. however what jason (main dev) did was mainly linking to the wireguard todo list ( https://www.wireguard.com/gsoc/ ).
<dhess> yay, wireguard issue resolved.
<makefu> hyper_ch2: right now you have a script which starts the wireguard services if they crash via your script. however you could use systemd features to keep the service running instead. this is what i mean
<makefu> wireguard-<iterfacename>.service
<dhess> hyper_ch2: OK, and are you using any IPv6 addrs with the WireGuard interface?
<dhess> hyper_ch2: Are you using NixOps to deploy the WireGuard private keys or pre-shared keys, by any chance?
<dhess> anyone around who uses WireGuard with NixOS?

2018-02-13

<hyper_ch2> sphalerite_: also tried wireguard?

2018-02-05

<NixOS_GitHub> nixpkgs/release-17.09 4670974 Jason A. Donenfeld: wireguard: 0.0.20180118 -> 0.0.20180202...
<NixOS_GitHub> nixpkgs/master ca78dc1 Jason A. Donenfeld: wireguard: 0.0.20180118 -> 0.0.20180202
<NixOS_GitHub> [nixpkgs] zx2c4 opened pull request #34621: wireguard: 0.0.20180118 -> 0.0.20180202 (master...patch-1) https://git.io/vNhOd

2018-01-21

<NixOS_GitHub> nixpkgs/release-17.09 a435c92 Jörg Thalheim: wireguard: 0.0.20171221 -> 0.0.20180118...
<NixOS_GitHub> nixpkgs/master e36a362 Jörg Thalheim: wireguard: 0.0.20171221 -> 0.0.20180118

2018-01-18

<concatime> "the wireguard kernel module was not installed correctly"
<hyper_ch> you could also add wireguard to the list of installed packages and try to run their config with wg-quick but never tried and it seems bothersome
<concatime> I have an account with Mullvad which provides WireGuard support. How to use it on NIxOS?

2018-01-11

<hyper_ch> Mic92: so, my wireguard starting fix: https://raw.githubusercontent.com/sjau/nix-expressions/master/wgStartFix.nix --> "*/5 * * * * root wgStartFix 'wg_home wg_office'"
<hyper_ch> I'll check :) need to fix wireguard now
<hyper_ch> wireguard is still a mess for some reason

2018-01-06

<makefu> i had some issues that wireguard starts too early after reboot which results in no default routing being available

2018-01-04

<fpletz> arianvp: don't use linuxPackages.wireguard, just wireguard for the cli tool
<arianvp> I want to install the wireguard tools, but it either installs the wireguard module or the wireguard tools depending on `kernel == null`

2018-01-02

<hyper_ch> makefu: I think I was in #wireguard before you :)
<makefu> yep, just saw it on #wireguard
<hyper_ch> sphalerite: trying again with wireguard to route everything through it

2017-12-31

<makefu> well it seems like it is not 100% automatic with default wireguard, but maybe with the nixos module? see https://www.wireguard.com/quickstart/
<hyper_ch> makefu: "[17:36] <hyper_ch> in wireguard, how can I make that a peer routes all traffic through the vpn and uses the vpn server as endpoint for internet requests?"
<hyper_ch> makefu: got wireguard running?

2017-12-30

<hyper_ch> makefu: wireguard is pretty easy to setup and performs better than openvpn as far as I can tell
<hyper_ch> makefu: added it to wireguard
<hyper_ch> ip forwarding and masquerading is needed by both.... openvpn and wireguard... so question is where to add it best...
<hyper_ch> this is for openvpn and wireguard
<makefu> i also wanted to set up wireguard for my router
<makefu> hyper_ch: just saw you are also lurking in #wireguard
<NixOS_GitHub> nixpkgs/release-17.09 33778ff Franz Pletz: wireguard: 0.0.20171111 -> 0.0.20171221...
<NixOS_GitHub> nixpkgs/release-17.09 b23ac40 Franz Pletz: wireguard: 0.0.20171101 -> 0.0.20171111...

2017-12-29

<NixOS_GitHub> nixpkgs/master 4ce44d6 Franz Pletz: wireguard: 0.0.20171111 -> 0.0.20171221

2017-12-26

<andi-> mosh (with scp) would be nice.. some simple wireguard tunnel would wrk as well I guess

2017-11-30

<Mic92> we are doing not much magic with wireguard in nixos, you can probably also ask in the #wireguard channel for help
<patrl> @Mic92 weirdly, starting wireguard manually using wg-quick doesn't work for me on NixOS either
<Mic92> I think andi- has used the wireguard module. I have wrote a systemd-networkd patch instead.
<patrl> Hi all. Does anyone have a confirmed working wireguard configuration on 17.09?

2017-11-28

<patrl> looking at the log for the generated unit wireguard-wg_home, this is the relevant error i'm getting "ip link del dev wg_home (code=exited, status=1/FAILURE)"
<patrl> does anyone have a confirmed working wireguard config on 17.09?
<patrl> guh, still getting "device not found" errors for wireguard
<hyper_ch> patrl: sudo journalctl -u wireguard-wg0
<hyper_ch> patrl: systemctl restart wireguard-wg0
<patrl> hi all. I'm struggling with the wireguard configuration module. I was wondering if anyone here has any experience and could help me debug

2017-11-27

<ivan> sphalerite: wireguard

2017-11-20

<hyper_ch> I'm starting to like wireguard more and more

2017-11-19

<NixOS_GitHub> nixpkgs/master 265f4c5 Franz Pletz: wireguard: 0.0.20171101 -> 0.0.20171111

2017-11-05

<hyper_ch> sphalerite: nixos wireguard has no options for adding execstart or something
<hyper_ch> MichaelRaskin: yes, I need to konw the content of the resolv.conf when wireguard starts... so I want to alter its unit file to add a cat /etc/resolv.conf as first execstart
<hyper_ch> vcunat: so file bug with wireguard?
<NixOS_GitHub> nixpkgs/release-17.09 003102c Franz Pletz: wireguard module: add device name environment var...
<NixOS_GitHub> nixpkgs/release-17.09 af9bb2d Joerg Thalheim: wireguard: fix function for adding routes...
<vcunat> hyper_ch: it's more of a decision for wireguard upstream anyway
<NixOS_GitHub> nixpkgs/master 7113039 Franz Pletz: wireguard module: add device name environment var...

2017-11-04

<hyper_ch> Mic92: wireguard still doesn't automatically start
<NixOS_GitHub> [nixpkgs] shaunren opened pull request #31250: wireguard: add support for default routing (master...wireguard) https://git.io/vFC0Z

2017-11-01

<NixOS_GitHub> nixpkgs/master 8a59ef7 zimbatm: wireguard: 0.0.20171017 -> 0.0.20171101

2017-10-29

<hyper_ch> I think znc, openvpn, wireguard and samba run fine

2017-10-28

<hyper_ch> ArdaXi[m]: test from yesterday.... line were slow.... direct connection was only around 750mbit... wireguard 570mbit and unoptimized openvpn 210mbit (well, I have to tweak openvpn a bit) https://paste.simplylinux.ch/view/raw/6e8f2bcf
<hyper_ch> wireguard gives me around 650mbit/s over internet as vpn.... so not too worried about performance

2017-10-27

<hyper_ch> Harekiet: well, just tested zfs send | ssh remote "zfs receive" through wireguard
<hyper_ch> ha, just sent around 90Gb through wireguard vpn with zfs in 25 minutes

2017-10-19

<NixOS_GitHub> nixpkgs/release-17.09 2181a93 Joerg Thalheim: wireguard: 0.0.20171011 -> 0.0.20171017...
<NixOS_GitHub> nixpkgs/master 65256b7 Joerg Thalheim: wireguard: 0.0.20171011 -> 0.0.20171017
<hyper_ch> Mic92: that patch still doesn't work.... the wireguard connection with domain doesn't get auto-started at boot

2017-10-18

<hyper_ch> tilpner: https://paste.simplylinux.ch/view/raw/62c89659 tested now direct IP connection between office and home and then through wireguard :) speeds are good :)

2017-10-17

<tilpner> Yes, I saw it. I found out I can't use wireguard from this location, firewall breaks it
<hyper_ch> tilpner: btw, tested wireguard speed today between office and home

2017-10-16

<Mic92> tilpner: restartIfChanged = false; for the service that setups wireguard
<tilpner> Mic92 - No, actually just NixOS firewall. And then I changed something for the server config and nixops lost connection mid-activation when the wireguard service came up
<tilpner> Mic92 - Sorry for late reply, I couldn't get wireguard to work with my firewalls. wg-quick looks like the way to go though, so thanks for that :)
<Mic92> tilpner: systemd-networkd and wg-quick at the moment. Also I am not done yet with pull request for the latest wireguard protocol. update. This netns this is not really needed anymore
<tilpner> Mic92 - How do you manage wireguard? Do you run the netns thing manually?
<tilpner> hyper_ch - wireguard is available and builds on nixos-unstable-small. Is that not the problem you mentioned?
<tilpner> hyper_ch - nixos-unstable-small seems to have wireguard substitutes O.o
<NixOS_GitHub> nixpkgs/release-17.09 e95811d Joerg Thalheim: wireguard: 0.0.20171005 -> 0.0.20171011...
<NixOS_GitHub> nixpkgs/master 3f4a675 Joerg Thalheim: wireguard: 0.0.20171005 -> 0.0.20171011
<Mic92> clever: wireguard supports this. The only problem is changing from a network with v6 support to one without.
<hyper_ch> still can't test wireguard speeds though :(
<Mic92> suspend is not a problem for wireguard
<Mic92> it would be much cleaner, if this would be fixed in wireguard tools itself
<Mic92> hyper_ch: there is no target, where this could be reliable attached to. You could restart wireguard forever until it succeed.
<hyper_ch> why l2tp if you have openvpn and wireguard ;9
<hyper_ch> so, added wireguard to vpn wiki... too bad can't test all of it currently https://nixos.wiki/wiki/VPN#Wireguard
<hyper_ch> hey Mic92, you also use wireguard, right?
<hyper_ch> been running openvpn for years and just managed yesterday to run wireguard

2017-10-15

<hyper_ch> Mic92: you also use wireguard?

2017-10-09

<NixOS_GitHub> nixpkgs/release-17.09 841414e Peter Hoeg: wireguard: wg-quick systemd unit was referencing /usr/bin...
<NixOS_GitHub> nixpkgs/release-17.09 afb83c9 Joerg Thalheim: wireguard: 0.0.20171001 -> 0.0.20171005...
<NixOS_GitHub> nixpkgs/release-17.09 1584d3d Jason A. Donenfeld: wireguard: 0.0.20170810 -> 0.0.20171001...
<NixOS_GitHub> nixpkgs/master 1439972 Joerg Thalheim: wireguard: 0.0.20171001 -> 0.0.20171005
<NixOS_GitHub> nixpkgs/master 4817454 Peter Hoeg: wireguard: wg-quick systemd unit was referencing /usr/bin

2017-10-05

<nh2> hyper_ch: how do the hardphones conflict with it? Aren't tinc and wireguard at the same level as openvpn?
<hyper_ch> nh2: can't use tinc or wireguard with sip hardphones
<nh2> hyper_ch: ah, do you know why openvpn is so slow? Is it on 100% CPU when you're testing with iperf3? If yes, you could try `tinc` (I've got gigabit speeds over it with no problems in the data center), or eventually, WireGuard -- both are in nixpkgs

2017-10-02

<NixOS_GitHub> [nixpkgs] orivej closed pull request #30010: wireguard: 0.0.20170810 -> 0.0.20171001 (master...patch-8) https://git.io/vdnVD
<hyper_ch> also, wireguard doc says - use at own risk ;)
<hyper_ch> wireguard is from the same guy as pass and he's a regular at #openvpn
<etu> I think wireguard looks amazing, but I don't use vpn except for work, and for work it's a cisco thingys
<etu> hyper_ch: Looked at wireguard?
<NixOS_GitHub> [nixpkgs] zx2c4 opened pull request #30010: wireguard: 0.0.20170810 -> 0.0.20171001 (master...patch-8) https://git.io/vdnVD
<NixOS_GitHub> [nixpkgs] zx2c4 closed pull request #29551: wireguard: 0.0.20170810 -> 0.0.20170918 (master...patch-7) https://git.io/v5NMn

2017-09-25

<NixOS_GitHub> nixpkgs/master 194c400 Joerg Thalheim: wireguard: fix function for adding routes
<NixOS_GitHub> [nixpkgs] Mic92 closed pull request #29753: networking.wireguard: added `allowedIpsAsRoutes` boolean to control p… (master...wireguard-allowed-ips-as-route-optional) https://git.io/vdTzD

2017-09-24

<NixOS_GitHub> [nixpkgs] andir opened pull request #29753: networking.wireguard: added `allowedIpsAsRoutes` boolean to control p… (master...wireguard-allowed-ips-as-route-optional) https://git.io/vdTzD

2017-09-19

<woffs> How can I hide e.g. /nix/store/*wireguard*.conf and /nix/store/*wpa_supplicant.conf from unprivileged users' eyes?
<NixOS_GitHub> [nixpkgs] zx2c4 opened pull request #29551: wireguard: 0.0.20170810 -> 0.0.20170918 (master...patch-7) https://git.io/v5NMn

2017-08-11

<NixOS_GitHub> [nixpkgs] Mic92 closed pull request #28169: wireguard: 0.0.20170726 -> 0.0.20170810 (master...patch-6) https://git.io/v79er
<NixOS_GitHub> [nixpkgs] zx2c4 opened pull request #28169: wireguard: 0.0.20170726 -> 0.0.20170810 (master...patch-6) https://git.io/v79er
<18VABX70R> nixpkgs/master e355f70 evujumenuk: wireguard: add per-peer routing table option...
<18VABX70R> nixpkgs/master eaab02b evujumenuk: wireguard: convert "table" to an interface option...
<18VABX70R> nixpkgs/master 6070d91 evujumenuk: wireguard: remove "table" option from example...
<NixOS_GitHub> [nixpkgs] fpletz closed pull request #27939: wireguard: add per-peer routing table option (master...wireguard-rt_tables) https://git.io/v7VwC

2017-08-04

<NixOS_GitHub> [nixpkgs] evujumenuk opened pull request #27939: wireguard: add per-peer routing table option (master...wireguard-rt_tables) https://git.io/v7VwC

2017-07-29

<NixOS_GitHub> nixpkgs/master 9d4d963 Aristid Breitkreuz: wireguard: 0.0.20170706 -> 0.0.20170726

2017-07-25

<nh2> Infinisil: maybe even that will be fixed at some point. He already verified WireGuard with a Haskell tool

2017-07-24

<aristid> gchristensen: i want the channel to update so everybody can benefit from my fix to the wireguard module to allow you not to store your private keys in the /nix/store! :)

2017-07-23

<NixOS_GitHub> nixpkgs/master 6319054 Aristid Breitkreuz: wireguard: sometimes module tries to re-add the default route, which fails - use replace to make it succeed

2017-07-17

<NixOS_GitHub> nixpkgs/master 9b0ff95 Aristid Breitkreuz: wireguard: allow not storing private keys in world-readable /nix/store (#27433)...
<NixOS_GitHub> nixpkgs/wireguard-private-keys a93e3a9 Aristid Breitkreuz: wireguard: fix listenPort