Wireguard is fast, simple (around 4k lines of code) and secure VPN. From my perspective as a user, a configuration is as simple as in SSH.
Installation
Add repository and install package (for other systems go to official docs)
add-apt-repository ppa:wireguard/wireguard
apt-get update
apt-get install -y wireguard
Ensure that you enabled forwarding in sysctl.
echo "net.ipv4.ip_forward = 1" > /etc/sysctl.d/wg.conf
echo "net.ipv6.conf.all.forwarding = 1" >> /etc/sysctl.d/wg.conf
sysctl --system
Configuration
Create server and client keys
wg genkey | tee server.private.key | wg pubkey > server.public.key wg genkey | tee client.private.key | wg pubkey > client.public.key
touch /etc/wireguard/wg0.conf
and put config for VPN interface:[Interface] Address=/24 PrivateKey = ListenPort = 51820 PostUp = iptables -t nat -A POSTROUTING -o -j MASQUERADE; ip6tables -t nat -A POSTROUTING -o -j MASQUERADE PostDown = iptables -t nat -D POSTROUTING -o -j MASQUERADE; ip6tables -t nat -D POSTROUTING -o -j MASQUERADE [Peer] PublicKey = AllowedIPs = /32
Example:
[Interface] Address=192.168.101.1/24 PrivateKey = mHjrLYUTKbrGqJViVOHfQX9dN0Sn49gJNoof68nbJHA= ListenPort = 51820 PostUp = iptables -t nat -A POSTROUTING -o enp0s3 -j MASQUERADE; ip6tables -t nat -A POSTROUTING -o enp0s3 -j MASQUERADE PostDown = iptables -t nat -D POSTROUTING -o enp0s3 -j MASQUERADE; ip6tables -t nat -D POSTROUTING -o enp0s3 -j MASQUERADE [Peer] PublicKey = XKT1Ctj5b+gjXc1gMtOdxNEpc9UUM2TsXaFdAyABd3w= AllowedIPs = 192.168.101.2/32
Run VPN server with
wg-quick up
Create config for client
[Interface] Address = /24 PrivateKey = ListenPort = 21841 DNS = , [Peer] PublicKey = Endpoint = :51820 AllowedIPs = 0.0.0.0/0
Example:
[Interface] Address = 192.168.101.2/32 PrivateKey = 0AQI65ehzszpXf9f2FWEABX90PX+gv5DJH3/mkZ/eW8= ListenPort = 21841 DNS = 1.1.1.1,1.1.0.0 [Peer] PublicKey = ccDLW5zKussL3ejxMqWpx1uZMfN09bkGAirCWXZWp0s= Endpoint = 192.168.1.5:51820 AllowedIPs = 0.0.0.0/0
Install client software https://www.wireguard.com/install/ and paste client config