Crates.io | cableguard |
lib.rs | cableguard |
version | 0.90.15 |
source | src |
created_at | 2023-09-26 14:57:20.81419 |
updated_at | 2023-10-26 07:59:00.297705 |
description | an implementation of the WireGuard® protocol that uses rich online digital tokens for configuration and mutual authentication |
homepage | |
repository | https://github.com/alanesmizi/cgtun |
max_upload_size | |
id | 983749 |
size | 387,206 |
Most of the following information refers to cableguard-cli This library has not been tested yet Please check https://crates.io/crates/cableguard-cli
CableGuard TUN is an implementation of the WireGuard® protocol with Rich Online Digital Tokens (RODiT). RODiT are an implementation of non-fungible tokens that contain all the configuration, identity, and subscription information for Cableguard TUN endpoints. Cableguard TUN is based on Cloudflare's Borintung, a Rust implememtation of Wireguard. This project is part of a large ecosystem (Cableguard FORGE, Cableguard TOOL, Cableguard WALLET, Cableguard FIND and Cableguard AUTH), and consists of three parts:
cableguard-cli
, a userspace WireGuard implementation for Linux and macOS.cableguard
that implements the underlying WireGuard protocol, without the network or tunnel stacks that need to be that need to be implemented in a platform idiomatic way.This project is released under the GPLv2. More information may be found at WireGuard.com.**
Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the 3-Clause BSD License, shall be licensed as above, without any additional terms or conditions.
If you want to contribute to this project, please contact vpn@cableguard.org.
./target/release
folder. You can copy it to a desired location manually, or install it using cargo install --bin cableguard --path .
.You may want to add to .bashrc these lines:
To start a tunnel use:
cableguard-cli [-f/--foreground] <filewithaccount.json>
Where <filewithaccount.json> is a NEAR implicit account created with ./wallet/rodtwallet.sh genaccount
cableguard
will drop privileges when started. When privileges are dropped it is not possible to set fwmark
. If fwmark
is required, such as when using wg-quick
, run with --disable-drop-privileges
or set the environment variable WG_SUDO=1
.
You will need to give the executable the CAP_NET_ADMIN
capability using: sudo setcap cap_net_admin+epi cableguard
.
It may be possible to use with wg-quick by setting the environment variable WG_QUICK_USERSPACE_IMPLEMENTATION
to cableguard
. For example:
sudo WG_QUICK_USERSPACE_IMPLEMENTATION=cableguard-cli WG_SUDO=1 wg-quick up CONFIGURATION
x86-64
architecture is supported.WireGuard is a registered trademark of Jason A. Donenfeld. Cableguard is not sponsored or endorsed by Jason A. Donenfeld.