| Crates.io | cableguard |
| lib.rs | cableguard |
| version | 0.90.15 |
| created_at | 2023-09-26 14:57:20.81419+00 |
| updated_at | 2023-10-26 07:59:00.297705+00 |
| description | an implementation of the WireGuard® protocol that uses rich online digital tokens for configuration and mutual authentication |
| homepage | |
| repository | https://github.com/alanesmizi/cgtun |
| max_upload_size | |
| id | 983749 |
| size | 387,206 |

Most of the following information refers to cableguard-cli This library has not been tested yet Please check https://crates.io/crates/cableguard-cli
CableGuard TUN is an implementation of the WireGuard® protocol with Rich Online Digital Tokens (RODiT). RODiT are an implementation of non-fungible tokens that contain all the configuration, identity, and subscription information for Cableguard TUN endpoints. Cableguard TUN is based on Cloudflare's Borintung, a Rust implememtation of Wireguard. This project is part of a large ecosystem (Cableguard FORGE, Cableguard TOOL, Cableguard WALLET, Cableguard FIND and Cableguard AUTH), and consists of three parts:
cableguard-cli, a userspace WireGuard implementation for Linux and macOS.cableguard that implements the underlying WireGuard protocol, without the network or tunnel stacks that need to be that need to be implemented in a platform idiomatic way.This project is released under the GPLv2. More information may be found at WireGuard.com.**
Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the 3-Clause BSD License, shall be licensed as above, without any additional terms or conditions.
If you want to contribute to this project, please contact vpn@cableguard.org.
./target/release folder. You can copy it to a desired location manually, or install it using cargo install --bin cableguard --path ..You may want to add to .bashrc these lines:
To start a tunnel use:
cableguard-cli [-f/--foreground] <filewithaccount.json>
Where <filewithaccount.json> is a NEAR implicit account created with ./wallet/rodtwallet.sh genaccount
cableguard will drop privileges when started. When privileges are dropped it is not possible to set fwmark. If fwmark is required, such as when using wg-quick, run with --disable-drop-privileges or set the environment variable WG_SUDO=1.
You will need to give the executable the CAP_NET_ADMIN capability using: sudo setcap cap_net_admin+epi cableguard.
It may be possible to use with wg-quick by setting the environment variable WG_QUICK_USERSPACE_IMPLEMENTATION to cableguard. For example:
sudo WG_QUICK_USERSPACE_IMPLEMENTATION=cableguard-cli WG_SUDO=1 wg-quick up CONFIGURATION
x86-64 architecture is supported.WireGuard is a registered trademark of Jason A. Donenfeld. Cableguard is not sponsored or endorsed by Jason A. Donenfeld.