I think you might be surprised how straightforward an app like this would be for Wireguard, and, unlike OpenVPN, for which there are a zillion wrapper options, Wireguard really needs some non-shell-user UX love right now.
Have you considered doing a version of this for Wireguard? It's much, much better than OpenVPN.
Just skimming wireguard as this is the first I've heard of it. I haven't got time to read the entire spec tonight as it is late where I am. I see it uses a custom protocol over UDP. Do you know if this is detectable? One of the major advantages of openvpn is the ability to host an sslvpn on port 443 to not have to face any problems with filtering..just wonder if anyone knows if/how wireguard addresses this?
This comment is inexplicably downvoted; if you're going to set up a VPN for the first time and don't want to get sysadmin-level intimate with Linux networking to boot up Wireguard (surprisingly easy!), Algo is your best bet.
I feel like "here's a similar tutorial for algo, which has these advantages ..." would have received upvotes. This just looks like it's pissing on the efforts of the actual post.
This looks interesting, and I'm going to try it. Alternatively if you want something a little more lightweight but less-feature packed, there's http://www.pivpn.io
Looks cool, but FYI for those trying to remove themselves from the Google surveillance ecosystem... Outline was created by Jigsaw, an Alphabet/Google owned subsidiary. Outline could very well have the best intentions, and they likely do based on Jigsaw’s mission, but the link to Alphabet/Google should caution some people.
I had an OpenVPN server setup for the first time yesterday with a docker container, in about five minutes. This thread's app is probably very useful but I figured someone in here might be interested in the docker container. I found it at the top of google with "openvpn docker." I ended up using the thread on HN yesterday to setup wireguard instead, though. I used the ansible setup and it was a breeze as well.
Sorry for not staying on topic. VPNHome looks nifty.
Looks great, but I prefer to use native Cisco IPSec[1] so I don't have to install 3rd party applications. Works out of the box with macOS, iOS, and Android. Non-technical users can follow a tutorial and setup on their devices. It does lack some nice-to-haves such as two-factor authentication though.
Wireguard is great, but is not supported on many devices, and does not auto provision configuration files for all your devices. Please look into algo, it really is the best solution for 99% of people.
IPSEC and OpenVPN are far more dangerous than Wireguard is, so while it might be simpler for some kinds of users to boot up an OpenVPN connection, that doesn't necessarily make it the "best solution".
It's pretty terrible advice for anyone who isn't running Linux on their endpoints, or non-technical users accustom to an openvpn-as or other web-bootstrapped vpn client.
Wireguard is a great VPN protocol. At this point in time it is a lousy VPN solution for all but the most basic uses. Given time the necessary infrastructure to make it a great VPN solution will develop.
What's a common-case VPN problem, the kind that (say) 3 out of 5 company or personal VPN users would have, that aren't well addressed by Wireguard, other than lack of Windows support?
Have you considered doing a version of this for Wireguard? It's much, much better than OpenVPN.
However, Wireguard requires kernel module which is a bit tricky on VPSes and is not compatible with "it just works" mantra.
Deleted Comment
I've hard time installing Wireguard on a VPS.
Deleted Comment
[1] https://getoutline.org/
Sorry for not staying on topic. VPNHome looks nifty.
[1] https://github.com/hwdsl2/setup-ipsec-vpn
Just use Wireguard.
Wireguard is great, but is not supported on many devices, and does not auto provision configuration files for all your devices. Please look into algo, it really is the best solution for 99% of people.
It's also open-source: https://github.com/tinfoil/openvpn_autoconfig