From 2f34f3efe7dc720d86c107eabf5ce6e09d93c2e8 Mon Sep 17 00:00:00 2001 From: "Jason A. Donenfeld" Date: Tue, 15 May 2018 02:26:55 +0200 Subject: [PATCH] ncat-client-server: add wg-quick variant Signed-off-by: Jason A. Donenfeld --- contrib/ncat-client-server/client-quick.sh | 34 ++++++++++++++++++++++ contrib/ncat-client-server/client.sh | 7 ++--- 2 files changed, 37 insertions(+), 4 deletions(-) create mode 100755 contrib/ncat-client-server/client-quick.sh diff --git a/contrib/ncat-client-server/client-quick.sh b/contrib/ncat-client-server/client-quick.sh new file mode 100755 index 0000000..25ff615 --- /dev/null +++ b/contrib/ncat-client-server/client-quick.sh @@ -0,0 +1,34 @@ +#!/bin/bash +# SPDX-License-Identifier: GPL-2.0 +# +# Copyright (C) 2015-2018 Jason A. Donenfeld . All Rights Reserved. + +set -e + +echo "[!] Warning: This server is for testing purposes only. You may not use this server for abusive or illegal purposes." + +echo "[+] Generating private key." +privatekey="$(wg genkey)" + +echo "[+] Sending public key to server." +exec 7<>/dev/tcp/demo.wireguard.com/42912 +wg pubkey <<<"$privatekey" >&7 + +echo "[+] Parsing server response." +IFS=: read -r status server_pubkey server_port internal_ip <&7 +[[ $status == OK ]] || exit 1 + +echo "[+] Writing config file." +sudo sh -c 'umask 077; mkdir -p /etc/wireguard; cat > /etc/wireguard/demo.conf' <<_EOF +[Interface] +PrivateKey = $privatekey +Address = $internal_ip/24 +DNS = 8.8.8.8, 8.8.4.4, 1.1.1.1, 1.0.0.1 + +[Peer] +PublicKey = $server_pubkey +Endpoint = demo.wireguard.com:$server_port +AllowedIPs = 0.0.0.0/0 +_EOF + +echo "[+] Success. Run \`wg-quick up demo\` to turn on the tunnel to the demo server and \`wg-quick down demo\` to turn it off." diff --git a/contrib/ncat-client-server/client.sh b/contrib/ncat-client-server/client.sh index 9ad9180..7994f18 100755 --- a/contrib/ncat-client-server/client.sh +++ b/contrib/ncat-client-server/client.sh @@ -5,15 +5,14 @@ set -e [[ $UID == 0 ]] || { echo "You must be root to run this."; exit 1; } -umask 077 -trap 'rm -f /tmp/wg_private_key' EXIT INT TERM exec 3<>/dev/tcp/demo.wireguard.com/42912 -wg genkey | tee /tmp/wg_private_key | wg pubkey >&3 +privatekey="$(wg genkey)" +wg pubkey <<<"$privatekey" >&3 IFS=: read -r status server_pubkey server_port internal_ip <&3 [[ $status == OK ]] ip link del dev wg0 2>/dev/null || true ip link add dev wg0 type wireguard -wg set wg0 private-key /tmp/wg_private_key peer "$server_pubkey" allowed-ips 0.0.0.0/0 endpoint "demo.wireguard.com:$server_port" persistent-keepalive 25 +wg set wg0 private-key <(echo "$privatekey") peer "$server_pubkey" allowed-ips 0.0.0.0/0 endpoint "demo.wireguard.com:$server_port" persistent-keepalive 25 ip address add "$internal_ip"/24 dev wg0 ip link set up dev wg0 if [ "$1" == "default-route" ]; then