global: wireguard.io --> wireguard.com

Due to concerns with the .io TLD, we are switching to using
wireguard.com instead.

Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
This commit is contained in:
Jason A. Donenfeld 2017-07-16 16:12:20 +02:00
parent 28f373e9cd
commit aad91ae679
10 changed files with 14 additions and 14 deletions

View File

@ -3,7 +3,7 @@
WireGuard is a novel VPN that runs inside the Linux Kernel and utilizes **state-of-the-art cryptography**. It aims to be faster, simpler, leaner, and more useful than IPSec, while avoiding the massive headache. It intends to be considerably more performant than OpenVPN. WireGuard is designed as a general purpose VPN for running on embedded interfaces and super computers alike, fit for many different circumstances. It runs over UDP. WireGuard is a novel VPN that runs inside the Linux Kernel and utilizes **state-of-the-art cryptography**. It aims to be faster, simpler, leaner, and more useful than IPSec, while avoiding the massive headache. It intends to be considerably more performant than OpenVPN. WireGuard is designed as a general purpose VPN for running on embedded interfaces and super computers alike, fit for many different circumstances. It runs over UDP.
**More information may be found at [WireGuard.io](https://www.wireguard.io/).** **More information may be found at [WireGuard.com](https://www.wireguard.com/).**
## License ## License

View File

@ -51,7 +51,7 @@ func main() {
StaticKeypair: noise.DHKey{Private: ourPrivate, Public: ourPublic}, StaticKeypair: noise.DHKey{Private: ourPrivate, Public: ourPublic},
PeerStatic: theirPublic, PeerStatic: theirPublic,
}) })
conn, err := net.Dial("udp", "demo.wireguard.io:12913") conn, err := net.Dial("udp", "demo.wireguard.com:12913")
if err != nil { if err != nil {
log.Fatalf("error dialing udp socket: %s", err) log.Fatalf("error dialing udp socket: %s", err)
} }

View File

@ -57,7 +57,7 @@ unsafeMessage write mpsk msg ns = case operation msg ns of
main :: IO () main :: IO ()
main = do main = do
let ip = "demo.wireguard.io" let ip = "demo.wireguard.com"
port = "12913" port = "12913"
myKeyB64 = "WAmgVYXkbT2bCtdcDwolI88/iVi/aV3/PHcUBTQSYmo=" -- private key myKeyB64 = "WAmgVYXkbT2bCtdcDwolI88/iVi/aV3/PHcUBTQSYmo=" -- private key
serverKeyB64 = "qRCwZSKInrMAq5sepfCdaCsRJaoLe5jhtzfiw7CjbwM=" -- public key serverKeyB64 = "qRCwZSKInrMAq5sepfCdaCsRJaoLe5jhtzfiw7CjbwM=" -- public key

View File

@ -17,7 +17,7 @@ use pnet::packet::icmp::{MutableIcmpPacket, IcmpTypes, echo_reply, echo_request,
use std::net::*; use std::net::*;
use std::str::FromStr; use std::str::FromStr;
static TEST_SERVER: &'static str = "demo.wireguard.io:12913"; static TEST_SERVER: &'static str = "demo.wireguard.com:12913";
fn memcpy(out: &mut [u8], data: &[u8]) { fn memcpy(out: &mut [u8], data: &[u8]) {
out[..data.len()].copy_from_slice(data); out[..data.len()].copy_from_slice(data);

View File

@ -140,7 +140,7 @@ int main(int argc, char *argv[])
const char *server = argv[1], *interface = argv[2]; const char *server = argv[1], *interface = argv[2];
if (argc < 3) { if (argc < 3) {
fprintf(stderr, "Usage: %s SERVER WIREGUARD_INTERFACE\nExample:\n %s demo.wireguard.io wg0\n", argv[0], argv[0]); fprintf(stderr, "Usage: %s SERVER WIREGUARD_INTERFACE\nExample:\n %s demo.wireguard.com wg0\n", argv[0], argv[0]);
return EINVAL; return EINVAL;
} }

View File

@ -11,6 +11,6 @@ That all said, this is a pretty cool example of just how
darn easy WireGuard can be. darn easy WireGuard can be.
Disclaimer: Disclaimer:
The `demo.wireguard.io` server in client.sh is for testing The `demo.wireguard.com` server in client.sh is for testing
purposes only. You may not use this server for abusive or purposes only. You may not use this server for abusive or
illegal purposes. illegal purposes.

View File

@ -6,13 +6,13 @@ set -e
[[ $UID == 0 ]] || { echo "You must be root to run this."; exit 1; } [[ $UID == 0 ]] || { echo "You must be root to run this."; exit 1; }
umask 077 umask 077
trap 'rm -f /tmp/wg_private_key' EXIT INT TERM trap 'rm -f /tmp/wg_private_key' EXIT INT TERM
exec 3<>/dev/tcp/demo.wireguard.io/42912 exec 3<>/dev/tcp/demo.wireguard.com/42912
wg genkey | tee /tmp/wg_private_key | wg pubkey >&3 wg genkey | tee /tmp/wg_private_key | wg pubkey >&3
IFS=: read -r status server_pubkey server_port internal_ip <&3 IFS=: read -r status server_pubkey server_port internal_ip <&3
[[ $status == OK ]] [[ $status == OK ]]
ip link del dev wg0 2>/dev/null || true ip link del dev wg0 2>/dev/null || true
ip link add dev wg0 type wireguard ip link add dev wg0 type wireguard
wg set wg0 private-key /tmp/wg_private_key peer "$server_pubkey" allowed-ips 0.0.0.0/0 endpoint "demo.wireguard.io:$server_port" persistent-keepalive 25 wg set wg0 private-key /tmp/wg_private_key peer "$server_pubkey" allowed-ips 0.0.0.0/0 endpoint "demo.wireguard.com:$server_port" persistent-keepalive 25
ip address add "$internal_ip"/24 dev wg0 ip address add "$internal_ip"/24 dev wg0
ip link set up dev wg0 ip link set up dev wg0
if [ "$1" == "default-route" ]; then if [ "$1" == "default-route" ]; then

View File

@ -114,7 +114,7 @@ traffic:
.br .br
AllowedIPs = 0.0.0.0/0 AllowedIPs = 0.0.0.0/0
.br .br
Endpoint = demo.wireguard.io:51820 Endpoint = demo.wireguard.com:51820
.br .br
Notice that the `PostUp` and `PostDown` commands are used here to configure DNS using Notice that the `PostUp` and `PostDown` commands are used here to configure DNS using
@ -193,6 +193,6 @@ was written by
Jason A. Donenfeld Jason A. Donenfeld
.ME . .ME .
For updates and more information, a project page is available on the For updates and more information, a project page is available on the
.UR https://\:www.wireguard.io/ .UR https://\:www.wireguard.com/
World Wide Web World Wide Web
.UE . .UE .

View File

@ -4,8 +4,8 @@ After=network-online.target
Wants=network-online.target Wants=network-online.target
Documentation=man:wg-quick(8) Documentation=man:wg-quick(8)
Documentation=man:wg(8) Documentation=man:wg(8)
Documentation=https://www.wireguard.io/ Documentation=https://www.wireguard.com/
Documentation=https://www.wireguard.io/quickstart/ Documentation=https://www.wireguard.com/quickstart/
Documentation=https://git.zx2c4.com/WireGuard/about/src/tools/wg-quick.8 Documentation=https://git.zx2c4.com/WireGuard/about/src/tools/wg-quick.8
Documentation=https://git.zx2c4.com/WireGuard/about/src/tools/wg.8 Documentation=https://git.zx2c4.com/WireGuard/about/src/tools/wg.8

View File

@ -200,7 +200,7 @@ ignored.
.br .br
PublicKey = gN65BkIKy1eCE9pP1wdc8ROUtkHLF2PfAqYdyYBz6EA= PublicKey = gN65BkIKy1eCE9pP1wdc8ROUtkHLF2PfAqYdyYBz6EA=
.br .br
Endpoint = test.wireguard.io:18981 Endpoint = test.wireguard.com:18981
.br .br
AllowedIPs = 10.10.10.230/32 AllowedIPs = 10.10.10.230/32
@ -225,6 +225,6 @@ was written by
Jason A. Donenfeld Jason A. Donenfeld
.ME . .ME .
For updates and more information, a project page is available on the For updates and more information, a project page is available on the
.UR https://\:www.wireguard.io/ .UR https://\:www.wireguard.com/
World Wide Web World Wide Web
.UE . .UE .