WireGuard on OpenBSD
This is an old blogpost but maybe someone is finding it useful
There are many way’s to set up WireGuard on OpenBSD, I prefer to use the hostname.wg method, in that it follows the same path as all other interfaces in OpenBSD. I have two tunnels at home, one for management and one with less privileges. All in all six clients.
Let us start with creating the keys. In a terminal window:
Server keys
umask 077
wg genkey > server.priv (PrivateKey)
wg pubkey < server.priv > server.pub (PublicKey)
Then create the clients keys.
Client keys
wg genkey > client.priv (PrivateKey)
wg pubkey < client.priv > client.pub (PublicKey)
wg genpsk > wg.psk (PresharedKey)
Create as many clients as you need. And if you want to separate these you can create more tunnels, like hostname.wg0, hostname.wg1 and so on, all with a different listening ports, and in that way separate tunnels with different privileges on the network. Then continue to create the configuration file /etc/hostname.wg0 and put the information in it:
wgkey "Server Private Key"
wgport 51820
inet 172.16.10.1/29 (do not make the subnet bigger than you need)
client 1
wgpeer "Client Public Key" wgpsk "Preshared Key" wgpka 25 wgaip 172.16.10.2/32 (all on line line)
up
group services (if no interface groups is used disregard this)
group mgmt
Then we can create the client conf, client.conf:
[Interface]
PrivateKey = "Client Private Key"
Address = 172.16.10.2/29
DNS = preferred DNS server address, domain (if used)
[Peer]
PublicKey = "Server Public Key"
PresharedKey = "Preshared Key"
AllowedIPs = 0.0.0.0/0 (if you want to route all traffic through the tunnel)
Endpoint = WireGuard public ip-address or dynamic DNS adress:51820
PersistentKeepalive = 25
If this is not your router you should also add to sysctl.conf
net.inet.ip.forwarding=1
Instead of rebooting your server you can instead then do in the terminal:
doas sysctl net.inet.ip.forwarding=1
doas sh /etc/netstart wg0
An ifconfig would then show:
wg0: flags=80c3<UP,BROADCAST,RUNNING,NOARP,MULTICAST> mtu 1420 index 15 priority 0 llprio 3
wgport 51820
groups: wg mgmt services
inet 172.16.10.1 netmask 0xfffffff8 broadcast 172.16.10.7
If you do a:
doas ifconfig wg0 or doas wg show wg0
You will get much more information about the connection.
In pf.conf you would have to open your firewall, I have a NAT rule for all my clients.
NAT rules
match out on egress inet from any to any nat-to (egress:0) port 1024:65535 set prio (5, 6 ) label "nat" (all on one line)# pass in rules for WireGuard #
pass in quick log on egress inet proto udp to egress 51820 keep state set prio (3, 5) label "WireGuard" (all on one line)
After a doas pfctl -f /etc/pf.conf
you should be set.
If your client has a camera then you can create a QR-code from the client.conf file and scan that QR-code in an easy way to configure the tunnel. On Linux and MacOS Brew you can install qrencode very easy and then:
qrencode -t ansiutf8 < client.conf
Essential links:
Quick Start - WireGuard
How to generate WireGuard QR code on Linux for mobile - nixCraft