* Wireguard configuration - PostUp and PostDown @ 2021-08-28 22:55 crodges 2021-08-30 12:25 ` Pierre Langlois 0 siblings, 1 reply; 3+ messages in thread From: crodges @ 2021-08-28 22:55 UTC (permalink / raw) To: help-guix Hello everyone, I managed to configure wireguard on a vps running guix and created clients for my desktop and cellphone. What I want to do (and did already in a Debian vps) is to make wireguard's lan accessible to anyone connected and also browse the internet using this vpn. As I remember, I need to allow ip forwarding using sysctl net.ipv4.ip_forward=1 and I also need to put these rules into wireguard (the server) under [interface], PostUp = iptables -A FORWARD -i wg0 -j ACCEPT; iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE; ip6tables -A FORWARD -i wg0 -j ACCEPT; ip6tables -t nat -A POSTROUTING -o eth0 -j MASQUERADE PostDown = iptables -D FORWARD -i wg0 -j ACCEPT; iptables -t nat -D POSTROUTING -o eth0 -j MASQUERADE; ip6tables -D FORWARD -i wg0 -j ACCEPT; ip6tables -t nat -D POSTROUTING -o eth0 -j MASQUERADE Problem is, looking at the latest guix manual, PostUp and PostDown doesn't seem to exist yet. Do they exist but are still undocumented? If they don't exist, where should be a reasonable place to add this configurations? I'm trying to do everything the guix way, when I finish this machine configuration, I'd like it to be fully replicable. ^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: Wireguard configuration - PostUp and PostDown 2021-08-28 22:55 Wireguard configuration - PostUp and PostDown crodges @ 2021-08-30 12:25 ` Pierre Langlois 2021-08-31 16:16 ` crodges 0 siblings, 1 reply; 3+ messages in thread From: Pierre Langlois @ 2021-08-30 12:25 UTC (permalink / raw) To: crodges; +Cc: help-guix [-- Attachment #1: Type: text/plain, Size: 3734 bytes --] Hi there, crodges <crodges@csphy.pw> writes: > Hello everyone, > > I managed to configure wireguard on a vps running guix and created clients for > my desktop and cellphone. What I want to do (and did already in a Debian vps) > is to make wireguard's lan accessible to anyone connected and also browse the > internet using this vpn. I also have a similar setup with Guix, maybe I can help. > > As I remember, I need to allow ip forwarding using > > sysctl net.ipv4.ip_forward=1 That one is pretty easy, you find exactly that example in the manual: https://guix.gnu.org/manual/en/html_node/Miscellaneous-Services.html#System-Control-Service > > and I also need to put these rules into wireguard (the server) under > [interface], > > PostUp = iptables -A FORWARD -i wg0 -j ACCEPT; iptables -t nat -A POSTROUTING > -o eth0 -j MASQUERADE; ip6tables -A FORWARD -i wg0 -j ACCEPT; ip6tables -t nat > -A POSTROUTING -o eth0 -j MASQUERADE > > PostDown = iptables -D FORWARD -i wg0 -j ACCEPT; iptables -t nat -D > POSTROUTING -o eth0 -j MASQUERADE; ip6tables -D FORWARD -i wg0 -j ACCEPT; > ip6tables -t nat -D POSTROUTING -o eth0 -j MASQUERADE > > Problem is, looking at the latest guix manual, PostUp and PostDown doesn't > seem to exist yet. Do they exist but are still undocumented? > > If they don't exist, where should be a reasonable place to add this > configurations? I'm trying to do everything the guix way, when I finish this > machine configuration, I'd like it to be fully replicable. Yeah, I don't think wireguard-configuration supports doing this, we could probably add it although I think the "Guix way" here would probably be to specify iptables in another service: https://guix.gnu.org/manual/en/html_node/Networking-Services.html#index-iptables Probably something like this? Although I'm really not an iptables expert: --8<---------------cut here---------------start------------->8--- (service iptables-service-type (iptables-configuration (ipv4-rules (plain-file "iptables.rules" "*filter :INPUT ACCEPT :FORWARD ACCEPT :OUTPUT ACCEPT -A FORWARD -i wg0 -j ACCEPT -A POSTROUTING -t nat -o eth0 -j MASQUERADE COMMIT ")) (ipv6-rules (plain-file "ip6tables.rules" "*filter :INPUT ACCEPT :FORWARD ACCEPT :OUTPUT ACCEPT -A FORWARD -i wg0 -j ACCEPT -A POSTROUTING -t nat -o eth0 -j MASQUERADE COMMIT ")))) --8<---------------cut here---------------end--------------->8--- That being said, it's not exactly the same as doing this with PostUp/PostDown, the rules will be applied independently and it would be good for them to be setup only when wireguard comes up, and removed when you bring it down. AFAIK, there isn't a way to do this without hacking on the wireguard and iptables services themselves. The way to compose services together in Guix is to use a list of service-extension, at the moment wireguard doesn't have any other than itself: --8<---------------cut here---------------start------------->8--- (define wireguard-service-type (service-type (name 'wireguard) (extensions (list (service-extension shepherd-root-service-type wireguard-shepherd-service) (service-extension activation-service-type wireguard-activation))))) --8<---------------cut here---------------end--------------->8--- Maybe we could have the iptable-service-type here as an extension as well, however that requires the iptable service itself to be modified to allow extensibilty. See the manual for more information https://guix.gnu.org/manual/en/html_node/Service-Composition.html Hope this helps! Thanks, Pierre [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 519 bytes --] ^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: Wireguard configuration - PostUp and PostDown 2021-08-30 12:25 ` Pierre Langlois @ 2021-08-31 16:16 ` crodges 0 siblings, 0 replies; 3+ messages in thread From: crodges @ 2021-08-31 16:16 UTC (permalink / raw) To: Pierre Langlois; +Cc: help-guix [-- Attachment #1: Type: text/plain, Size: 4364 bytes --] On Monday, August 30, 2021 5:25:10 A.M. PDT Pierre Langlois wrote: > Hi there, > > crodges <crodges@csphy.pw> writes: > > Hello everyone, > > > > I managed to configure wireguard on a vps running guix and created clients > > for my desktop and cellphone. What I want to do (and did already in a > > Debian vps) is to make wireguard's lan accessible to anyone connected and > > also browse the internet using this vpn. > > I also have a similar setup with Guix, maybe I can help. > > > As I remember, I need to allow ip forwarding using > > > > sysctl net.ipv4.ip_forward=1 > > That one is pretty easy, you find exactly that example in the manual: > https://guix.gnu.org/manual/en/html_node/Miscellaneous-Services.html#System-> Control-Service > > and I also need to put these rules into wireguard (the server) under > > [interface], > > > > PostUp = iptables -A FORWARD -i wg0 -j ACCEPT; iptables -t nat -A > > POSTROUTING -o eth0 -j MASQUERADE; ip6tables -A FORWARD -i wg0 -j ACCEPT; > > ip6tables -t nat -A POSTROUTING -o eth0 -j MASQUERADE > > > > PostDown = iptables -D FORWARD -i wg0 -j ACCEPT; iptables -t nat -D > > POSTROUTING -o eth0 -j MASQUERADE; ip6tables -D FORWARD -i wg0 -j ACCEPT; > > ip6tables -t nat -D POSTROUTING -o eth0 -j MASQUERADE > > > > Problem is, looking at the latest guix manual, PostUp and PostDown doesn't > > seem to exist yet. Do they exist but are still undocumented? > > > > If they don't exist, where should be a reasonable place to add this > > configurations? I'm trying to do everything the guix way, when I finish > > this machine configuration, I'd like it to be fully replicable. > > Yeah, I don't think wireguard-configuration supports doing this, we > could probably add it although I think the "Guix way" here would > probably be to specify iptables in another service: > https://guix.gnu.org/manual/en/html_node/Networking-Services.html#index-ipta > bles > > Probably something like this? Although I'm really not an iptables > expert: > > --8<---------------cut here---------------start------------->8--- > (service iptables-service-type > (iptables-configuration > (ipv4-rules (plain-file "iptables.rules" "*filter > > :INPUT ACCEPT > :FORWARD ACCEPT > :OUTPUT ACCEPT > > -A FORWARD -i wg0 -j ACCEPT > -A POSTROUTING -t nat -o eth0 -j MASQUERADE > COMMIT > ")) > (ipv6-rules (plain-file "ip6tables.rules" "*filter > > :INPUT ACCEPT > :FORWARD ACCEPT > :OUTPUT ACCEPT > > -A FORWARD -i wg0 -j ACCEPT > -A POSTROUTING -t nat -o eth0 -j MASQUERADE > COMMIT > ")))) > --8<---------------cut here---------------end--------------->8--- > > That being said, it's not exactly the same as doing this with > PostUp/PostDown, the rules will be applied independently and it would be > good for them to be setup only when wireguard comes up, and removed when > you bring it down. > > AFAIK, there isn't a way to do this without hacking on the wireguard and > iptables services themselves. The way to compose services together in > Guix is to use a list of service-extension, at the moment wireguard > doesn't have any other than itself: > > --8<---------------cut here---------------start------------->8--- > (define wireguard-service-type > (service-type > (name 'wireguard) > (extensions > (list (service-extension shepherd-root-service-type > wireguard-shepherd-service) > (service-extension activation-service-type > wireguard-activation))))) > --8<---------------cut here---------------end--------------->8--- > > Maybe we could have the iptable-service-type here as an extension as > well, however that requires the iptable service itself to be modified to > allow extensibilty. See the manual for more information > https://guix.gnu.org/manual/en/html_node/Service-Composition.html > > Hope this helps! > > Thanks, > Pierre Pierre, That actually helped! I was able to enable ip forwarding using modify-services (after I realized that sysctl is part of base-services). As for iptables, I tried pasting the config but I'm getting an error when I reconfigure the system and restart iptables. I am not an iptables expert either! But now I have something to work with. Regarding service-extension, thanks for the pointer, I'll read it carefully and try to make the necessary extensions. [-- Attachment #2: This is a digitally signed message part. --] [-- Type: application/pgp-signature, Size: 833 bytes --] ^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2021-08-31 16:17 UTC | newest] Thread overview: 3+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2021-08-28 22:55 Wireguard configuration - PostUp and PostDown crodges 2021-08-30 12:25 ` Pierre Langlois 2021-08-31 16:16 ` crodges
Code repositories for project(s) associated with this external index https://git.savannah.gnu.org/cgit/guix.git This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.