WireGuard: Difference between revisions
imported>Zarelit replace removed page with its version in the web archive |
imported>Fedx No edit summary |
||
| Line 2: | Line 2: | ||
==Generate keypair== | ==Generate keypair== | ||
Each peer needs to have a public-private keypair. The keys can be generated on any machine that already has WireGuard installed using the <code>wg</code> utility. If WireGuard isn't installed yet, it can be made available by adding <code>wireguard</code> to <code>environment.systemPackages</code> or by running <code>nix-env -iA wireguard</code>. | Each peer needs to have a public-private keypair. The keys can be generated on any machine that already has WireGuard installed using the <code>wg</code> utility. If WireGuard isn't installed yet, it can be made available by adding <code>wireguard</code> to <code>environment.systemPackages</code> or by running <code>nix-env -iA nixos.wireguard</code> for NixOS based systems and <code>nix-env -iA nixpkgs.wireguard</code> for non-NixOS systems. | ||
Creating a keypair is simple: | Creating a keypair is simple: | ||