Skip to main content

Wireguard Mesh Maker

Project description

Wireguard Mesh Tool

This is a small project designed to experiment with distribution and maintenance of Wireguard Meshes for private networks using Protocol Routing.

Of necessity, the Routing Daemons are running against the wireguard interfaces.

If there are local Routing Requirements, they are beyond the scope of this mesh development. This is intended to produce a routing mesh - care and feeding of the mesh is your responsibility.

Requirements

  • Fedora prolly any modern linux will work
  • Wireguard included with Fedora (wireguard-tools)
  • Python included with almost all modern linux
  • BIRD modular protocol routing daemon
  • Shorewall local linux firewall configuration, with the simple two-interface setup

See INSTALL.md

TODO

  • build node removal workflow.
  • wgconfig should perform the initial wghost configuration.
  • Local Site-specific configurations integration?
    • 1/2 done, calls -local scripts.
  • Rename netns "private" to a mesh-specific locus.
  • startup script should prolly be written in python.
  • Non-dns method of transmitting deploy_messages.
  • Warning command:
    • check default and private for forwarding
    • check for addresses on WG interfaces
    • Check for wg up
    • Check for veth device presence
    • Check veth addressed
    • Monitor/Warn on UDP port conflicts on startup.
  • Examine ifaddr dependency.
  • Simplify wgconfig, remove wgdeploy redundant code blocks.
  • Fix deploy template args structure so that wg/table/ifdetails are portable throughout the templates

Getting Started

Example config: wgmesh.yaml Example Domain: mesh.example.com

Site Config

  • Copy wgmesh-example.yaml to wgmesh.yaml
  • Edit the file and set the primitives.
    • The ipv6 segment should be a 48bit ULA subnet.
  • Execute site publisher: wgsite wgmesh.yaml
  • Publish the DNS Information. (TXT record 'mesh.example.com')

Endpoint Config

  • Connect to mesh endpoints, setup python virtualenv if desired.

  • Install wgmesh package; pip install wgmesh

  • Setup host registration the mesh (run as root or sudo):

     wgconfig mesh.example.com
    
  • Configure the local host:

     wgconfig -i ens3 -T ens4 -I 172.22.15.243/24  mesh.example.com
    
  • Publish Site import data:

    wghost mesh.example.com
    

Site Config

  • Import the host by copying the output into the site controller. wgsite -i <hash> wgmesh.yaml
  • Once host(s) are ready, publish Host-base DNS records: wgpub wgmesh.yaml
  • Publish output to the [uuid].wgmesh.example.com TXT records.

Endpoint Config

  • Deploy on the local hosts: wgdeploy mesh.example.com

Publish and deploy processes can be automated.

Warnings:

wghost setup, and wgsite -i must be a human-approved process, because this adds nodes (e.g. trusted keys) to the mesh.

Route53 Integration

If you are using Route53 for DNS hosting, you may setup automated DNS posting from the site configurator. This causes wgsite, and wgpub to automatically update records in DNS.

Add the aws_access_key_id and aws_secret_access_key to the Site Mesh file in the global section.

global:
  aws_access_key_id: XXXXXXXXXXXXXXXXXX
  aws_secret_access_key: yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy

Mesh Endpoints

The Mesh endpoints expect a VM (or machine) with two attached interfaces. One interface should be configured for Internet access. The other interface must connect to the local LAN.

Mesh BGP Configuration is setup for exchanging routes between Mesh Endpoints across the wireguard links. Local routing configuration can be attached using BIRD's modular configuration capability.

image

Process Flow

image

Troubleshooting

UDP Ports

Check for UDP Port conflicts. Other elements on the system may conflict with the UDP ports. UDP Ports are assigned from the base port in an ascending fashion. Reliable reports have come in and high-end (49900+) ports have caused OS-related interference.

Lowering the ports resolved the issue.

BIRD Status

BFD Is enabled to make troubleshooting easier. The endpoints are all known at wgdeploy time, and this neatly describes the config when monitoring. Use this script to watch bird on an endpoint, and to see changes in status as nodes are up'd and down'd.

util/birdwatch.sh

watch -n1 "birdc -s /var/run/bird-private.sock show prot;echo '';birdc -s /var/run/bird-private.sock show bfd session;echo '';birdc -s /var/run/bird-private.sock show route count"

Testing Subnet

If you're experimenting with the MESH, and just want to send packets racing around, start the tester namespace:

sudo systemctl start systemd-netns-access@tester systemd-netns@tester

From within the namespace, you can ping the other nodes. (Taken from a 3-node test setup.)

[root@vpn-nodea eis]# ip netns exec tester fping 192.168.101.1 192.168.102.100 192.168.103.10
192.168.101.1 is alive
192.168.102.100 is alive
192.168.103.10 is alive

Contributing

Pull requests and feature requests gladly accepted.

wgmesh is licensed under the MIT/Expat license.

Changelog

  • 2020-12-04: Joshua Schmidlkofer - project setup
  • 2021-03-03: 0.5 - functional test release.
  • 2021-03-03: 0.5.1 - packaging test release.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

wgmesh-1.0.2.tar.gz (825.7 kB view hashes)

Uploaded Source

Built Distribution

wgmesh-1.0.2-py3-none-any.whl (31.2 kB view hashes)

Uploaded Python 3

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page