commit - 4860bf749055bdf77e7fbcdea6edb4f55929935c
commit + 078baac6a940efc32a9d6a984a5f059a9d3140bc
blob - 29cb897ad307311ad6768496dafde840878e8fe4
blob + 2c607914abe71b922bf6d72e2b2329f114c4c3f8
--- wiki.d/.pageindex
+++ wiki.d/.pageindex
+Wg.RecentChanges:1729410970: : recentchanges wireguard configure hosting without moocow 19t21 2024 34z nat wg 10 25 by
Wg.Hosting:1729373134: : server_mac_address unused_private_ip privatekey_server privatekey_client server_privatekey ip_for_client pubkey_client configuration pubkey_server peer_pubkey generation publically allowedips wireguard configure interface publickey keypairs endpoint required hostname contents standard replaced routable generate hosting without dynamic command should genkey tunnel syntax giving wgport blocks useful wgpeer remove change enough domain their 51820 setup wgkey given route tools wgaip shown below ports first user home vio0 have lots that want once this will file your inet them also but nat can 255 arp etc isp wg0 now tee em0 172 32 if 16 10 of
SiteAdmin.AuthUser:1729372342: PmWiki.AuthUser PmWiki.LocalCustomizations PmWiki.Passwords PmWiki.SecurityVariables : kzxa069zaurvme2wtkwdzobecad6wq5dc4qaipfumc46kzjhzxcew ulu1o3dw6ai7kpjei7g8qestxykcd2w3fzyowe5hgq4whuqc7n0ai qjtdeoj70cst8ml4gojowul8rflfeb0ljdhqhhrupftuodfudgmh2 szg7d334j0wxrt6z10wdfousucloey1jwsw0ivkg6gyvgocjinbim 66jkjxosix5cosun3pdyqoecdfk8qlgxyft8z9ygxcngwagxd0meq 1pnquver1cxhbyv5lov9lelgygjh6wynimfb3qzhaojtx5xbymelq wag2z1yjfasuaba4mxmbsou2ko3ustjmsl4nd8idl5spozzfhmfjy xasgfyoxhyutadgrshosxuze1eulwgr8asiasxv55y9v9b9swmtti pzez59xbud1rgqtfz4kjketart6ktxi3ufshb1prgrlipsrlbu0yc aktvcerbb0sdxyotxcgtqox7nnawvtw5mp3fzrfehnjjchrxgpmuu ie9xoswkeovtpinzj4ly7empvmpwzc99ia8jbfhfsorxvynewmame rgbffhuylfod5gdwiakagosqrfcumusbg0get4yo34cesai3bholm uv7tb320n8nw4j8hbwmxauulithnvntazdul03i0eff6qzjboiy4e ihauv3tzcsgfn1lwqevtkod52yrw2jtyldkkuvgpb9xaabw4zbfnu eg0gstvpzzkfdqvcwjhoukjygjheqg5jwipsypgxzfvryuybdyns p0f7um4cefnoi5bc22ydrea70mwytcuucc1tpti1gvyjurprgyhl nvr0aml4vitwsaiwbxomxe5bcpoemizd8ylzgb4z8xmb2vbpbxsx qmudpox7rienwmktganomgigewmryogzrbba3hzpftednpygfum 6ebwthcykp9i58fb2o6e2vjqpt518kagfktykw6kjsynfvpj8g2 hvhl15tubmv02b5mwgufti7im13ewpicurr2itigd9oszvuma2 sqduis8wadu8znym4jkutnibju3ubscdmyqxhsi6lrzjb0d3 lvwv9ovfqynfsrp4eumyu2lj74qi9c7id4chuudje7uxd7u r9bi5akhnf95kewd8tgz1uxewhhxxcyxadzvpgq1juwtaho ss8tuxkvkbof96voledbuucyi9ttcike0yybrzo4tyrae32 qrfr1hwxytpatdc2yvfiveabomhk9w3m4trsy1jhi7ekk m7cpbk5jdy57jo7ks9brzvniuyrgelixeef7rtpwogvxm zgbs867t7iewra9ii4ugpeyujpig74fbgiks0bncopydy g9w8qg4ue8v43o5arh9rduwc7oerlrtfjpproodhsk7c2 itpy2rbjtkrho3klnbtpprzx8gfv8deutmy31g4rsl2u 1g59vanvkriwopnzpwnzp4ippsh4p9njje7hcj5oowyy zmxwtgvqfhegupguo2pvgpzimh3xds0dujoj7suipo0q atlu0ewhjdaiiechhgjmhawd9guli7jldkmfr4wohq8 c01gpw8lwjdosppykaj4c4i87yapdztvkazrzaecxnk umwmoir2cr7niiop2qeaezph2nofkimfrx5f9uhpbm vfc1fev5rchhweu8zhmvaaa5dh8vh6oylw3xfeiaif yk9cfpbfosetivlifjlrzzykg6upyqmoxepksideim xlah3mevoenpgpaoe1mkj22e2mmaahvieaeyglatu qo2rq1ioupw7soob8pi1x5gaxojgddwy4f0flsuk ioz7lg2n4fqy56yfunk11ojrryocf8ufpvljxj14 afs8a0w9zccpmytwe4pl0uifydvk5fe9g9roqggb uy0qfjunaqhboa5f7tjz0ecj5dng0ugtmv9ndlfw hkca3foog9jjrr0i2ijhfqw0wui5bpoqlnwnrgk da9wcjtoa0vw36x9jmvhdedcnon8266cmlzcevy 6qnynlbctuprbw4n3ywjgogbhmhpgdctw1umlc uxv3bpvhyrdshbjqg96jhu0vq6jff4ixyveqm4 ethxrqerfaa354dguosuujotxevxj5g1aa71zc psiwryupbin7gljgcvnzba4hrapwisefyhmuni le5wzugfbgd7eoj34bkwxbpy3jcmx1xxr83fy obhuysubnkyj8jvsv4g5u7ozxlt6j143wexcu zu7uqwpwimccwio0lw0zce8l1xqapekqj5zs 8qdfodwtozjtuxzkh91hw3ukbb7igotee78i nnmrvuvdgbdtsahmsaepdovxrc814hun9alh z98eph7otcsgsxnknjqy2dae3lwp5n8skas l7vubxwc5llgnc83mofl3t1fic7ct4a1dkc ej5u185vundv3ggm2sy1tlmc1rxcylkfdfm wstnetyibyndhha4tvvotzuep3qo4t1aju yv2ne76jgp6ptzu8sinytoaai6zx9b4zhw mllh4vqqhgo8thxisycj3o9gxmqhchlsc1 mxprwnztv15akg39ugen3e6bwdvils1ny wuqziqxgofprem0ltjpu4jtkqhcrqsmke qrco9ginmv2ejeldfbe31oz2yclac1ik civjwtmqvmsoqtgc1bxugoao1o3kqgov u0yfpdpmxysiowz53lupsbfx6gwur6ay 8ayeqbf2rydjavxaamqaau32fkpvpurg rywyoyngb8a92316xg2hrrbxjmu9dnym ycsfmmxoj1ersj4ie00egabz4tdf5cvj vnf29ixrgyonlyjlwltiaq0hvlfmktc jeukvrvwnmnfx3qgqnn5sabpn45jgna hmezurgyzvkxagxg0w813ve62fzyxbg 3yqmn4ja0o7nxkunz9iebct3xqagt2a zhb46wocsop6occy4eexy7b2nsbfhji cslnbsoosrjy2gatllybzznvqk2vkaq tv62dbotx3hqstfucuc3mrnl2xtjfai mr35li6zvu5cbo7z7jacruze9jvklpq k8f2oxfp4ipbjllclnakeh04qka4bca orbrzwetldeoygfpq1ilnmrnc1uje2q drhfmw6raqrxzf3zdvpvntakjorgphq 3oxtsaj8x80dyigvouihe2zjdwfkn22 v0z18o4mwjtqz5jf4wv2doufp1mdubw bzsoxmp7owshe24o7fiiqvxxqxktul6 84zy6cqydcxzs60avrhndi1c9owhnzq pdumkmvz9zctvlxkdcpzdwvzy8xg2cm jsvcw6ejfypdaq5ofim7nohbcrvyrvg sbfyefrwctlrx1quqrgafusyowyyjzw ec2hgiszxo1q5xdyyfqozqubk4fhs2 eklex8ktxrvgzzktc5kpkezpzafsbh pcztnczypyvyxslw0eha1ow1vgzhgh agrmydmtrtv5j9ugzohrwduprerl7c jp8or2zol3npv3vqgeu8aemdsvkadh ey00b8w6olostkiyuwestefklwbh1j gronpdkh2nsoqx4twmefwenfid9b6n masjz1qzlxjxf0n65huznoetifbrz pdczw1yt7vm2l9k7n3vhjocykxwae qaslgkztkc2cncvblpoz2dwcosy5s 0dsq4eby2pu72cd8brkmkughclpyl uqgdbqdoluvdev0w5fthbi5kakvxb z1hgrq8ikpue7k9cmk9sl5xpwfl8c 9hbw193lb03gcnggdkslf1ppclqc 7p6mjnlbj5nebyazfgramefu9ee2 fvx6enlijp803jwidmfjdo5th4xk hkznqgwolbzgxympawplkhiktiv6 binnpzxqolydmhezezeihewrlhvg nkxwxnngbzm9fs1enbrfuuawwlq xgp2dx1gezdrnxawf3xlxonb9ps 1uajaodrgaoxlyabfuectxulwpf iax4dfaxzp9uozjsahowah7dtbi wemurhl0onbhjp1rn5srpxv4q00 7doxdoqywmaounqwli0yieosgq we2yrcw5jtxroskwb9dizesl4r a0nce4yaeelti78la6kz5vxuc2 tfeltu2k9h08hwq3sci6wd6jse biq3ofpdk7snwc11fh04efjhyf 71jltjbjajnswv5bgax331mgu ehk94ub5zvoggkpovufykrnbo vx86rtea1slyyruevsuore4h6 yfj0ulciacmdioryqqejwla4k natdp7x0rwn49o0j856lz3fy 0jozbg6xmfccs2cbiykufiw3 fomakvhwn8kn03sxgksiqryq a7zaamj7kvwdn9yanfqv20ag y1ooa0x4ddcekgsjpgkpjpmo i0owuedgkabq6gwuoq5v5e2o s3mmcyr8lzbxpckon7v0vo79 njqmeqej1mvzbhbqzb34guo cjli0qjweqvtrrahtiafsoq gwcs6rlxghahs5dukoe7mmg lrwrdezrbvvnshf4v9qk7ug lboktrzby6cpcbxvx9i4qni 5msdan8yv21snlpngzyp3ul xjhd7ohzh7ag08whhcsgcdu hhddyu4r8u08etxbargkbi 6ko5ph4gyoanqyihtctgma wlt6pigtfmyqu55jqg8pvm kup1dogmojd45nqsv5uqud fiwjo4qobuwjgpvp94qqy0 peht2wtpmlkegdedywddwh 9omzcn6xhzhturuqevwhuu 2faeti2yhn3wdswmj7umc6 mz7xzjzwqbgcb5fr2jtjte h1ebwcfkqkscku7srgylfs 3jaodve4mftaqjnrbeqmbr qybnuzyu6upsrx6zy9lsvs dpwgproatmm8vfwsa9ugvw sj593ercmttjm3fk26hcv1 enjlijpqrqacxicen6u4gy yzx2efmjb2tstlbpzjvbyi gqoob7em1lz6ohyabxhv5u omqamx8c88oi6aps9rjas kfgqaqdokuvt59y6dsxpn socjm4cmoilvjivbc8khe qvhtmtmyxpj0wcsvvvitz ucvbrt0gpzcqdknvfmudm ulkjdqk1izobvkm2j7cz2 onkf9n7zptixlmegxjjog koemylipc9lfxwmzl7z3y pung6ln1yvvlbhupjybif mkhixzcyrdshlu0fm6ch3 hmdvlziy2johd3nnxbbcd pltltcxdjnf2vryi43vyh 4a3ubwzs3sir8r5q1fxp6 whfqq0jm3vgux5hdbxnt0 g9asiddmu0hhoinsarerc ouorr5eqof2paopebvaw1 neqvlwxdft1lds30oqo28 fxiqoyvxkfhk7yfqt3ky5 xudd8uwoxxsce51f89nn4 dxdjdqo5m7qxfdglo2qpc yydkuesj23fyvvvwsj0wd xqnpth6al1kizgex3zb5r 8qrrymyolfpgjtdkahs5m f2cwt7rydsvrf0rpok1g e1u8nykpmimoyfo0fz7h 6ole59b9mytmzfxfmjv2 v2cgzesi6wtmrcaucc0a pmumzjc5phkk0rrkni54 7ptsttfhgfy5gljy7pkf inef0edyym7owq38us8b 49eddxffecgs4sp67juk f4zua5eqrchm27oovgkb qu3bqdxc6lcobpmp3ewm ay1xpkv5lflmqxlf3cgu localcustomizations aqoxbsz6tkaq6zbo1tm ypywz3uernyqwc0oxs4 sametdg8clzbquz8p76 hmxvx33qkei6j7qd20w ztyudzxyfmctdryepu iag0cwxsruwvm00t7a 9coq2zkunfzjunx8cb otx5vcipesddc56y8s wnxd84phwsssrcdxn6 5itiwlrplpj6ftetsx mm5fkbh3wiibzgojtu nwv81niquopiisnaae ceo7yksgn9uwsxwj8l fp7oiarmjfgalbm3is st8mmnxusgzx3akxu clnznlel9swsn4xyd oc9jb0oetn5rm3t3h zrenqeftxooceaawe wmoubc5jmwjtljjkk kjr6tvshk0hhwhdv3 yz7sobvnxy5dtt30h ton0wxx68ocqgdgnc securityvariables eqlfgml2sfuopuh7 8haadaxreogkfd9c pl8ht02qfvzkgxxg nrfg9q0zawtcbjnw defaultpasswords 9xrlszfqwaplkpmm zkmaoqobpo9seov4 kynjefuacurq4esg h7k4iws7bu7ly41d nbgzmpqx1gfadg3e 5knbzgrgmiblmak5 bgl5db0pbw0xixwu w20ji3bo8bxz5drw l9droffo7vzcztyx 7mlxgsurkmnaelj6 b2sqibohgzgupob jp4auon7wjygzdg 1n3jwaxihhglefo category_mirror rzlneutjupvqxga lmxahw9irmgumhy beiclitwodvkuyg nolinkwikiwords wqa6rttgbbmviem raghavgururajan sebovrbswkugraj cherrychapstick wwsem8im4qe4kgb vy9hpakkevcrs2f ailkpigbkmoflkm 3iokkmeyzcziymy uldshqanxmyo0zo m3vvbxqcimslxdp fvvzrhqxdanhlqf pogz4btt8ja8fzu blu0weexcvofpgf sveqgihrgb9i24r mbkc8cuskhuqbda nstbbogpojkrnel jdekoeg7ueannx b3egsdgj3nijio authorisations smiwzcq5sptw2m sn7ivhcolzdmok enableauthuser xuq06t1tpt1fds eklzrcmvedpjck authorizations vaseocpdiuzqck htdeaxyyyo8hc9 vmibxshkt3dnys legzuuq15zxpxe huzkhlwnvmvzpa wxur7gwbhxtxru ywcuec1yjsztc configuration 5ysifk2tlkpwq bejelentkezni nxr4bhwdufkrj ancientwisdom phsartzftbvdc honest_monkey documentation f9fgt0srt04be lin1gjxbbogbs openbsdtai123 wb2sfo5grmljb hiqijvgibsp1j b9jkkv3bmdejx frleiwxjzhzsg kltphcaeztoj 9x93nprdutyo searchsocial include_once dragonmaster gv0hgxcnq7hn aamjpfeqogxc ins9xxwb9n4h lzi4vmboxpjq dr9um9nkequ5 rottenbuytes rqn0brfrakl9 pjuebgoxw5ge l2aw44ypveld r7d4u6dkw4qo pl6mpr4oevmb z0yvlf3tonqh instructions otlilpysrm4 planetofnix xtb0zdegrf1 debiankaios 1yx2yfpb3pf f4eesyrsb1n ydst9exlfyg gdr3mpykmfl vdjkr2tambh mdlg7lxw0ke 5srfraco53s oddprotocol zny2cvztvrg bvegxfnzpuv gp8sc432fsy thunderirc locustlord filesystem qge5dqqnfw miniontoby 7oyx8h15yl pystardust z035hjc024 irk6sag7aw generating hydragyrum ircforever inspirenet summersonw wonderland pyritepyro posterdati cqbdq791ds jsljbw0pyr 0x6vt8zflt extensions connection 3mzsz3hyjz outge5fng beginning evfglv95k fkkvb0omc lecturify sulieztya 1t5wabidh starewind w7cptvctw lightblue bugzbunny hqnhbzrgg siteadmin 8cndcvokq bsdforall 9refsvlyg generated 5vthrlqy0 fee1d3skl obtaining nastycode ztrdmpvcu authorize fqcz1wfmv specified astroanax gvlyotbvn noxturnix belonging something i1dbsojqs shelltalk neonshell encrypted noisytoot craziness xh4gyeydm v3zq2jnu accounts external giziydno wsp2r80i jrmutest wwgi6nv9 snowcode tiramisu 9h35c3hr specific redrum88 unsorted comptech username splinter guardian fallback examples aegilops htpasswd gezwnjqq monsieur b13o3k2j q4m0jffj udtwqlny gtlsgamr theguest tlwqzfu7 0gcdan1a suzerain initfree mandarax 2kllevcx obv5wmjw th8u98nq tmiebubk bountyht inactive akoizumi teamless overflow identity writers subline quiliro mistera editors ircuser asdflkj thelion xxmqpw3 private members padding message gandalf 3mvnu1n zshnf2g xv30yz1 ik3apry 4ztyavj zouheir builder spookan baytuch bangcat ebhzbn8 kkzzumm specify leading enabled donjuan nickman appears bgcolor freeirc tomglok bvwcivn waitman limutoo geekzer wh2d8m6 fossdev cloud9p ojtrijm shokara pufferf scripts t9iowtc 05fmm2l nixdork present summary naglfar sources eodrc6x groups pmwiki hhgmlh fvrbe6 bwfdzd sylv1a admins lutzke tcache ircnow maddie result trench limits action entrex caesar secure jacobk erhard moocow almajd manner shared should devune josiah rsxxte places arthur bcrypt forero yiming yahsie lelfey kilroy zxtv1e monaco koragg anasko ui0uos margin lohang quofan yalbcu pirata menche logged bogani people kiliro shrini define 6knc4w sergio either al1r4d dennis zleap tqosd 55vvs index izzyb 7hjez login kolev right https users alice pkxzw carol scara lepht sxngg jykzl rgvua zlpwd yonle gj1ae rrrry ugxga other pages c8pzu allen gpzok 4h5jw doesn hed0x pxkbu maxxe nicoz pyr3x ifend moshe d6cu6 w16wa saved st13g lbtwy sarah based robyn farmd uo1kp notes block error glono barth black rpblc this fizi taa2 attr siva hawk have 20he 41ic f2zo ldap your from tool rahl njpc them left path icri jan6 here auto like form fear zfgw used with fgbo skar sign hash jgtk that tony look will kont kqpp dima when mean ayam qsg3 geze xfnw dave then matt punk pbug db4w zzgr bob zen 5em see mkf php g1n any 1em tby can pkn uid jim rre m16 oiw ret pra gcz jlj ixg 1xa old 2rp gry usr zao 4y2 w3i 09 07
PmWiki.Contributors:1728676238: PmWiki.PmWiki PmWiki.Uploads PmWiki.Links PmWiki.WikiGroup Cookbook.EmacsPmWikiMode PmWiki.Petko PmWiki.ChangeLog PITS.PITS PmWiki.MailingLists : internationalization editquickreference emacspmwikimode rssfeeddisplay contributions modifications documentation mailinglists ianmacgregor ridderström contributors contributed redirection development improvement attachments suggestions evaluation wikitrails wikistyles blocklist2 commentbox associated debugging dominique condition internals durchholz continued ittermann printable donations developer webmaster apologies changelog forgotten wikigroup christian personal research cookbook kowalski tishmack floating isabelle tracking mypmwiki monetary gorichon michaud general michael testing hacking crisses blalock strozzi heinold jessica recipes uploads summary joachim powered profile january journal checker website reports topped charts system seller having weiner worked simple markup sanity people rankin notify remove around voting janice claude images anyone scott petko other these glenn issue while after early yotov james faure found davis skins green carlo since hacks links have free pits with core some pmwe been your name feel page left want 2004 2009 dawn duff http todo jean pest best that many john html ross here xes are www aka all php and boa out rev can add by ye
blob - /dev/null
blob + 6bbc85718420d8c9cc236e5cb52dbb4ddb93a03c (mode 644)
--- /dev/null
+++ wiki.d/Wg.Hosting
+version=pmwiki-2.3.20 ordered=1 urlencoded=1
+agent=Mozilla/5.0 (X11; Linux aarch64; rv:109.0) Gecko/20100101 Firefox/115.0
+author=moocow
+charset=UTF-8
+csum=Configure WireGuard without NAT
+ctime=1729373134
+host=2001:470:f1af:10:478b:8aff:b27a:a98e
+name=Wg.Hosting
+rev=1
+targets=
+text=%0a!!! Configure WireGuard without NAT%0a%0a%0aIn this setup, we will configure WireGuard without NAT, giving your user a publically routable IP. This is useful if you want to host at home but you have a dynamic IP or your ISP blocks lots of ports.%0a%0awg-tools is required for wg command for the key generation but you can remove it once it is set up.%0a%0aFirst, generate 2 keypairs:%0a%0a[@%0awg genkey | tee privatekey_server | wg pubkey > pubkey_server%0awg genkey | tee privatekey_client | wg pubkey > pubkey_client%0a@]%0a%0aNow, configure @@/etc/hostname.wg0@@, replace @@server_privatekey@@ with the contents of @@privatekey_server@@, @@peer_pubkey@@ with the contents of @@pubkey_client@@ and @@ip_for_client@@ with the public IP address for the client. @@server_mac_address@@ should be replaced with the mac address of the server (em0, vio0, etc). @@unused_private_ip@@ can be replaced with @@172.16.10.1@@.%0a%0a[@%0a# /etc/hostname.wg0%0awgkey server_privatekey%0awgpeer peer_pubkey wgaip ip_for_client/32%0awgport 51820%0ainet unused_private_ip 255.255.255.255%0aup%0a!arp -s ip_for_client server_mac_address pub%0a!route change ip_for_client unused_private_ip%0a@]%0a%0aThe user should be given the endpoint (domain or IP of the server), their public IP address, the port, the server's public key and the client's private key. That should be enough to setup the tunnel on their end. You can also give them it in the standard WireGuard configuration file syntax shown below.%0a%0a[@%0a[Interface]%0aPrivateKey = client private key%0aAddress = client address%0a%0a[Peer]%0aPublicKey = server public key%0aEndpoint = server ip:port%0aAllowedIPs = 0.0.0.0/0%0a@]
+time=1729373134
+author:1729373134=moocow
+csum:1729373134=Configure WireGuard without NAT
+diff:1729373134:1729373134:=1,40d0%0a%3c %0a%3c !!! Configure WireGuard without NAT%0a%3c %0a%3c %0a%3c In this setup, we will configure WireGuard without NAT, giving your user a publically routable IP. This is useful if you want to host at home but you have a dynamic IP or your ISP blocks lots of ports.%0a%3c %0a%3c wg-tools is required for wg command for the key generation but you can remove it once it is set up.%0a%3c %0a%3c First, generate 2 keypairs:%0a%3c %0a%3c [@%0a%3c wg genkey | tee privatekey_server | wg pubkey > pubkey_server%0a%3c wg genkey | tee privatekey_client | wg pubkey > pubkey_client%0a%3c @]%0a%3c %0a%3c Now, configure @@/etc/hostname.wg0@@, replace @@server_privatekey@@ with the contents of @@privatekey_server@@, @@peer_pubkey@@ with the contents of @@pubkey_client@@ and @@ip_for_client@@ with the public IP address for the client. @@server_mac_address@@ should be replaced with the mac address of the server (em0, vio0, etc). @@unused_private_ip@@ can be replaced with @@172.16.10.1@@.%0a%3c %0a%3c [@%0a%3c # /etc/hostname.wg0%0a%3c wgkey server_privatekey%0a%3c wgpeer peer_pubkey wgaip ip_for_client/32%0a%3c wgport 51820%0a%3c inet unused_private_ip 255.255.255.255%0a%3c up%0a%3c !arp -s ip_for_client server_mac_address pub%0a%3c !route change ip_for_client unused_private_ip%0a%3c @]%0a%3c %0a%3c The user should be given the endpoint (domain or IP of the server), their public IP address, the port, the server's public key and the client's private key. That should be enough to setup the tunnel on their end. You can also give them it in the standard WireGuard configuration file syntax shown below.%0a%3c %0a%3c [@%0a%3c [Interface]%0a%3c PrivateKey = client private key%0a%3c Address = client address%0a%3c %0a%3c [Peer]%0a%3c PublicKey = server public key%0a%3c Endpoint = server ip:port%0a%3c AllowedIPs = 0.0.0.0/0%0a%3c @]%0a\ No newline at end of file%0a
+host:1729373134=2001:470:f1af:10:478b:8aff:b27a:a98e
blob - /dev/null
blob + 03e46ba5c21292904aa104ccbf397bd36ff4474c (mode 644)
--- /dev/null
+++ wiki.d/Wg.RecentChanges
+version=pmwiki-2.3.20 ordered=1 urlencoded=1
+agent=Mozilla/5.0 (X11; Linux aarch64; rv:109.0) Gecko/20100101 Firefox/115.0
+charset=UTF-8
+ctime=1729373134
+host=2001:470:f1af:10:478b:8aff:b27a:a98e
+name=Wg.RecentChanges
+rev=1
+text=* [[Wg/Hosting]] . . . @2024-10-19T21:25:34Z by [[~moocow]]: [=Configure WireGuard without NAT=]%0a
+time=1729373134