Skip to content

ugurrdemirel/wireguard-oracle-cloud-install

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

25 Commits
 
 
 
 
 
 
 
 

Repository files navigation

WireGuard for Oracle Cloud

Wireguard VPN Setup for Oracle Cloud Instances
Oracle Cloud instances need some additional configuration to get WireGuard up and running as expected. Here is how we do that:

Please Note:

  • The wireguard kernel mod ships with the latest Ubuntu image on Oracle Cloud.
  • The image used for testing is Ubuntu 22.04 Minimal aarch64
  • All scripts must be run as root.

Installation

Install dependencies:

sudo apt-get update && sudo apt-get install -y wireguard qrencode resolvconf git

Continue as root:

sudo su

Download and install our scripts ( Huge thanks to @vaughngx4):

cd /etc/wireguard
git clone https://github.com/ugurrdemirel/wireguard-oracle-cloud-install.git
mv wireguard-oracle-cloud-install/* ./
rm -rf wireguard-oracle-cloud-install

Generate the config(follow the prompts, this will not start the server):

./wireguard-autoconfig.sh

A reboot is needed at this point. Answer 'y' to the reboot prompt to reboot.

Once you've reconnected to the instance, add a peer and start the server:

sudo su
cd /etc/wireguard
./add-peer.sh

You can use the qr code that is ouput to the terminal or copy the configuration from /etc/wireguard/peerX('X' being the peer number). The add-peer.sh script will automatically restart the server to apply changes. To add another peer, simply run the script again. Peer configs can found in folders inside /etc/wireguard/ starting with folder name peer2(the peer number corresponds with the peer's IP address).

That's it, you can now connect to the vpn using the auto generated configs :)

Oracle Cloud IP Policy

The setup can fail to connect due to Oracle IP Policy set by Oracle Cloud Free Tier. Reddit user DecisionBright came up with a solution.

0 - disable your firewall temporarily (important during taking these steps):

sudo ufw disable

1 - Go to /etc/iptables/rules.v4

sudo nano /etc/iptables/rules.v4

2 - replace the contents of this file with the following:

*filter
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0] 
:OUTPUT ACCEPT [0:0] 
COMMIT

3 - Save the file (CTRL+X > y > Enter) and reboot:

sudo reboot