Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/clusterm/wg-obfuscator
WireGuard obfuscator - simple obfuscator for WireGuard. Usefull if your ISP/government blocks WireGuard traffic.
https://github.com/clusterm/wg-obfuscator
Last synced: 4 days ago
JSON representation
WireGuard obfuscator - simple obfuscator for WireGuard. Usefull if your ISP/government blocks WireGuard traffic.
- Host: GitHub
- URL: https://github.com/clusterm/wg-obfuscator
- Owner: ClusterM
- License: gpl-3.0
- Created: 2024-05-25T14:11:14.000Z (7 months ago)
- Default Branch: master
- Last Pushed: 2024-10-24T15:43:02.000Z (2 months ago)
- Last Synced: 2024-12-12T04:25:01.310Z (12 days ago)
- Language: C
- Size: 81.1 KB
- Stars: 112
- Watchers: 4
- Forks: 6
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
- License: LICENSE
Awesome Lists containing this project
README
# WireGuard obfuscator
This is a simple obfuscator for WireGuard. It is designed to make it harder to detect WireGuard traffic by making it look like something else. It does this by wrapping WireGuard packets in a layer of obfuscation using a simple XOR cipher. Usefull for bypassing DPI (Deep Packet Inspection) firewalls, e.g. if your ISP/government blocks WireGuard traffic.
## How it works
```
+----------------+
| WireGuard peer |
+----------------+
^
|
v
+----------------+
| Obfuscator |
+----------------+
^
|
v
+----------------+
| Internet |
+----------------+
^
|
v
+----------------+
| Obfuscator |
+----------------+
^
|
v
+----------------+
| WireGuard peer |
+----------------+
```Since the obfuscator is a simple XOR cipher, it is totally simmetric. You need to install this application on the same network as the WireGuard peer you want to obfuscate, you need to do this on the other peer too. The obfuscator will then obfuscate the WireGuard packets and send them to the Internet. On the other side the obfuscator will deobfuscate the packets and send them to the WireGuard peer.
It can be used even if one of the peers is behind a NAT or has a dynamic IP address. The obfuscator will keep track of the IP address of the peer after handshake and will send the packets to the correct IP address.
## How to use
You can pass parameters to the obfuscator using a configuration file or command line arguments. Available parameters are:
* `source-if` - source interface to listen on. Optional, default is `0.0.0.0`, e.g. all interfaces. Can be used to listen only on a specific interface.
* `source` - source client address and port in `address:port` format. Optional. By default any address and port is accepted but server replies will be sent to the last successfully handshake address, so it can work over NAT. If specified, only packets from this address will be accepted and all server replies will be sent to this address, in such case target side cat initiate connections to the source side too.
* `source-lport` - source port to listen. Source client should connect to this port. Required.
* `target-if` - target interface to listen on. Optional, default is `0.0.0.0`, e.g. all interfaces. Can be used to listen only on a specific interface.
* `target` - target address and port in `address:port` format. Obfuscated data will be sent to this address. Required.
* `target-lport` - target port to listen. Optional. Default is auto (assigned by the OS). If specified, target can initiate connections to the source side too.
* `key` - obfuscation key. Just string. Longer - better. Required.
* `verbose` - verbosity level, 0-4. Optional, default is 2.You can use configuration file with those parameters in `key=value` format. For example:
```
# Port to listen for the source client (real client or client obfuscator)
source-lport = 13255# Host and port of the target to forward to (server obfuscator or real server)
target = 10.13.1.100:13255# Obfuscation key, must be the same on both sides
key = test
```You can pass the configuration file to the obfuscator using `--config` argument. For example:
```bash
wg-obfuscator --config /etc/wg-obfuscator.conf
```You can also pass parameters using command line arguments. For example:
```bash
wg-obfuscator --source-lport 13255 --target 10.13.1.100:13255 --key test
```
Type `wg-obfuscator.exe --help` for more information.### Settings diagram
```
+------------------------------------------------------------------------------------------+
| Source WireGuard peer |
| ListenPort = |
+------------------------------------------------------------------------------------------+
| Endpoint = |
+------------------------------------------------------------------------------------------+
^
|
v
+------------------------------------------------------------------------------------------+
| Source obfuscator |
| source = |
| source-lport = |
+------------------------------------------------------------------------------------------+
| target-lport = |
| target = |
+------------------------------------------------------------------------------------------+
^
|
v
+------------------------------------------------------------------------------------------+
| Internet |
+------------------------------------------------------------------------------------------+
^
|
v
+------------------------------------------------------------------------------------------+
| Tartget obfuscator |
| source = |
| source-lport = |
+------------------------------------------------------------------------------------------+
| target-lport = |
| = (required only for hybrid configuration)> |
| target = |
+------------------------------------------------------------------------------------------+
^
|
v
+------------------------------------------------------------------------------------------+
| Target WireGuard peer |
| ListenPort = |
+------------------------------------------------------------------------------------------+
| Endpoint = |
| (required only for hybrid configuration)> |
+------------------------------------------------------------------------------------------+
```## How to build and install
On Linux:
```bash
make
sudo make install
```It will be installed as a systemd service. You can start it with:
```bash
sudo systemctl start wg-obfuscator
```
Configularion file is located at `/etc/wg-obfuscator.conf`.You can also run it from the command line, type `wg-obfuscator --help` for more information.
On Windows and MacOS you can only run it from the command line.
## Donate
* [Buy Me A Coffee](https://www.buymeacoffee.com/cluster)
* [Donation Alerts](https://www.donationalerts.com/r/clustermeerkat)
* [Boosty](https://boosty.to/cluster)
* PayPal is not available in Armenia :(