Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/n-r-w/shadow-server
Cloak + WireGuard + Docker + LAN gateway (server-side)
https://github.com/n-r-w/shadow-server
cloak docker gateway wireguard
Last synced: 6 days ago
JSON representation
Cloak + WireGuard + Docker + LAN gateway (server-side)
- Host: GitHub
- URL: https://github.com/n-r-w/shadow-server
- Owner: n-r-w
- Created: 2023-09-08T20:39:59.000Z (about 1 year ago)
- Default Branch: main
- Last Pushed: 2023-12-13T06:46:10.000Z (11 months ago)
- Last Synced: 2023-12-13T07:38:56.241Z (11 months ago)
- Topics: cloak, docker, gateway, wireguard
- Language: Shell
- Homepage:
- Size: 24.4 KB
- Stars: 5
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Cloak + WireGuard + Docker + LAN gateway (server-side)
## Server-side setup for internet access through a separate gateway in the local network. Client-side here
Data flows through the following chain:
- Computer (LAN) with the client part of this configuration specified as gateway or proxy server
- Gateway (LAN)
- WireGuard client (LAN)
- Cloak client (LAN)
- Censored Internet
- Cloak server (remote)
- WireGuard server (remote)
- Free InternetFor simplicity, all operations are performed as root, using Ubuntu 22.04 as an example. All settings are for IPv4 only. First, you need to follow this guide, and then the client-side part
Tested on:
- Remote server Ununtu 22.04 (VPS, 1 CPU core, 1GB RAM)
- Local server Ubuntu 20.04 (2 CPU cores, 2GB RAM, single ethernet port).
- Speedtest Download Mbps: 108, Upload Mbps: 71. This is slower than a direct WireGuard connection (Download Mbps: 254, Upload Mbps: 189) because the traffic goes through Cloak and is encrypted to make it indistinguishable from regular HTTP traffic, disguising it as a VPN connection. The bottleneck here is the server's CPU. If a dual-core configuration is used, the speed should be higher.## Go to the home folder
```bash
cd /root
```## Configuring the Firewall
```bash
ufw allow openssh && ufw allow http && ufw allow https && echo "y" | ufw enable
```## Server Preparation
```bash
apt update && apt install -y nano wget git wireguard && \
wget https://github.com/cbeuw/Cloak/releases/download/v2.7.0/ck-server-linux-amd64-v2.7.0 && \
mv ck-server-linux-amd64-v2.7.0 ck-server && chmod +x ck-server
```We've downloaded WireGuard and Cloak server for generating encryption keys. Once generated, they are no longer needed on the host.
Enable ip forward
```bash
echo "net.ipv4.ip_forward=1" >> /etc/sysctl.conf && sysctl -p
```## docker setup
### Install docker Manually
Install docker manually using manual at + install docker-compose:
```bash
apt update && apt install -y ca-certificates curl gnupg && \
install -m 0755 -d /etc/apt/keyrings && \
curl -fsSL https://download.docker.com/linux/ubuntu/gpg | gpg --dearmor -o /etc/apt/keyrings/docker.gpg --yes && \
chmod a+r /etc/apt/keyrings/docker.gpg && \
if [ ! -e /etc/apt/sources.list.d/docker.list ]; then
echo \
"deb [arch="$(dpkg --print-architecture)" signed-by=/etc/apt/keyrings/docker.gpg] https://download.docker.com/linux/ubuntu \
"$(. /etc/os-release && echo "$VERSION_CODENAME")" stable" | \
sudo tee /etc/apt/sources.list.d/docker.list > /dev/null
fi && \
apt update && \
apt install -y docker-ce docker-ce-cli containerd.io docker-buildx-plugin docker-compose-plugin && \
wget https://github.com/docker/compose/releases/download/v2.21.0/docker-compose-linux-x86_64 && \
mv docker-compose-linux-x86_64 /usr/local/bin/docker-compose && \
chmod +x /usr/local/bin/docker-compose
```### Alternatively, install docker via snap (in Ubuntu 22.04, it is not working at the moment)
```bash
apt install -y snapd && snap install docker
snap refresh docker --channel=latest/edge
```## Generation of encryption keys
### Generating wireguard keys
```bash
wg genkey | tee wg-server-private.key | wg pubkey > wg-server-public.key && \
wg genkey | tee wg-client-private.key | wg pubkey > wg-client-public.key
```- ```wg-server-private.key``` server private key
- ```wg-server-public.key``` server public key. Will be needed when installing the client part
- ```wg-client-private.key``` client private key. Will be needed when installing the client part
- ```wg-client-public.key``` client public key### Generating cloak keys
```bash
./ck-server -k > cloak.keys && ./ck-server -u > cloak.uid
```- ```cloak.keys``` cloak keys pair. public key (will be needed when installing the client part ), private key
- ```cloak.uid``` cloak client UID## Setup
### Download this repository
```bash
git clone https://github.com/n-r-w/shadow-server.git && cd shadow-server
```### Set up environment variables for docker
In the doc directory there is an example file with environment variables ```env.txt```. Copy it to the ```.env``` file, which contains environment variables for ```docker-compose```
```bash
apt install -y nano && \
cp ./doc/env.txt ./.env && \
nano ./.env
```Setting the values of the variables
- ```CK_UID``` take from file ```cloak.uid```
- ```CK_PRIVATE_KEY``` take from file (second key) ```cloak.keys```
- ```WG_SERVER_PRIVATE_KEY``` take from file ```wg-server-private.key```
- ```WG_CLIENT_PUBLIC_KEY``` take from file ```wg-client-public.key```## Test run
We check that everything starts (the first launch is long)
```bash
docker-compose up
```Press CTRL+C and then
```bash
docker-compose down
```## Create systemd service to automatically launch a container
If installed via ```snap```:
```bash
cp ./doc/shadow-server-snap.service /etc/systemd/system/shadow-server-snap.service && \
systemctl daemon-reload && \
systemctl enable shadow-server-snap && \
systemctl start shadow-server-snap
```If you installed it according to the instructions from the ubuntu website:
```bash
cp ./doc/shadow-server.service /etc/systemd/system/shadow-server.service && \
systemctl daemon-reload && \
systemctl enable shadow-server && \
systemctl start shadow-server
```That's it, now we need to proceed to installing the client