Материал из Wiki.X-news.org
Перейти к: навигация, поиск


I was at a place that was blocking traffic on all ports except 53 (DNS). That had me thinking I could set up a WireGuard connection to tunnel traffic through there. But I wanted more devices to be able to access it simultaneously, so I set up a Raspberry Pi as a wireless access point and routed all the WiFi traffic through the WireGuard tunnel.

It is expected that you already have a WireGuard server set up Configure a WireGuard server interface to listen to port 53 (just set ListenPort=53) This guide will result in the following network configuration:

Wireless interface:

Static IP:, fd13:37::1/120
DHCP range:, fd13:37::/120
DNS server:

Wireguard interface:

Client:, fd00:8::101
Server:, fd00:8::1
DNS server:
Endpoint: <wireguard server ip>:53
DHCPv6 is not working as I expected. If you see what’s wrong, please tell me.

Setup steps

Spoof ethernet MAC address

I don’t want the other end of the line to know the original MAC of my network device, so I changed it inside /boot/config.cmd by appending smsc95xx.macaddr=XX:XX:XX:XX:XX:XX to the end of the first line.

Setup WireGuard client

Install prerequisites

$ sudo apt install raspberrypi-kernel-headers dirmngr
$ echo 'deb http://deb.debian.org/debian/ unstable main' | sudo tee -a /etc/apt/sources.list.d/unstable.list
$ sudo apt-key adv --keyserver keyserver.ubuntu.com --recv-keys 8B48AD6246925553
$ sudo apt-key adv --keyserver keyserver.ubuntu.com --recv-keys 7638D0442B90D010
$ sudo apt-key adv --keyserver keyserver.ubuntu.com --recv-keys 04EE7237B7D453EC
$ printf 'Package: *\nPin: release a=unstable\nPin-Priority: 150\n' | sudo tee --append /etc/apt/preferences.d/limit-unstable
$ sudo apt install wireguard

Create a new private key and output the public key by running the below command

$ sudo sh -c 'umask 077; wg genkey | tee /etc/wireguard/private.key | wg pubkey'

Configure your WireGuard server to allow this peer by registering the public key above. How to configure server side is not described in this guide.

Create a client configuration file similiar to the following, but with your own specific modifications inside /etc/wireguard/wg0.conf:

Address =, fd00:8::101/48
PrivateKey = <private key contents>
PostUp   = netfilter-persistent start
PostDown = netfilter-persistent flush

PublicKey = <public key of server>
AllowedIPs =, ::/0
Endpoint = <server ip>:53
Endpoint = <server ipv6>:53
PersistentKeepalive = 15
Auto-start the interface on boot

$ sudo systemctl enable wg-quick@wg0

Reboot (note that the Pi will now probably have a different IP due to the change of the MAC address)

$ sudo reboot

Verify that your WireGuard interface connects successfully before continuing. It will probably make troubleshooting easier in case of problems.

Setup as WiFi access point (AP)

Install required programs, and stop them for now. They will start automatically on boot anyway.

$ sudo apt install dnsmasq hostapd
$ sudo systemctl stop dnsmasq hostapd

Set a static IP address for the wireless interface. Append the following to /etc/dhcpcd.conf:

interface wlan0
   static ip_address=
   static ip6_address=fd13:37::1/120
   nohook wpa_supplicant

Configure the DHCP server by replacing all the contents of /etc/dnsmasq.conf with the following:


Configure the WiFi AP server deamon by pasting the following config in /etc/hostapd/hostapd.conf. Take note of the ssid and wpa_passphrase values and change them to your desire.


Specify the location of the previous configuration file inside /etc/default/hostapd with the following value:

Enable IPv4 forwarding
$ echo 'net.ipv4.ip_forward=1' | sudo tee /etc/sysctl.d/97-wifi-ap.conf

Masquerade outbound traffic on wg0

$ sudo iptables -A FORWARD -i wlan0 -o wg0 -j ACCEPT
$ sudo iptables -A FORWARD -i wg0 -o wlan0 -m state --state RELATED,ESTABLISHED -j ACCEPT
$ sudo iptables -t nat -A  POSTROUTING -o wg0 -j MASQUERADE

Persist iptables rules by installing iptables-persistent and answer yes in the prompt. (If the prompt fails or you for other reasons want to do this again later, use dpkg-reconfigure iptables-persistent, or manually run netfilter-persistent).

$ sudo apt install iptables-persistent

Unmask and enable services on boot

$ sudo systemctl unmask hostapd
$ sudo systemctl enable hostapd dnsmasq

Reboot once again, and see if it works as expected. You should be able to connect to the Pi through the WiFi AP. Once connected, verify that you have an IP address different to that of which you started with.

$ curl ip.stigok.com