Wireguard Connected, Web Host not Accessible

This page summarizes the projects mentioned and recommended in the original post on /r/pivpn

Our great sponsors
  • WorkOS - The modern identity platform for B2B SaaS
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • SaaSHub - Software Alternatives and Reviews
  • pivpn

    The Simplest VPN installer, designed for Raspberry Pi

  • ``` ::: Generating Debug Output :::: PiVPN debug :::: ============================================= :::: Latest commit :::: commit b5ec995f68fbae2eb30b50e1b6a4350f96316f2e Author: Carlos Colaço Date: Sun Jan 17 18:26:12 2021 +0100 Merge Test Branch into master Merged test branch into master, More details LatestUpdate.md ============================================= :::: Installation settings :::: PLAT=Ubuntu OSCN=focal USING_UFW=0 IPv4dev=eth0 install_user=aaron install_home=/home/aaron VPN=wireguard pivpnPORT=51820 pivpnDNS1=9.9.9.9 pivpnDNS2=149.112.112.112 pivpnHOST=REDACTED INPUT_CHAIN_EDITED=0 FORWARD_CHAIN_EDITED=1 pivpnPROTO=udp pivpnDEV=wg0 pivpnNET=10.6.0.0 subnetClass=24 ALLOWED_IPS="0.0.0.0/0, ::0/0" UNATTUPG=1 INSTALLED_PACKAGES=(dnsutils net-tools iptables-persistent wireguard-tools qrencode) ============================================= :::: Server configuration shown below :::: [Interface] PrivateKey = server_priv Address = 10.6.0.1/24 ListenPort = 51820 ### begin vpndkrtest ### [Peer] PublicKey = vpndkrtest_pub PresharedKey = vpndkrtest_psk AllowedIPs = 10.6.0.2/32 ### end vpndkrtest ### ### begin dkr ### [Peer] PublicKey = dkr_pub PresharedKey = dkr_psk AllowedIPs = 10.6.0.4/32 ### end dkr ### ### begin vesta ### [Peer] PublicKey = vesta_pub PresharedKey = vesta_psk AllowedIPs = 10.6.0.3/32 ### end vesta ### ============================================= :::: Client configuration shown below :::: [Interface] PrivateKey = vpndkrtest_priv Address = 10.6.0.2/24 DNS = 9.9.9.9, 149.112.112.112 [Peer] PublicKey = server_pub PresharedKey = vpndkrtest_psk Endpoint = REDACTED:51820 AllowedIPs = 0.0.0.0/0, ::0/0 ============================================= :::: Recursive list of files in :::: ::::[4m/etc/wireguard shown below :::: /etc/wireguard: configs keys wg0.conf /etc/wireguard/configs: clients.txt dkr.conf vesta.conf vpndkrtest.conf /etc/wireguard/keys: dkr_priv dkr_psk dkr_pub server_priv server_pub vesta_priv vesta_psk vesta_pub vpndkrtest_priv vpndkrtest_psk vpndkrtest_pub ============================================= :::: Self check :::: :: [OK] IP forwarding is enabled :: [OK] Iptables MASQUERADE rule set :: [OK] Iptables FORWARD rule set :: [OK] WireGuard is running :: [OK] WireGuard is enabled (it will automatically start on reboot) :: [OK] WireGuard is listening on port 51820/udp ============================================= :::: Having trouble connecting? Take a look at the FAQ: :::: https://github.com/pivpn/pivpn/wiki/FAQ ============================================= :::: WARNING: This script should have automatically masked sensitive :::: :::: information, however, still make sure that PrivateKey, PublicKey :::: :::: and PresharedKey are masked before reporting an issue. An example key :::: :::: that you should NOT see in this log looks like this: :::: :::: YIAoJVsdIeyvXfGGDDadHh6AxsMRymZTnnzZoAb9cxRe :::: ============================================= :::: Debug complete :::: ::: ::: Debug output completed above. ::: Copy saved to /tmp/debug.log :::

  • WorkOS

    The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.

    WorkOS logo
NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a more popular project.

Suggest a related project

Related posts