Configuration parsing error: Wireguard Ubuntu 20
ddan4 opened this issue · comments
Describe the bug
When trying to enable my wireguard connection, I get the following error.
[#] ip link add wg0 type wireguard
[#] wg setconf wg0 /dev/fd/63
Line unrecognized: `connalgovpn-167.99.220.196'
Configuration parsing error
[#] ip link delete dev wg0
This is on Ubuntu 20LTS,
openresolv is already the newest version (3.10.0-1).
wireguard is already the newest version (1.0.20200513-1~20.04.2).
To Reproduce
Steps to reproduce the behavior:
- Install AlgoVPN
- Copy config files to local drive
sudo install -o root -g root -m 600 <username>.conf /etc/wireguard/wg0.conf
sudo wg-quick up wg0
(also triedsystemctl status wg-quick@wg0.service
)
Expected behavior
Usually at this point wireguard simply works and I never have to concern with it again.
Full log
Enter the number of your desired provider
:
12^M
TASK [Cloud prompt] ************************************************************
ok: [localhost]
TASK [Set facts based on the input] ********************************************
ok: [localhost]
[Cellular On Demand prompt]
Do you want macOS/iOS clients to enable "Connect On Demand" when connected to cellular networks?
[y/N]
:
y^M
TASK [Cellular On Demand prompt] ***********************************************
ok: [localhost]
[Wi-Fi On Demand prompt]
Do you want macOS/iOS clients to enable "Connect On Demand" when connected to Wi-Fi?
[y/N]
:
TASK [Wi-Fi On Demand prompt] **************************************************
ok: [localhost]
[Trusted Wi-Fi networks prompt]
List the names of any trusted Wi-Fi networks where macOS/iOS clients should not use "Connect On Demand"
(e.g., your home network. Comma-separated value, e.g., HomeNet,OfficeWifi,AlgoWiFi)
:
TASK [Trusted Wi-Fi networks prompt] *******************************************
ok: [localhost]
[Retain the PKI prompt]
Do you want to retain the keys (PKI)? (required to add users in the future, but less secure)
[y/N]
:
y^M
TASK [Retain the PKI prompt] ***************************************************
ok: [localhost]
[DNS adblocking prompt]
Do you want to enable DNS ad blocking on this VPN server?
[y/N]
:
y^M
TASK [DNS adblocking prompt] ***************************************************
ok: [localhost]
[SSH tunneling prompt]
Do you want each user to have their own account for SSH tunneling?
[y/N]
:
y^M
TASK [SSH tunneling prompt] ****************************************************
ok: [localhost]
TASK [Set facts based on the input] ********************************************
ok: [localhost]
PLAY [Provision the server] ****************************************************
TASK [Gathering Facts] *********************************************************
ok: [localhost]
--> Please include the following block of text when reporting issues:
Algo running on: Ubuntu 20.04.2 LTS (Virtualized: kvm)
Created from git clone. Last commit: 665af5a Update Google Compute Environment machine type (#14251)
Python 3.8.10
Runtime variables:
algo_provider "local"
algo_ondemand_cellular "True"
algo_ondemand_wifi "True"
algo_ondemand_wifi_exclude "X251bGw="
algo_dns_adblocking "True"
algo_ssh_tunneling "True"
wireguard_enabled "True"
dns_encryption "True"
TASK [Display the invocation environment] **************************************
changed: [localhost]
TASK [Install the requirements] ************************************************
changed: [localhost]
[local : pause]
Enter the IP address of your server: (or use localhost for local installation):
[localhost]
:
^M
TASK [local : pause] ***********************************************************
ok: [localhost]
TASK [local : Set the facts] ***************************************************
ok: [localhost]
[local : pause]
Enter the public IP address or domain name of your server: (IMPORTANT! This is used to verify the certificate)
[localhost]
:
167.99.220.196^M
TASK [local : pause] ***********************************************************
ok: [localhost]
TASK [local : Set the facts] ***************************************************
ok: [localhost]
TASK [Set subjectAltName as a fact] ********************************************
ok: [localhost]
TASK [Add the server to an inventory group] ************************************
changed: [localhost]
TASK [debug] *******************************************************************
ok: [localhost] => {
"IP_subject_alt_name": "167.99.220.196"
}
[WARNING]: Reset is not implemented for this connection
TASK [Wait 600 seconds for target connection to become reachable/usable] *******
ok: [localhost] => (item=localhost)
PLAY [Configure the server and install required software] **********************
TASK [common : Check the system] ***********************************************
ok: [localhost]
included: /home/nfo/algo/roles/common/tasks/ubuntu.yml for localhost
TASK [common : Gather facts] ***************************************************
ok: [localhost]
TASK [common : Install unattended-upgrades] ************************************
ok: [localhost]
TASK [common : Configure unattended-upgrades] **********************************
changed: [localhost]
TASK [common : Periodic upgrades configured] ***********************************
changed: [localhost]
TASK [common : Disable MOTD on login and SSHD] *********************************
changed: [localhost] => (item={'regexp': '^session.*optional.*pam_motd.so.*', 'line': '# MOTD DISABLED', 'file': '/etc/pam.d/login'})
changed: [localhost] => (item={'regexp': '^session.*optional.*pam_motd.so.*', 'line': '# MOTD DISABLED', 'file': '/etc/pam.d/sshd'})
TASK [common : Ensure fallback resolvers are set] ******************************
changed: [localhost]
TASK [common : Loopback for services configured] *******************************
changed: [localhost]
TASK [common : systemd services enabled and started] ***************************
ok: [localhost] => (item=systemd-networkd)
ok: [localhost] => (item=systemd-resolved)
RUNNING HANDLER [common : restart systemd-networkd] ****************************
changed: [localhost]
RUNNING HANDLER [common : restart systemd-resolved] ****************************
changed: [localhost]
TASK [common : Check apparmor support] *****************************************
ok: [localhost]
TASK [common : Set fact if apparmor enabled] ***********************************
ok: [localhost]
TASK [common : Define facts] ***************************************************
ok: [localhost]
TASK [common : Set facts] ******************************************************
ok: [localhost]
TASK [common : Set IPv6 support as a fact] *************************************
ok: [localhost]
TASK [common : Check size of MTU] **********************************************
ok: [localhost]
TASK [common : Set OS specific facts] ******************************************
ok: [localhost]
TASK [common : Install tools] **************************************************
changed: [localhost]
included: /home/nfo/algo/roles/common/tasks/iptables.yml for localhost
TASK [common : Iptables configured] ********************************************
changed: [localhost] => (item={'src': 'rules.v4.j2', 'dest': '/etc/iptables/rules.v4'})
TASK [common : Sysctl tuning] **************************************************
changed: [localhost] => (item={'item': 'net.ipv4.ip_forward', 'value': 1})
changed: [localhost] => (item={'item': 'net.ipv4.conf.all.forwarding', 'value': 1})
RUNNING HANDLER [common : restart iptables] ************************************
changed: [localhost]
included: /home/nfo/algo/roles/dns/tasks/ubuntu.yml for localhost
TASK [Install dnscrypt-proxy] **************************************************
changed: [localhost]
TASK [Ubuntu | Configure AppArmor policy for dnscrypt-proxy] *******************
changed: [localhost]
TASK [Ubuntu | Enforce the dnscrypt-proxy AppArmor policy] *********************
ok: [localhost]
TASK [Ubuntu | Ensure that the dnscrypt-proxy service directory exist] *********
changed: [localhost]
TASK [dns : Ubuntu | Add custom requirements to successfully start the unit] ***
changed: [localhost]
TASK [dnscrypt-proxy ip-blacklist configured] **********************************
changed: [localhost]
TASK [dnscrypt-proxy configured] ***********************************************
changed: [localhost]
TASK [dns : Adblock script created] ********************************************
changed: [localhost]
TASK [dns : Adblock script added to cron] **************************************
changed: [localhost]
TASK [dns : Update adblock hosts] **********************************************
ok: [localhost]
[WARNING]: flush_handlers task does not support when conditional
RUNNING HANDLER [restart dnscrypt-proxy] ***************************************
changed: [localhost]
TASK [dnscrypt-proxy enabled and started] **************************************
ok: [localhost]
TASK [wireguard : Ensure the required directories exist] ***********************
changed: [localhost] => (item=configs/167.99.220.196/wireguard//.pki//preshared)
changed: [localhost] => (item=configs/167.99.220.196/wireguard//.pki//private)
changed: [localhost] => (item=configs/167.99.220.196/wireguard//.pki//public)
changed: [localhost] => (item=configs/167.99.220.196/wireguard//apple/ios)
changed: [localhost] => (item=configs/167.99.220.196/wireguard//apple/macos)
included: /home/nfo/algo/roles/wireguard/tasks/ubuntu.yml for localhost
TASK [wireguard : WireGuard installed] *****************************************
changed: [localhost]
TASK [wireguard : Set OS specific facts] ***************************************
ok: [localhost]
TASK [wireguard : Generate private keys] ***************************************
changed: [localhost] => (item=apple)
changed: [localhost] => (item=samsung)
changed: [localhost] => (item=pinephone)
changed: [localhost] => (item=hp)
changed: [localhost] => (item=macbook)
changed: [localhost] => (item=desktop)
changed: [localhost] => (item=other)
changed: [localhost] => (item=167.99.220.196)
TASK [wireguard : Save private keys] *******************************************
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost]
TASK [wireguard : Touch the lock file] *****************************************
changed: [localhost] => (item=apple)
changed: [localhost] => (item=samsung)
changed: [localhost] => (item=pinephone)
changed: [localhost] => (item=hp)
changed: [localhost] => (item=macbook)
changed: [localhost] => (item=desktop)
changed: [localhost] => (item=other)
changed: [localhost] => (item=167.99.220.196)
TASK [wireguard : Generate preshared keys] *************************************
changed: [localhost] => (item=apple)
changed: [localhost] => (item=samsung)
changed: [localhost] => (item=pinephone)
changed: [localhost] => (item=hp)
changed: [localhost] => (item=macbook)
changed: [localhost] => (item=desktop)
changed: [localhost] => (item=other)
changed: [localhost] => (item=167.99.220.196)
TASK [wireguard : Save preshared keys] *****************************************
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost]
TASK [wireguard : Touch the preshared lock file] *******************************
changed: [localhost] => (item=apple)
changed: [localhost] => (item=samsung)
changed: [localhost] => (item=pinephone)
changed: [localhost] => (item=hp)
changed: [localhost] => (item=macbook)
changed: [localhost] => (item=desktop)
changed: [localhost] => (item=other)
changed: [localhost] => (item=167.99.220.196)
TASK [wireguard : Generate public keys] ****************************************
ok: [localhost] => (item=apple)
ok: [localhost] => (item=samsung)
ok: [localhost] => (item=pinephone)
ok: [localhost] => (item=hp)
ok: [localhost] => (item=macbook)
ok: [localhost] => (item=desktop)
ok: [localhost] => (item=other)
ok: [localhost] => (item=167.99.220.196)
TASK [wireguard : Save public keys] ********************************************
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost]
TASK [wireguard : WireGuard user list updated] *********************************
changed: [localhost] => (item=apple)
changed: [localhost] => (item=samsung)
changed: [localhost] => (item=pinephone)
changed: [localhost] => (item=hp)
changed: [localhost] => (item=macbook)
changed: [localhost] => (item=desktop)
changed: [localhost] => (item=other)
TASK [wireguard : set_fact] ****************************************************
ok: [localhost]
TASK [wireguard : WireGuard users config generated] ****************************
changed: [localhost] => (item=[0, 'apple'])
changed: [localhost] => (item=[1, 'samsung'])
changed: [localhost] => (item=[2, 'pinephone'])
changed: [localhost] => (item=[3, 'hp'])
changed: [localhost] => (item=[4, 'macbook'])
changed: [localhost] => (item=[5, 'desktop'])
changed: [localhost] => (item=[6, 'other'])
included: /home/nfo/algo/roles/wireguard/tasks/mobileconfig.yml for localhost
included: /home/nfo/algo/roles/wireguard/tasks/mobileconfig.yml for localhost
TASK [wireguard : WireGuard apple mobileconfig generated] **********************
changed: [localhost] => (item=[0, 'apple'])
changed: [localhost] => (item=[1, 'samsung'])
changed: [localhost] => (item=[2, 'pinephone'])
changed: [localhost] => (item=[3, 'hp'])
changed: [localhost] => (item=[4, 'macbook'])
changed: [localhost] => (item=[5, 'desktop'])
changed: [localhost] => (item=[6, 'other'])
TASK [wireguard : WireGuard apple mobileconfig generated] **********************
changed: [localhost] => (item=[0, 'apple'])
changed: [localhost] => (item=[1, 'samsung'])
changed: [localhost] => (item=[2, 'pinephone'])
changed: [localhost] => (item=[3, 'hp'])
changed: [localhost] => (item=[4, 'macbook'])
changed: [localhost] => (item=[5, 'desktop'])
changed: [localhost] => (item=[6, 'other'])
TASK [wireguard : Generate QR codes] *******************************************
ok: [localhost] => (item=[0, 'apple'])
ok: [localhost] => (item=[1, 'samsung'])
ok: [localhost] => (item=[2, 'pinephone'])
ok: [localhost] => (item=[3, 'hp'])
ok: [localhost] => (item=[4, 'macbook'])
ok: [localhost] => (item=[5, 'desktop'])
ok: [localhost] => (item=[6, 'other'])
TASK [wireguard : WireGuard configured] ****************************************
changed: [localhost]
TASK [wireguard : WireGuard enabled and started] *******************************
changed: [localhost]
RUNNING HANDLER [restart wireguard] ********************************************
changed: [localhost]
included: /home/nfo/algo/roles/strongswan/tasks/ubuntu.yml for localhost
TASK [strongswan : Set OS specific facts] **************************************
ok: [localhost]
TASK [strongswan : Ubuntu | Install strongSwan] ********************************
changed: [localhost]
TASK [strongswan : Ubuntu | Charon profile for apparmor configured] ************
changed: [localhost]
TASK [strongswan : Ubuntu | Enforcing ipsec with apparmor] *********************
ok: [localhost] => (item=/usr/lib/ipsec/charon)
ok: [localhost] => (item=/usr/lib/ipsec/lookip)
ok: [localhost] => (item=/usr/lib/ipsec/stroke)
TASK [strongswan : Ubuntu | Enable services] ***********************************
ok: [localhost] => (item=apparmor)
ok: [localhost] => (item=strongswan-starter)
ok: [localhost] => (item=netfilter-persistent)
TASK [Ubuntu | Ensure that the strongswan service directory exists] ************
changed: [localhost]
TASK [strongswan : Ubuntu | Setup the cgroup limitations for the ipsec daemon] ***
changed: [localhost]
TASK [Ensure that the strongswan user exists] **********************************
ok: [localhost]
TASK [strongswan : Install strongSwan] *****************************************
ok: [localhost]
TASK [strongswan : Setup the config files from our templates] ******************
changed: [localhost] => (item={'src': 'strongswan.conf.j2', 'dest': 'strongswan.conf', 'owner': 'root', 'group': 'root', 'mode': '0644'})
changed: [localhost] => (item={'src': 'ipsec.conf.j2', 'dest': 'ipsec.conf', 'owner': 'root', 'group': 'root', 'mode': '0644'})
changed: [localhost] => (item={'src': 'ipsec.secrets.j2', 'dest': 'ipsec.secrets', 'owner': 'strongswan', 'group': 'root', 'mode': '0600'})
changed: [localhost] => (item={'src': 'charon.conf.j2', 'dest': 'strongswan.d/charon.conf', 'owner': 'root', 'group': 'root', 'mode': '0644'})
TASK [strongswan : Get loaded plugins] *****************************************
ok: [localhost]
TASK [strongswan : Disable unneeded plugins] ***********************************
changed: [localhost] => (item=counters)
changed: [localhost] => (item=updown)
changed: [localhost] => (item=sha1)
changed: [localhost] => (item=mgf1)
changed: [localhost] => (item=sshkey)
changed: [localhost] => (item=xcbc)
changed: [localhost] => (item=aesni)
changed: [localhost] => (item=agent)
changed: [localhost] => (item=attr)
changed: [localhost] => (item=eap-mschapv2)
changed: [localhost] => (item=pkcs1)
changed: [localhost] => (item=resolve)
changed: [localhost] => (item=drbg)
changed: [localhost] => (item=connmark)
changed: [localhost] => (item=constraints)
changed: [localhost] => (item=fips-prf)
changed: [localhost] => (item=bypass-lan)
changed: [localhost] => (item=rc2)
changed: [localhost] => (item=md5)
changed: [localhost] => (item=xauth-generic)
changed: [localhost] => (item=dnskey)
changed: [localhost] => (item=gmp)
TASK [strongswan : Ensure that required plugins are enabled] *******************
changed: [localhost] => (item=x509)
changed: [localhost] => (item=pkcs7)
changed: [localhost] => (item=pgp)
changed: [localhost] => (item=sha2)
changed: [localhost] => (item=pkcs8)
changed: [localhost] => (item=pubkey)
changed: [localhost] => (item=aes)
changed: [localhost] => (item=gcm)
changed: [localhost] => (item=nonce)
changed: [localhost] => (item=socket-default)
changed: [localhost] => (item=stroke)
changed: [localhost] => (item=pem)
changed: [localhost] => (item=revocation)
changed: [localhost] => (item=random)
changed: [localhost] => (item=pkcs12)
changed: [localhost] => (item=openssl)
changed: [localhost] => (item=kernel-netlink)
changed: [localhost] => (item=hmac)
TASK [strongswan : debug] ******************************************************
ok: [localhost] => {
"subjectAltName": "IP:167.99.220.196"
}
TASK [strongswan : Ensure the pki directories exist] ***************************
changed: [localhost] => (item=ecparams)
changed: [localhost] => (item=certs)
changed: [localhost] => (item=crl)
changed: [localhost] => (item=newcerts)
changed: [localhost] => (item=private)
changed: [localhost] => (item=public)
changed: [localhost] => (item=reqs)
TASK [strongswan : Ensure the config directories exist] ************************
changed: [localhost] => (item=apple)
changed: [localhost] => (item=manual)
TASK [strongswan : Ensure the files exist] *************************************
changed: [localhost] => (item=.rnd)
changed: [localhost] => (item=private/.rnd)
changed: [localhost] => (item=index.txt)
changed: [localhost] => (item=index.txt.attr)
changed: [localhost] => (item=serial)
TASK [strongswan : Generate the openssl server configs] ************************
changed: [localhost]
TASK [strongswan : Build the CA pair] ******************************************
changed: [localhost]
TASK [strongswan : Copy the CA certificate] ************************************
changed: [localhost]
TASK [strongswan : Generate the serial number] *********************************
changed: [localhost]
TASK [strongswan : Build the server pair] **************************************
changed: [localhost]
TASK [strongswan : Build the client's pair] ************************************
changed: [localhost] => (item=apple)
changed: [localhost] => (item=samsung)
changed: [localhost] => (item=pinephone)
changed: [localhost] => (item=hp)
changed: [localhost] => (item=macbook)
changed: [localhost] => (item=desktop)
changed: [localhost] => (item=other)
TASK [strongswan : Build openssh public keys] **********************************
changed: [localhost] => (item=apple)
changed: [localhost] => (item=samsung)
changed: [localhost] => (item=pinephone)
changed: [localhost] => (item=hp)
changed: [localhost] => (item=macbook)
changed: [localhost] => (item=desktop)
changed: [localhost] => (item=other)
TASK [strongswan : Build the client's p12] *************************************
changed: [localhost] => (item=apple)
changed: [localhost] => (item=samsung)
changed: [localhost] => (item=pinephone)
changed: [localhost] => (item=hp)
changed: [localhost] => (item=macbook)
changed: [localhost] => (item=desktop)
changed: [localhost] => (item=other)
TASK [strongswan : Build the client's p12 with the CA cert included] ***********
changed: [localhost] => (item=apple)
changed: [localhost] => (item=samsung)
changed: [localhost] => (item=pinephone)
changed: [localhost] => (item=hp)
changed: [localhost] => (item=macbook)
changed: [localhost] => (item=desktop)
changed: [localhost] => (item=other)
TASK [strongswan : Copy the p12 certificates] **********************************
changed: [localhost] => (item=apple)
changed: [localhost] => (item=samsung)
changed: [localhost] => (item=pinephone)
changed: [localhost] => (item=hp)
changed: [localhost] => (item=macbook)
changed: [localhost] => (item=desktop)
changed: [localhost] => (item=other)
TASK [strongswan : Get active users] *******************************************
changed: [localhost]
TASK [Copy the keys to the strongswan directory] *******************************
changed: [localhost] => (item={'src': 'cacert.pem', 'dest': 'cacerts/ca.crt', 'owner': 'strongswan', 'group': 'root', 'mode': '0600'})
changed: [localhost] => (item={'src': 'certs/167.99.220.196.crt', 'dest': 'certs/167.99.220.196.crt', 'owner': 'strongswan', 'group': 'root', 'mode': '0600'})
changed: [localhost] => (item={'src': 'private/167.99.220.196.key', 'dest': 'private/167.99.220.196.key', 'owner': 'strongswan', 'group': 'root', 'mode': '0600'})
TASK [strongswan : Register p12 PayloadContent] ********************************
ok: [localhost] => (item=apple)
ok: [localhost] => (item=samsung)
ok: [localhost] => (item=pinephone)
ok: [localhost] => (item=hp)
ok: [localhost] => (item=macbook)
ok: [localhost] => (item=desktop)
ok: [localhost] => (item=other)
TASK [strongswan : Set facts for mobileconfigs] ********************************
ok: [localhost]
TASK [strongswan : Build the mobileconfigs] ************************************
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost]
TASK [strongswan : Build the client ipsec config file] *************************
changed: [localhost] => (item=apple)
changed: [localhost] => (item=samsung)
changed: [localhost] => (item=pinephone)
changed: [localhost] => (item=hp)
changed: [localhost] => (item=macbook)
changed: [localhost] => (item=desktop)
changed: [localhost] => (item=other)
TASK [strongswan : Build the client ipsec secret file] *************************
changed: [localhost] => (item=apple)
changed: [localhost] => (item=samsung)
changed: [localhost] => (item=pinephone)
changed: [localhost] => (item=hp)
changed: [localhost] => (item=macbook)
changed: [localhost] => (item=desktop)
changed: [localhost] => (item=other)
TASK [strongswan : Restrict permissions for the local private directories] *****
ok: [localhost]
TASK [strongswan : strongSwan started] *****************************************
ok: [localhost]
RUNNING HANDLER [restart strongswan] *******************************************
changed: [localhost]
RUNNING HANDLER [strongswan : daemon-reload] ***********************************
ok: [localhost]
TASK [ssh_tunneling : Ensure that the sshd_config file has desired options] ****
changed: [localhost]
TASK [ssh_tunneling : Ensure that the algo group exist] ************************
changed: [localhost]
TASK [ssh_tunneling : Ensure that the jail directory exist] ********************
changed: [localhost]
TASK [ssh_tunneling : Ensure that the SSH users exist] *************************
changed: [localhost] => (item=apple)
changed: [localhost] => (item=samsung)
changed: [localhost] => (item=pinephone)
changed: [localhost] => (item=hp)
changed: [localhost] => (item=macbook)
changed: [localhost] => (item=desktop)
changed: [localhost] => (item=other)
TASK [ssh_tunneling : Ensure the config directories exist] *********************
changed: [localhost]
TASK [ssh_tunneling : Check if the private keys exist] *************************
ok: [localhost] => (item=apple)
ok: [localhost] => (item=samsung)
ok: [localhost] => (item=pinephone)
ok: [localhost] => (item=hp)
ok: [localhost] => (item=macbook)
ok: [localhost] => (item=desktop)
ok: [localhost] => (item=other)
TASK [ssh_tunneling : Build ssh private keys] **********************************
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost]
TASK [ssh_tunneling : Build ssh public keys] ***********************************
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost]
TASK [ssh_tunneling : Build the client ssh config] *****************************
changed: [localhost] => (item=apple)
changed: [localhost] => (item=samsung)
changed: [localhost] => (item=pinephone)
changed: [localhost] => (item=hp)
changed: [localhost] => (item=macbook)
changed: [localhost] => (item=desktop)
changed: [localhost] => (item=other)
TASK [ssh_tunneling : The authorized keys file created] ************************
changed: [localhost] => (item=apple)
changed: [localhost] => (item=samsung)
changed: [localhost] => (item=pinephone)
changed: [localhost] => (item=hp)
changed: [localhost] => (item=macbook)
changed: [localhost] => (item=desktop)
changed: [localhost] => (item=other)
TASK [ssh_tunneling : Get active users] ****************************************
ok: [localhost]
TASK [ssh_tunneling : Delete non-existing users] *******************************
ok: [localhost] => (item=)
TASK [Dump the configuration] **************************************************
changed: [localhost]
TASK [Create a symlink if deploying to localhost] ******************************
changed: [localhost]
TASK [debug] *******************************************************************
ok: [localhost] => {
"msg": [
[
"\"# Congratulations! #\"",
"\"# Your Algo server is running. #\""
Please post the config file that WireGuard is complaining about. You can edit out the keys.
I think you might be using an IPsec config file instead of a WireGuard config file.
you are correct! only problem is.. I deleted that from /etc/wireguard/wg0.conf
and ran again this command on the proper wireuard config sudo install -o root -g root -m 600 hp.conf /etc/wireguard/wg0.conf
but now though sudo wg-quick up wg0
works, I have no internet connection once connected
just had to reboot, thanks!
I also have Line unrecognized
on rc-service net.wg0 start
, my /etc/wireguard/wg0.conf
:
[Interface]
PrivateKey = xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx=
Address = xx.xx.x.x
DNS = xxx.xx.xxx.xxx
[Peer]
PublicKey = xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx=
PresharedKey = xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx=
AllowedIPs = 0.0.0.0/0
Endpoint = x.xx.xxx.xxx:xxxxx