trailofbits / algo

Set up a personal VPN in the cloud

Home Page:https://blog.trailofbits.com/2016/12/12/meet-algo-the-vpn-that-works/

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Configuration parsing error: Wireguard Ubuntu 20

ddan4 opened this issue · comments

Describe the bug

When trying to enable my wireguard connection, I get the following error.

[#] ip link add wg0 type wireguard
[#] wg setconf wg0 /dev/fd/63
Line unrecognized: `connalgovpn-167.99.220.196'
Configuration parsing error
[#] ip link delete dev wg0

This is on Ubuntu 20LTS,

openresolv is already the newest version (3.10.0-1).
wireguard is already the newest version (1.0.20200513-1~20.04.2).

To Reproduce

Steps to reproduce the behavior:

  1. Install AlgoVPN
  2. Copy config files to local drive
  3. sudo install -o root -g root -m 600 <username>.conf /etc/wireguard/wg0.conf
  4. sudo wg-quick up wg0 (also tried systemctl status wg-quick@wg0.service)

Expected behavior

Usually at this point wireguard simply works and I never have to concern with it again.

Full log

Enter the number of your desired provider
:
12^M
TASK [Cloud prompt] ************************************************************
ok: [localhost]

TASK [Set facts based on the input] ********************************************
ok: [localhost]
[Cellular On Demand prompt]
Do you want macOS/iOS clients to enable "Connect On Demand" when connected to cellular networks?
[y/N]
:
y^M
TASK [Cellular On Demand prompt] ***********************************************
ok: [localhost]
[Wi-Fi On Demand prompt]
Do you want macOS/iOS clients to enable "Connect On Demand" when connected to Wi-Fi?
[y/N]
:

TASK [Wi-Fi On Demand prompt] **************************************************
ok: [localhost]
[Trusted Wi-Fi networks prompt]
List the names of any trusted Wi-Fi networks where macOS/iOS clients should not use "Connect On Demand"
(e.g., your home network. Comma-separated value, e.g., HomeNet,OfficeWifi,AlgoWiFi)
:

TASK [Trusted Wi-Fi networks prompt] *******************************************
ok: [localhost]
[Retain the PKI prompt]
Do you want to retain the keys (PKI)? (required to add users in the future, but less secure)
[y/N]
:
y^M
TASK [Retain the PKI prompt] ***************************************************
ok: [localhost]
[DNS adblocking prompt]
Do you want to enable DNS ad blocking on this VPN server?
[y/N]
:
y^M
TASK [DNS adblocking prompt] ***************************************************
ok: [localhost]
[SSH tunneling prompt]
Do you want each user to have their own account for SSH tunneling?
[y/N]
:
y^M
TASK [SSH tunneling prompt] ****************************************************
ok: [localhost]

TASK [Set facts based on the input] ********************************************
ok: [localhost]

PLAY [Provision the server] ****************************************************

TASK [Gathering Facts] *********************************************************
ok: [localhost]

--> Please include the following block of text when reporting issues:

Algo running on: Ubuntu 20.04.2 LTS (Virtualized: kvm)
Created from git clone. Last commit: 665af5a Update Google Compute Environment machine type (#14251)
Python 3.8.10
Runtime variables:
    algo_provider "local"
    algo_ondemand_cellular "True"
    algo_ondemand_wifi "True"
    algo_ondemand_wifi_exclude "X251bGw="
    algo_dns_adblocking "True"
    algo_ssh_tunneling "True"
    wireguard_enabled "True"
    dns_encryption "True"

TASK [Display the invocation environment] **************************************
changed: [localhost]

TASK [Install the requirements] ************************************************
changed: [localhost]
[local : pause]
Enter the IP address of your server: (or use localhost for local installation):
[localhost]
:
^M
TASK [local : pause] ***********************************************************
ok: [localhost]

TASK [local : Set the facts] ***************************************************
ok: [localhost]
[local : pause]
Enter the public IP address or domain name of your server: (IMPORTANT! This is used to verify the certificate)
[localhost]
:
167.99.220.196^M
TASK [local : pause] ***********************************************************
ok: [localhost]

TASK [local : Set the facts] ***************************************************
ok: [localhost]

TASK [Set subjectAltName as a fact] ********************************************
ok: [localhost]

TASK [Add the server to an inventory group] ************************************
changed: [localhost]

TASK [debug] *******************************************************************
ok: [localhost] => {
    "IP_subject_alt_name": "167.99.220.196"
}
[WARNING]: Reset is not implemented for this connection

TASK [Wait 600 seconds for target connection to become reachable/usable] *******
ok: [localhost] => (item=localhost)

PLAY [Configure the server and install required software] **********************

TASK [common : Check the system] ***********************************************
ok: [localhost]
included: /home/nfo/algo/roles/common/tasks/ubuntu.yml for localhost

TASK [common : Gather facts] ***************************************************
ok: [localhost]

TASK [common : Install unattended-upgrades] ************************************
ok: [localhost]

TASK [common : Configure unattended-upgrades] **********************************
changed: [localhost]

TASK [common : Periodic upgrades configured] ***********************************
changed: [localhost]

TASK [common : Disable MOTD on login and SSHD] *********************************
changed: [localhost] => (item={'regexp': '^session.*optional.*pam_motd.so.*', 'line': '# MOTD DISABLED', 'file': '/etc/pam.d/login'})
changed: [localhost] => (item={'regexp': '^session.*optional.*pam_motd.so.*', 'line': '# MOTD DISABLED', 'file': '/etc/pam.d/sshd'})

TASK [common : Ensure fallback resolvers are set] ******************************
changed: [localhost]

TASK [common : Loopback for services configured] *******************************
changed: [localhost]

TASK [common : systemd services enabled and started] ***************************
ok: [localhost] => (item=systemd-networkd)
ok: [localhost] => (item=systemd-resolved)

RUNNING HANDLER [common : restart systemd-networkd] ****************************
changed: [localhost]

RUNNING HANDLER [common : restart systemd-resolved] ****************************
changed: [localhost]

TASK [common : Check apparmor support] *****************************************
ok: [localhost]

TASK [common : Set fact if apparmor enabled] ***********************************
ok: [localhost]

TASK [common : Define facts] ***************************************************
ok: [localhost]

TASK [common : Set facts] ******************************************************
ok: [localhost]

TASK [common : Set IPv6 support as a fact] *************************************
ok: [localhost]

TASK [common : Check size of MTU] **********************************************
ok: [localhost]

TASK [common : Set OS specific facts] ******************************************
ok: [localhost]

TASK [common : Install tools] **************************************************
changed: [localhost]
included: /home/nfo/algo/roles/common/tasks/iptables.yml for localhost

TASK [common : Iptables configured] ********************************************
changed: [localhost] => (item={'src': 'rules.v4.j2', 'dest': '/etc/iptables/rules.v4'})

TASK [common : Sysctl tuning] **************************************************
changed: [localhost] => (item={'item': 'net.ipv4.ip_forward', 'value': 1})
changed: [localhost] => (item={'item': 'net.ipv4.conf.all.forwarding', 'value': 1})

RUNNING HANDLER [common : restart iptables] ************************************
changed: [localhost]
included: /home/nfo/algo/roles/dns/tasks/ubuntu.yml for localhost

TASK [Install dnscrypt-proxy] **************************************************
changed: [localhost]

TASK [Ubuntu | Configure AppArmor policy for dnscrypt-proxy] *******************
changed: [localhost]

TASK [Ubuntu | Enforce the dnscrypt-proxy AppArmor policy] *********************
ok: [localhost]

TASK [Ubuntu | Ensure that the dnscrypt-proxy service directory exist] *********
changed: [localhost]

TASK [dns : Ubuntu | Add custom requirements to successfully start the unit] ***
changed: [localhost]

TASK [dnscrypt-proxy ip-blacklist configured] **********************************
changed: [localhost]

TASK [dnscrypt-proxy configured] ***********************************************
changed: [localhost]

TASK [dns : Adblock script created] ********************************************
changed: [localhost]

TASK [dns : Adblock script added to cron] **************************************
changed: [localhost]

TASK [dns : Update adblock hosts] **********************************************
ok: [localhost]
[WARNING]: flush_handlers task does not support when conditional

RUNNING HANDLER [restart dnscrypt-proxy] ***************************************
changed: [localhost]

TASK [dnscrypt-proxy enabled and started] **************************************
ok: [localhost]

TASK [wireguard : Ensure the required directories exist] ***********************
changed: [localhost] => (item=configs/167.99.220.196/wireguard//.pki//preshared)
changed: [localhost] => (item=configs/167.99.220.196/wireguard//.pki//private)
changed: [localhost] => (item=configs/167.99.220.196/wireguard//.pki//public)
changed: [localhost] => (item=configs/167.99.220.196/wireguard//apple/ios)
changed: [localhost] => (item=configs/167.99.220.196/wireguard//apple/macos)
included: /home/nfo/algo/roles/wireguard/tasks/ubuntu.yml for localhost

TASK [wireguard : WireGuard installed] *****************************************
changed: [localhost]

TASK [wireguard : Set OS specific facts] ***************************************
ok: [localhost]

TASK [wireguard : Generate private keys] ***************************************
changed: [localhost] => (item=apple)
changed: [localhost] => (item=samsung)
changed: [localhost] => (item=pinephone)
changed: [localhost] => (item=hp)
changed: [localhost] => (item=macbook)
changed: [localhost] => (item=desktop)
changed: [localhost] => (item=other)
changed: [localhost] => (item=167.99.220.196)

TASK [wireguard : Save private keys] *******************************************
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost]

TASK [wireguard : Touch the lock file] *****************************************
changed: [localhost] => (item=apple)
changed: [localhost] => (item=samsung)
changed: [localhost] => (item=pinephone)
changed: [localhost] => (item=hp)
changed: [localhost] => (item=macbook)
changed: [localhost] => (item=desktop)
changed: [localhost] => (item=other)
changed: [localhost] => (item=167.99.220.196)

TASK [wireguard : Generate preshared keys] *************************************
changed: [localhost] => (item=apple)
changed: [localhost] => (item=samsung)
changed: [localhost] => (item=pinephone)
changed: [localhost] => (item=hp)
changed: [localhost] => (item=macbook)
changed: [localhost] => (item=desktop)
changed: [localhost] => (item=other)
changed: [localhost] => (item=167.99.220.196)

TASK [wireguard : Save preshared keys] *****************************************
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost]

TASK [wireguard : Touch the preshared lock file] *******************************
changed: [localhost] => (item=apple)
changed: [localhost] => (item=samsung)
changed: [localhost] => (item=pinephone)
changed: [localhost] => (item=hp)
changed: [localhost] => (item=macbook)
changed: [localhost] => (item=desktop)
changed: [localhost] => (item=other)
changed: [localhost] => (item=167.99.220.196)

TASK [wireguard : Generate public keys] ****************************************
ok: [localhost] => (item=apple)
ok: [localhost] => (item=samsung)
ok: [localhost] => (item=pinephone)
ok: [localhost] => (item=hp)
ok: [localhost] => (item=macbook)
ok: [localhost] => (item=desktop)
ok: [localhost] => (item=other)
ok: [localhost] => (item=167.99.220.196)

TASK [wireguard : Save public keys] ********************************************
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost]

TASK [wireguard : WireGuard user list updated] *********************************
changed: [localhost] => (item=apple)
changed: [localhost] => (item=samsung)
changed: [localhost] => (item=pinephone)
changed: [localhost] => (item=hp)
changed: [localhost] => (item=macbook)
changed: [localhost] => (item=desktop)
changed: [localhost] => (item=other)

TASK [wireguard : set_fact] ****************************************************
ok: [localhost]

TASK [wireguard : WireGuard users config generated] ****************************
changed: [localhost] => (item=[0, 'apple'])
changed: [localhost] => (item=[1, 'samsung'])
changed: [localhost] => (item=[2, 'pinephone'])
changed: [localhost] => (item=[3, 'hp'])
changed: [localhost] => (item=[4, 'macbook'])
changed: [localhost] => (item=[5, 'desktop'])
changed: [localhost] => (item=[6, 'other'])
included: /home/nfo/algo/roles/wireguard/tasks/mobileconfig.yml for localhost
included: /home/nfo/algo/roles/wireguard/tasks/mobileconfig.yml for localhost

TASK [wireguard : WireGuard apple mobileconfig generated] **********************
changed: [localhost] => (item=[0, 'apple'])
changed: [localhost] => (item=[1, 'samsung'])
changed: [localhost] => (item=[2, 'pinephone'])
changed: [localhost] => (item=[3, 'hp'])
changed: [localhost] => (item=[4, 'macbook'])
changed: [localhost] => (item=[5, 'desktop'])
changed: [localhost] => (item=[6, 'other'])

TASK [wireguard : WireGuard apple mobileconfig generated] **********************
changed: [localhost] => (item=[0, 'apple'])
changed: [localhost] => (item=[1, 'samsung'])
changed: [localhost] => (item=[2, 'pinephone'])
changed: [localhost] => (item=[3, 'hp'])
changed: [localhost] => (item=[4, 'macbook'])
changed: [localhost] => (item=[5, 'desktop'])
changed: [localhost] => (item=[6, 'other'])

TASK [wireguard : Generate QR codes] *******************************************
ok: [localhost] => (item=[0, 'apple'])
ok: [localhost] => (item=[1, 'samsung'])
ok: [localhost] => (item=[2, 'pinephone'])
ok: [localhost] => (item=[3, 'hp'])
ok: [localhost] => (item=[4, 'macbook'])
ok: [localhost] => (item=[5, 'desktop'])
ok: [localhost] => (item=[6, 'other'])

TASK [wireguard : WireGuard configured] ****************************************
changed: [localhost]

TASK [wireguard : WireGuard enabled and started] *******************************
changed: [localhost]

RUNNING HANDLER [restart wireguard] ********************************************
changed: [localhost]
included: /home/nfo/algo/roles/strongswan/tasks/ubuntu.yml for localhost

TASK [strongswan : Set OS specific facts] **************************************
ok: [localhost]

TASK [strongswan : Ubuntu | Install strongSwan] ********************************
changed: [localhost]

TASK [strongswan : Ubuntu | Charon profile for apparmor configured] ************
changed: [localhost]

TASK [strongswan : Ubuntu | Enforcing ipsec with apparmor] *********************
ok: [localhost] => (item=/usr/lib/ipsec/charon)
ok: [localhost] => (item=/usr/lib/ipsec/lookip)
ok: [localhost] => (item=/usr/lib/ipsec/stroke)

TASK [strongswan : Ubuntu | Enable services] ***********************************
ok: [localhost] => (item=apparmor)
ok: [localhost] => (item=strongswan-starter)
ok: [localhost] => (item=netfilter-persistent)

TASK [Ubuntu | Ensure that the strongswan service directory exists] ************
changed: [localhost]

TASK [strongswan : Ubuntu | Setup the cgroup limitations for the ipsec daemon] ***
changed: [localhost]

TASK [Ensure that the strongswan user exists] **********************************
ok: [localhost]

TASK [strongswan : Install strongSwan] *****************************************
ok: [localhost]

TASK [strongswan : Setup the config files from our templates] ******************
changed: [localhost] => (item={'src': 'strongswan.conf.j2', 'dest': 'strongswan.conf', 'owner': 'root', 'group': 'root', 'mode': '0644'})
changed: [localhost] => (item={'src': 'ipsec.conf.j2', 'dest': 'ipsec.conf', 'owner': 'root', 'group': 'root', 'mode': '0644'})
changed: [localhost] => (item={'src': 'ipsec.secrets.j2', 'dest': 'ipsec.secrets', 'owner': 'strongswan', 'group': 'root', 'mode': '0600'})
changed: [localhost] => (item={'src': 'charon.conf.j2', 'dest': 'strongswan.d/charon.conf', 'owner': 'root', 'group': 'root', 'mode': '0644'})

TASK [strongswan : Get loaded plugins] *****************************************
ok: [localhost]

TASK [strongswan : Disable unneeded plugins] ***********************************
changed: [localhost] => (item=counters)
changed: [localhost] => (item=updown)
changed: [localhost] => (item=sha1)
changed: [localhost] => (item=mgf1)
changed: [localhost] => (item=sshkey)
changed: [localhost] => (item=xcbc)
changed: [localhost] => (item=aesni)
changed: [localhost] => (item=agent)
changed: [localhost] => (item=attr)
changed: [localhost] => (item=eap-mschapv2)
changed: [localhost] => (item=pkcs1)
changed: [localhost] => (item=resolve)
changed: [localhost] => (item=drbg)
changed: [localhost] => (item=connmark)
changed: [localhost] => (item=constraints)
changed: [localhost] => (item=fips-prf)
changed: [localhost] => (item=bypass-lan)
changed: [localhost] => (item=rc2)
changed: [localhost] => (item=md5)
changed: [localhost] => (item=xauth-generic)
changed: [localhost] => (item=dnskey)
changed: [localhost] => (item=gmp)

TASK [strongswan : Ensure that required plugins are enabled] *******************
changed: [localhost] => (item=x509)
changed: [localhost] => (item=pkcs7)
changed: [localhost] => (item=pgp)
changed: [localhost] => (item=sha2)
changed: [localhost] => (item=pkcs8)
changed: [localhost] => (item=pubkey)
changed: [localhost] => (item=aes)
changed: [localhost] => (item=gcm)
changed: [localhost] => (item=nonce)
changed: [localhost] => (item=socket-default)
changed: [localhost] => (item=stroke)
changed: [localhost] => (item=pem)
changed: [localhost] => (item=revocation)
changed: [localhost] => (item=random)
changed: [localhost] => (item=pkcs12)
changed: [localhost] => (item=openssl)
changed: [localhost] => (item=kernel-netlink)
changed: [localhost] => (item=hmac)

TASK [strongswan : debug] ******************************************************
ok: [localhost] => {
    "subjectAltName": "IP:167.99.220.196"
}

TASK [strongswan : Ensure the pki directories exist] ***************************
changed: [localhost] => (item=ecparams)
changed: [localhost] => (item=certs)
changed: [localhost] => (item=crl)
changed: [localhost] => (item=newcerts)
changed: [localhost] => (item=private)
changed: [localhost] => (item=public)
changed: [localhost] => (item=reqs)

TASK [strongswan : Ensure the config directories exist] ************************
changed: [localhost] => (item=apple)
changed: [localhost] => (item=manual)

TASK [strongswan : Ensure the files exist] *************************************
changed: [localhost] => (item=.rnd)
changed: [localhost] => (item=private/.rnd)
changed: [localhost] => (item=index.txt)
changed: [localhost] => (item=index.txt.attr)
changed: [localhost] => (item=serial)

TASK [strongswan : Generate the openssl server configs] ************************
changed: [localhost]

TASK [strongswan : Build the CA pair] ******************************************
changed: [localhost]

TASK [strongswan : Copy the CA certificate] ************************************
changed: [localhost]

TASK [strongswan : Generate the serial number] *********************************
changed: [localhost]

TASK [strongswan : Build the server pair] **************************************
changed: [localhost]

TASK [strongswan : Build the client's pair] ************************************
changed: [localhost] => (item=apple)
changed: [localhost] => (item=samsung)
changed: [localhost] => (item=pinephone)
changed: [localhost] => (item=hp)
changed: [localhost] => (item=macbook)
changed: [localhost] => (item=desktop)
changed: [localhost] => (item=other)

TASK [strongswan : Build openssh public keys] **********************************
changed: [localhost] => (item=apple)
changed: [localhost] => (item=samsung)
changed: [localhost] => (item=pinephone)
changed: [localhost] => (item=hp)
changed: [localhost] => (item=macbook)
changed: [localhost] => (item=desktop)
changed: [localhost] => (item=other)

TASK [strongswan : Build the client's p12] *************************************
changed: [localhost] => (item=apple)
changed: [localhost] => (item=samsung)
changed: [localhost] => (item=pinephone)
changed: [localhost] => (item=hp)
changed: [localhost] => (item=macbook)
changed: [localhost] => (item=desktop)
changed: [localhost] => (item=other)

TASK [strongswan : Build the client's p12 with the CA cert included] ***********
changed: [localhost] => (item=apple)
changed: [localhost] => (item=samsung)
changed: [localhost] => (item=pinephone)
changed: [localhost] => (item=hp)
changed: [localhost] => (item=macbook)
changed: [localhost] => (item=desktop)
changed: [localhost] => (item=other)

TASK [strongswan : Copy the p12 certificates] **********************************
changed: [localhost] => (item=apple)
changed: [localhost] => (item=samsung)
changed: [localhost] => (item=pinephone)
changed: [localhost] => (item=hp)
changed: [localhost] => (item=macbook)
changed: [localhost] => (item=desktop)
changed: [localhost] => (item=other)

TASK [strongswan : Get active users] *******************************************
changed: [localhost]

TASK [Copy the keys to the strongswan directory] *******************************
changed: [localhost] => (item={'src': 'cacert.pem', 'dest': 'cacerts/ca.crt', 'owner': 'strongswan', 'group': 'root', 'mode': '0600'})
changed: [localhost] => (item={'src': 'certs/167.99.220.196.crt', 'dest': 'certs/167.99.220.196.crt', 'owner': 'strongswan', 'group': 'root', 'mode': '0600'})
changed: [localhost] => (item={'src': 'private/167.99.220.196.key', 'dest': 'private/167.99.220.196.key', 'owner': 'strongswan', 'group': 'root', 'mode': '0600'})

TASK [strongswan : Register p12 PayloadContent] ********************************
ok: [localhost] => (item=apple)
ok: [localhost] => (item=samsung)
ok: [localhost] => (item=pinephone)
ok: [localhost] => (item=hp)
ok: [localhost] => (item=macbook)
ok: [localhost] => (item=desktop)
ok: [localhost] => (item=other)

TASK [strongswan : Set facts for mobileconfigs] ********************************
ok: [localhost]

TASK [strongswan : Build the mobileconfigs] ************************************
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost]

TASK [strongswan : Build the client ipsec config file] *************************
changed: [localhost] => (item=apple)
changed: [localhost] => (item=samsung)
changed: [localhost] => (item=pinephone)
changed: [localhost] => (item=hp)
changed: [localhost] => (item=macbook)
changed: [localhost] => (item=desktop)
changed: [localhost] => (item=other)

TASK [strongswan : Build the client ipsec secret file] *************************
changed: [localhost] => (item=apple)
changed: [localhost] => (item=samsung)
changed: [localhost] => (item=pinephone)
changed: [localhost] => (item=hp)
changed: [localhost] => (item=macbook)
changed: [localhost] => (item=desktop)
changed: [localhost] => (item=other)

TASK [strongswan : Restrict permissions for the local private directories] *****
ok: [localhost]

TASK [strongswan : strongSwan started] *****************************************
ok: [localhost]

RUNNING HANDLER [restart strongswan] *******************************************
changed: [localhost]

RUNNING HANDLER [strongswan : daemon-reload] ***********************************
ok: [localhost]

TASK [ssh_tunneling : Ensure that the sshd_config file has desired options] ****
changed: [localhost]

TASK [ssh_tunneling : Ensure that the algo group exist] ************************
changed: [localhost]

TASK [ssh_tunneling : Ensure that the jail directory exist] ********************
changed: [localhost]

TASK [ssh_tunneling : Ensure that the SSH users exist] *************************
changed: [localhost] => (item=apple)
changed: [localhost] => (item=samsung)
changed: [localhost] => (item=pinephone)
changed: [localhost] => (item=hp)
changed: [localhost] => (item=macbook)
changed: [localhost] => (item=desktop)
changed: [localhost] => (item=other)

TASK [ssh_tunneling : Ensure the config directories exist] *********************
changed: [localhost]

TASK [ssh_tunneling : Check if the private keys exist] *************************
ok: [localhost] => (item=apple)
ok: [localhost] => (item=samsung)
ok: [localhost] => (item=pinephone)
ok: [localhost] => (item=hp)
ok: [localhost] => (item=macbook)
ok: [localhost] => (item=desktop)
ok: [localhost] => (item=other)

TASK [ssh_tunneling : Build ssh private keys] **********************************
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost]

TASK [ssh_tunneling : Build ssh public keys] ***********************************
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost] => (item=None)
changed: [localhost]

TASK [ssh_tunneling : Build the client ssh config] *****************************
changed: [localhost] => (item=apple)
changed: [localhost] => (item=samsung)
changed: [localhost] => (item=pinephone)
changed: [localhost] => (item=hp)
changed: [localhost] => (item=macbook)
changed: [localhost] => (item=desktop)
changed: [localhost] => (item=other)

TASK [ssh_tunneling : The authorized keys file created] ************************
changed: [localhost] => (item=apple)
changed: [localhost] => (item=samsung)
changed: [localhost] => (item=pinephone)
changed: [localhost] => (item=hp)
changed: [localhost] => (item=macbook)
changed: [localhost] => (item=desktop)
changed: [localhost] => (item=other)

TASK [ssh_tunneling : Get active users] ****************************************
ok: [localhost]

TASK [ssh_tunneling : Delete non-existing users] *******************************
ok: [localhost] => (item=)

TASK [Dump the configuration] **************************************************
changed: [localhost]

TASK [Create a symlink if deploying to localhost] ******************************
changed: [localhost]

TASK [debug] *******************************************************************
ok: [localhost] => {
    "msg": [
        [
            "\"#                          Congratulations!                            #\"",
            "\"#                     Your Algo server is running.                     #\""

Please post the config file that WireGuard is complaining about. You can edit out the keys.

I think you might be using an IPsec config file instead of a WireGuard config file.

you are correct! only problem is.. I deleted that from /etc/wireguard/wg0.conf and ran again this command on the proper wireuard config sudo install -o root -g root -m 600 hp.conf /etc/wireguard/wg0.conf

but now though sudo wg-quick up wg0 works, I have no internet connection once connected

just had to reboot, thanks!

I also have Line unrecognized on rc-service net.wg0 start, my /etc/wireguard/wg0.conf:

[Interface]
PrivateKey = xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx=
Address = xx.xx.x.x
DNS =  xxx.xx.xxx.xxx

[Peer]
PublicKey = xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx=
PresharedKey = xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx=
AllowedIPs = 0.0.0.0/0
Endpoint = x.xx.xxx.xxx:xxxxx