WireGuard is an experimental VPN protocol that is generating a fair amount of excitement in the VPN world.
It is extremely lightweight (at just 3782 lines of code), which makes it much faster than traditional VPN protocols such as OpenVPN and IPsec. The brevity of the code also makes it easy to audit, and because it uses proven cryptographic primitives, it should be very secure.
WireGuard has great potential, but it is still very much at the experimental and developmental stage. It has not yet been properly audited for security issues, and the lack of a secure key sharing system across servers prevents widespread commercial roll-out at this time.
This last issue could be resolved by using a more traditional public-key cryptosystem such RSA to distribute keys. Sadly, doing so would add complexity, and remove many of the advantages of using WireGuard in the first place.
WireGuard is therefore very much a work in progress. It is nevertheless very interesting that some providers are beginning to experiment with the new protocol. With special thanks to NordVPN, we are very excited to have the opportunity for a hands-on look at it.
Please do also check out What is WireGuard VPN protocol? for a more detailed look at the theory behind this new VPN protocol.
At present, WireGuard is officially available for Android and Linux, although support for Windows and iOS is promised soon. It is also available for the macOS command line using Homebrew or MacPorts.
An alternative to the official clients is
The software itself, however, has now been made fully open source and can be
As we shall see, the
It can also be run from the Linux, macOS, or FreeBSD command line. This requires compiling from source, but simple and easy-to-follow instructions are provided for this.
The official WireGuard Client
WireGuard was designed specifically for the Linux kernel. The official WireGuard client is command line only, running as a service inside Terminal.
Other than needing to fix some dependency issues ($
The WireGuard protocol has full IPv4 and IPv6 routing inside the VPN tunnel. We detected no DNS leaks of any kind when using it on any platform, but it is reported that
There is no built-in kill switch as such, but one can be created by adding
A good example of how to do this manually, which should be applicable for any WireGuard config files, can be found on Mullvad’s WireGuard setup page. Or a VPN provider can simply add the commands to its standard config files.
As already noted, the basic WireGuard client can also be run in macOS using Homebrew or MacPorts.
To run TunSafe in Linux you must compile the source code yourself. Fortunately, this is nowhere near as scary as it sounds. Instructions on the website are very clear, and we had the command-line daemon up and running in just a few minutes.
It has to be said, though, that we can see no advantage of using
The Official WireGuard app
What the app lacks in features (it doesn’t really have any), it makes up for in ease of use. Using what we imagine will become the standard way to configure WireGuard settings, NordVPN supplied us with images containing QR codes for its experimental WireGuard servers.
All we had to do was scan this code for each server using our phone’s camera, and ta-da! Setup was complete. It is also possible to manually add setup
And that is all there really is to the app. Once set up, it connected instantly and worked exactly as it should.
TunSafe VPN App
Now that it’s open source, TunSafe makes a good alternative to the official Android app. The core functionality of the app is almost identical to the open source official app on which it is based. As such, it can be configured to connect to any WireGuard servers via QR code, config files, or create from new
The main difference is that
Unlike the official app,
At the time of writing the only way to run WireGuard in Windows is using
The main problem with this is that the TAP adapter can leak IPv6 DNS requests outside the VPN interface. It is therefore strongly recommended to disable IPv6 in Windows when using
Another issue is that using a TAP adapter adds complexity to WireGuard’s simplicity. Which somewhat works against one of the major advantages of using WireGuard.
The client uses a simple GUI, which make importing a WireGuard .conf file very easy. There is no option to import files via QR code, but this understandable as many Windows PC’s do not feature cameras.
It also offers killswitch, which can use either (client-based) routing rules or (system) firewall rules to work. Or both. Which is very handy.
In addition to simplicity for its own sake, one of the biggest advantages of WireGuard over OpenVPN is that the added simplicity should also make WireGuard much faster So we ran some tests...
We opted to use Mullvad for this because Mullvad fully supports Linux. It also supports WireGuard and OpenVPN on the same servers (or at least very similar server locations), allowing for a good like-for-like comparison.
Tests were performed using speedtest.net, as our own speed testing system requires OpenVPN files to work. All tests performed
WireGuard should, in theory, be much faster than OpenVPN. But this is not borne out by these tests. It should be remembered, though, that this is still very early days for actual implementation of WireGuard, and that Mullvad is blazing fast when it comes to OpenVPN performance.
WireGuard has not yet been sufficiently audited and penetration-tested to recommend as a serious alternative to secure VPN protocols such as OpenVPN and IKEv2 at the present time. But it looks very promising indeed.
It is easy to set up and use, and in our tests, it connected quickly and maintained a very stable connection.
On paper, WireGuard is much more performant than OpenVPN. Our test results may be because the full implementation is still at the prototype stage, or it may be due to the limitations of our test environment.
They were performed over WiFi, and the only WiFi connector we currently have that is compatible with Linux is (somewhat ironically) a very cheap 802.11g dongle that cost around $5.
So make what you will of our speed test results. Other than that, we were very impressed with how WireGuard is progressing, and can’t wait for it to undergo further improvement testing. For anyone sharing this enthusiasm, donations to the project are very welcome. VPN protocols VPN protocols