一元网络论坛

 找回密码
 立即注册
搜索
热搜: 活动 交友 discuz
查看: 166|回复: 0

Surge或Mihomo用WireGuard远程到家

[复制链接]

1万

主题

1万

帖子

5万

积分

管理员

Rank: 9Rank: 9Rank: 9

积分
57799
发表于 2024-7-31 09:18:28 | 显示全部楼层 |阅读模式
1. Background
I have a soft router equipped with a public IPv4 address. Previously, when running OpenWRT, I would set up an SS server for remote access. However, I'm no longer interested in using OpenWRT. This led me to explore alternative solutions.
Given that I use iOS and have purchased Surge, which supports the WireGuard protocol, and considering Mihomo also supports WireGuard, I decided to set up a WireGuard connection for remote access. Here's a rundown of my setup:
Soft Router: 5105 (ikuai as the main router, Debian, Windows 10)
Debian - Service End
iOS device with Surge - Client End

2. Installation
Since Debian is stable, I chose to install WireGuard on it. As root user:
apt install wireguard

3. Generating Public and Private Keys
It's crucial to generate all keys on the service end.

3.1 Generating Server Keys
First, create the server's public and private keys:
cd /etc/wireguard
wg genkey | tee server_private.key | wg pubkey > server_public.key

3.2 Generating Client Keys
For each client, generate a pair of public and private keys. For example, if you have an iOS device with Surge and a Windows PC with Mihomo, you'd generate two pairs:
wg genkey | tee ios_private.key | wg pubkey > ios_public.key

4. Configuring wg*.conf
The wg configuration files must reside in /etc/wireguard and be named wg*.conf. Here's an example for wg0.conf:
[Interface]
Address = 192.168.63.1/24
ListenPort = 22334
PrivateKey =
PostUp = iptables -A FORWARD -i wg0 -j ACCEPT; iptables -A FORWARD -o wg0 -j ACCEPT; iptables -t nat -A POSTROUTING -o ens18 -j MASQUERADE
PostDown = iptables -D FORWARD -i wg0 -j ACCEPT; iptables -D FORWARD -o wg0 -j ACCEPT; iptables -t nat -D POSTROUTING -o ens18 -j MASQUERADE
[Peer]
PublicKey = [i]
AllowedIPs = 192.168.63.2/32
[Peer]
PublicKey =
AllowedIPs = 192.168.63.3/32
4.1 Pitfalls
- Ensure the UDP port is open (22334 in this case).
- In the wg0.conf file, include only the server's private key and the public keys of the clients.
- Identify your outgoing network interface (ens18 in this example).
- The service end should cover the entire subnet (24), while clients represent individual devices (32).

5. Starting the Server
cd /etc/wireguard
wg-quick up wg0

6. Configuring Surge
Here's the configuration for Surge:
[Proxy]
Home = wireguard, section-name = Home
[Rule]
IP-CIDR,192.168.88.0/24,Home,no-resolve
[WireGuard Home]
private-key = [i]
self-ip = 192.168.63.2
mtu = 1280
peer = (public-key = , allowed-ips = "0.0.0.0/0, ::0/0", endpoint = ddns.cn:22334, keepalive = 25)
6.1 Considerations
- self-ip must match the Interface's network segment.
- endpoint should be the public IP of your home (ddns.cn:22334).

7. Configuring Mihomo
The configuration for Mihomo is similar to Surge:
proxies:
- name: "wg"
  type: wireguard
  ip: 192.168.63.3
  private-key:
  peers:
    - server: ddns.cn
      port: 22334
      public-key:
      allowed-ips: ['0.0.0.0/0']
  udp: true
This concludes the setup guide.
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

Archiver|手机版|小黑屋|一元网络论坛

GMT+8, 2024-9-22 05:36 , Processed in 0.059748 second(s), 20 queries .

Powered by Discuz! X3.4

Copyright © 2001-2020, Tencent Cloud.

快速回复 返回顶部 返回列表