- #Router with shadowsocks client install#
- #Router with shadowsocks client software#
- #Router with shadowsocks client code#
Peer: BLABLAT3TQJwIE0OYx2qeZWYystRb9BLABLAbla= Public key: blablaPyAN3eOyINB5JKNu4mHyKwrg3Mblabla= #DEBUG= # uncomment/comment to enable/disable debug mode
#Router with shadowsocks client code#
Open the QR Code decoder and add the png file to decode.Go to Tunnels to generate then capture and save a QR Code screenshot.Using a network manager with Wireguard and preshared key support is optional but much easier. Manager: systemd-networkd 237, networkmanager 1.16, connman 1.38.for Arch) and/or forums for more details.
#Router with shadowsocks client install#
Review the Wireguard install page, distribution wiki (e.g. WireGuard app: press "+" in the lower right corner, select "Create from QR code", scan from DD-WRT peer, then the app will prompt to name the tunnel. Iptables -t nat -I POSTROUTING -o br0 -j SNAT -to $(nvram get lan_ipaddr) Android/iOS config importĪndroid: Google Play Store, iOS: Apple Store (12.0 or later) Click Apply.Īdd the following firewall rule under Administration/Commands and save as firewall then reboot: Go to Networking, unbridge the oet1 interface (automatic since r42067), and enable Masquerade / NAT to have internet on the tunnel. Wireguard must be unbridged, using Forwarding and NAT. Click Save then the QR-Code button to generate it. Peer Tunnel MTU will be calculated automatically (WAN mtu-40) but can then be edited. if the router LAN IP is 192.168.2.1, for the oet1 IP address use 10.10.0.1.įor simple configurations, just enter Peer Tunnel IP within the oet1 interface ip range (e.g.
#Router with shadowsocks client software#
The WireGuard installation/downloads page has software and instructions per OS. The advantage of this approach is that there is no need to transfer sensitive information via potentially compromised data channels. Since build 38581 in February 2019, a client config can be imported using a QR Code. The "Quick Response" Code is a two-dimensional barcode with larger encoded data capacity and high fault tolerance. Before proceeding, verify a working reset button and configuration backup in case of problems. This tutorial shows the basics of securely creating a tunnel from a client device to DD-WRT. Executes in-kernel (and is upstream since Linux 5.6).