Has no effect with -r or if cached connection information is not available.ĭuring the first run, pia-wg will grab PIA's encryption key and initial server list, prompt for your PIA login credentials, and fetch an authentication token from PIA before proceeding to set up a wireguard connection.īy default, it saves your settings in ~/.config/pia-wg/nf (when run as user) or /var/cache/pia-wg/nf (when run as root or under sudo) - and saves other data (eg auth token, server list, cached connection, port-forward token, etc) in the same folder. If qrencode is available, will also print a QR code to your terminal that can be scanned by the Wireguard mobile app.įast reconnect - only restore cached connection information, do not actually try to contact anything on the internet. The generated config will be stored at ~/.config/pia-wg/pia.conf or /var/cache/pia-wg/pia.conf - where the filename is based on the PIA_INTERFACE value in your config (default " pia") Only generate config, do not affect current system - useful for generating configs for routers and similar devices, or WireGuard's Android/iOS apps (if you don't like the PIA app) Hop to a new server or re-submit keys to selected server, even if a cached connection profile is available Windows is entirely out of scope for this project. They have not been tested on OSX but might work - pull requests are welcomed as long as they don't adversely affect the functionality on Linux, or excessively complicate the scripts. These scripts have been tested on Gentoo Linux, but should work with other Linux distributions. WireGuard is a relatively new VPN protocol written by a consortium of Linux developers and cryptographers, designed to be small, simple, efficient, and avoid many of the pitfalls of other popular VPN protocols. Private Internet Access (PIA) is a VPN provider that claims a strict interest in privacy and does not log user traffic. Private Internet Access wireguard shell scripts Prelude
0 Comments
Leave a Reply. |