The Wiert Corner – irregular stream of stuff

Jeroen W. Pluimers on .NET, C#, Delphi, databases, and personal interests

  • My badges

  • Twitter Updates

  • My Flickr Stream

  • Pages

  • All categories

  • Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 1,861 other subscribers

Link dump on GL.iNet and WireGuard

Posted by jpluimers on 2026/02/20

For my link archive, as these might be useful one day:

WireGuard on Gl.INet devices

Autostart the WireGuard client after reboot

Site-to-site VPN on GL.iNet devices

WireGuard on Linux

WireGuard on pfSense

WireGuard / Tailscale

  • [Wayback/Archive] WireGuard vs. Tailscale · Tailscale
    Tailscale is built on top of WireGuard; we think very highly of it.
    We designed Tailscale to make it easier to use WireGuard to secure your network connections. You might decide to use WireGuard directly, without Tailscale. This is a guide to using Tailscale vs. configuring and running WireGuard directly.

     

  • [Wayback/Archive] Pricing · Tailscale

    Free
    For personal & hobby projects

    • 1 user
    • 20 devices
    • 1 subnet router
    • Secure, peer-to-peer connections
    • SSO and MFA
    • Sharing, MagicDNS, and more

AstroRelay (note this is operated by GL Intelligene, a close party to GL.iNET)

Before posting links, two very important things to keep in mind:

  1. AstroRelay is basically a combination of a tunnel with port forwarding where the ports are on the internet protected by the access control you configure on the AstroRelay web portal.
    So if you consider using AstroRelay, you need to trim access down very much *and* trust that access control is correctly implemented by AstroRelay.Although AstroRelay makes access very simple, if you or AstroRelay makes mistakes in implementing access control, you have a wide open door for others to enter your systems.
  2. Theire relay is free for 1GB (not sure if that is gigabyte or gibibyte) per lifetime of your account.

Anyway, here are the AstroRelay links:

For installation of the AstroRelay Client on GL.iNet routers a script is generated that downloads a software package and creates a configuration file which you need to run as root; there is no mechanism to keep the software package up-to-date.

The installation is by piping a shell script to ash like this:

cat<<'#INSTALL' | ash
    curl https://console.astrorelay.com/download/OpenWRT/1806/arc_1.0.0-1806_mips_siflower.ipk -o arc.ipk
    opkg update
    opkg remove arc
    opkg install arc.ipk
    rm arc.ipk
    cat<<'#CFG' | openssl enc -base64 -d > /etc/astrorelay/arc.cfg
    QXN0cm9SZWxheUNsaWVudDxDb25maWc+
...
LAoJT3JjaGVzdHJhdG9yUG9ydDogMjQzOSwKCUNBRmlsZTogIi9ldGMvYXN0cm9yZWxheS9jYS5w
ZW0iLAoJQWxsb3dBbGxMaW5rczogdHJ1ZSwKCUNvbW1hbmRDaGVja0ludGVydmFsTVM6IDIwMDAw
LAoJQ29ubmVjdGlvblRpbWVvdXRNUzogMjUwMCwKCUNvbW1hbmRUcmFuc2ZlclRpbWVvdXRNUzog
MzAwMCwKCUxpbmtUcmFuc2ZlclRpbWVvdXRNUzogNjAwMDAwLAoJQnVmZmVyU2l6ZTogODAwMAp9
Cgo=

#CFG
    /etc/init.d/arc restart
#INSTALL

Hopefully by now AstroRelay have increased their maximum password length as back early 2023 that was just 12 digits long which I posted in [Wayback/Archive] Thread by @jpluimers on Thread Reader App:

  1. [Wayback/Archive] Jeroen Wiert Pluimers @wiert@mastodon.social on Twitter: “It looks like that @GLiNetWiFi have put their AstroRelay service for providing a “Secure Tunnel for Remote Accessing Your Devices” into the Password Requirements Hall of Shame, don’t you think @PWTooStrong? “The password can not be greater than 12 digits” does not match green 1/”

    Signup screenshot for "A Secure Tunnel For Remote Accessing Your Devices" with the text "The password can not be greater than 12 digits"

  2. [Wayback/Archive] Jeroen Wiert Pluimers @wiert@mastodon.social on Twitter: “@GLiNetWiFi @PWTooStrong Especially not in the green when requiring a maximum of “12 digits” instead of “12 characters” as a year ago during the 2022 @hivesystems investigation, it took about 2 seconds to crack such passwords.”

    [Wayback/ArchiveHive Systems: Are Your Passwords in the Green? from my earlier blog post Generating random strings for passwords and uuids/guids on both Windows and Linux using base64 and hex encoding

    Table with "Time it takes a hacker to brute force your password in 2022".

Fun results

The first query below returned an OpenVPN question recommending to look at WireGuard: [Wayback/Archive] Any ideas on how to create an openvpn server/network on my home router with a dynamic IP? : selfhosted

It also got me product recommendations like in [Wayback/Archive] Best router for Wireguard out of the box? | SmallNetBuilder Forums.

To me this was funny because I already had a product (:

Clearly my first query was to broad as it returned also this conceptual question [Wayback/Archive] How do people access these servers off of their home network (or do they not?). … | Hacker News. Despite not answering my question, it was interesting to see what options other people were using.

The second query did not return any WireGuard results, only results like:

Queries

–jeroen


[Wayback/Archive] AstroRelay Remote Access Tool- First Time Setup – YouTube

 

Leave a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.