No description
Find a file
Jason A. Donenfeld 6768090667
version: bump snapshot
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2025-06-23 14:56:43 -06:00
.github/workflows Fix pipeline 2024-02-07 18:53:55 +07:00
conn global: replaced unused function params with _ 2025-06-23 14:26:55 -06:00
device device: use rand.NewSource instead of rand.Seed 2025-06-23 14:27:06 -06:00
ipc global: bump copyright notice 2025-06-23 14:20:32 -06:00
ratelimiter global: bump copyright notice 2025-06-23 14:20:32 -06:00
replay global: bump copyright notice 2025-06-23 14:20:32 -06:00
rwcancel rwcancel: fix wrong poll event flag on ReadyWrite 2025-06-23 14:27:20 -06:00
tai64n global: bump copyright notice 2025-06-23 14:20:32 -06:00
tests device: combine debug and info log levels into 'verbose' 2021-01-26 23:05:48 +01:00
tun tun: darwin: fetch flags and mtu from if_msghdr directly 2025-06-23 14:26:37 -06:00
.gitignore Naming unify 2024-01-20 23:18:10 +03:00
Dockerfile faster and more secure junk creation 2025-03-18 08:34:23 +01:00
format_test.go global: bump copyright notice 2025-06-23 14:20:32 -06:00
go.mod mod: bump deps 2025-06-23 14:25:36 -06:00
go.sum mod: bump deps 2025-06-23 14:25:36 -06:00
LICENSE mod: rename COPYING to LICENSE 2021-03-06 09:09:21 -07:00
main.go global: bump copyright notice 2025-06-23 14:20:32 -06:00
main_windows.go global: bump copyright notice 2025-06-23 14:20:32 -06:00
Makefile Remove GetOffloadInfo() (#32) 2024-05-24 16:18:23 +01:00
README.md global: bump copyright notice 2025-06-23 14:20:32 -06:00
version.go version: bump snapshot 2025-06-23 14:56:43 -06:00

Go Implementation of AmneziaWG

AmneziaWG is a contemporary version of the WireGuard protocol. It's a fork of WireGuard-Go and offers protection against detection by Deep Packet Inspection (DPI) systems. At the same time, it retains the simplified architecture and high performance of the original.

The precursor, WireGuard, is known for its efficiency but had issues with detection due to its distinctive packet signatures. AmneziaWG addresses this problem by employing advanced obfuscation methods, allowing its traffic to blend seamlessly with regular internet traffic. As a result, AmneziaWG maintains high performance while adding an extra layer of stealth, making it a superb choice for those seeking a fast and discreet VPN connection.

Usage

Simply run:

$ amneziawg-go wg0

This will create an interface and fork into the background. To remove the interface, use the usual ip link del wg0, or if your system does not support removing interfaces directly, you may instead remove the control socket via rm -f /var/run/amneziawg/wg0.sock, which will result in amneziawg-go shutting down.

To run amneziawg-go without forking to the background, pass -f or --foreground:

$ amneziawg-go -f wg0

When an interface is running, you may use amneziawg-tools to configure it, as well as the usual ip(8) and ifconfig(8) commands.

To run with more logging you may set the environment variable LOG_LEVEL=debug.

Platforms

Linux

This will run on Linux; you should run amnezia-wg instead of using default linux kernel module.

macOS

This runs on macOS using the utun driver. It does not yet support sticky sockets, and won't support fwmarks because of Darwin limitations. Since the utun driver cannot have arbitrary interface names, you must either use utun[0-9]+ for an explicit interface name or utun to have the kernel select one for you. If you choose utun as the interface name, and the environment variable WG_TUN_NAME_FILE is defined, then the actual name of the interface chosen by the kernel is written to the file specified by that variable. This runs on MacOS, you should use it from amneziawg-apple

Windows

This runs on Windows, you should use it from amneziawg-windows, which uses this as a module.

Building

This requires an installation of the latest version of Go.

$ git clone https://github.com/amnezia-vpn/amneziawg-go
$ cd amneziawg-go
$ make