From aad91ae6791910315a929cc3f1973e96d33bcd1c Mon Sep 17 00:00:00 2001
From: "Jason A. Donenfeld" <Jason@zx2c4.com>
Date: Sun, 16 Jul 2017 16:12:20 +0200
Subject: [PATCH] global: wireguard.io --> wireguard.com

Due to concerns with the .io TLD, we are switching to using
wireguard.com instead.

Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
---
 README.md                                    | 2 +-
 contrib/external-tests/go/main.go            | 2 +-
 contrib/external-tests/haskell/src/Main.hs   | 2 +-
 contrib/external-tests/rust/src/main.rs      | 2 +-
 contrib/nat-hole-punching/nat-punch-client.c | 2 +-
 contrib/ncat-client-server/README            | 2 +-
 contrib/ncat-client-server/client.sh         | 4 ++--
 src/wg-quick.8                               | 4 ++--
 src/wg-quick@.service                        | 4 ++--
 src/wg.8                                     | 4 ++--
 10 files changed, 14 insertions(+), 14 deletions(-)

diff --git a/README.md b/README.md
index 0f6e1c5..08f8827 100644
--- a/README.md
+++ b/README.md
@@ -3,7 +3,7 @@
 
 WireGuard is a novel VPN that runs inside the Linux Kernel and utilizes **state-of-the-art cryptography**. It aims to be faster, simpler, leaner, and more useful than IPSec, while avoiding the massive headache. It intends to be considerably more performant than OpenVPN. WireGuard is designed as a general purpose VPN for running on embedded interfaces and super computers alike, fit for many different circumstances. It runs over UDP.
 
-**More information may be found at [WireGuard.io](https://www.wireguard.io/).**
+**More information may be found at [WireGuard.com](https://www.wireguard.com/).**
 
 ## License
 
diff --git a/contrib/external-tests/go/main.go b/contrib/external-tests/go/main.go
index e3627f3..9b60636 100644
--- a/contrib/external-tests/go/main.go
+++ b/contrib/external-tests/go/main.go
@@ -51,7 +51,7 @@ func main() {
 		StaticKeypair:         noise.DHKey{Private: ourPrivate, Public: ourPublic},
 		PeerStatic:            theirPublic,
 	})
-	conn, err := net.Dial("udp", "demo.wireguard.io:12913")
+	conn, err := net.Dial("udp", "demo.wireguard.com:12913")
 	if err != nil {
 		log.Fatalf("error dialing udp socket: %s", err)
 	}
diff --git a/contrib/external-tests/haskell/src/Main.hs b/contrib/external-tests/haskell/src/Main.hs
index b0b7503..7863829 100644
--- a/contrib/external-tests/haskell/src/Main.hs
+++ b/contrib/external-tests/haskell/src/Main.hs
@@ -57,7 +57,7 @@ unsafeMessage write mpsk msg ns = case operation msg ns of
 
 main :: IO ()
 main = do
-  let ip           = "demo.wireguard.io"
+  let ip           = "demo.wireguard.com"
       port         = "12913"
       myKeyB64     = "WAmgVYXkbT2bCtdcDwolI88/iVi/aV3/PHcUBTQSYmo=" -- private key
       serverKeyB64 = "qRCwZSKInrMAq5sepfCdaCsRJaoLe5jhtzfiw7CjbwM=" -- public key
diff --git a/contrib/external-tests/rust/src/main.rs b/contrib/external-tests/rust/src/main.rs
index 9fb0f5a..fdd220e 100644
--- a/contrib/external-tests/rust/src/main.rs
+++ b/contrib/external-tests/rust/src/main.rs
@@ -17,7 +17,7 @@ use pnet::packet::icmp::{MutableIcmpPacket, IcmpTypes, echo_reply, echo_request,
 use std::net::*;
 use std::str::FromStr;
 
-static TEST_SERVER: &'static str = "demo.wireguard.io:12913";
+static TEST_SERVER: &'static str = "demo.wireguard.com:12913";
 
 fn memcpy(out: &mut [u8], data: &[u8]) {
 	out[..data.len()].copy_from_slice(data);
diff --git a/contrib/nat-hole-punching/nat-punch-client.c b/contrib/nat-hole-punching/nat-punch-client.c
index 65f3249..aa00d35 100644
--- a/contrib/nat-hole-punching/nat-punch-client.c
+++ b/contrib/nat-hole-punching/nat-punch-client.c
@@ -140,7 +140,7 @@ int main(int argc, char *argv[])
 	const char *server = argv[1], *interface = argv[2];
 
 	if (argc < 3) {
-		fprintf(stderr, "Usage: %s SERVER WIREGUARD_INTERFACE\nExample:\n    %s demo.wireguard.io wg0\n", argv[0], argv[0]);
+		fprintf(stderr, "Usage: %s SERVER WIREGUARD_INTERFACE\nExample:\n    %s demo.wireguard.com wg0\n", argv[0], argv[0]);
 		return EINVAL;
 	}
 
diff --git a/contrib/ncat-client-server/README b/contrib/ncat-client-server/README
index f584829..0c0667a 100644
--- a/contrib/ncat-client-server/README
+++ b/contrib/ncat-client-server/README
@@ -11,6 +11,6 @@ That all said, this is a pretty cool example of just how
 darn easy WireGuard can be.
 
 Disclaimer:
-  The `demo.wireguard.io` server in client.sh is for testing
+  The `demo.wireguard.com` server in client.sh is for testing
   purposes only. You may not use this server for abusive or
   illegal purposes.
diff --git a/contrib/ncat-client-server/client.sh b/contrib/ncat-client-server/client.sh
index b49a05e..1d30f49 100755
--- a/contrib/ncat-client-server/client.sh
+++ b/contrib/ncat-client-server/client.sh
@@ -6,13 +6,13 @@ set -e
 [[ $UID == 0 ]] || { echo "You must be root to run this."; exit 1; }
 umask 077
 trap 'rm -f /tmp/wg_private_key' EXIT INT TERM
-exec 3<>/dev/tcp/demo.wireguard.io/42912
+exec 3<>/dev/tcp/demo.wireguard.com/42912
 wg genkey | tee /tmp/wg_private_key | wg pubkey >&3
 IFS=: read -r status server_pubkey server_port internal_ip <&3
 [[ $status == OK ]]
 ip link del dev wg0 2>/dev/null || true
 ip link add dev wg0 type wireguard
-wg set wg0 private-key /tmp/wg_private_key peer "$server_pubkey" allowed-ips 0.0.0.0/0 endpoint "demo.wireguard.io:$server_port" persistent-keepalive 25
+wg set wg0 private-key /tmp/wg_private_key peer "$server_pubkey" allowed-ips 0.0.0.0/0 endpoint "demo.wireguard.com:$server_port" persistent-keepalive 25
 ip address add "$internal_ip"/24 dev wg0
 ip link set up dev wg0
 if [ "$1" == "default-route" ]; then
diff --git a/src/wg-quick.8 b/src/wg-quick.8
index ceee026..04653a8 100644
--- a/src/wg-quick.8
+++ b/src/wg-quick.8
@@ -114,7 +114,7 @@ traffic:
 .br
     AllowedIPs = 0.0.0.0/0 
 .br
-    Endpoint = demo.wireguard.io:51820 
+    Endpoint = demo.wireguard.com:51820 
 .br
 
 Notice that the `PostUp` and `PostDown` commands are used here to configure DNS using
@@ -193,6 +193,6 @@ was written by
 Jason A. Donenfeld
 .ME .
 For updates and more information, a project page is available on the
-.UR https://\:www.wireguard.io/
+.UR https://\:www.wireguard.com/
 World Wide Web
 .UE .
diff --git a/src/wg-quick@.service b/src/wg-quick@.service
index f5f4e8f..ce6d70a 100644
--- a/src/wg-quick@.service
+++ b/src/wg-quick@.service
@@ -4,8 +4,8 @@ After=network-online.target
 Wants=network-online.target
 Documentation=man:wg-quick(8)
 Documentation=man:wg(8)
-Documentation=https://www.wireguard.io/
-Documentation=https://www.wireguard.io/quickstart/
+Documentation=https://www.wireguard.com/
+Documentation=https://www.wireguard.com/quickstart/
 Documentation=https://git.zx2c4.com/WireGuard/about/src/tools/wg-quick.8
 Documentation=https://git.zx2c4.com/WireGuard/about/src/tools/wg.8
 
diff --git a/src/wg.8 b/src/wg.8
index 1517432..612fb4e 100644
--- a/src/wg.8
+++ b/src/wg.8
@@ -200,7 +200,7 @@ ignored.
 .br
     PublicKey = gN65BkIKy1eCE9pP1wdc8ROUtkHLF2PfAqYdyYBz6EA=
 .br
-    Endpoint = test.wireguard.io:18981
+    Endpoint = test.wireguard.com:18981
 .br
     AllowedIPs = 10.10.10.230/32
 
@@ -225,6 +225,6 @@ was written by
 Jason A. Donenfeld
 .ME .
 For updates and more information, a project page is available on the
-.UR https://\:www.wireguard.io/
+.UR https://\:www.wireguard.com/
 World Wide Web
 .UE .