IPFire 2.29 - Core Update 195 Testing: WireGuard and More

Hello IPFire community,

We’ve just rolled out IPFire 2.29 - Core Update 195 for testing!

This update brings a range of new features and improvements, and we need your help to ensure everything works smoothly before the official release.

One of the highlights is the addition of WireGuard VPN support :partying_face: a modern, lightweight VPN protocol known for its simplicity and performance.

Here’s what you can explore with WireGuard in this update:

  • Full integration into the IPFire WUI.
  • Support for net-to-net and host-to-net (Roadwarrior) connections.
  • Multiple peer configurations with individual settings.
  • QR code display and config file export for quick mobile setup.
  • A WireGuard config importer.
  • Full support for Intrusion Prevention System and Connection Tracking.

WireGuard can run alongside existing VPN services, offering a separate option for secure connections. Check out the WireGuard documentation for setup details:

This update also includes other enhancements, like updated packages (e.g., OpenSSH 10.0.p1, OpenSSL 3.5.0) and usability improvements to Pakfire. You can read the full list of improvements on the blog

How to Help with Testing
This is a testing phase, not the final release, your feedback is crucial! Please:

  • Test WireGuard and other new features in your environment.
  • Report any bugs, performance issues, or suggestions.
  • Share your experiences to help us refine this update.

We’re looking forward to hearing your thoughts!

A Quick Reminder
IPFire is free to use, but it’s not free to develop and maintain. Your donations keep this project alive and help us add new features like this. If you’re able, please consider supporting us at www.ipfire.org - Donate Every contribution makes a difference!

Cheers,
A G

11 Likes

Wooow. Works for me Ok in FriendlyElec NanoPi R4S. Thanks!!!.

Good works guys!!!. :+1:

Saludos.

1 Like

I have found that the backup only saves the settings file and not the peers file so only the global settings get restored.

Patch has been submitted to fix that.

6 Likes

Also went smoothly for me. I upgraded, from CU 194 Testing, via WUI, without problems. This testing installation is on x86_64 hardware. I use few addons.

2 Likes

Very nice! Any indications yet on whether throughput is improved over OpenVPN?

1 Like

Technically, the throughput should be better than OpenVPN. We tested throughput from IPFire’s data centre to my ISP, but I think some external QoS was limiting us somewhere at around 500 Mbps.

Also, enabling IPS on WireGuard can slow down throughput if the hardware’s CPU isn’t up to scratch.

Thanks,
A G

1 Like

Reported online help link missing from the WireGuard WUI page.

1 Like

Do I think correctly that the Wireguard Client Pool should be different from the OpenVPN subnet address range , OpenVPN Static IP address pools , IPsec Host-to-Net Virtual Private Network (RoadWarrior)?

Regards

Yes they all would have to be distinct subnets. They cannot overlap.

3 Likes

Thank you for your confirmation.
Would such a Note, at the end of the Wireguard Wiki page, be correct?

1 Like

change “should be different” to “must be different”.

1 Like

Yes, of course.
Already corrected.

2 Likes

Yesterday I ran simple tests between
IPFire 2.29 (x86_64) - Core-Update 195 Development Build: master/4e8f4314

and

  1. Wireguard v0.5.3 client on Windows 10 Pro 19045.5854
  • import settings from .conf file without any problems
  • I was able to connect to remote resources
  1. Wireguard client v1.0.20250516 on Android 15
  • import settings from .conf file without any problems
  • import settings from QR code without any problems
  • I could connect to remote resources

Regards

1 Like

The update went well, but I have noticed the IPS logs are not working.


The system is running just not logging. It did work in 194.

On your IPS page (cgi-bin/ids.cgi), which interfaces have you enabled?

I’ve noticed that in the /var/ipfire/suricata/suricata-homenet.yaml file, when both WireGuard and IPS scanning for WG are enabled, the subnet of the WG interface doesn’t appear in the file. I’m not entirely sure if this is expected though.

Thanks,
A G

Only have Red and green enabled.

1 Like

This bug has been reported and a patch has been submitted. Hopefully in the next few days we’ll have an updated testing build with the the identified bugs fixed.

Thanks,
A G

Thanks for the help. Will look out for the update and let you know.

IMHO it would make more sense to have IPfire prevent configuring overlapping ranges in the first place (don’t know if this happens, but sounds like it does not).

Of course, yes. However, it requires additional work by developers to implement the additional code .
IMHO without this additional feature IPFire2 will work, and the time for additional work is better spent on the development of version 3 of IPFire.

Regards

1 Like