aboutsummaryrefslogtreecommitdiffstatshomepage
diff options
context:
space:
mode:
authorJason A. Donenfeld <Jason@zx2c4.com>2017-07-16 16:12:20 +0200
committerJason A. Donenfeld <Jason@zx2c4.com>2017-07-20 03:37:39 +0200
commit006984ab3ff48831149290ea7c4bed97951929c1 (patch)
tree00b303006a2643d157f210e9b38cb2625685082a
parentblake2s: fix up alignment issues (diff)
downloadwireguard-monolithic-historical-006984ab3ff48831149290ea7c4bed97951929c1.tar.xz
wireguard-monolithic-historical-006984ab3ff48831149290ea7c4bed97951929c1.zip
global: wireguard.io --> wireguard.com
Due to concerns with the .io TLD, we are switching to using wireguard.com instead.
-rw-r--r--README.md2
-rw-r--r--contrib/examples/nat-hole-punching/nat-punch-client.c2
-rw-r--r--contrib/examples/ncat-client-server/README2
-rwxr-xr-xcontrib/examples/ncat-client-server/client.sh4
-rw-r--r--contrib/external-tests/go/main.go2
-rw-r--r--contrib/external-tests/haskell/src/Main.hs2
-rw-r--r--contrib/external-tests/rust/src/main.rs2
-rw-r--r--src/Kconfig2
-rw-r--r--src/main.c2
-rwxr-xr-xsrc/tests/netns.sh2
-rw-r--r--src/tests/qemu/Makefile2
-rw-r--r--src/tests/qemu/init.c2
-rw-r--r--src/tools/wg-quick.84
-rw-r--r--src/tools/wg-quick@.service4
-rw-r--r--src/tools/wg.84
15 files changed, 19 insertions, 19 deletions
diff --git a/README.md b/README.md
index 0f6e1c5..08f8827 100644
--- a/README.md
+++ b/README.md
@@ -3,7 +3,7 @@
WireGuard is a novel VPN that runs inside the Linux Kernel and utilizes **state-of-the-art cryptography**. It aims to be faster, simpler, leaner, and more useful than IPSec, while avoiding the massive headache. It intends to be considerably more performant than OpenVPN. WireGuard is designed as a general purpose VPN for running on embedded interfaces and super computers alike, fit for many different circumstances. It runs over UDP.
-**More information may be found at [WireGuard.io](https://www.wireguard.io/).**
+**More information may be found at [WireGuard.com](https://www.wireguard.com/).**
## License
diff --git a/contrib/examples/nat-hole-punching/nat-punch-client.c b/contrib/examples/nat-hole-punching/nat-punch-client.c
index 65f3249..aa00d35 100644
--- a/contrib/examples/nat-hole-punching/nat-punch-client.c
+++ b/contrib/examples/nat-hole-punching/nat-punch-client.c
@@ -140,7 +140,7 @@ int main(int argc, char *argv[])
const char *server = argv[1], *interface = argv[2];
if (argc < 3) {
- fprintf(stderr, "Usage: %s SERVER WIREGUARD_INTERFACE\nExample:\n %s demo.wireguard.io wg0\n", argv[0], argv[0]);
+ fprintf(stderr, "Usage: %s SERVER WIREGUARD_INTERFACE\nExample:\n %s demo.wireguard.com wg0\n", argv[0], argv[0]);
return EINVAL;
}
diff --git a/contrib/examples/ncat-client-server/README b/contrib/examples/ncat-client-server/README
index f584829..0c0667a 100644
--- a/contrib/examples/ncat-client-server/README
+++ b/contrib/examples/ncat-client-server/README
@@ -11,6 +11,6 @@ That all said, this is a pretty cool example of just how
darn easy WireGuard can be.
Disclaimer:
- The `demo.wireguard.io` server in client.sh is for testing
+ The `demo.wireguard.com` server in client.sh is for testing
purposes only. You may not use this server for abusive or
illegal purposes.
diff --git a/contrib/examples/ncat-client-server/client.sh b/contrib/examples/ncat-client-server/client.sh
index b49a05e..1d30f49 100755
--- a/contrib/examples/ncat-client-server/client.sh
+++ b/contrib/examples/ncat-client-server/client.sh
@@ -6,13 +6,13 @@ set -e
[[ $UID == 0 ]] || { echo "You must be root to run this."; exit 1; }
umask 077
trap 'rm -f /tmp/wg_private_key' EXIT INT TERM
-exec 3<>/dev/tcp/demo.wireguard.io/42912
+exec 3<>/dev/tcp/demo.wireguard.com/42912
wg genkey | tee /tmp/wg_private_key | wg pubkey >&3
IFS=: read -r status server_pubkey server_port internal_ip <&3
[[ $status == OK ]]
ip link del dev wg0 2>/dev/null || true
ip link add dev wg0 type wireguard
-wg set wg0 private-key /tmp/wg_private_key peer "$server_pubkey" allowed-ips 0.0.0.0/0 endpoint "demo.wireguard.io:$server_port" persistent-keepalive 25
+wg set wg0 private-key /tmp/wg_private_key peer "$server_pubkey" allowed-ips 0.0.0.0/0 endpoint "demo.wireguard.com:$server_port" persistent-keepalive 25
ip address add "$internal_ip"/24 dev wg0
ip link set up dev wg0
if [ "$1" == "default-route" ]; then
diff --git a/contrib/external-tests/go/main.go b/contrib/external-tests/go/main.go
index e3627f3..9b60636 100644
--- a/contrib/external-tests/go/main.go
+++ b/contrib/external-tests/go/main.go
@@ -51,7 +51,7 @@ func main() {
StaticKeypair: noise.DHKey{Private: ourPrivate, Public: ourPublic},
PeerStatic: theirPublic,
})
- conn, err := net.Dial("udp", "demo.wireguard.io:12913")
+ conn, err := net.Dial("udp", "demo.wireguard.com:12913")
if err != nil {
log.Fatalf("error dialing udp socket: %s", err)
}
diff --git a/contrib/external-tests/haskell/src/Main.hs b/contrib/external-tests/haskell/src/Main.hs
index b0b7503..7863829 100644
--- a/contrib/external-tests/haskell/src/Main.hs
+++ b/contrib/external-tests/haskell/src/Main.hs
@@ -57,7 +57,7 @@ unsafeMessage write mpsk msg ns = case operation msg ns of
main :: IO ()
main = do
- let ip = "demo.wireguard.io"
+ let ip = "demo.wireguard.com"
port = "12913"
myKeyB64 = "WAmgVYXkbT2bCtdcDwolI88/iVi/aV3/PHcUBTQSYmo=" -- private key
serverKeyB64 = "qRCwZSKInrMAq5sepfCdaCsRJaoLe5jhtzfiw7CjbwM=" -- public key
diff --git a/contrib/external-tests/rust/src/main.rs b/contrib/external-tests/rust/src/main.rs
index 9fb0f5a..fdd220e 100644
--- a/contrib/external-tests/rust/src/main.rs
+++ b/contrib/external-tests/rust/src/main.rs
@@ -17,7 +17,7 @@ use pnet::packet::icmp::{MutableIcmpPacket, IcmpTypes, echo_reply, echo_request,
use std::net::*;
use std::str::FromStr;
-static TEST_SERVER: &'static str = "demo.wireguard.io:12913";
+static TEST_SERVER: &'static str = "demo.wireguard.com:12913";
fn memcpy(out: &mut [u8], data: &[u8]) {
out[..data.len()].copy_from_slice(data);
diff --git a/src/Kconfig b/src/Kconfig
index f2e25bb..e86a935 100644
--- a/src/Kconfig
+++ b/src/Kconfig
@@ -11,7 +11,7 @@ config WIREGUARD
that uses modern cryptography and clever networking tricks. It's
designed to be fairly general purpose and abstract enough to fit most
use cases, while at the same time remaining extremely simple to
- configure. See www.wireguard.io for more info.
+ configure. See www.wireguard.com for more info.
It's safe to say Y or M here, as the driver is very lightweight and
is only in use when an administrator chooses to add an interface.
diff --git a/src/main.c b/src/main.c
index 91d8886..0697741 100644
--- a/src/main.c
+++ b/src/main.c
@@ -37,7 +37,7 @@ static int __init mod_init(void)
if (ret < 0)
goto err_device;
- pr_info("WireGuard " WIREGUARD_VERSION " loaded. See www.wireguard.io for information.\n");
+ pr_info("WireGuard " WIREGUARD_VERSION " loaded. See www.wireguard.com for information.\n");
pr_info("Copyright (C) 2015-2017 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.\n");
return 0;
diff --git a/src/tests/netns.sh b/src/tests/netns.sh
index 72f6333..4c60e95 100755
--- a/src/tests/netns.sh
+++ b/src/tests/netns.sh
@@ -18,7 +18,7 @@
#
# After the topology is prepared we run a series of TCP/UDP iperf3 tests between the
# wireguard peers in $ns1 and $ns2. Note that $ns0 is the endpoint for the wg0
-# interfaces in $ns1 and $ns2. See https://www.wireguard.io/netns/ for further
+# interfaces in $ns1 and $ns2. See https://www.wireguard.com/netns/ for further
# details on how this is accomplished.
set -e
diff --git a/src/tests/qemu/Makefile b/src/tests/qemu/Makefile
index 9dbcc51..05081cd 100644
--- a/src/tests/qemu/Makefile
+++ b/src/tests/qemu/Makefile
@@ -10,7 +10,7 @@ NR_CPUS ?= 2
DOWNLOAD := wget -O
# DOWNLOAD := curl -f -o
-MIRROR := https://download.wireguard.io/qemu-test/distfiles/
+MIRROR := https://download.wireguard.com/qemu-test/distfiles/
CHOST := $(shell gcc -dumpmachine)
ARCH := $(shell uname -m)
diff --git a/src/tests/qemu/init.c b/src/tests/qemu/init.c
index 38df1aa..ea578c1 100644
--- a/src/tests/qemu/init.c
+++ b/src/tests/qemu/init.c
@@ -129,7 +129,7 @@ static void kmod_selftests(void)
continue;
start += 11;
*strchrnul(start, '\n') = '\0';
- if (strstr(start, "www.wireguard.io"))
+ if (strstr(start, "www.wireguard.com"))
break;
pass = strstr(start, ": pass");
if (!pass || pass[6] != '\0') {
diff --git a/src/tools/wg-quick.8 b/src/tools/wg-quick.8
index ceee026..04653a8 100644
--- a/src/tools/wg-quick.8
+++ b/src/tools/wg-quick.8
@@ -114,7 +114,7 @@ traffic:
.br
AllowedIPs = 0.0.0.0/0
.br
- Endpoint = demo.wireguard.io:51820
+ Endpoint = demo.wireguard.com:51820
.br
Notice that the `PostUp` and `PostDown` commands are used here to configure DNS using
@@ -193,6 +193,6 @@ was written by
Jason A. Donenfeld
.ME .
For updates and more information, a project page is available on the
-.UR https://\:www.wireguard.io/
+.UR https://\:www.wireguard.com/
World Wide Web
.UE .
diff --git a/src/tools/wg-quick@.service b/src/tools/wg-quick@.service
index f5f4e8f..ce6d70a 100644
--- a/src/tools/wg-quick@.service
+++ b/src/tools/wg-quick@.service
@@ -4,8 +4,8 @@ After=network-online.target
Wants=network-online.target
Documentation=man:wg-quick(8)
Documentation=man:wg(8)
-Documentation=https://www.wireguard.io/
-Documentation=https://www.wireguard.io/quickstart/
+Documentation=https://www.wireguard.com/
+Documentation=https://www.wireguard.com/quickstart/
Documentation=https://git.zx2c4.com/WireGuard/about/src/tools/wg-quick.8
Documentation=https://git.zx2c4.com/WireGuard/about/src/tools/wg.8
diff --git a/src/tools/wg.8 b/src/tools/wg.8
index 1517432..612fb4e 100644
--- a/src/tools/wg.8
+++ b/src/tools/wg.8
@@ -200,7 +200,7 @@ ignored.
.br
PublicKey = gN65BkIKy1eCE9pP1wdc8ROUtkHLF2PfAqYdyYBz6EA=
.br
- Endpoint = test.wireguard.io:18981
+ Endpoint = test.wireguard.com:18981
.br
AllowedIPs = 10.10.10.230/32
@@ -225,6 +225,6 @@ was written by
Jason A. Donenfeld
.ME .
For updates and more information, a project page is available on the
-.UR https://\:www.wireguard.io/
+.UR https://\:www.wireguard.com/
World Wide Web
.UE .