diff options
author | Jason A. Donenfeld <Jason@zx2c4.com> | 2017-07-16 16:12:20 +0200 |
---|---|---|
committer | Jason A. Donenfeld <Jason@zx2c4.com> | 2017-07-20 03:37:39 +0200 |
commit | 006984ab3ff48831149290ea7c4bed97951929c1 (patch) | |
tree | 00b303006a2643d157f210e9b38cb2625685082a | |
parent | blake2s: fix up alignment issues (diff) | |
download | wireguard-monolithic-historical-006984ab3ff48831149290ea7c4bed97951929c1.tar.xz wireguard-monolithic-historical-006984ab3ff48831149290ea7c4bed97951929c1.zip |
global: wireguard.io --> wireguard.com
Due to concerns with the .io TLD, we are switching to using
wireguard.com instead.
-rw-r--r-- | README.md | 2 | ||||
-rw-r--r-- | contrib/examples/nat-hole-punching/nat-punch-client.c | 2 | ||||
-rw-r--r-- | contrib/examples/ncat-client-server/README | 2 | ||||
-rwxr-xr-x | contrib/examples/ncat-client-server/client.sh | 4 | ||||
-rw-r--r-- | contrib/external-tests/go/main.go | 2 | ||||
-rw-r--r-- | contrib/external-tests/haskell/src/Main.hs | 2 | ||||
-rw-r--r-- | contrib/external-tests/rust/src/main.rs | 2 | ||||
-rw-r--r-- | src/Kconfig | 2 | ||||
-rw-r--r-- | src/main.c | 2 | ||||
-rwxr-xr-x | src/tests/netns.sh | 2 | ||||
-rw-r--r-- | src/tests/qemu/Makefile | 2 | ||||
-rw-r--r-- | src/tests/qemu/init.c | 2 | ||||
-rw-r--r-- | src/tools/wg-quick.8 | 4 | ||||
-rw-r--r-- | src/tools/wg-quick@.service | 4 | ||||
-rw-r--r-- | src/tools/wg.8 | 4 |
15 files changed, 19 insertions, 19 deletions
@@ -3,7 +3,7 @@ WireGuard is a novel VPN that runs inside the Linux Kernel and utilizes **state-of-the-art cryptography**. It aims to be faster, simpler, leaner, and more useful than IPSec, while avoiding the massive headache. It intends to be considerably more performant than OpenVPN. WireGuard is designed as a general purpose VPN for running on embedded interfaces and super computers alike, fit for many different circumstances. It runs over UDP. -**More information may be found at [WireGuard.io](https://www.wireguard.io/).** +**More information may be found at [WireGuard.com](https://www.wireguard.com/).** ## License diff --git a/contrib/examples/nat-hole-punching/nat-punch-client.c b/contrib/examples/nat-hole-punching/nat-punch-client.c index 65f3249..aa00d35 100644 --- a/contrib/examples/nat-hole-punching/nat-punch-client.c +++ b/contrib/examples/nat-hole-punching/nat-punch-client.c @@ -140,7 +140,7 @@ int main(int argc, char *argv[]) const char *server = argv[1], *interface = argv[2]; if (argc < 3) { - fprintf(stderr, "Usage: %s SERVER WIREGUARD_INTERFACE\nExample:\n %s demo.wireguard.io wg0\n", argv[0], argv[0]); + fprintf(stderr, "Usage: %s SERVER WIREGUARD_INTERFACE\nExample:\n %s demo.wireguard.com wg0\n", argv[0], argv[0]); return EINVAL; } diff --git a/contrib/examples/ncat-client-server/README b/contrib/examples/ncat-client-server/README index f584829..0c0667a 100644 --- a/contrib/examples/ncat-client-server/README +++ b/contrib/examples/ncat-client-server/README @@ -11,6 +11,6 @@ That all said, this is a pretty cool example of just how darn easy WireGuard can be. Disclaimer: - The `demo.wireguard.io` server in client.sh is for testing + The `demo.wireguard.com` server in client.sh is for testing purposes only. You may not use this server for abusive or illegal purposes. diff --git a/contrib/examples/ncat-client-server/client.sh b/contrib/examples/ncat-client-server/client.sh index b49a05e..1d30f49 100755 --- a/contrib/examples/ncat-client-server/client.sh +++ b/contrib/examples/ncat-client-server/client.sh @@ -6,13 +6,13 @@ set -e [[ $UID == 0 ]] || { echo "You must be root to run this."; exit 1; } umask 077 trap 'rm -f /tmp/wg_private_key' EXIT INT TERM -exec 3<>/dev/tcp/demo.wireguard.io/42912 +exec 3<>/dev/tcp/demo.wireguard.com/42912 wg genkey | tee /tmp/wg_private_key | wg pubkey >&3 IFS=: read -r status server_pubkey server_port internal_ip <&3 [[ $status == OK ]] ip link del dev wg0 2>/dev/null || true ip link add dev wg0 type wireguard -wg set wg0 private-key /tmp/wg_private_key peer "$server_pubkey" allowed-ips 0.0.0.0/0 endpoint "demo.wireguard.io:$server_port" persistent-keepalive 25 +wg set wg0 private-key /tmp/wg_private_key peer "$server_pubkey" allowed-ips 0.0.0.0/0 endpoint "demo.wireguard.com:$server_port" persistent-keepalive 25 ip address add "$internal_ip"/24 dev wg0 ip link set up dev wg0 if [ "$1" == "default-route" ]; then diff --git a/contrib/external-tests/go/main.go b/contrib/external-tests/go/main.go index e3627f3..9b60636 100644 --- a/contrib/external-tests/go/main.go +++ b/contrib/external-tests/go/main.go @@ -51,7 +51,7 @@ func main() { StaticKeypair: noise.DHKey{Private: ourPrivate, Public: ourPublic}, PeerStatic: theirPublic, }) - conn, err := net.Dial("udp", "demo.wireguard.io:12913") + conn, err := net.Dial("udp", "demo.wireguard.com:12913") if err != nil { log.Fatalf("error dialing udp socket: %s", err) } diff --git a/contrib/external-tests/haskell/src/Main.hs b/contrib/external-tests/haskell/src/Main.hs index b0b7503..7863829 100644 --- a/contrib/external-tests/haskell/src/Main.hs +++ b/contrib/external-tests/haskell/src/Main.hs @@ -57,7 +57,7 @@ unsafeMessage write mpsk msg ns = case operation msg ns of main :: IO () main = do - let ip = "demo.wireguard.io" + let ip = "demo.wireguard.com" port = "12913" myKeyB64 = "WAmgVYXkbT2bCtdcDwolI88/iVi/aV3/PHcUBTQSYmo=" -- private key serverKeyB64 = "qRCwZSKInrMAq5sepfCdaCsRJaoLe5jhtzfiw7CjbwM=" -- public key diff --git a/contrib/external-tests/rust/src/main.rs b/contrib/external-tests/rust/src/main.rs index 9fb0f5a..fdd220e 100644 --- a/contrib/external-tests/rust/src/main.rs +++ b/contrib/external-tests/rust/src/main.rs @@ -17,7 +17,7 @@ use pnet::packet::icmp::{MutableIcmpPacket, IcmpTypes, echo_reply, echo_request, use std::net::*; use std::str::FromStr; -static TEST_SERVER: &'static str = "demo.wireguard.io:12913"; +static TEST_SERVER: &'static str = "demo.wireguard.com:12913"; fn memcpy(out: &mut [u8], data: &[u8]) { out[..data.len()].copy_from_slice(data); diff --git a/src/Kconfig b/src/Kconfig index f2e25bb..e86a935 100644 --- a/src/Kconfig +++ b/src/Kconfig @@ -11,7 +11,7 @@ config WIREGUARD that uses modern cryptography and clever networking tricks. It's designed to be fairly general purpose and abstract enough to fit most use cases, while at the same time remaining extremely simple to - configure. See www.wireguard.io for more info. + configure. See www.wireguard.com for more info. It's safe to say Y or M here, as the driver is very lightweight and is only in use when an administrator chooses to add an interface. @@ -37,7 +37,7 @@ static int __init mod_init(void) if (ret < 0) goto err_device; - pr_info("WireGuard " WIREGUARD_VERSION " loaded. See www.wireguard.io for information.\n"); + pr_info("WireGuard " WIREGUARD_VERSION " loaded. See www.wireguard.com for information.\n"); pr_info("Copyright (C) 2015-2017 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.\n"); return 0; diff --git a/src/tests/netns.sh b/src/tests/netns.sh index 72f6333..4c60e95 100755 --- a/src/tests/netns.sh +++ b/src/tests/netns.sh @@ -18,7 +18,7 @@ # # After the topology is prepared we run a series of TCP/UDP iperf3 tests between the # wireguard peers in $ns1 and $ns2. Note that $ns0 is the endpoint for the wg0 -# interfaces in $ns1 and $ns2. See https://www.wireguard.io/netns/ for further +# interfaces in $ns1 and $ns2. See https://www.wireguard.com/netns/ for further # details on how this is accomplished. set -e diff --git a/src/tests/qemu/Makefile b/src/tests/qemu/Makefile index 9dbcc51..05081cd 100644 --- a/src/tests/qemu/Makefile +++ b/src/tests/qemu/Makefile @@ -10,7 +10,7 @@ NR_CPUS ?= 2 DOWNLOAD := wget -O # DOWNLOAD := curl -f -o -MIRROR := https://download.wireguard.io/qemu-test/distfiles/ +MIRROR := https://download.wireguard.com/qemu-test/distfiles/ CHOST := $(shell gcc -dumpmachine) ARCH := $(shell uname -m) diff --git a/src/tests/qemu/init.c b/src/tests/qemu/init.c index 38df1aa..ea578c1 100644 --- a/src/tests/qemu/init.c +++ b/src/tests/qemu/init.c @@ -129,7 +129,7 @@ static void kmod_selftests(void) continue; start += 11; *strchrnul(start, '\n') = '\0'; - if (strstr(start, "www.wireguard.io")) + if (strstr(start, "www.wireguard.com")) break; pass = strstr(start, ": pass"); if (!pass || pass[6] != '\0') { diff --git a/src/tools/wg-quick.8 b/src/tools/wg-quick.8 index ceee026..04653a8 100644 --- a/src/tools/wg-quick.8 +++ b/src/tools/wg-quick.8 @@ -114,7 +114,7 @@ traffic: .br AllowedIPs = 0.0.0.0/0 .br - Endpoint = demo.wireguard.io:51820 + Endpoint = demo.wireguard.com:51820 .br Notice that the `PostUp` and `PostDown` commands are used here to configure DNS using @@ -193,6 +193,6 @@ was written by Jason A. Donenfeld .ME . For updates and more information, a project page is available on the -.UR https://\:www.wireguard.io/ +.UR https://\:www.wireguard.com/ World Wide Web .UE . diff --git a/src/tools/wg-quick@.service b/src/tools/wg-quick@.service index f5f4e8f..ce6d70a 100644 --- a/src/tools/wg-quick@.service +++ b/src/tools/wg-quick@.service @@ -4,8 +4,8 @@ After=network-online.target Wants=network-online.target Documentation=man:wg-quick(8) Documentation=man:wg(8) -Documentation=https://www.wireguard.io/ -Documentation=https://www.wireguard.io/quickstart/ +Documentation=https://www.wireguard.com/ +Documentation=https://www.wireguard.com/quickstart/ Documentation=https://git.zx2c4.com/WireGuard/about/src/tools/wg-quick.8 Documentation=https://git.zx2c4.com/WireGuard/about/src/tools/wg.8 diff --git a/src/tools/wg.8 b/src/tools/wg.8 index 1517432..612fb4e 100644 --- a/src/tools/wg.8 +++ b/src/tools/wg.8 @@ -200,7 +200,7 @@ ignored. .br PublicKey = gN65BkIKy1eCE9pP1wdc8ROUtkHLF2PfAqYdyYBz6EA= .br - Endpoint = test.wireguard.io:18981 + Endpoint = test.wireguard.com:18981 .br AllowedIPs = 10.10.10.230/32 @@ -225,6 +225,6 @@ was written by Jason A. Donenfeld .ME . For updates and more information, a project page is available on the -.UR https://\:www.wireguard.io/ +.UR https://\:www.wireguard.com/ World Wide Web .UE . |