Skip to content

Commit

Permalink
global: wireguard.io --> wireguard.com
Browse files Browse the repository at this point in the history
Due to concerns with the .io TLD, we are switching to using
wireguard.com instead.
  • Loading branch information
zx2c4 committed Jul 20, 2017
1 parent 4ac87cf commit 006984a
Show file tree
Hide file tree
Showing 15 changed files with 19 additions and 19 deletions.
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@

WireGuard is a novel VPN that runs inside the Linux Kernel and utilizes **state-of-the-art cryptography**. It aims to be faster, simpler, leaner, and more useful than IPSec, while avoiding the massive headache. It intends to be considerably more performant than OpenVPN. WireGuard is designed as a general purpose VPN for running on embedded interfaces and super computers alike, fit for many different circumstances. It runs over UDP.

**More information may be found at [WireGuard.io](https://www.wireguard.io/).**
**More information may be found at [WireGuard.com](https://www.wireguard.com/).**

## License

Expand Down
2 changes: 1 addition & 1 deletion contrib/examples/nat-hole-punching/nat-punch-client.c
Original file line number Diff line number Diff line change
Expand Up @@ -140,7 +140,7 @@ int main(int argc, char *argv[])
const char *server = argv[1], *interface = argv[2];

if (argc < 3) {
fprintf(stderr, "Usage: %s SERVER WIREGUARD_INTERFACE\nExample:\n %s demo.wireguard.io wg0\n", argv[0], argv[0]);
fprintf(stderr, "Usage: %s SERVER WIREGUARD_INTERFACE\nExample:\n %s demo.wireguard.com wg0\n", argv[0], argv[0]);
return EINVAL;
}

Expand Down
2 changes: 1 addition & 1 deletion contrib/examples/ncat-client-server/README
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,6 @@ That all said, this is a pretty cool example of just how
darn easy WireGuard can be.

Disclaimer:
The `demo.wireguard.io` server in client.sh is for testing
The `demo.wireguard.com` server in client.sh is for testing
purposes only. You may not use this server for abusive or
illegal purposes.
4 changes: 2 additions & 2 deletions contrib/examples/ncat-client-server/client.sh
Original file line number Diff line number Diff line change
Expand Up @@ -6,13 +6,13 @@ set -e
[[ $UID == 0 ]] || { echo "You must be root to run this."; exit 1; }
umask 077
trap 'rm -f /tmp/wg_private_key' EXIT INT TERM
exec 3<>/dev/tcp/demo.wireguard.io/42912
exec 3<>/dev/tcp/demo.wireguard.com/42912
wg genkey | tee /tmp/wg_private_key | wg pubkey >&3
IFS=: read -r status server_pubkey server_port internal_ip <&3
[[ $status == OK ]]
ip link del dev wg0 2>/dev/null || true
ip link add dev wg0 type wireguard
wg set wg0 private-key /tmp/wg_private_key peer "$server_pubkey" allowed-ips 0.0.0.0/0 endpoint "demo.wireguard.io:$server_port" persistent-keepalive 25
wg set wg0 private-key /tmp/wg_private_key peer "$server_pubkey" allowed-ips 0.0.0.0/0 endpoint "demo.wireguard.com:$server_port" persistent-keepalive 25
ip address add "$internal_ip"/24 dev wg0
ip link set up dev wg0
if [ "$1" == "default-route" ]; then
Expand Down
2 changes: 1 addition & 1 deletion contrib/external-tests/go/main.go
Original file line number Diff line number Diff line change
Expand Up @@ -51,7 +51,7 @@ func main() {
StaticKeypair: noise.DHKey{Private: ourPrivate, Public: ourPublic},
PeerStatic: theirPublic,
})
conn, err := net.Dial("udp", "demo.wireguard.io:12913")
conn, err := net.Dial("udp", "demo.wireguard.com:12913")
if err != nil {
log.Fatalf("error dialing udp socket: %s", err)
}
Expand Down
2 changes: 1 addition & 1 deletion contrib/external-tests/haskell/src/Main.hs
Original file line number Diff line number Diff line change
Expand Up @@ -57,7 +57,7 @@ unsafeMessage write mpsk msg ns = case operation msg ns of

main :: IO ()
main = do
let ip = "demo.wireguard.io"
let ip = "demo.wireguard.com"
port = "12913"
myKeyB64 = "WAmgVYXkbT2bCtdcDwolI88/iVi/aV3/PHcUBTQSYmo=" -- private key
serverKeyB64 = "qRCwZSKInrMAq5sepfCdaCsRJaoLe5jhtzfiw7CjbwM=" -- public key
Expand Down
2 changes: 1 addition & 1 deletion contrib/external-tests/rust/src/main.rs
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ use pnet::packet::icmp::{MutableIcmpPacket, IcmpTypes, echo_reply, echo_request,
use std::net::*;
use std::str::FromStr;

static TEST_SERVER: &'static str = "demo.wireguard.io:12913";
static TEST_SERVER: &'static str = "demo.wireguard.com:12913";

fn memcpy(out: &mut [u8], data: &[u8]) {
out[..data.len()].copy_from_slice(data);
Expand Down
2 changes: 1 addition & 1 deletion src/Kconfig
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ config WIREGUARD
that uses modern cryptography and clever networking tricks. It's
designed to be fairly general purpose and abstract enough to fit most
use cases, while at the same time remaining extremely simple to
configure. See www.wireguard.io for more info.
configure. See www.wireguard.com for more info.

It's safe to say Y or M here, as the driver is very lightweight and
is only in use when an administrator chooses to add an interface.
Expand Down
2 changes: 1 addition & 1 deletion src/main.c
Original file line number Diff line number Diff line change
Expand Up @@ -37,7 +37,7 @@ static int __init mod_init(void)
if (ret < 0)
goto err_device;

pr_info("WireGuard " WIREGUARD_VERSION " loaded. See www.wireguard.io for information.\n");
pr_info("WireGuard " WIREGUARD_VERSION " loaded. See www.wireguard.com for information.\n");
pr_info("Copyright (C) 2015-2017 Jason A. Donenfeld <[email protected]>. All Rights Reserved.\n");

return 0;
Expand Down
2 changes: 1 addition & 1 deletion src/tests/netns.sh
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@
#
# After the topology is prepared we run a series of TCP/UDP iperf3 tests between the
# wireguard peers in $ns1 and $ns2. Note that $ns0 is the endpoint for the wg0
# interfaces in $ns1 and $ns2. See https://www.wireguard.io/netns/ for further
# interfaces in $ns1 and $ns2. See https://www.wireguard.com/netns/ for further
# details on how this is accomplished.
set -e

Expand Down
2 changes: 1 addition & 1 deletion src/tests/qemu/Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ NR_CPUS ?= 2

DOWNLOAD := wget -O
# DOWNLOAD := curl -f -o
MIRROR := https://download.wireguard.io/qemu-test/distfiles/
MIRROR := https://download.wireguard.com/qemu-test/distfiles/

CHOST := $(shell gcc -dumpmachine)
ARCH := $(shell uname -m)
Expand Down
2 changes: 1 addition & 1 deletion src/tests/qemu/init.c
Original file line number Diff line number Diff line change
Expand Up @@ -129,7 +129,7 @@ static void kmod_selftests(void)
continue;
start += 11;
*strchrnul(start, '\n') = '\0';
if (strstr(start, "www.wireguard.io"))
if (strstr(start, "www.wireguard.com"))
break;
pass = strstr(start, ": pass");
if (!pass || pass[6] != '\0') {
Expand Down
4 changes: 2 additions & 2 deletions src/tools/wg-quick.8
Original file line number Diff line number Diff line change
Expand Up @@ -114,7 +114,7 @@ traffic:
.br
AllowedIPs = 0.0.0.0/0
.br
Endpoint = demo.wireguard.io:51820
Endpoint = demo.wireguard.com:51820
.br

Notice that the `PostUp` and `PostDown` commands are used here to configure DNS using
Expand Down Expand Up @@ -193,6 +193,6 @@ was written by
Jason A. Donenfeld
.ME .
For updates and more information, a project page is available on the
.UR https://\:www.wireguard.io/
.UR https://\:www.wireguard.com/
World Wide Web
.UE .
4 changes: 2 additions & 2 deletions src/tools/[email protected]
Original file line number Diff line number Diff line change
Expand Up @@ -4,8 +4,8 @@ After=network-online.target
Wants=network-online.target
Documentation=man:wg-quick(8)
Documentation=man:wg(8)
Documentation=https://www.wireguard.io/
Documentation=https://www.wireguard.io/quickstart/
Documentation=https://www.wireguard.com/
Documentation=https://www.wireguard.com/quickstart/
Documentation=https://git.zx2c4.com/WireGuard/about/src/tools/wg-quick.8
Documentation=https://git.zx2c4.com/WireGuard/about/src/tools/wg.8

Expand Down
4 changes: 2 additions & 2 deletions src/tools/wg.8
Original file line number Diff line number Diff line change
Expand Up @@ -200,7 +200,7 @@ ignored.
.br
PublicKey = gN65BkIKy1eCE9pP1wdc8ROUtkHLF2PfAqYdyYBz6EA=
.br
Endpoint = test.wireguard.io:18981
Endpoint = test.wireguard.com:18981
.br
AllowedIPs = 10.10.10.230/32

Expand All @@ -225,6 +225,6 @@ was written by
Jason A. Donenfeld
.ME .
For updates and more information, a project page is available on the
.UR https://\:www.wireguard.io/
.UR https://\:www.wireguard.com/
World Wide Web
.UE .

0 comments on commit 006984a

Please sign in to comment.