Laurence ee27bf3153 Fix race condition in WireGuard session management
The race condition existed because while sync.Map is thread-safe for map
operations (Load, Store, Delete, Range), it does not provide thread-safety
for the data stored within it. When WireGuardSession structs were stored as
pointers in the sync.Map, multiple goroutines could:

1. Retrieve the same session pointer from the map concurrently
2. Access and modify the session's fields (particularly LastSeen) without
   synchronization
3. Cause data races when one goroutine reads LastSeen while another updates it

This fix adds a sync.RWMutex to each WireGuardSession struct to protect
concurrent access to its fields. All field access now goes through
thread-safe methods that properly acquire/release the mutex.

Changes:
- Added sync.RWMutex to WireGuardSession struct
- Added thread-safe accessor methods (GetLastSeen, GetDestAddr, etc.)
- Added atomic CheckAndUpdateIfMatch method for efficient check-and-update
- Updated all session field accesses to use thread-safe methods
- Removed redundant Store call after updating LastSeen (pointer update is
  atomic in Go, but field access within pointer was not)
2025-11-13 06:26:09 +00:00
2025-10-20 16:43:18 -07:00
2024-11-23 17:41:42 -05:00
2025-01-03 21:48:14 -05:00
2025-01-16 07:41:27 -05:00
2025-08-17 11:48:39 +00:00
2025-10-19 15:12:56 -07:00
2025-01-15 00:01:34 -05:00
2025-01-04 21:23:14 -05:00
2025-06-10 13:34:49 +02:00
2025-10-19 15:12:56 -07:00
2025-10-19 15:12:56 -07:00

Gerbil

Gerbil is a simple WireGuard interface management server written in Go. Gerbil makes it easy to create WireGuard interfaces as well as add and remove peers with an HTTP API.

Installation and Documentation

Gerbil works with Pangolin, Newt, and Olm as part of the larger system. See documentation below:

Key Functions

Setup WireGuard

A WireGuard interface will be created and configured on the local Linux machine or in the Docker container according to the values given in either a JSON config file or via the remote server. If the interface already exists, it will be reconfigured.

Manage Peers

Gerbil will create the peers defined in the config on the WireGuard interface. The HTTP API can be used to remove, create, and update peers on the interface dynamically.

Report Bandwidth

Bytes transmitted in and out of each peer are collected every 10 seconds, and incremental usage is reported via the api endpoint. This can be used to track data usage of each peer on the remote server.

Handle client relaying

Gerbil listens on port 21820 for incoming UDP hole punch packets to orchestrate NAT hole punching between olm and newt clients. Additionally, it handles relaying data through the gerbil server down to the newt. This is accomplished by scanning each packet for headers and handling them appropriately.

SNI Proxy

Gerbil includes an SNI (Server Name Indication) proxy that enables intelligent routing of HTTPS traffic between Pangolin nodes. When a TLS connection comes in, the proxy extracts the hostname from the SNI extension and queries Pangolin to determine the correct routing destination. This allows seamless routing of web traffic through the WireGuard mesh network:

  • If the hostname is configured for local handling (via local overrides or local SNIs), traffic is routed to the local proxy
  • Otherwise, the proxy queries Pangolin's routing API to determine which node should handle the traffic
  • Supports caching of routing decisions to improve performance
  • Handles connection pooling and graceful shutdown
  • Optional PROXY protocol v1 support to preserve original client IP addresses when forwarding to downstream proxies (HAProxy, Nginx, etc.)

The PROXY protocol allows downstream proxies to know the real client IP address instead of seeing the SNI proxy's IP. When enabled with --proxy-protocol, the SNI proxy will prepend a PROXY protocol header to each connection containing the original client's IP and port information.

In single node (self hosted) Pangolin deployments this can be bypassed by using port 443:443 to route to Traefik instead of the SNI proxy at 8443.

CLI Args

  • reachableAt: How should the remote server reach Gerbil's API?
  • generateAndSaveKeyTo: Where to save the generated WireGuard private key to persist across restarts.
  • remoteConfig (optional): Remote config location to HTTP get the JSON based config from. See example_config.json
  • config (optional): Local JSON file path to load config. Used if remote config is not supplied. See example_config.json

Note: You must use either config or remoteConfig to configure WireGuard.

  • reportBandwidthTo (optional): DEPRECATED - Use remoteConfig instead. Remote HTTP endpoint to send peer bandwidth data
  • interface (optional): Name of the WireGuard interface created by Gerbil. Default: wg0
  • listen (optional): Port to listen on for HTTP server. Default: :3004
  • log-level (optional): The log level to use (DEBUG, INFO, WARN, ERROR, FATAL). Default: INFO
  • mtu (optional): MTU of the WireGuard interface. Default: 1280
  • notify (optional): URL to notify on peer changes
  • sni-port (optional): Port for the SNI proxy to listen on. Default: 8443
  • local-proxy (optional): Address for local proxy when routing local traffic. Default: localhost
  • local-proxy-port (optional): Port for local proxy when routing local traffic. Default: 443
  • local-overrides (optional): Comma-separated list of domain names that should always be routed to the local proxy
  • proxy-protocol (optional): Enable PROXY protocol v1 for preserving client IP addresses when forwarding to downstream proxies. Default: false

Environment Variables

All CLI arguments can also be provided via environment variables:

  • INTERFACE: Name of the WireGuard interface
  • CONFIG: Path to local configuration file
  • REMOTE_CONFIG: URL of the remote config server
  • LISTEN: Address to listen on for HTTP server
  • GENERATE_AND_SAVE_KEY_TO: Path to save generated private key
  • REACHABLE_AT: Endpoint of the HTTP server to tell remote config about
  • LOG_LEVEL: Log level (DEBUG, INFO, WARN, ERROR, FATAL)
  • MTU: MTU of the WireGuard interface
  • NOTIFY_URL: URL to notify on peer changes
  • SNI_PORT: Port for the SNI proxy to listen on
  • LOCAL_PROXY: Address for local proxy when routing local traffic
  • LOCAL_PROXY_PORT: Port for local proxy when routing local traffic
  • LOCAL_OVERRIDES: Comma-separated list of domain names that should always be routed to the local proxy
  • PROXY_PROTOCOL: Enable PROXY protocol v1 for preserving client IP addresses (true/false)

Example:

./gerbil \
--reachableAt=http://gerbil:3004 \
--generateAndSaveKeyTo=/var/config/key \
--remoteConfig=http://pangolin:3001/api/v1/
services:
  gerbil:
    image: fosrl/gerbil
    container_name: gerbil
    restart: unless-stopped
    command:
      - --reachableAt=http://gerbil:3004
      - --generateAndSaveKeyTo=/var/config/key
      - --remoteConfig=http://pangolin:3001/api/v1/
    volumes:
      - ./config/:/var/config
    cap_add:
      - NET_ADMIN
      - SYS_MODULE
    ports:
      - 51820:51820/udp
      - 21820:21820/udp
      - 443:8443/tcp  # SNI proxy port

Build

Container

Ensure Docker is installed.

make

Binary

Make sure to have Go 1.23.1 installed.

make local

Licensing

Gerbil is dual licensed under the AGPLv3 and the Fossorial Commercial license. For inquiries about commercial licensing, please contact us.

Contributions

Please see CONTRIBUTIONS in the repository for guidelines and best practices.

Description
A simple WireGuard interface management server written in Go
Readme AGPL-3.0 5.5 MiB
Languages
Go 98.5%
Makefile 0.8%
Dockerfile 0.6%
Shell 0.1%