16 KiB
Olm
Olm is a WireGuard tunnel client designed to securely connect your computer to Newt sites running on remote networks.
Installation and Documentation
Olm is used with Pangolin and Newt as part of the larger system. See documentation below:
Key Functions
Registers with Pangolin
Using the Olm ID and a secret, the olm will make HTTP requests to Pangolin to receive a session token. Using that token, it will connect to a websocket and maintain that connection. Control messages will be sent over the websocket.
Receives WireGuard Control Messages
When Olm receives WireGuard control messages, it will use the information encoded (endpoint, public key) to bring up a WireGuard tunnel on your computer to a remote Newt. It will ping over the tunnel to ensure the peer is brought up.
CLI Args
endpoint: The endpoint where both Gerbil and Pangolin reside in order to connect to the websocket.id: Olm ID generated by Pangolin to identify the olm.secret: A unique secret (not shared and kept private) used to authenticate the olm ID with the websocket in order to receive commands.org(optional): Organization ID to connect to.user-token(optional): User authentication token.mtu(optional): MTU for the internal WG interface. Default: 1280dns(optional): DNS server to use to resolve the endpoint. Default: 8.8.8.8upstream-dns(optional): Upstream DNS server(s), comma-separated. Default: 8.8.8.8:53log-level(optional): The log level to use (DEBUG, INFO, WARN, ERROR, FATAL). Default: INFOping-interval(optional): Interval for pinging the server. Default: 3sping-timeout(optional): Timeout for each ping. Default: 5sinterface(optional): Name of the WireGuard interface. Default: olmenable-api(optional): Enable API server for receiving connection requests. Default: falsehttp-addr(optional): HTTP server address (e.g., ':9452'). Default: :9452socket-path(optional): Unix socket path (or named pipe on Windows). Default: /var/run/olm.sock (Linux/macOS) or olm (Windows)disable-holepunch(optional): Disable hole punching. Default: falseoverride-dns(optional): Override system DNS settings. Default: falsedisable-relay(optional): Disable relay connections. Default: false
Environment Variables
All CLI arguments can also be set via environment variables:
PANGOLIN_ENDPOINT: Equivalent to--endpointOLM_ID: Equivalent to--idOLM_SECRET: Equivalent to--secretORG: Equivalent to--orgUSER_TOKEN: Equivalent to--user-tokenMTU: Equivalent to--mtuDNS: Equivalent to--dnsUPSTREAM_DNS: Equivalent to--upstream-dnsLOG_LEVEL: Equivalent to--log-levelINTERFACE: Equivalent to--interfaceENABLE_API: Set to "true" to enable API server (equivalent to--enable-api)HTTP_ADDR: Equivalent to--http-addrSOCKET_PATH: Equivalent to--socket-pathPING_INTERVAL: Equivalent to--ping-intervalPING_TIMEOUT: Equivalent to--ping-timeoutDISABLE_HOLEPUNCH: Set to "true" to disable hole punching (equivalent to--disable-holepunch)OVERRIDE_DNS: Set to "true" to override system DNS settings (equivalent to--override-dns)DISABLE_RELAY: Set to "true" to disable relay connections (equivalent to--disable-relay)CONFIG_FILE: Set to the location of a JSON file to load secret values
Examples:
olm \
--id 31frd0uzbjvp721 \
--secret h51mmlknrvrwv8s4r1i210azhumt6isgbpyavxodibx1k2d6 \
--endpoint https://example.com
You can also run it with Docker compose. For example, a service in your docker-compose.yml might look like this using environment vars (recommended):
services:
olm:
image: fosrl/olm
container_name: olm
restart: unless-stopped
network_mode: host
devices:
- /dev/net/tun:/dev/net/tun
environment:
- PANGOLIN_ENDPOINT=https://example.com
- OLM_ID=31frd0uzbjvp721
- OLM_SECRET=h51mmlknrvrwv8s4r1i210azhumt6isgbpyavxodibx1k2d6
You can also pass the CLI args to the container:
services:
olm:
image: fosrl/olm
container_name: olm
restart: unless-stopped
network_mode: host
devices:
- /dev/net/tun:/dev/net/tun
command:
- --id 31frd0uzbjvp721
- --secret h51mmlknrvrwv8s4r1i210azhumt6isgbpyavxodibx1k2d6
- --endpoint https://example.com
Docker Configuration Notes:
network_mode: hostbrings the olm network interface to the host system, allowing the WireGuard tunnel to function properlydevices: - /dev/net/tun:/dev/net/tunis required to give the container access to the TUN device for creating WireGuard interfaces
Loading secrets from files
You can use CONFIG_FILE to define a location of a config file to store the credentials between runs.
$ cat ~/.config/olm-client/config.json
{
"id": "spmzu8rbpzj1qq6",
"secret": "f6v61mjutwme2kkydbw3fjo227zl60a2tsf5psw9r25hgae3",
"endpoint": "https://app.pangolin.net",
"org": "",
"userToken": "",
"mtu": 1280,
"dns": "8.8.8.8",
"upstreamDNS": ["8.8.8.8:53"],
"interface": "olm",
"logLevel": "INFO",
"enableApi": false,
"httpAddr": "",
"socketPath": "/var/run/olm.sock",
"pingInterval": "3s",
"pingTimeout": "5s",
"disableHolepunch": false,
"overrideDNS": false,
"disableRelay": false,
"tlsClientCert": ""
}
This file is also written to when olm first starts up. So you do not need to run every time with --id and secret if you have run it once!
Default locations:
- macOS:
~/Library/Application Support/olm-client/config.json - Windows:
%PROGRAMDATA%\olm\olm-client\config.json - Linux/Others:
~/.config/olm-client/config.json
Hole Punching
In the default mode, olm uses both relaying through Gerbil and NAT hole punching to connect to newt. If you want to disable hole punching, use the --disable-holepunch flag. Hole punching attempts to orchestrate a NAT hole punch between the two sites so that traffic flows directly, which can save data costs and improve speed. If hole punching fails, traffic will fall back to relaying through Gerbil.
Right now, basic NAT hole punching is supported. We plan to add:
- Birthday paradox
- UPnP
- LAN detection
Windows Service
On Windows, olm has to be installed and run as a Windows service. When running it with the cli args live above it will attempt to install and run the service to function like a cli tool. You can also run the following:
Service Management Commands
# Install the service
olm.exe install
# Start the service
olm.exe start
# Stop the service
olm.exe stop
# Check service status
olm.exe status
# Remove the service
olm.exe remove
# Run in debug mode (console output) with our without id & secret
olm.exe debug
# Show help
olm.exe help
Note running the service requires credentials in %PROGRAMDATA%\olm\olm-client\config.json.
Service Configuration
When running as a service, Olm will read configuration from environment variables or you can modify the service to include command-line arguments:
- Install the service:
olm.exe install - Set the credentials in
%PROGRAMDATA%\olm\olm-client\config.json. Hint: if you run olm once with --id and --secret this file will be populated! - Start the service:
olm.exe start
Service Logs
When running as a service, logs are written to:
- Windows Event Log (Application log, source: "OlmWireguardService")
- Log files in:
%PROGRAMDATA%\olm\logs\olm.log
You can view the Windows Event Log using Event Viewer or PowerShell:
Get-EventLog -LogName Application -Source "OlmWireguardService" -Newest 10
HTTP API
Olm can be controlled with an embedded HTTP server when using --enable-http. This allows you to start it as a daemon and trigger it with the following endpoints. The API can listen on either a TCP address or a Unix socket/Windows named pipe.
Socket vs TCP
By default, when --enable-http is used, Olm listens on a TCP address (configured via --http-addr, default :9452). Alternatively, Olm can listen on a Unix socket (Linux/macOS) or Windows named pipe for local-only communication with better security.
Unix Socket (Linux/macOS):
- Socket path example:
/var/run/olm/olm.sock - The directory is created automatically if it doesn't exist
- Socket permissions are set to
0666to allow access - Existing socket files are automatically removed on startup
- Socket file is cleaned up when Olm stops
Windows Named Pipe:
- Pipe path example:
\\.\pipe\olm - If the path doesn't start with
\, it's automatically prefixed with\\.\pipe\ - Security descriptor grants full access to Everyone and the current owner
- Named pipes are automatically cleaned up by Windows
Connecting to the Socket:
# Linux/macOS - using curl with Unix socket
curl --unix-socket /var/run/olm/olm.sock http://localhost/status
---
### POST /connect
Initiates a new connection request to a Pangolin server.
**Request Body:**
```json
{
"id": "string",
"secret": "string",
"endpoint": "string",
"userToken": "string",
"mtu": 1280,
"dns": "8.8.8.8",
"dnsProxyIP": "string",
"upstreamDNS": ["8.8.8.8:53", "1.1.1.1:53"],
"interfaceName": "olm",
"holepunch": false,
"tlsClientCert": "string",
"pingInterval": "3s",
"pingTimeout": "5s",
"orgId": "string"
}
Required Fields:
id: Olm ID generated by Pangolinsecret: Authentication secret for the Olm IDendpoint: Target Pangolin endpoint URL
Optional Fields:
userToken: User authentication tokenmtu: MTU for the internal WireGuard interface (default: 1280)dns: DNS server to use for resolving the endpointdnsProxyIP: DNS proxy IP addressupstreamDNS: Array of upstream DNS serversinterfaceName: Name of the WireGuard interface (default: olm)holepunch: Enable NAT hole punching (default: false)tlsClientCert: TLS client certificatepingInterval: Interval for pinging the server (default: 3s)pingTimeout: Timeout for each ping (default: 5s)orgId: Organization ID to connect to
Response:
- Status Code:
202 Accepted - Content-Type:
application/json
{
"status": "connection request accepted"
}
Error Responses:
405 Method Not Allowed- Non-POST requests400 Bad Request- Invalid JSON or missing required fields409 Conflict- Already connected to a server (disconnect first)
GET /status
Returns the current connection status, registration state, and peer information.
Response:
- Status Code:
200 OK - Content-Type:
application/json
{
"connected": true,
"registered": true,
"terminated": false,
"version": "1.0.0",
"agent": "olm",
"orgId": "org_123",
"peers": {
"10": {
"siteId": 10,
"name": "Site A",
"connected": true,
"rtt": 145338339,
"lastSeen": "2025-08-13T14:39:17.208334428-07:00",
"endpoint": "p.fosrl.io:21820",
"isRelay": true,
"peerAddress": "100.89.128.5",
"holepunchConnected": false
},
"8": {
"siteId": 8,
"name": "Site B",
"connected": false,
"rtt": 0,
"lastSeen": "2025-08-13T14:39:19.663823645-07:00",
"endpoint": "p.fosrl.io:21820",
"isRelay": true,
"peerAddress": "100.89.128.10",
"holepunchConnected": false
}
},
"networkSettings": {
"tunnelIP": "100.89.128.3/20"
}
}
Fields:
connected: Boolean indicating if connected to Pangolinregistered: Boolean indicating if registered with the serverterminated: Boolean indicating if the connection was terminatedversion: Olm version stringagent: Agent identifierorgId: Current organization IDpeers: Map of peer statuses by site IDsiteId: Peer site identifiername: Site nameconnected: Boolean peer connection statertt: Peer round-trip time (integer, nanoseconds)lastSeen: Last time peer was seen (RFC3339 timestamp)endpoint: Peer endpoint addressisRelay: Whether the peer is relayed (true) or direct (false)peerAddress: Peer's IP address in the tunnelholepunchConnected: Whether holepunch connection is established
networkSettings: Current network configuration including tunnel IP
Error Responses:
405 Method Not Allowed- Non-GET requests
POST /disconnect
Disconnects from the current Pangolin server and tears down the WireGuard tunnel.
Request Body: None required
Response:
- Status Code:
200 OK - Content-Type:
application/json
{
"status": "disconnect initiated"
}
Error Responses:
405 Method Not Allowed- Non-POST requests409 Conflict- Not currently connected to a server
POST /switch-org
Switches to a different organization while maintaining the connection.
Request Body:
{
"orgId": "string"
}
Required Fields:
orgId: The organization ID to switch to
Response:
- Status Code:
200 OK - Content-Type:
application/json
{
"status": "org switch request accepted"
}
Error Responses:
405 Method Not Allowed- Non-POST requests400 Bad Request- Invalid JSON or missing orgId field500 Internal Server Error- Org switch failed
POST /exit
Initiates a graceful shutdown of the Olm process.
Request Body: None required
Response:
- Status Code:
200 OK - Content-Type:
application/json
{
"status": "shutdown initiated"
}
Note: The response is sent before shutdown begins. There is a 100ms delay before the actual shutdown to ensure the response is delivered.
Error Responses:
405 Method Not Allowed- Non-POST requests
GET /health
Simple health check endpoint to verify the API server is running.
Response:
- Status Code:
200 OK - Content-Type:
application/json
{
"status": "ok"
}
Error Responses:
405 Method Not Allowed- Non-GET requests
Usage Examples
Connect to a peer
curl -X POST http://localhost:9452/connect \
-H "Content-Type: application/json" \
-d '{
"id": "31frd0uzbjvp721",
"secret": "h51mmlknrvrwv8s4r1i210azhumt6isgbpyavxodibx1k2d6",
"endpoint": "https://example.com"
}'
Connect with additional options
curl -X POST http://localhost:9452/connect \
-H "Content-Type: application/json" \
-d '{
"id": "31frd0uzbjvp721",
"secret": "h51mmlknrvrwv8s4r1i210azhumt6isgbpyavxodibx1k2d6",
"endpoint": "https://example.com",
"mtu": 1400,
"holepunch": true,
"pingInterval": "5s"
}'
Check connection status
curl http://localhost:9452/status
Switch organization
curl -X POST http://localhost:9452/switch-org \
-H "Content-Type: application/json" \
-d '{"orgId": "org_456"}'
Disconnect from server
curl -X POST http://localhost:9452/disconnect
Health check
curl http://localhost:9452/health
Shutdown Olm
curl -X POST http://localhost:9452/exit
Using Unix socket (Linux/macOS)
curl --unix-socket /var/run/olm/olm.sock http://localhost/status
curl --unix-socket /var/run/olm/olm.sock -X POST http://localhost/disconnect
Build
Binary
Make sure to have Go 1.23.1 installed.
make local
Licensing
Olm is dual licensed under the AGPLv3 and the Fossorial Commercial license. For inquiries about commercial licensing, please contact us.
Contributions
Please see CONTRIBUTIONS in the repository for guidelines and best practices.