Gerbil is a simple WireGuard interface management server written in Go. Gerbil makes it easy to create WireGuard interfaces as well as add and remove peers with an HTTP API.
Gerbil works with Pangolin, Newt, and Olm as part of the larger system. See documentation below:
A WireGuard interface will be created and configured on the local Linux machine or in the Docker container according to the values given in either a JSON config file or via the remote server. If the interface already exists, it will be reconfigured.
Gerbil will create the peers defined in the config on the WireGuard interface. The HTTP API can be used to remove, create, and update peers on the interface dynamically.
Bytes transmitted in and out of each peer are collected every 10 seconds, and incremental usage is reported via the "reportBandwidthTo" endpoint. This can be used to track data usage of each peer on the remote server.
Gerbil listens on port 21820 for incoming UDP hole punch packets to orchestrate NAT hole punching between olm and newt clients. Additionally, it handles relaying data through the gerbil server down to the newt. This is accomplished by scanning each packet for headers and handling them appropriately.
Gerbil includes an SNI (Server Name Indication) proxy that enables intelligent routing of HTTPS traffic between Pangolin nodes. When a TLS connection comes in, the proxy extracts the hostname from the SNI extension and queries Pangolin to determine the correct routing destination. This allows seamless routing of web traffic through the WireGuard mesh network:
- If the hostname is configured for local handling (via local overrides or local SNIs), traffic is routed to the local proxy
- Otherwise, the proxy queries Pangolin's routing API to determine which node should handle the traffic
- Supports caching of routing decisions to improve performance
- Handles connection pooling and graceful shutdown
- Optional PROXY protocol v1 support to preserve original client IP addresses when forwarding to downstream proxies (HAProxy, Nginx, etc.)
The PROXY protocol allows downstream proxies to know the real client IP address instead of seeing the SNI proxy's IP. When enabled with --proxy-protocol
, the SNI proxy will prepend a PROXY protocol header to each connection containing the original client's IP and port information.
In single node (self hosted) Pangolin deployments this can be bypassed by using port 443:443 to route to Traefik instead of the SNI proxy at 8443.
reachableAt
: How should the remote server reach Gerbil's API?generateAndSaveKeyTo
: Where to save the generated WireGuard private key to persist across restarts.remoteConfig
(optional): Remote config location to HTTP get the JSON based config from. Seeexample_config.json
config
(optional): Local JSON file path to load config. Used if remote config is not supplied. Seeexample_config.json
Note: You must use either config
or remoteConfig
to configure WireGuard.
reportBandwidthTo
(optional): DEPRECATED - UseremoteConfig
instead. Remote HTTP endpoint to send peer bandwidth datainterface
(optional): Name of the WireGuard interface created by Gerbil. Default:wg0
listen
(optional): Port to listen on for HTTP server. Default::3003
log-level
(optional): The log level to use (DEBUG, INFO, WARN, ERROR, FATAL). Default:INFO
mtu
(optional): MTU of the WireGuard interface. Default:1280
notify
(optional): URL to notify on peer changessni-port
(optional): Port for the SNI proxy to listen on. Default:8443
local-proxy
(optional): Address for local proxy when routing local traffic. Default:localhost
local-proxy-port
(optional): Port for local proxy when routing local traffic. Default:443
local-overrides
(optional): Comma-separated list of domain names that should always be routed to the local proxyproxy-protocol
(optional): Enable PROXY protocol v1 for preserving client IP addresses when forwarding to downstream proxies. Default:false
All CLI arguments can also be provided via environment variables:
INTERFACE
: Name of the WireGuard interfaceCONFIG
: Path to local configuration fileREMOTE_CONFIG
: URL of the remote config serverLISTEN
: Address to listen on for HTTP serverGENERATE_AND_SAVE_KEY_TO
: Path to save generated private keyREACHABLE_AT
: Endpoint of the HTTP server to tell remote config aboutLOG_LEVEL
: Log level (DEBUG, INFO, WARN, ERROR, FATAL)MTU
: MTU of the WireGuard interfaceNOTIFY_URL
: URL to notify on peer changesSNI_PORT
: Port for the SNI proxy to listen onLOCAL_PROXY
: Address for local proxy when routing local trafficLOCAL_PROXY_PORT
: Port for local proxy when routing local trafficLOCAL_OVERRIDES
: Comma-separated list of domain names that should always be routed to the local proxyPROXY_PROTOCOL
: Enable PROXY protocol v1 for preserving client IP addresses (true/false)
Example:
./gerbil \
--reachableAt=http://gerbil:3003 \
--generateAndSaveKeyTo=/var/config/key \
--remoteConfig=http://pangolin:3001/api/v1/
services:
gerbil:
image: fosrl/gerbil
container_name: gerbil
restart: unless-stopped
command:
- --reachableAt=http://gerbil:3003
- --generateAndSaveKeyTo=/var/config/key
- --remoteConfig=http://pangolin:3001/api/v1/
volumes:
- ./config/:/var/config
cap_add:
- NET_ADMIN
- SYS_MODULE
ports:
- 51820:51820/udp
- 21820:21820/udp
- 443:8443/tcp # SNI proxy port
Ensure Docker is installed.
make
Make sure to have Go 1.23.1 installed.
make local
Gerbil is dual licensed under the AGPLv3 and the Fossorial Commercial license. For inquiries about commercial licensing, please contact us.
Please see CONTRIBUTIONS in the repository for guidelines and best practices.