Gerbil is a simple WireGuard interface management server written in Go. Gerbil makes it easy to create WireGuard interfaces as well as add and remove peers with an HTTP API.
Gerbil works with Pangolin, Newt, and Olm as part of the larger system. See documentation below:
A WireGuard interface will be created and configured on the local Linux machine or in the Docker container according to the values given in either a JSON config file or via the remote server. If the interface already exists, it will be reconfigured.
Gerbil will create the peers defined in the config on the WireGuard interface. The HTTP API can be used to remove, create, and update peers on the interface dynamically.
Bytes transmitted in and out of each peer are collected every 10 seconds, and incremental usage is reported via the api endpoint. This can be used to track data usage of each peer on the remote server.
Gerbil listens on port 21820 for incoming UDP hole punch packets to orchestrate NAT hole punching between olm and newt clients. Additionally, it handles relaying data through the gerbil server down to the newt. This is accomplished by scanning each packet for headers and handling them appropriately.
Gerbil includes an SNI (Server Name Indication) proxy that enables intelligent routing of HTTPS traffic between Pangolin nodes. When a TLS connection comes in, the proxy extracts the hostname from the SNI extension and queries Pangolin to determine the correct routing destination. This allows seamless routing of web traffic through the WireGuard mesh network:
- If the hostname is configured for local handling (via local overrides or local SNIs), traffic is routed to the local proxy
- Otherwise, the proxy queries Pangolin's routing API to determine which node should handle the traffic
- Supports caching of routing decisions to improve performance
- Handles connection pooling and graceful shutdown
- Optional PROXY protocol v1 support to preserve original client IP addresses when forwarding to downstream proxies (HAProxy, Nginx, etc.)
The PROXY protocol allows downstream proxies to know the real client IP address instead of seeing the SNI proxy's IP. When enabled with --proxy-protocol, the SNI proxy will prepend a PROXY protocol header to each connection containing the original client's IP and port information.
In single node (self hosted) Pangolin deployments this can be bypassed by using port 443:443 to route to Traefik instead of the SNI proxy at 8443.
reachableAt: How should the remote server reach Gerbil's API?generateAndSaveKeyTo: Where to save the generated WireGuard private key to persist across restarts.remoteConfig(optional): Remote config location to HTTP get the JSON based config from. Seeexample_config.jsonconfig(optional): Local JSON file path to load config. Used if remote config is not supplied. Seeexample_config.json
Note: You must use either config or remoteConfig to configure WireGuard.
reportBandwidthTo(optional): DEPRECATED - UseremoteConfiginstead. Remote HTTP endpoint to send peer bandwidth datainterface(optional): Name of the WireGuard interface created by Gerbil. Default:wg0listen(optional): Port to listen on for HTTP server. Default::3004log-level(optional): The log level to use (DEBUG, INFO, WARN, ERROR, FATAL). Default:INFOmtu(optional): MTU of the WireGuard interface. Default:1280notify(optional): URL to notify on peer changessni-port(optional): Port for the SNI proxy to listen on. Default:8443local-proxy(optional): Address for local proxy when routing local traffic. Default:localhostlocal-proxy-port(optional): Port for local proxy when routing local traffic. Default:443local-overrides(optional): Comma-separated list of domain names that should always be routed to the local proxyproxy-protocol(optional): Enable PROXY protocol v1 for preserving client IP addresses when forwarding to downstream proxies. Default:false
All CLI arguments can also be provided via environment variables:
INTERFACE: Name of the WireGuard interfaceCONFIG: Path to local configuration fileREMOTE_CONFIG: URL of the remote config serverLISTEN: Address to listen on for HTTP serverGENERATE_AND_SAVE_KEY_TO: Path to save generated private keyREACHABLE_AT: Endpoint of the HTTP server to tell remote config aboutLOG_LEVEL: Log level (DEBUG, INFO, WARN, ERROR, FATAL)MTU: MTU of the WireGuard interfaceNOTIFY_URL: URL to notify on peer changesSNI_PORT: Port for the SNI proxy to listen onLOCAL_PROXY: Address for local proxy when routing local trafficLOCAL_PROXY_PORT: Port for local proxy when routing local trafficLOCAL_OVERRIDES: Comma-separated list of domain names that should always be routed to the local proxyPROXY_PROTOCOL: Enable PROXY protocol v1 for preserving client IP addresses (true/false)
Example:
./gerbil \
--reachableAt=http://gerbil:3004 \
--generateAndSaveKeyTo=/var/config/key \
--remoteConfig=http://pangolin:3001/api/v1/services:
gerbil:
image: fosrl/gerbil
container_name: gerbil
restart: unless-stopped
command:
- --reachableAt=http://gerbil:3004
- --generateAndSaveKeyTo=/var/config/key
- --remoteConfig=http://pangolin:3001/api/v1/
volumes:
- ./config/:/var/config
cap_add:
- NET_ADMIN
- SYS_MODULE
ports:
- 51820:51820/udp
- 21820:21820/udp
- 443:8443/tcp # SNI proxy portEnsure Docker is installed.
makeMake sure to have Go 1.23.1 installed.
make localGerbil is dual licensed under the AGPLv3 and the Fossorial Commercial license. For inquiries about commercial licensing, please contact us.
Please see CONTRIBUTIONS in the repository for guidelines and best practices.