networking:misc:wireguard_01
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| networking:misc:wireguard_01 [2025/03/17 16:35] – sysadmin | networking:misc:wireguard_01 [2025/03/17 16:37] (current) – sysadmin | ||
|---|---|---|---|
| Line 34: | Line 34: | ||
| **HKLM\Software\WireGuard\DangerousScriptExecution** | **HKLM\Software\WireGuard\DangerousScriptExecution** | ||
| - | When this key is set to DWORD(1), the tunnel service will execute the commands specified in the PreUp, PostUp, PreDown, and PostDown options of a tunnel configuration. Note that this execution is done as the Local System user, which runs with the highest permissions on the operating system, and is therefore a real target of malware. Therefore, you should enable this option only with the utmost trepidation. Rather than use %i, WireGuard for Windows instead sets the environment variable WIREGUARD_TUNNEL_NAME to the name of the tunnel when executing these scripts. | + | When this key is set to DWORD(1), the tunnel service will execute the commands specified in the //PreUp, PostUp, PreDown//, and //PostDown// options of a tunnel configuration. Note that this execution is done as the Local System user, which runs with the highest permissions on the operating system, and is therefore a real target of malware. Therefore, you should enable this option only with the utmost trepidation. Rather than use //%i//, WireGuard for Windows instead sets the environment variable |
| reg add HKLM\Software\WireGuard /v DangerousScriptExecution /t REG_DWORD /d 1 /f | reg add HKLM\Software\WireGuard /v DangerousScriptExecution /t REG_DWORD /d 1 /f | ||
networking/misc/wireguard_01.1742229323.txt.gz · Last modified: 2025/03/17 16:35 by sysadmin
