Jump to content

WireGuard VPN Setup on Your Pulsed Media Seedbox

From Pulsed Media Wiki


WireGuard VPN Setup on Your Pulsed Media Seedbox

WireGuard is a modern, fast, and cryptographically secure VPN protocol. When combined with a seedbox, it gives you an encrypted tunnel between your local machine and your server — letting you browse, torrent, and transfer files with your seedbox's IP and jurisdiction, not your home ISP's.

This article walks you through what WireGuard is, why it pairs well with a seedbox, and how to set it up on a Pulsed Media seedbox. For the authoritative technical reference, see the PMSS WireGuard documentation.

What Is WireGuard?

WireGuard is a VPN protocol designed to be simpler, faster, and more auditable than its predecessors (OpenVPN, IPsec). It was created by Jason Donenfeld and is now included in the Linux kernel as of version 5.6.

Key properties:

  • Minimal codebase — roughly 4,000 lines of code vs. hundreds of thousands in OpenVPN. Fewer lines means a smaller attack surface and easier security auditing.
  • Modern cryptography — uses Curve25519 for key exchange, ChaCha20-Poly1305 for encryption, and BLAKE2s for hashing. No legacy cipher negotiation.
  • Fast handshake — connection establishment takes milliseconds. Roaming between networks (Wi-Fi to mobile) reconnects automatically without dropping the tunnel.
  • Kernel-level performance — runs in kernel space on Linux, giving throughput competitive with raw network performance.
  • Stateless design — the server responds only to packets with valid cryptographic credentials. Port scanners see nothing.

WireGuard does not try to hide that you are using a VPN (it is not obfuscated traffic), but it does encrypt everything inside the tunnel and presents the server's IP address to the outside world.

Why Use a VPN With a Seedbox?

A seedbox already handles your torrents remotely. Adding VPN changes what happens when you access the seedbox itself and how you route other traffic through it.

Encrypted Access to Your Files

When you download files from your seedbox to your local machine over HTTPS or SFTP, the connection is already encrypted. But a WireGuard tunnel lets you route all traffic through the seedbox — your browser, applications, and other tools — not just file transfers.

Finnish Jurisdiction

Pulsed Media operates from Finland, which has strong data privacy protections and no data retention requirements comparable to those found in some other EU jurisdictions. When your traffic exits through a Finnish server rather than your home country, it is subject to Finnish law, not your local ISP's cooperation with local authorities.

This is not legal advice. What it means practically: Finland has a track record of respecting privacy as a baseline, not an exception. For users in countries with aggressive ISP-level monitoring or weak data protection, routing through Finland is a meaningful difference.

Separating Seedbox Traffic From Home Traffic

Not all traffic needs to go through the seedbox. WireGuard supports split tunneling — you can route only specific subnets or destinations through the VPN, leaving everything else on your normal connection. This is configurable in the WireGuard client configuration file.

Use Cases

  • Access services as if you are in Finland (useful for privacy, not for geo-bypassing DRM — read your service agreements)
  • Keep your home IP out of tracker peer lists entirely
  • Route all traffic through the seedbox when on untrusted networks (public Wi-Fi, hotel networks)
  • Access your seedbox's local services (internal ports, admin interfaces) without exposing them publicly

Setting Up WireGuard

Pulsed Media Seedbox Software (PMSS) includes WireGuard support. The full configuration reference is in the PMSS WireGuard documentation. The steps below give you the general flow; consult that document for the exact commands, file paths, and configuration options specific to your server.

WireGuard is available on all plans, including the free tier. See our free seedbox page for details on getting started without a paid subscription.

Step 1: Generate Keys

WireGuard uses asymmetric key pairs. Each peer (your server and your client device) has a private key and a public key. Keys are generated on each side independently — you never transmit private keys over the network.

On your local machine (Linux/macOS):

wg genkey | tee privatekey | wg pubkey > publickey

On Windows, the official WireGuard client application generates keys through its GUI. The WireGuard app is available from wireguard.com/install.

Keep your private key private. You will need your public key to give to the server-side configuration.

Step 2: Configure the Server Side

Log in to your seedbox panel or SSH into your server. PMSS handles the WireGuard configuration. Refer to the PMSS WireGuard docs for the exact interface — it will ask you for your client's public key and assign you a VPN IP address within the tunnel network.

The server-side configuration includes:

  • The server's WireGuard interface IP (your tunnel gateway)
  • Your client peer entry (your public key + assigned tunnel IP)
  • Allowed source IPs for your peer

After saving, PMSS will provide you with the server's public key and endpoint (IP address and port) needed for your client configuration.

Step 3: Create Your Client Configuration

A WireGuard client configuration file looks like this:

[Interface]
PrivateKey = <your-client-private-key>
Address = <your-assigned-tunnel-ip>/32
DNS = <dns-server-optional>

[Peer]
PublicKey = <server-public-key>
Endpoint = <server-ip>:<wireguard-port>
AllowedIPs = 0.0.0.0/0
PersistentKeepalive = 25

AllowedIPs controls what traffic goes through the tunnel:

  • 0.0.0.0/0 — route all IPv4 traffic through the tunnel (full tunnel)
  • 10.0.0.0/8 or similar — route only specific subnets (split tunnel)

PersistentKeepalive sends a keepalive packet every 25 seconds. This is recommended when the client is behind NAT (most home routers), because NAT tables time out idle UDP flows and the keepalive prevents the tunnel from going silent.

Step 4: Start the Tunnel

On Linux:

sudo wg-quick up /path/to/your-config.conf

To bring it down:

sudo wg-quick down /path/to/your-config.conf

To enable on boot (systemd):

sudo systemctl enable wg-quick@your-config
sudo systemctl start wg-quick@your-config

On macOS and Windows, import the configuration file into the WireGuard app and toggle the tunnel on.

On Android and iOS, the WireGuard app accepts a QR code generated from the config file:

qrencode -t ansiutf8 < your-config.conf

Step 5: Verify the Tunnel

With the tunnel active, check your public IP address. It should show your seedbox's IP, not your home IP:

curl https://ifconfig.me

On the server side (via SSH or the PMSS interface), you can check active WireGuard peers:

sudo wg show

This will show each peer, their last handshake time, and data transferred. A recent handshake time confirms the tunnel is working.

Troubleshooting

No Handshake / Tunnel Not Connecting

  • Check firewall on server: The WireGuard UDP port must be open. PMSS configures this, but verify it is not blocked by an upstream firewall rule. The PMSS docs specify the default port.
  • Check your client config: Verify the server's public key and endpoint IP/port match what PMSS gave you exactly. A single wrong character breaks the cryptographic handshake silently.
  • Check NAT on client side: Some ISPs or routers block outbound UDP on non-standard ports. Try from a different network (mobile hotspot) to isolate whether the issue is on the client side.
  • PersistentKeepalive: If the tunnel connects initially but drops after idle periods, add or verify PersistentKeepalive = 25 in the [Peer] section.

DNS Leaks

If you are routing all traffic through the tunnel but DNS queries are still going to your ISP's resolver, you have a DNS leak. Fix options:

  • Set DNS = in the [Interface] section of your client config to a resolver of your choice (e.g., 1.1.1.1 or a self-hosted resolver).
  • Use wg-quick which handles DNS configuration automatically via resolvconf or systemd-resolved.
  • Verify with dnsleaktest.com.

Traffic Not Routing Through Tunnel

  • Verify AllowedIPs = 0.0.0.0/0 if you intend full tunnel routing.
  • On Linux, check that your routing table has the WireGuard interface as the default route after bringing up the tunnel: ip route show.
  • On macOS/Windows, the WireGuard app handles routing automatically when the config uses 0.0.0.0/0.

IPv6 Leaks

AllowedIPs = 0.0.0.0/0 only covers IPv4. If your client has IPv6, traffic may bypass the tunnel. To cover both:

AllowedIPs = 0.0.0.0/0, ::/0

Or, if the server does not have an IPv6 tunnel address assigned, disable IPv6 on the client's WireGuard interface:

PreUp = ip6tables -I OUTPUT ! -o %i -m mark ! --mark $(wg show %i fwmark) -m addrtype ! --dst-type LOCAL -j REJECT
PostDown = ip6tables -D OUTPUT ! -o %i -m mark ! --mark $(wg show %i fwmark) -m addrtype ! --dst-type LOCAL -j REJECT

Consult the PMSS docs for whether the server-side configuration includes IPv6 tunnel addresses.

Slow Speeds Inside the Tunnel

WireGuard overhead is low, but some factors affect throughput:

  • MTU mismatch: WireGuard adds approximately 60 bytes of overhead per packet. If the path MTU is already at 1500, packets will be fragmented. Set MTU = 1420 in the [Interface] section of your client config.
  • CPU on client: ChaCha20-Poly1305 is fast, but older mobile devices may be the bottleneck. Test with iperf3 to isolate whether the limit is encryption or network.
  • Server capacity: Seedbox servers handle many concurrent users. WireGuard VPN traffic competes with seedbox traffic. During peak hours, the bottleneck may be server-side bandwidth, not the VPN protocol itself.

Security Considerations

Key Rotation

WireGuard does not implement automatic key rotation. If you believe your private key has been compromised, generate a new key pair and update both the client config and the server-side peer entry. PMSS makes this straightforward through its configuration interface.

For high-security use cases, rotate keys periodically (monthly or quarterly). This limits the exposure window if a key is captured through means other than breaking the cryptography.

Pre-Shared Keys

WireGuard supports an optional pre-shared key (PSK) in addition to the asymmetric key exchange. This adds a layer of symmetric encryption that would resist a future quantum computer capable of breaking elliptic curve cryptography. PMSS may or may not expose this option — check the PMSS docs.

Logging

WireGuard does not log connection metadata at the kernel level. Pulsed Media's privacy policy governs what, if anything, is logged at the application or network layer. Operating from Finland means the company is subject to Finnish law on data retention — not the more aggressive retention requirements found in some jurisdictions.

WireGuard Is Not Anonymity

WireGuard encrypts your traffic and replaces your IP with the server's IP. It does not anonymize you against the server operator (Pulsed Media can see that you connected, from what IP, and when), and it does not protect against browser fingerprinting, tracking cookies, or application-level identifiers. For strong anonymity requirements, WireGuard is a transport layer — it is not Tor.

Summary

WireGuard on a Pulsed Media seedbox gives you:

  • Encrypted tunnel from your device to a Finnish server
  • Your seedbox's IP presenting to the outside world instead of your home IP
  • Finnish jurisdiction for traffic that exits through the seedbox
  • Fast, low-overhead VPN that reconnects automatically when roaming
  • Free on all plans — no extra subscription required

The full setup reference is in the PMSS WireGuard documentation. If you do not have a seedbox yet, WireGuard VPN is available on all plans, including the free seedbox tier — no credit card required.

See also