Skip to content

Latest commit

 

History

History
39 lines (30 loc) · 1.87 KB

adminregistry.md

File metadata and controls

39 lines (30 loc) · 1.87 KB

Registry Keys for Admins

These are advanced configuration knobs that admins can set to do unusual things that are not recommended. There is no UI to enable these, and no such thing is planned. These registry keys may also be removed at some point in the future. The uninstaller will clean up the entirety of HKLM\Software\AmneziaWG. Use at your own risk, and please make sure you know what you're doing.

HKLM\Software\AmneziaWG\LimitedOperatorUI

When this key is set to DWORD(1), the UI will be launched on desktops of users belonging to the Network Configuration Operators builtin group (S-1-5-32-556), with the following limitations for members of that group:

  • Configurations are stripped of all public, private, and pre-shared keys;
  • No version update popup notifications are shown, and updates are not permitted, though a tab still indicates the availability;
  • Adding, removing, editing, importing, or exporting configurations is forbidden; and
  • Quitting the manager is forbidden.

However, basic functionality such as starting and stopping tunnels remains intact.

> reg add HKLM\Software\AmneziaWG /v LimitedOperatorUI /t REG_DWORD /d 1 /f

HKLM\Software\AmneziaWG\DangerousScriptExecution

When this key is set to DWORD(1), the tunnel service will execute the commands specified in the PreUp, PostUp, PreDown, and PostDown options of a tunnel configuration. Note that this execution is done as the Local System user, which runs with the highest permissions on the operating system, and is therefore a real target of malware. Therefore, you should enable this option only with the utmost trepidation. Rather than use %i, AmneziaWG for Windows instead sets the environment variable AMNEZIAWG_TUNNEL_NAME to the name of the tunnel when executing these scripts.

> reg add HKLM\Software\AmneziaWG /v DangerousScriptExecution /t REG_DWORD /d 1 /f