ProficientNowTechRFCs
Platform RFCs/Rfcs/Wg/RFC WG 0002

2. Requirements

RFC-WG-0002                                                     Section 2
Category: Architecture                                     Requirements

2. Requirements

← Introduction | Index | Next →


2.1 Design Goals

GoalDescription
Private connectivityServices communicate over a private network rather than public IPs
Host-level simplicityMinimal dependencies on each host
Deterministic routingStable WG IPs for each host
Security boundariesExplicit separation between public/LAN and WG

2.2 Non-Goals

Non-GoalRationale
Service-specific configsOwned by service maintainers
App-level encryptionWG provides network encryption; app TLS is optional
Orchestrator overlaysOut of scope for this architecture

2.3 Invariants

Invariant 1 — WG-Only Service Access

Internal services MUST be reachable only via the WireGuard interface. Public/LAN interfaces MUST NOT provide access to internal service ports.

Invariant 2 — Stable Host Identity

Each host MUST have a stable WireGuard IP that uniquely identifies it within the VPN subnet.

Invariant 3 — Encrypted Transport

All inter-host traffic for internal services MUST traverse WireGuard.

2.4 Success Criteria

CriterionMeasurement
WG reachabilityAll hosts can reach each other via WG IPs
Public isolationInternal services are unreachable via public/LAN IPs
Operational stabilityPeer handshakes remain active during normal operation

End of Requirements — RFC-WG-0002

On this page