Open rainfallsevensamurai opened 3 years ago
AllowedIPs = 0.0.0.0/0,::0/0,192.168.1.0/24
In this case, the added IP should have no effect, and what I stated above stays true: The first two entries mean that every request shall be tunnelled, so the LAN IP range is first of all included, as long as not overwritten by other defined routes or rules. But probably it indirectly has an effect. How does the WireGuard routing table actually look like?
ip r l table 51820
You are not connected to Mullvad. Your IP address is [my local IP]
You mean your regular public IP, not your "local=LAN" IP, don't you?
That it works with the SOCKS5 proxy does not necessarily mean the all your traffic (aside of LAN) is tunnelled, as that proxy uses explicitly the VPN servers internal IP. So it is possible that only requests to 10.64.*
are tunnelled, while everything else is bypassing the VPN. A route for the subnet of the interface itself is default, but what we want is routing everything through the VPN, excluding only the LAN range. Would be awesome if WireGuard had an UnallowedIPs
setting to exclude subnets within the AllowedIPs
, then all the manual route/rule hack wouldn't be required at all 😄.
Yeah, I have no idea what I'm doing :)
ip r l table 51820
returns nothing.
Indeed my public IP.
Interesting, but ip rule
shows the rule ending with lookup 51820
? I'm confused 😄. Although it would fit to the case that currently nothing is tunnelled by default, but only when the VPN is actively used as proxy. Actually, in many cases with BitTorrent, this is quite the wanted case: Only the BitTorrent software uses the VPN via SOCKS5 socket, while everything else bypasses it, including requests from/to LAN.
I'm confused as well and I think it's not really working. For now, it appears like the tunnel is not active at all. But, the scenario you speak of, is exactly what I'm looking for.
I guess a duplicate request, similar like https://github.com/MichaIng/DietPi/issues/2758
You are right. Let's focus on WireGuard here and have the other one for DietPi-VPN. While there are overlaps, the implementation differs.
Required Information
Additional Information (if applicable)
Steps to reproduce
Expected behaviour
Actual behaviour
Extra details