-
-
Notifications
You must be signed in to change notification settings - Fork 156
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Wireguard] Traffic not routed if IP not in Allowed IPs #1140
Comments
I am surprised Tailscale works with default WireGuard as-is? We've have an open issue on it #1047
I think I understand what you mean (and we could fix it)... but can you reword this / be more clear so I know for sure? |
No, I am using a seperate Wireguard-Server as a Tailscale-Gateway because of too high battery drain of Tailscale.
If I am setting the allowed IPs in my Wireguard config to 100.64.0.0/10 and an app is trying to connect to 188.114.96.3, the traffic is blocked and neither routed via Wireguard or my local network connection. Connections to 100.64.0.45 are routed via WG as expected. So only traffic that is allowed to pass the VPN is routed (via the VPN), all other traffic (that should be routed via local network) is discarded. |
Gotcha. This has been fixed in the upcoming version |
Fixed in
|
Hi, I have this same issue. It works on the android wireguard client, same as the OP, but doesn't work on RethinkDNS. Any way I can test this on my machine? Version: 0.5.5n (fdroid) |
What works? |
I'm using this kind of config in RethinkDNS:
But it looks like it's routing all traffic through the wireguard endpoint instead of just IPs like 192.168.13.1. The same configuration works on the official wireguard app, it routes just these IPs. Not sure if I'm doing something wrong here. |
|
Thanks for the specific adb logs that I needed to troubleshoot this. It turns out that I wasn't tunnelling the DNS IP through the wireugard To answer the rest of your questions, I'm using Simple mode, and it appears that DNS is tunnelled through the VPN regardless of whether Just to note, I wasn't able to connect to them before either, so this part isn't a regression. I am still able to access them with Wireguard on Android just fine, so this might be due to some kind of tweaking that that app does. My current config is something like this now:
|
I finally figured it out! I had set "Do not route Private IPs" in the Network settings. That + allowing DNS through the VPN fixes my issues. |
Thanks for the reporting back. Glad it works the way you expect it to. Rethink has many footguns... Btw, you could consider removing the KeepAlive for power/battery reasons. |
I am using a Wireguard VPN to connect to my home and Tailscale/Headscale network. Therefor i only want specific subnets routed via Wireguard (in my example 100.64.0.0/10). This is working in official Wireguard app by adding only this subnet to the allowed IPs so no other traffic is routed via VPN.
When using Rethink also only the allowed traffic is routed via VPN, but other traffic is blocked silently. If i am changing the allowed IPs to 100.64.0.0/0, all traffic is routed through VPN as expected. Therefor my public IP-adress is the one of my peer, which is static and would give me less privacy.
I think this behavior could also be a feature, but the user must be able to turn it off.
The text was updated successfully, but these errors were encountered: