Martineau
Part of the Furniture
Oh ye of little faith!Thanks! had not the guts to test before I had confirmation.
I've hackedMaybee this will get rid of the error messages I get when attempting to start a dual stack peer with ipv4 dns only. Will test tonight.
Still, maybee my suggestion above is a good idea to get rid of the error message?
wireguard_manager
Beta v4.14b9 (no doubt with more error messages, although different!) to accommodate your dual stackTesting scenario (
opkg install xtables-addons_legacy
) and defined both IPv4 and IPv6 DNS, and with Policy routing for source IPs (one IPv4 and one IPv6 ) it appears to now correctly NAT each IP with its appropriate DNS...
Code:
e = Exit Script [?]
E:Option ==> peer wg15
Peers (Auto=P - Policy, Auto=X - External i.e. Cell/Mobile)
Client Auto IP Endpoint DNS MTU Public Private Annotate
wg15 N fc00:bbbb:bbbb:bb01::4:fd0f/128 [2001:ac8:20:308::a15f]:51820 193.138.218.74,2620:119:35::35 dead5B6gTRAcgb+78RpfGTw1UaNJ//ciQTS0/tKjyE= Doom4czAgW+zLEk/oPFH+eMFlRBkPv62W2XX3wieiVA= # Mullvad Germany, Frankfurt (IPv6)
Selective Routing RPDB rules
ID Peer Interface Source Destination Description
2 wg15 VPN fcdd::23 Any
1 wg15 VPN 172.16.123.1 Any
IPSet Enable Peer FWMark DST/SRC
Netflix Y wg15 0x3000 dst
Code:
DEBUG: -t nat
Chain PREROUTING (policy ACCEPT 42 packets, 15350 bytes)
num pkts bytes target prot opt in out source destination
1 2 122 WGDNS5 udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:53 /* WireGuard 'client5 DNS' */
2 0 0 WGDNS5 tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:53 /* WireGuard 'client5 DNS' */
Chain POSTROUTING (policy ACCEPT 9 packets, 916 bytes)
num pkts bytes target prot opt in out source destination
1 0 0 MASQUERADE all -- * wg15 192.168.50.0/24 0.0.0.0/0 /* WireGuard 'client' */
Chain WGDNS5 (2 references)
num pkts bytes target prot opt in out source destination
1 0 0 DNAT all -- * * 172.16.123.1 0.0.0.0/0 /* WireGuard 'client5 DNS' */ to:193.138.218.74
Code:
DEBUG: IPv6 -t nat
Chain PREROUTING (policy ACCEPT 0 packets, 0 bytes)
num pkts bytes target prot opt in out source destination
1 0 0 WGDNS5 udp * * ::/0 ::/0 udp dpt:53 /* WireGuard 'client5 DNS' */
2 0 0 WGDNS5 tcp * * ::/0 ::/0 tcp dpt:53 /* WireGuard 'client5 DNS' */
Chain POSTROUTING (policy ACCEPT 2 packets, 162 bytes)
num pkts bytes target prot opt in out source destination
Chain WGDNS5 (2 references)
num pkts bytes target prot opt in out source destination
1 0 0 DNAT all * * fcdd::23 ::/0 /* WireGuard 'client5 DNS' */ to:2620:119:35::35
Usual method to try it
Code:
e = Exit Script [?]
E:Option ==> uf dev
Last edited: