Ellenswamy
Regular Contributor
ha! sorry my mistakeDo you not see the command in the post?
ha! sorry my mistakeDo you not see the command in the post?
@ZebMcKayhan I am assuming your comments above are directed at @Martineau, but it does remind me that I still need to check my road-warrior to LAN connectivity once passthru is setup - not an issue for my phone, but with a laptop I may want to RDP to another desktop on the lan. In theory I can setup two 'device.conf' settings, one with passthru and one without, but I still think I should see what happens.Looks mostly like typo/concatenation errors....
But while following the sequence of commands, I don't see any route added to wg21 clients in policy route table, nor any "to wg21 use main" rules. If none of these are added there might be issues for any client policy routed to wg11 to contact wg21 clients.
This may not always be a problem, but you will not be able to contact your lan device, which is also routed to wg11, from wg21 clients (actually you could but it wont be able to reply)
Maybee the most obvious problem is if entire wg21 (including wg21 own ip) is used in passthrough any router local process (chrony, ntpd, dnsmasq a.s.o) will use wg21 ip to contact wg21 clients, which leads to routing table 121 where no routes exist so connection may be broken. If wg21 clients are then setup to use router for dns and wg11 too, it is not going to work.
Dns is not really an issue for a vanilla setup where wg21 clients uses wan dns and for passthru gets redirected to wg11 dns but you are quite far from vanilla setup.
I would thought that wgm adds route to wg21 in table 121 to get rid of this issue for passthru, but if it don't you still might need the 2 "To Wg21 use Main" rules even with passthru.
No, not really. I would not consider this to be a bug and I always assume there is a point as to why wgm is designed as it is although I might not always understand it. I may hope that @Martineau reads it and consider it but there may be perfectly good reasons for why wgm does what it does. The point was to you that you still might need some of the rules for your system even though the typos are fixed in wgm.@ZebMcKayhan I am assuming your comments above are directed at @Martineau,
I don't follow what it is that you 'would not consider this to be a bug' I can add all of wg11 or specific devices using the rules you provided and the 'road-warrior' devices work as expected (the only IPs and DNS they expose are those of the VPN provider). If I use the latest beta, this does not happen, the IPv4 address are those of the VPN provider, but the IPv6 are from my ISP range. For passthru I was testing with just one device, I will test ALL and see if makes any difference.No, not really. I would not consider this to be a bug and I always assume there is a point as to why wgm is designed as it is although I might not always understand it. I may hope that @Martineau reads it and consider it but there may be perfectly good reasons for why wgm does what it does. The point was to you that you still might need some of the rules for your system even though the typos are fixed in wgm.
Abject apologies....I'm sure you've had more than enough of trying to overcome the seemingly never endingAlso looking at the errors in start wg11 debug they appear to arise from not parsing the wg21 IPv6 address correctly and so I thought that this could be connected to the IPv6 leaks in passthru.
wireguard_manager
inadequacies within your true Dual-stack IPv4+IPv6 environment, without the added frustrations of my idiotic hastily applied (and totally inexcusable) shoddy typos.ip -6 route show cache
ip -6 route flush cache
e = Exit Script [?]
E:Option ==> uf dev
The typo errors are of course bugs, which you so nicely reported. I choose not to write more about it than that, you already referred to @Martineau and he knows so it's no point in me repeating it.I don't follow what it is that you 'would not consider this to be a bug
E:Option ==> create Samsung-S10 wg21 dns=local
Firstly, thank you and @ZebMcKayhan for bearing with me as I keep trying to see where I can break this. Passthru now works , but not quite as expected - though given @ZebMcKayhan's comments on trying to cover all perms and comms this may well be a result of my particular setup (running unbound and then obscuring the DNS servers via the VPN tunnel).Abject apologies....I'm sure you've had more than enough of trying to overcome the seemingly never endingwireguard_manager
inadequacies within your true Dual-stack IPv4+IPv6 environment, without the added frustrations of my idiotic hastily applied (and totally inexcusable) shoddy typos.
However, not having an IPv6 stack to test with, slightly mitigates the fact that the code execution path cannot be fully tested by me, but it may be why the following appears to be invalid....but works for IPv4?
Code:ip -6 route show cache ip -6 route flush cache
Consequently, with hindsight, I concur, you are correct to probably eschew the use of the Passthru feature, as it would be preferable to simply have the Road-Warrior 'client' Peer connect directly to the VPN ISP WireGuard 'server' Peer endpoint for better throughput/performance anyway, but I am truly grateful for your diligence and patience when offering your time/resource to improve the script's IPv6 compatibility - despite the many tedious interruptions to service endured by your family.
Nonetheless, I'll persevere with the attempted removal of the embarrassing typos etc., and try again....
- wg_client v4.16.15
- wg_server v4.16.11
To upgrade use
Code:e = Exit Script [?] E:Option ==> uf dev
and getpeer wg21 passthru add wg11 laptop
any other device connected to wg21 will now also passthruServer Auto Subnet Port Annotate
wg21 N 10.50.1.1/24,aa36:7ef1:2add:aa88:100::1/120 11501 # RT-AX88U (IPv4/IPv6) Server 1
Server Client Passthru
wg21 wg11 laptop
From the look of it, it doesn't seem to be your setup. Is both ipv4 and ipv6 from another device go out wg11 as well?Firstly, thank you and @ZebMcKayhan for bearing with me as I keep trying to see where I can break this. Passthru now works , but not quite as expected - though given @ZebMcKayhan's comments on trying to cover all perms and comms this may well be a result of my particular setup (running unbound and then obscuring the DNS servers via the VPN tunnel).
However, what I have found is that although I just select one device for passthru
and get
any other device connected to wg21 will now also passthru
I can circumvent this by creating a second - no passthru server (wg23), so please feel free to tell me to be happy with what I have (and I am!!), but I thought I should report back. It would probably be helpful if someone else with a less convoluted setup also checks whether single / specified passthru is picking up all the server devices or is working as intended.
E:Option ==> peer wg21 passthru add wg11 ip=10.50.1.2/32 ipv6=aa36:7ef1:2add:aa88:100::2/128
Can you pleaseHowever, what I have found is that although I just select one device for passthru
any other device connected to wg21 will now also passthruCode:Server Client Passthru wg21 wg11 laptop
stop wg11
, then start wg11 debug
and post the result.diag
command.The issue is on ipv4 and ipv6 and manually adding as above doesn't help (I edited as laptop is the second device) - the first (non-specified) device still gets sent through passthroughFrom the look of it, it doesn't seem to be your setup. Is both ipv4 and ipv6 from another device go out wg11 as well?
Perhaps try adding passthrough with ip instead:
not 100% on the syntax though and assuming laptop is your first wg21 device peer.Code:E:Option ==> peer wg21 passthru add wg11 ip=10.50.1.2/32 ipv6=aa36:7ef1:2add:aa88:100::2/128
Even though your command should have worked the above might bring some more information to the table.
Somewhere in the middle of adding, removing, modifying, etc I have manged to type the wrong command and SNAFU! Please bear with me while I remove and rebuild my server, client and devices. Normal service will be resumed....Can you pleasestop wg11
, thenstart wg11 debug
and post the result.
Also can you please PM the contents of thediag
command.
Oh dear a bit unfortunate.Somewhere in the middle of adding, removing, modifying, etc I have manged to type the wrong command and SNAFU! Please bear with me while I remove and rebuild my server, client and devices. Normal service will be resumed....
...and we are backOh dear a bit unfortunate.
EDIT:However, I think I can replicate the issue.. the 'server' Peer IP subnet is always being used to build the RPDB rule, rather than the expected Road-Warrior 'client' Peer IP address
The use of the subnet was a remnant of my previous testing
ip rule
0: from all lookup local
9810: from all fwmark 0xd2 lookup 210
9981: from 10.50.1.1/24 lookup 121
9982: from 10.50.1.1/24 lookup 122
9982: from 10.50.1.1/24 lookup 122
9982: from 192.168.100.2 lookup 122
9982: from 10.50.1.4 lookup 122
I'll take a look tomorrow.
Client Auto IP Endpoint DNS MTU Annotate
wg11 P <vpn_ipv4>/19, <vpn_ipv6>/64 nl1.wg.azirevpn.net:nnnnn 10.50.60.1,fe80::aa5e:45ff:feae:5050 # N/A
Selective Routing RPDB rules
ID Peer Interface Source Destination Description
10 wg11 VPN fd36:7ef1:2add:aa88:100::1 Any Unbound6VPN
9 wg11 VPN 192.168.3.1 Any Unbound4VPN
IPSet Enable Peer FWMark DST/SRC
wg11-mac Y wg11 0x1000 src
Server Client Passthru
wg21 wg11 pho21
Requesting WireGuard VPN Peer start (wg11)
WireGuard-clientwg11: Initialising WireGuard VPN 'client' Peer (wg11) in Policy Mode to nl1.wg.azirevpn.net:51820 (# N/A) DNS=10.50.60.1,fe80::aa5e:45ff:feae:5050
[#] iptables -t nat -N WGDNS1
[#] ip6tables -t nat -N WGDNS1
[#] ip link add dev wg11 type wireguard
[#] wg setconf wg11 /tmp/wg11.10547 #(/opt/etc/wireguard.d/wg11.conf)
[#] ip address add dev wg11 <vpn_ipv4>/19
[#] ip -6 address add dev wg11 <vpn_ipv6>/64
[#] ip link set up dev wg11
[#] ip -6 link set up dev wg11
[#] ifconfig wg11 mtu 1420
[#] ifconfig wg11 txqueuelen 1000
[+] wg11-route-up.sh
[#] ip route add <vpn_endpoint> via <ISP_WAN>
[#] ip rule add from 0/0 fwmark 0x1000/0x1000 table 121 prio 9991
[#] ip -6 rule add from ::/0 fwmark 0x1000/0x1000 table 121 prio 9991
[#] iptables -t mangle -A PREROUTING -m set --match-set wg11-mac src -j MARK --set-mark 0x1000/0x1000 -m comment --comment WireGuard 'client'
[#] ip6tables -t mangle -A PREROUTING -m set --match-set wg11-mac src -j MARK --set-mark 0x1000/0x1000 -m comment --comment WireGuard 'client'
[#] ip route add 0/1 dev wg11 table 121
[#] ip route add 128/1 dev wg11 table 121
[#] ip -6 route add 0::/1 dev wg11 table 121
[#] ip -6 route add 8000::/1 dev wg11 table 121
[#] ip route add table 121 10.0.0.0/8 proto kernel scope link src 10.50.60.10 dev br0
[#] ip route add table 121 10.50.60.0/24 proto kernel scope link src 10.50.60.1 dev br0
[#] ip -6 route add table 121 <LAN IPv6 Address>/56 proto kernel metric 256 pref medium dev br0
[#] ip -6 route add table 121 fe80::/64 proto kernel metric 256 pref medium dev br0
[#] ip rule add from 10.50.1.2/32 table 121 prio 9981
[#] iptables -t nat -I POSTROUTING -s 10.50.1.2/32 -o wg11 -j MASQUERADE
[#] ip -6 rule add from aa36:7ef1:2add:aa88:100::2/128 table 121 prio 9981
[#] ip6tables -t nat -I POSTROUTING -s aa36:7ef1:2add:aa88:100::2/128 -o wg11 -j MASQUERADE
[#] ip route flush cache
[?] ip -6 route flush cache >>>>'Failed to send flush request: No such process'.....ALWAYS FAILS!!!!
[+] wg11-up.sh
[#] iptables -t mangle -I FORWARD -o wg11 -p tcp -m tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu -m comment --comment WireGuard 'client'
[#] iptables -t mangle -I FORWARD -i wg11 -p tcp -m tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu -m comment --comment WireGuard 'client'
[#] iptables -t mangle -I FORWARD -o wg11 -j MARK --set-xmark 0x01/0x7 -m comment --comment WireGuard 'client'
[#] iptables -t mangle -I PREROUTING -i wg11 -j MARK --set-xmark 0x01/0x7 -m comment --comment WireGuard 'client'
[#] iptables -t nat -I POSTROUTING -s 10.50.60.1/24 -o wg11 -j MASQUERADE -m comment --comment WireGuard 'client'
[#] iptables -t nat -I PREROUTING -p tcp -m tcp --dport 53 -j WGDNS1 -m comment --comment WireGuard 'client1 DNS'
[#] iptables -t nat -I PREROUTING -p udp -m udp --dport 53 -j WGDNS1 -m comment --comment WireGuard 'client1 DNS'
[#] ip6tables -t mangle -I FORWARD -o wg11 -p tcp -m tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu -m comment --comment WireGuard 'client'
[#] ip6tables -t mangle -I FORWARD -i wg11 -p tcp -m tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu -m comment --comment WireGuard 'client'
[#] ip6tables -t mangle -I FORWARD -o wg11 -j MARK --set-xmark 0x01/0x7 -m comment --comment WireGuard 'client'
[#] ip6tables -t mangle -I PREROUTING -i wg11 -j MARK --set-xmark 0x01/0x7 -m comment --comment WireGuard 'client'
[#] ip6tables -t nat -I POSTROUTING -s <WAN IPv6 Address>/64 -o wg11 -j MASQUERADE -m comment --comment WireGuard 'client'
[#] ip6tables -t nat -I PREROUTING -p tcp -m tcp --dport 53 -j WGDNS1 -m comment --comment WireGuard 'client1 DNS'
[#] ip6tables -t nat -I PREROUTING -p udp -m udp --dport 53 -j WGDNS1 -m comment --comment WireGuard 'client1 DNS'
WireGuard-clientwg11: Initialisation complete.
[Interface]
PrivateKey = xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx=
Address = <vpn_ipv4>/19, <vpn_ipv6>/64
DNS = <vpn_DNS4>, <vpn_DNS6>
Afterpeer wg11 dns=10.55.63.1,fe80::aa5e:45ff:feae:5050
[Interface]
PrivateKey = xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx=
Address = <vpn_ipv4>/19, <vpn_ipv6>/64
DNS = 10.55.63.1,fe80::aa5e:45ff:feae:5050 <vpn_DNS6>
...and we are back
So Road-Warrior 'device' PeerServer Client Passthru
wg21 wg11 pho21[/CODE]
[#] ip rule add from 10.50.1.2/32 table 121 prio 9981
[#] iptables -t nat -I POSTROUTING -s 10.50.1.2/32 -o wg11 -j MASQUERADE
[#] ip -6 rule add from aa36:7ef1:2add:aa88:100::2/128 table 121 prio 9981
[#] ip6tables -t nat -I POSTROUTING -s aa36:7ef1:2add:aa88:100::2/128 -o wg11 -j MASQUERADE
pho21
is both 10.50.1.2/32
and aa36:7ef1:2add:aa88:100::2/128
and from the above, no wg21
subnet has been added to the RPDB rules..... so only the one device (as desired) should be subject to the 'Passthru' ?Wasn't aware that this was even broken?Also while rebuilding wg11.conf (adding the user defined DNS) I noted that it is now retaining the vpn IPv6 DNS
Before
runCode:[Interface] PrivateKey = xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx= Address = <vpn_ipv4>/19, <vpn_ipv6>/64 DNS = <vpn_DNS4>, <vpn_DNS6>
After
Code:[Interface] PrivateKey = xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx= Address = <vpn_ipv4>/19, <vpn_ipv6>/64 DNS = 10.55.63.1,fe80::aa5e:45ff:feae:5050 <vpn_DNS6>
No need now....you can just confirm/checkthis was not happening before. I am also PMing the diag output
ip rule
ip -6 rule
wireguard_manager
Beta v4.16bDpho21
'device' Peer.wg_server
wg_server
v4.16.12e = Exit Script [?]
E:Option ==> uf dev
just updated
So Road-Warrior 'device' Peerpho21
is both10.50.1.2/32
andaa36:7ef1:2add:aa88:100::2/128
and from the above, nowg21
subnet has been added to the RPDB rules..... so only the one device (as desired) should be subject to the 'Passthru' ?
Wasn't aware that this was even broken?
No need now....you can just confirm/check
Code:ip rule ip -6 rule
So if things have magically fixed themselves then that is puzzling indeed, however I have uploadedwireguard_manager
Beta v4.16bD
In truth, there are no changes to the code that inserts the Passthru RPDB rules..except it now displays the description tag when the passthru rule is added i.e for yourpho21
'device' Peer.
The changes are documented here
and effectively simply enhances Passthru Road-Warrior 'device' Peer validation, and now also prompts to restart any Peer when the Passthru feature has been requested.Update wg_manager.sh · MartineauUK/wireguard@d83dcc4
FIX: Command 'peer wg21 passthru add wg12 Garbage' would incorrectly add non-existent 'device' Peer 'Garbage' to SQL database. CHANGE: Command 'peer wg2X passthru add...github.com
EDIT: If the Passthru issue is still present, I can dig deeper but hopefully the Passthru subnet issue has definitely resolved itself?...sadly it is
Doh! - I'll need to investigate and upload a fix towg_server
I've uploaded a patchedwg_server
v4.16.12
Upgrade using:
Code:e = Exit Script [?] E:Option ==> uf dev
ip rule
0: from all lookup local
9810: from all fwmark 0xd2 lookup 210
9911: from 192.168.3.1 lookup 121
9981: from 10.50.1.1/24 lookup 121
9981: from 10.50.1.1/24 lookup 121
9981: from 10.50.1.1/24 lookup 121
9981: from 10.50.1.1/24 lookup 121
9981: from 10.50.1.1/24 lookup 121
9981: from 10.50.1.2 lookup 121
9981: from 10.50.1.1/24 lookup 121
9991: from all fwmark 0x1000/0x1000 lookup 121
32766: from all lookup main
32767: from all lookup default
ip -6 rule
0: from all lookup local
9810: from all fwmark 0xd2 lookup 210
9911: from fd36:7ef1:2add:aa88:100::1 lookup 121
9981: from aa36:7ef1:2add:aa88:100::1/120 lookup 121
9981: from aa36:7ef1:2add:aa88:100::1/120 lookup 121
9981: from aa36:7ef1:2add:aa88:100::1/120 lookup 121
9981: from aa36:7ef1:2add:aa88:100::1/120 lookup 121
9981: from aa36:7ef1:2add:aa88:100::1/120 lookup 121
9981: from aa36:7ef1:2add:aa88:100::2 lookup 121
9981: from aa36:7ef1:2add:aa88:100::1/120 lookup 121
9991: from all fwmark 0x1000/0x1000 lookup 121
32766: from all lookup main
....
[#] ip route add table 121 10.0.0.0/8 proto kernel scope link src 10.50.60.10 dev br0
[#] ip route add table 121 10.50.60.0/24 proto kernel scope link src 10.50.60.1 dev br0
[#] ip -6 route add table 121 <ISP_IPv6 Addresss> proto kernel metric 256 pref medium dev br0
[#] ip -6 route add table 121 fe80::/64 proto kernel metric 256 pref medium dev br0
grep: /opt/etc/wireguard.d/ip=10.50.1.3/32.conf: No such file or directory
[#] ip route flush cache
....
Doesjust updated
Code:ip rule 0: from all lookup local 9810: from all fwmark 0xd2 lookup 210 9911: from 192.168.3.1 lookup 121 9981: from 10.50.1.1/24 lookup 121 9981: from 10.50.1.1/24 lookup 121 9981: from 10.50.1.1/24 lookup 121 9981: from 10.50.1.1/24 lookup 121 9981: from 10.50.1.1/24 lookup 121 9981: from 10.50.1.2 lookup 121 9981: from 10.50.1.1/24 lookup 121 9991: from all fwmark 0x1000/0x1000 lookup 121 32766: from all lookup main 32767: from all lookup default
Code:ip -6 rule 0: from all lookup local 9810: from all fwmark 0xd2 lookup 210 9911: from fd36:7ef1:2add:aa88:100::1 lookup 121 9981: from aa36:7ef1:2add:aa88:100::1/120 lookup 121 9981: from aa36:7ef1:2add:aa88:100::1/120 lookup 121 9981: from aa36:7ef1:2add:aa88:100::1/120 lookup 121 9981: from aa36:7ef1:2add:aa88:100::1/120 lookup 121 9981: from aa36:7ef1:2add:aa88:100::1/120 lookup 121 9981: from aa36:7ef1:2add:aa88:100::2 lookup 121 9981: from aa36:7ef1:2add:aa88:100::1/120 lookup 121 9991: from all fwmark 0x1000/0x1000 lookup 121 32766: from all lookup main
running start wg11 debug - new error
passthru still applies to all wg11 devices, selected or othersise.Code:.... [#] ip route add table 121 10.0.0.0/8 proto kernel scope link src 10.50.60.10 dev br0 [#] ip route add table 121 10.50.60.0/24 proto kernel scope link src 10.50.60.1 dev br0 [#] ip -6 route add table 121 <ISP_IPv6 Addresss> proto kernel metric 256 pref medium dev br0 [#] ip -6 route add table 121 fe80::/64 proto kernel metric 256 pref medium dev br0 grep: /opt/etc/wireguard.d/ip=10.50.1.3/32.conf: No such file or directory [#] ip route flush cache ....
wg_server
show version v4.16.12 ?wgm stop
; upgrade, then wgm start wg21
and see if ip rule
still shows the incorrect subnet RPDB rule.seems like there are some old routing rules stuck in your routing table.... it may/may not solve your problem, but a reboot might clean things up. you have5 redundant rules which have been added by wgm but never removed, so added again, and again when peers restart (I presume)... since they are not removed they could be carried on passed your upgrade and still cause issues (altough wgm might be ok now).just updated
Code:ip rule 0: from all lookup local 9810: from all fwmark 0xd2 lookup 210 9911: from 192.168.3.1 lookup 121 9981: from 10.50.1.1/24 lookup 121 9981: from 10.50.1.1/24 lookup 121 9981: from 10.50.1.1/24 lookup 121 9981: from 10.50.1.1/24 lookup 121 9981: from 10.50.1.1/24 lookup 121 9981: from 10.50.1.2 lookup 121 9981: from 10.50.1.1/24 lookup 121 9991: from all fwmark 0x1000/0x1000 lookup 121 32766: from all lookup main 32767: from all lookup default
Code:ip -6 rule 0: from all lookup local 9810: from all fwmark 0xd2 lookup 210 9911: from fd36:7ef1:2add:aa88:100::1 lookup 121 9981: from aa36:7ef1:2add:aa88:100::1/120 lookup 121 9981: from aa36:7ef1:2add:aa88:100::1/120 lookup 121 9981: from aa36:7ef1:2add:aa88:100::1/120 lookup 121 9981: from aa36:7ef1:2add:aa88:100::1/120 lookup 121 9981: from aa36:7ef1:2add:aa88:100::1/120 lookup 121 9981: from aa36:7ef1:2add:aa88:100::2 lookup 121 9981: from aa36:7ef1:2add:aa88:100::1/120 lookup 121 9991: from all fwmark 0x1000/0x1000 lookup 121 32766: from all lookup main
running start wg11 debug - new error
passthru still applies to all wg11 devices, selected or othersise.Code:.... [#] ip route add table 121 10.0.0.0/8 proto kernel scope link src 10.50.60.10 dev br0 [#] ip route add table 121 10.50.60.0/24 proto kernel scope link src 10.50.60.1 dev br0 [#] ip -6 route add table 121 <ISP_IPv6 Addresss> proto kernel metric 256 pref medium dev br0 [#] ip -6 route add table 121 fe80::/64 proto kernel metric 256 pref medium dev br0 grep: /opt/etc/wireguard.d/ip=10.50.1.3/32.conf: No such file or directory [#] ip route flush cache ....
ip rule del prio 9981
ip -6 rule del prio 9981
Weirdly (given the context of the error message) it seems scriptrunning start wg11 debug - new error
Code:grep: /opt/etc/wireguard.d/ip=10.50.1.3/32.conf: No such file or directory
wg_client
has somehow assumed text string 'ip=10.50.1.3/32' to be a WireGuard interface? such as wg11
and possibly extracted from the SQL database?wgm stop wg11
then start it manually in full debug/trace mode using the appropriate commandwg11
has auto=p
issuesh -x /jffs/addons/wireguard/wg_client wg11 policy
sh -x /jffs/addons/wireguard/wg_client wg11
if I run wgm I seeDoeswg_server
show version v4.16.12 ?
If not; you need to issuewgm stop
; upgrade, thenwgm start wg21
and see ifip rule
still shows the incorrect subnet RPDB rule.
where can I seeVersion v4.16bD by Martineau
wg_server
? ip rule
0: from all lookup local
9911: from 192.168.3.1 lookup 121
9991: from all fwmark 0x1000/0x1000 lookup 121
32766: from all lookup main
32767: from all lookup default
ip -6 rule
0: from all lookup local
9911: from fd36:7ef1:2add:aa88:100::1 lookup 121
9991: from all fwmark 0x1000/0x1000 lookup 121
32766: from all lookup main
ip rule
0: from all lookup local
9810: from all fwmark 0xd2 lookup 210
9911: from 192.168.3.1 lookup 121
9991: from all fwmark 0x1000/0x1000 lookup 121
32766: from all lookup main
32767: from all lookup default
0: from all lookup local
9810: from all fwmark 0xd2 lookup 210
9911: from fd36:7ef1:2add:aa88:100::1 lookup 121
9991: from all fwmark 0x1000/0x1000 lookup 121
32766: from all lookup main
or any other devicepeer wg21 passthru add wg11 ip=10.50.1.3/32 ipv6=aa36:7ef1:2add:aa88:100::3/128
then pho21 had passthru and laptop did not. Reversing the setuppeer wg21 passthru del all
peer wg21 passthru add wg11 pho21
left both devices with passthru andpeer wg21 passthru del all
peer wg21 passthru add wg11 laptop
ip rule
0: from all lookup local
9810: from all fwmark 0xd2 lookup 210
9911: from 192.168.3.1 lookup 121
9981: from 10.50.1.2 lookup 121
9981: from 10.50.1.3 lookup 121
9991: from all fwmark 0x1000/0x1000 lookup 121
32766: from all lookup main
32767: from all lookup default
ip -6 rule
0: from all lookup local
9810: from all fwmark 0xd2 lookup 210
9911: from fd36:7ef1:2add:aa88:100::1 lookup 121
9981: from aa36:7ef1:2add:aa88:100::2 lookup 121
9981: from aa36:7ef1:2add:aa88:100::3 lookup 121
9991: from all fwmark 0x1000/0x1000 lookup 121
32766: from all lookup main
where can I seewg_server
?
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!