Hello everyone,
I use Skynet and Wireguard. I checked if Skynet was properly working with Wireguard clients.
After some basic tests, I can confirm it is. Those tests were just trying to access Skynet blocked IPs, on specific ports, from a Wireguard connected client. I did this a couple of times with different IPs/ports. The traffic was indeed blocked, and Skynet seems to be working indeed for wireguard clients.
However, the logs show the blocked traffic in a way that is not that intuitive.
Skynet marks the blocked traffic as **INBOUND**. The source IP, is the malicious IP which the Wireguard client tried to access.
At first glance, this is misleading because it seems that the malicious IP tried to establish a connection to the router, which is not true. This is also reflected in the Skynet webUI statistics.
In the first screenshot, you see the IP of the Wireguard client, trying to access the malicious IP.
The router receives the Wireguard client request to *202.152.154.133:8080*, and that is further logged as if *202.152.154.133:8080* was trying to access my router, from the outside. Hence the **INBOUND** log by Skynet I guess.
In this 2nd screenshot, we see Skynet legitimately blocking the traffic, but marking it as **INBOUND**.
The hidden IP is my public IP.
Is there way this could be logged in a less misleading way ? For instance, it would be more clear if the IP of the Wireguard client would just appear under the *Top 10 Blocks (Outbound)* section of Skynet's webUI.
I use Skynet and Wireguard. I checked if Skynet was properly working with Wireguard clients.
After some basic tests, I can confirm it is. Those tests were just trying to access Skynet blocked IPs, on specific ports, from a Wireguard connected client. I did this a couple of times with different IPs/ports. The traffic was indeed blocked, and Skynet seems to be working indeed for wireguard clients.
However, the logs show the blocked traffic in a way that is not that intuitive.
Skynet marks the blocked traffic as **INBOUND**. The source IP, is the malicious IP which the Wireguard client tried to access.
At first glance, this is misleading because it seems that the malicious IP tried to establish a connection to the router, which is not true. This is also reflected in the Skynet webUI statistics.
In the first screenshot, you see the IP of the Wireguard client, trying to access the malicious IP.
The router receives the Wireguard client request to *202.152.154.133:8080*, and that is further logged as if *202.152.154.133:8080* was trying to access my router, from the outside. Hence the **INBOUND** log by Skynet I guess.
In this 2nd screenshot, we see Skynet legitimately blocking the traffic, but marking it as **INBOUND**.
The hidden IP is my public IP.
Is there way this could be logged in a less misleading way ? For instance, it would be more clear if the IP of the Wireguard client would just appear under the *Top 10 Blocks (Outbound)* section of Skynet's webUI.