-
Notifications
You must be signed in to change notification settings - Fork 705
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Exclude private IPs from Wireguard profile #42
Comments
Hi, not sure if this works for you on Windows or with When I revert your changes so that |
Also |
Thanks for reporting! I will take a look later today when I have access to a Linux machine. |
I can confirm the issue on Ubuntu 20.04. I found a discussion of the same problem here: Essentially, |
Unfortunately, it seems like there is no good way to do this via the |
did you get warp working on linux? I can't make internet work with the configs generated, the moment I do wg-quick up I lose connectivity |
@felipejfc I do have the same issue Update: Using network manager with Both tried with unmodified generated config. So I'm not sure if this issue is related to AllowedIPs setting. |
@felipejfc , @jthomaschewski Don't you use some ubuntu (like) distribution? I have the same reliability problem in Linux Mint. In all other cases, wgcf always works. I've seen it here: #7 @ViRb3 It is necessary to exclude private addresses AND server addres You may not need to add the whole |
Allowed IP is not intended for this scenario, i guess. routes are supposed to be handled by the system native utility instead of wireguard. |
@duhd1993 The above list works fine at least on Linux. I use wgcf this way. The ranges listed in AllowedIPs appear as system routes. |
Yes. I figured how it works. thanks for the intro. I'm talking about the app giving me the option of excluding private ips, which does not work at all. Manually excluding server ip from allowed ip list solves the problem. Even so, this solution looks awkward. Not to mention 0.0.0.0/0 is specially treated but not documented. I ended up using netstat and route of macos directly. It's like ifconfig and iptables/ip of linux |
From Wireguard Android app:
The text was updated successfully, but these errors were encountered: