<div dir="ltr">Hi all,<div><br></div><div>So - I don't know if it's me being <b>thick</b> or wg-quick isn't supposed to do this, but:<div><br></div><div>I have a wireguard config on my Macbook with addresses <a href="http://10.3.0.5/31">10.3.0.5/31</a> & fd10::10:3:41/127, other endpoint is .4 and :40.</div><div><br></div><div>Running <font face="monospace, monospace">wg-quick up wg-xxxxx</font> works fine - pinging the v4 of the other side doesn't work however v6 does -</div><div><br></div><div><div><font face="monospace, monospace"># ping 10.3.0.4</font></div><div><font face="monospace, monospace">PING 10.3.0.4 (10.3.0.4): 56 data bytes</font></div><div><font face="monospace, monospace">Request timeout for icmp_seq 0</font></div><div><font face="monospace, monospace">Request timeout for icmp_seq 1</font></div></div><div><div><font face="monospace, monospace"># ping6 fd10::10:3:40</font></div><div><font face="monospace, monospace">PING6(56=40+8+8 bytes) fd10::10:3:41 --> fd10::10:3:40</font></div><div><font face="monospace, monospace">16 bytes from fd10::10:3:40, icmp_seq=0 hlim=64 time=16.008 ms</font></div><div><font face="monospace, monospace">16 bytes from fd10::10:3:40, icmp_seq=1 hlim=64 time=16.019 ms</font></div><div><font face="monospace, monospace">16 bytes from fd10::10:3:40, icmp_seq=2 hlim=64 time=14.460 ms</font></div></div><div><br></div><div>I think I see the problem:</div><div><div><font face="monospace, monospace"># ip route get 10.3.0.4</font></div><div><font face="monospace, monospace">10.3.0.4 via 10.2.0.1 dev en0 src 10.2.0.71</font></div><div><font face="monospace, monospace"># ip -6 route get fd10::10:3:40</font></div><div><font face="monospace, monospace">fd10::10:3:40 dev utun1 src fd10::10:3:41</font></div></div><div><br></div><div>and it's fixable, of course, I was just wondering if this is intended behaviour considering v6 works perfectly OK?</div><div><br></div><div>Tom</div></div></div><br><div class="gmail_quote"><div dir="ltr">On Tue, May 15, 2018 at 11:54 PM Jason A. Donenfeld <<a href="mailto:Jason@zx2c4.com">Jason@zx2c4.com</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Hey folks,<br>
<br>
We're gradually adding more platforms capable of running WireGuard, thanks to<br>
some still-buggy userspace code Mathias and I have been developing. Today you<br>
can try WireGuard on two new platforms: Android and macOS.<br>
<br>
[NEW] WireGuard for Android<br>
---------------------------<br>
You can download the app from the Play Store or from F-Droid. It supports<br>
adding wg-quick(8)-style .conf files or .zips of them. The app uses the kernel<br>
module if available, which gives the best performance, stability, and battery<br>
life, and falls back to the userspace code if it's not available. Download at:<br>
<a href="https://play.google.com/store/apps/details?id=com.wireguard.android" rel="noreferrer" target="_blank">https://play.google.com/store/apps/details?id=com.wireguard.android</a><br>
<br>
[NEW] WireGuard for macOS<br>
-------------------------<br>
You can install wg-quick, wg, and wireguard-go using Homebrew. Then you should<br>
be able to run `wg-quick up whatever` and familiar commands as you're used to.<br>
If you're setting up a network manually, you can run `wireguard-go utun3` in<br>
place of the usual Linux command `ip link add utun3 dev wireguard`. Install<br>
with the Homebrew command:<br>
$ brew install wireguard-tools<br>
<br>
[FUTURE] WireGuard for ${YOUR_FAVORITE_PLATFORM}<br>
------------------------------------------------<br>
It's a work in progress, and we hope to have nice things to announce in the<br>
coming weeks. If you're interested in helping to develop support for a<br>
particular platform, please send us an email at <a href="mailto:team@wireguard.com" target="_blank">team@wireguard.com</a>.<br>
<br>
[WORKHORSE] WireGuard for Linux<br>
-------------------------------<br>
The Linux kernel implementation remains the recommended and most complete<br>
WireGuard implementation, and we're actively working on upstreaming this code<br>
to <a href="http://kernel.org" rel="noreferrer" target="_blank">kernel.org</a>. Install instructions are available for every major distro on:<br>
<a href="https://www.wireguard.com/install/" rel="noreferrer" target="_blank">https://www.wireguard.com/install/</a><br>
<br>
[DISCLAIMER] Alpha Warning for Security-related Software<br>
--------------------------------------------------------<br>
The new implementations for macOS and Android are alpha quality, at best, so<br>
keep expectations low. There are bugs. There may even be security issues, and<br>
we don't yet certify that this software does what we want it to do. Let us<br>
know as you encounter the inevitable nasty bugs. Consider this as "pre-release"<br>
software.<br>
<br>
Enjoy!<br>
Jason<br>
_______________________________________________<br>
WireGuard mailing list<br>
<a href="mailto:WireGuard@lists.zx2c4.com" target="_blank">WireGuard@lists.zx2c4.com</a><br>
<a href="https://lists.zx2c4.com/mailman/listinfo/wireguard" rel="noreferrer" target="_blank">https://lists.zx2c4.com/mailman/listinfo/wireguard</a><br>
</blockquote></div>