Overlapping AllowedIPs Configuration
Paul Zillmann
paul at zil.li
Sat May 25 20:39:24 CEST 2019
Hello,
we have the same problem here, although our allowed IP ranges should be
0.0.0.0/0 for all peers.
We have OSPF traffic on the wireguard links so it should be task of the
Kernel's routing table to decide where to send what.
The problem is that the allowed-ips configuration has multiple purposes:
routing table and firewall/packet filter. This introduces these
problems. It would be helpfull to get a compile flag or something else
to make this behavior optional. Right now Wireguard isn't very friendly
to dynamic routing.
I came up with multiple solutions:
- create multiple interfaces + tunnels.
or
- create a bash script that injects the Kernel's routing table into the
wg tool every other minute.
Do you guys have a better idea? If not I would create the bash script.
- Paul
More information about the WireGuard
mailing list