wg-quick: document localhost exception and v6 rule
Reported-by: Hermann Lienstromberg <nurtic-vibe@grmml.net> Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
This commit is contained in:
parent
e77a77a805
commit
be4597e10f
1 changed files with 4 additions and 3 deletions
|
@ -137,9 +137,9 @@ Building on the last example, one might attempt the so-called ``kill-switch'', i
|
||||||
to prevent the flow of unencrypted packets through the non-WireGuard interfaces, by adding the following
|
to prevent the flow of unencrypted packets through the non-WireGuard interfaces, by adding the following
|
||||||
two lines `PostUp` and `PreDown` lines to the `[Interface]` section:
|
two lines `PostUp` and `PreDown` lines to the `[Interface]` section:
|
||||||
|
|
||||||
\fBPostUp = iptables -I OUTPUT ! -o %i -m mark ! --mark $(wg show %i fwmark) -j REJECT\fP
|
\fBPostUp = iptables -I OUTPUT ! -o %i -m mark ! --mark $(wg show %i fwmark) -m addrtype ! --dst-type LOCAL -j REJECT\fP
|
||||||
.br
|
.br
|
||||||
\fBPreDown = iptables -D OUTPUT ! -o %i -m mark ! --mark $(wg show %i fwmark) -j REJECT\fP
|
\fBPreDown = iptables -D OUTPUT ! -o %i -m mark ! --mark $(wg show %i fwmark) -m addrtype ! --dst-type LOCAL -j REJECT\fP
|
||||||
.br
|
.br
|
||||||
|
|
||||||
The `PostUp' and `PreDown' fields have been added to specify an
|
The `PostUp' and `PreDown' fields have been added to specify an
|
||||||
|
@ -148,7 +148,8 @@ command which, when used with interfaces that have a peer that specifies 0.0.0.0
|
||||||
`AllowedIPs', works together with wg-quick's fwmark usage in order to drop all packets that
|
`AllowedIPs', works together with wg-quick's fwmark usage in order to drop all packets that
|
||||||
are either not coming out of the tunnel encrypted or not going through the tunnel itself. (Note
|
are either not coming out of the tunnel encrypted or not going through the tunnel itself. (Note
|
||||||
that this continues to allow most DHCP traffic through, since most DHCP clients make use of PF_PACKET
|
that this continues to allow most DHCP traffic through, since most DHCP clients make use of PF_PACKET
|
||||||
sockets, which bypass Netfilter.)
|
sockets, which bypass Netfilter.) When IPv6 is in use, additional similar lines could be added using
|
||||||
|
.BR ip6tables (8).
|
||||||
|
|
||||||
Or, perhaps it is desirable to store private keys in encrypted form, such as through use of
|
Or, perhaps it is desirable to store private keys in encrypted form, such as through use of
|
||||||
.BR pass (1):
|
.BR pass (1):
|
||||||
|
|
Loading…
Reference in a new issue