wg-quick: document localhost exception and v6 rule
Reported-by: Hermann Lienstromberg <nurtic-vibe@grmml.net> Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
This commit is contained in:
		
							parent
							
								
									e77a77a805
								
							
						
					
					
						commit
						be4597e10f
					
				
					 1 changed files with 4 additions and 3 deletions
				
			
		| 
						 | 
					@ -137,9 +137,9 @@ Building on the last example, one might attempt the so-called ``kill-switch'', i
 | 
				
			||||||
to prevent the flow of unencrypted packets through the non-WireGuard interfaces, by adding the following
 | 
					to prevent the flow of unencrypted packets through the non-WireGuard interfaces, by adding the following
 | 
				
			||||||
two lines `PostUp` and `PreDown` lines to the `[Interface]` section:
 | 
					two lines `PostUp` and `PreDown` lines to the `[Interface]` section:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    \fBPostUp = iptables -I OUTPUT ! -o %i -m mark ! --mark $(wg show %i fwmark) -j REJECT\fP
 | 
					    \fBPostUp = iptables -I OUTPUT ! -o %i -m mark ! --mark $(wg show %i fwmark) -m addrtype ! --dst-type LOCAL -j REJECT\fP
 | 
				
			||||||
.br
 | 
					.br
 | 
				
			||||||
    \fBPreDown = iptables -D OUTPUT ! -o %i -m mark ! --mark $(wg show %i fwmark) -j REJECT\fP
 | 
					    \fBPreDown = iptables -D OUTPUT ! -o %i -m mark ! --mark $(wg show %i fwmark) -m addrtype ! --dst-type LOCAL -j REJECT\fP
 | 
				
			||||||
.br
 | 
					.br
 | 
				
			||||||
 | 
					
 | 
				
			||||||
The `PostUp' and `PreDown' fields have been added to specify an
 | 
					The `PostUp' and `PreDown' fields have been added to specify an
 | 
				
			||||||
| 
						 | 
					@ -148,7 +148,8 @@ command which, when used with interfaces that have a peer that specifies 0.0.0.0
 | 
				
			||||||
`AllowedIPs', works together with wg-quick's fwmark usage in order to drop all packets that
 | 
					`AllowedIPs', works together with wg-quick's fwmark usage in order to drop all packets that
 | 
				
			||||||
are either not coming out of the tunnel encrypted or not going through the tunnel itself. (Note
 | 
					are either not coming out of the tunnel encrypted or not going through the tunnel itself. (Note
 | 
				
			||||||
that this continues to allow most DHCP traffic through, since most DHCP clients make use of PF_PACKET
 | 
					that this continues to allow most DHCP traffic through, since most DHCP clients make use of PF_PACKET
 | 
				
			||||||
sockets, which bypass Netfilter.)
 | 
					sockets, which bypass Netfilter.) When IPv6 is in use, additional similar lines could be added using
 | 
				
			||||||
 | 
					.BR ip6tables (8).
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Or, perhaps it is desirable to store private keys in encrypted form, such as through use of
 | 
					Or, perhaps it is desirable to store private keys in encrypted form, such as through use of
 | 
				
			||||||
.BR pass (1):
 | 
					.BR pass (1):
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
		Loading…
	
		Reference in a new issue