Development discussion of WireGuard
 help / color / mirror / Atom feed
* macOS wireguard client: traffic to wireguard interface self IP travels through VPN server
@ 2021-01-06 16:46 Dmitrij Gusev
  0 siblings, 0 replies; only message in thread
From: Dmitrij Gusev @ 2021-01-06 16:46 UTC (permalink / raw)
  To: wireguard

Hello.
We just started to use the WireGuard VPN in our company.
Thanks for the great software!

I discovered, that while using the macOS wireguard client a traffic to the wireguard interface self IP travels through VPN server.

So for example if I ping wireguard interface self IP from macOS machine - both echo-request and echo-reply goes through WireGuard VPN server’s nftables “forward" chain.
Normally this kind of traffic is expected to travel locally.

Is it a bug in the WireGuard macOS client or is it related to macOS network (tunnel) stack glitches?
Are you already aware of a such behaviour?

macOS Big Sur version 11.1
WireGuard app version 1.0.12 (22)

macOS wireguard config looks like this:
[Interface]
PrivateKey = <PRIV KEY>
Address = 10.0.0.5/24
DNS = 10.1.0.53, example.local

[Peer]
PublicKey = <PUB KEY>
AllowedIPs = 0.0.0.0/0
Endpoint = vpn-srv.example.com:28283
PersistentKeepalive = 20

Thanks,
Dmitrij Gusev
System Architect
dmitrij.gusev@zealid.com
+370 6330 5550
ZealiD


^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2021-01-07 21:56 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-01-06 16:46 macOS wireguard client: traffic to wireguard interface self IP travels through VPN server Dmitrij Gusev

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).