From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.zx2c4.com (lists.zx2c4.com [165.227.139.114]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id D42D1C433EF for ; Fri, 17 Jun 2022 11:39:50 +0000 (UTC) Received: by lists.zx2c4.com (OpenSMTPD) with ESMTP id 61a8ebf0; Fri, 17 Jun 2022 11:39:48 +0000 (UTC) Received: from mx0.riseup.net (mx0.riseup.net [198.252.153.6]) by lists.zx2c4.com (OpenSMTPD) with ESMTPS id 9be6bea4 (TLSv1.3:AEAD-AES256-GCM-SHA384:256:NO) for ; Thu, 9 Jun 2022 21:56:21 +0000 (UTC) Received: from fews1.riseup.net (fews1-pn.riseup.net [10.0.1.83]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "mail.riseup.net", Issuer "R3" (not verified)) by mx0.riseup.net (Postfix) with ESMTPS id 4LJybR0mtnz9sdL for ; Thu, 9 Jun 2022 21:56:19 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=riseup.net; s=squak; t=1654811779; bh=acr+0KtLpeZnAdK181NS6Fb5BDxK52F2pYDDgGkWQak=; h=From:To:Subject:Date:Reply-To:From; b=H2VhR/CHT1XXq8huSUiTSnBrZnluawMiEgoxO5EVdlFVNGdDNMkiYWJhb4Bzrn6Ip 1WaCh/YwUXfZHFOn3/6kUW67M1q0G01y3S9TenWXDC4BCsfNqtUhkkSLjeLQi0E4cJ /gEJWJgF35bScIv9mzFp64xeUaghBtQxYTonVzf0= X-Riseup-User-ID: 745C3A8A69817C445C643B3E8D5877877C7D0EFCB827D76666F222017BFC5D3C Received: from [127.0.0.1] (localhost [127.0.0.1]) by fews1.riseup.net (Postfix) with ESMTPSA id 4LJybQ11sdz5vfP for ; Thu, 9 Jun 2022 21:56:17 +0000 (UTC) From: enlight To: wireguard@lists.zx2c4.com Subject: [question] wireguard-windows issue Date: Thu, 09 Jun 2022 21:56:12 +0000 Message-Id: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: quoted-printable X-Mailman-Approved-At: Fri, 17 Jun 2022 11:39:46 +0000 X-BeenThere: wireguard@lists.zx2c4.com X-Mailman-Version: 2.1.30rc1 Precedence: list List-Id: Development discussion of WireGuard List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Reply-To: enlight Errors-To: wireguard-bounces@lists.zx2c4.com Sender: "WireGuard" Hello, when enabling wireguard kill-switch, it creates aggressive wireguard=20 firewall rule on windows, it creates rule on windows filtering platform=20 (WFP). The rule is to block all inbound/outbound traffic not for or=20 from wireguard interface. i want to modify current wireguard wfp rule to premit inbound/outbout=20 traffic to additional interfaces, like vmware interface. There are=20 several network interfaces in my system active, like "Yggdrasil" ->=20 adapter name in Network and sharing center (it uses wintun driver to=20 create). I tried to modify "wireguard-windows/tunnel/firewall/blocker.go" inside=20 EnableFirewall( ) to add: ``` var adapter *driver.Adapter var luid2 winipcfg.LUID adapter, err =3D driver.OpenAdapter("Yggdrasil") -> gives error here luid2 =3D adapter.LUID() err =3D permitTunInterface(session, baseObjects, 12, uint64(luid2)) ``` the error is: ```Failed to find matching adapter name: Element not=20 found. (Code 0x00000490) Unable to enable firewall rules: Firewall error at=20 golang.zx2c4.com/wireguard/windows/tunnel/firewall/blocker.go:148:=20 Element not found.``` how can i solve the issue ?