Martin Neitzel <neit...@hackett.marshlabs.gaertner.de> wrote:
> > Plenty. 1.146.105.131 is my macOS client IP and 64.176.222.118 is the
> > server IP:
> >
> > # tcpdump -n port 9443
> > 23:06:02.270381 IP 64.176.222.118.9443 > 1.146.105.131.3117: UDP, length 
> > 1312
> > 23:06:02.270603 IP 64.176.222.118.9443 > 1.146.105.131.3117: UDP, length 208
> 
> tcpdump(1) just shows the first active, non-loopback interface by
> default.  In your your case above, the public ethernet interface.
> 
> Use   tcpdump -tn -i wg0
> or    tcpdump -tn -i wg0 icmp
> 
> to dump the (filtered) payload of the tunnel.  (I like -t to get
> rid of the timestamps.)

Here the updated tcpdump:

        starbeastie:~ $ doas tcpdump -tn -i wg0 icmp
        Password:
        tcpdump: verbose output suppressed, use -v or -vv for full protocol 
decode
        listening on wg0, link-type NULL (BSD loopback), capture size 262144 
bytes
        ^C
        0 packets captured
        81 packets received by filter
        0 packets dropped by kernel

Tumbleweeds.

Reply via email to