On 12/30/18 14:09, Samuel Holland wrote: > Hi, > > On 12/30/18 13:10, Christophe-Marie Duquesne wrote: >> Thinking about my former setup with Openvpn, I realized it had a setting >> "bypass VPN for local networks" (under "routing"). Is there such a thing >> in the Wireguard app? (In the peer config, there is a checkbox "Exclude >> private IPs". In doubt, I tried to enable it, but then the wireguard >> interface stopped working with the message "Error bringing up tunnel: Bad >> address") >> >> Generally, the app which I believe would solve my chromecast problem is >> probably "Google play services" (com.google.android.gms). It is >> unfortunately not part of the list of applications one can exclude from the >> UI. Is there a way to do one of these two things? - Implement a feature >> similar to "bypass VPN for local networks" > > That's the idea with the "Exclude private IPs" checkbox. Anything in the > RFC1918 range will not use the tunnel. Could you export a log (there's an > option in the app settings) with it failing, and send it to me (privately if > you want)?
The issue that was breaking the "Exclude private IPs" checkbox has been fixed and will be part of the next release. Thanks for the report. (For the curious: an IPv6 DNS server was getting added to the Allowed IPs list with an incorrect netmask, and Android rejects VPN routes to subnets with a non-zero host part.) Thanks, Samuel _______________________________________________ WireGuard mailing list [email protected] https://lists.zx2c4.com/mailman/listinfo/wireguard
