You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We found out in #496 that WireGuard does not support "match domains" on macOS, but it also does not properly support search domains in "split tunnel" configurations.
Take the below example, the PrivateKey value has been replaced by an invalid key.
If we make AllowedIPs the following, it does work: AllowedIPs = 0.0.0.0/0,::/0
By "it", we mean here, typing for example ping www in the Terminal which would result in macOS figuring out it can put .tuxed.net (as listed under DNS) behind www, which then results in an actual ping of www.tuxed.net.
We found out in #496 that WireGuard does not support "match domains" on macOS, but it also does not properly support search domains in "split tunnel" configurations.
Take the below example, the
PrivateKey
value has been replaced by an invalid key.If we make
AllowedIPs
the following, it does work:AllowedIPs = 0.0.0.0/0,::/0
By "it", we mean here, typing for example
ping www
in the Terminal which would result in macOS figuring out it can put.tuxed.net
(as listed underDNS
) behindwww
, which then results in an actual ping ofwww.tuxed.net
.See also: https://lists.zx2c4.com/pipermail/wireguard/2021-July/006927.html
It seems it has been fixed in Tailscale (link to fix in above mailing list post), but never upstreamed to WireGuard proper?
The text was updated successfully, but these errors were encountered: