Anyone please?
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts Menuroot@OPNsense:~ # curl https://am.i.mullvad.net/connected
You are not connected to Mullvad. Your IP address is 31.xxx.xxx.xxxRoute traffic to the specified exit node. Note that this only affects traffic routed into your Tailscale interface, which you will have to configure separately using firewall rules and hybrid outbound NAT rules.Quote from: mattlach on February 18, 2024, 06:34:43 AM
Alright, I was able to resolve this through some research and time spent reading. If anyone else needs it, here is what I found.
1.) Something changed when Wireguard moved into the kernel in v23. This something broke many previously implemented Wireguard to private VPN service tunnels.
2.) The initial part of the WireGuard MullvadVPN Road Warrior Setup guide can still be followed, with one small change.
Follow "Step 1" of the above, except when configuring your "instance" be sure to check the box "disable routes". If you don't it will create an automatic route that breaks external traffic over the wan.
Also, the guide above tells you to add a DNS server in the Peers section. This no longer appears to be possible. It is also not needed, as long as you used the version of the Mullvad Curl script that hijacks your DNS, as you will use Mullvads DNS either way, at least when connected to Mullvad.
Once step 1 is complete, shift to this video at timestamp ~8:39
Note that the youtuber is using the older WireGuard-go plugin which is now deprecated. You can still follow his instructions, but whenever he uses the WireGuard config tab labeled "Endpoints" use the tab labeled "Peers" instead. And whenever he uses the tab labeled "Local" use the tab labeled "Instances" instead.
Follow the youtubers guide to setting up firewall rules NAT rules. He splits his video into two parts. The first for forwarding ALL traffic through the VPN, and a second for setting up a gateway to later use firewall rules to decide which traffic goes through the VPN.
The first "everything through VPN" setup he configures will not work, but set up the rules as he does anyway, as they are needed in the second part. If you complete the second part you should wind up with a second gateway just for Mullvad. You can then use firewall rules to pass traffic through to whichever gateway is appropriate, Mullvad or wan to bypass Mullvad.
I usually set up a rule at the end of each networks firewall ruleset that passes all traffic through to the Mullvad gateway. Then if I want specific exclusions, I add pass rules above that, to pass specific traffic types or traffic from specific hosts to the wan interface bypassing Mullvad.
I hope this saves someone else some time as I was about to tear my hair out.
I suspect (but I am not sure) that there is a bug in the current kernel implementation of WireGuard that creates a faulty, non-functional default route, unless you check the box to disable it during the creation of the instance, and that is what is causing all of this trouble.
Quote from: cookiemonster on April 01, 2024, 11:34:48 PM
meyergru . I noticed you asked how to load a different version of the kernel under OPN and later you seemed to have been able to do it. Can you please point me in the direction of the instructions to achieve it? I'd like to make some tests of my own. Apologies for the hijack of thread.