[#] ifconfig wg create name wg0[!] Missing WireGuard kernel support (ifconfig: SIOCIFCREATE2: Invalid argument). Falling back to slow userspace implementation.[#] wireguard-go wg0tun0: link state changed to UPtun0: changing name to 'wg0'âââââââââââââââââââââââââââââââââââââââââââââââââââââââââ ââ Running wireguard-go is not required because this ââ kernel has first class support for WireGuard. For ââ information on installing the kernel module, ââ please visit: ââ https://www.wireguard.com/install/ ââ âââââââââââââââââââââââââââââââââââââââââââââââââââââââââ[#] wg setconf wg0 /dev/stdin[#] ifconfig wg0 inet 10.10.0.14/24 alias[#] ifconfig wg0 mtu 1420[#] ifconfig wg0 up[#] route -q -n add -inet 10.10.0.14/32 -interface wg0[#] route -q -n add -inet 10.99.0.0/24 -interface wg0[+] Backgrounding route monitor
[#] ifconfig wg create name wg0[!] Missing WireGuard kernel support (ifconfig: SIOCIFCREATE2: Invalid argument). Falling back to slow userspace implementation.[#] wireguard-go wg0tun0: link state changed to UPtun0: changing name to 'wg0'┌──────────────────────────────────────────────────────┐│ ││ Running wireguard-go is not required because this ││ kernel has first class support for WireGuard. For ││ information on installing the kernel module, ││ please visit: ││ https://www.wireguard.com/install/ ││ │└──────────────────────────────────────────────────────┘[#] wg setconf wg0 /dev/stdin[#] ifconfig wg0 inet 10.10.0.14/24 alias[#] ifconfig wg0 mtu 1420[#] ifconfig wg0 up[#] route -q -n add -inet 10.10.0.14/32 -interface wg0[#] rm -f /var/run/wireguard/wg0.sockwg0: link state changed to DOWN
/usr/local/etc/rc.d/wireguard restart
[#] ifconfig wg0 up[...][#] route -q -n add [...] -interface wg0[#] route -q -n add [...] -interface wg0[#] [... add all the routes ...][#] rm -f /var/run/wireguard/wg0.sockwg0: link state changed to DOWN
interface: wg0 public key: eehiloQrtuKlj2WieuER2X/hzcG7XR27qvqrqkQkI3Q= private key: (hidden) listening port: 51820peer: L/1DmaGJwqC0JpwNjKt9dRa6erwl3zLvXRcHYUfNqwM= preshared key: (hidden) endpoint: ***** allowed ips: ***** latest handshake: 6 seconds ago transfer: 18.82 GiB received, 2.97 GiB sent persistent keepalive: every 30 secondspeer: UVrmqWeiZvap6A0v6oCosT5w+rUBCUxVmVeBuUVWilk= preshared key: (hidden) endpoint: ***** allowed ips: ***** latest handshake: 41 seconds ago transfer: 200.69 GiB received, 45.96 GiB sent persistent keepalive: every 30 secondspeer: h6E2aX1XYrd/+E6OxMOCVNaFFanHYKa9V6LUxlb3BAk= preshared key: (hidden) endpoint: ***** allowed ips: ***** latest handshake: 1 minute, 1 second ago transfer: 1.07 GiB received, 59.12 GiB sent persistent keepalive: every 30 secondspeer: 9mXAH5tD6rlgYggTfYjoBpXtyDcN39tHTWYYaOGFEmE= preshared key: (hidden) endpoint: ***** allowed ips: ***** latest handshake: 1 minute, 16 seconds ago transfer: 7.80 GiB received, 29.08 GiB sent persistent keepalive: every 30 secondspeer: W6+cTWSzxPdUWL/IpyV6VnepQ+VnFNCLRbo/qmyM7mE= preshared key: (hidden) endpoint: ***** allowed ips: ***** latest handshake: 1 minute, 56 seconds ago transfer: 507.34 KiB received, 1.32 MiB sent persistent keepalive: every 30 seconds
[Interface]PrivateKey = IFHejkyCiJTq7FDC8iApjL3/mfrfeYaXcIVVMEffsFs=Address = 10.10.0.14/32ListenPort = 51820[Peer]PublicKey = UND2TqvSaGOeg96OS6gHymCVe++QOg+0DKWDa/R5bT8=Endpoint = s2s.example.com:51820AllowedIPs = 10.10.0.14/32,10.99.0.0/24PersistentKeepalive = 30
[Interface]Address = 10.10.0.2/32SaveConfig = trueListenPort = 51822PrivateKey = IFHejkyCiJTq7FDC8iApjL3/mfrfeYaXcIVVMEffsFs=[Peer]PublicKey = UND2TqvSaGOeg96OS6gHymCVe++QOg+0DKWDa/R5bT8=AllowedIPs = 10.99.0.0/24Endpoint = s2s.example.com:51820PersistentKeepalive = 60
[#] wg setconf wg0 /dev/stdin[#] ifconfig wg0 inet 10.10.0.14/32 alias[#] ifconfig wg0 mtu 1420[#] ifconfig wg0 up[#] route -q -n add -inet 10.10.0.14/32 -interface wg0[#] rm -f /var/run/wireguard/wg0.sockwg0: link state changed to DOWN
I did finally figure out the problem and it was a configuration issue. In the Local tab of the configuration I had the Tunnel IP address as 10.11.0.2/24 and in the Allowed IP's in Endpoints tab had 10.11.0.2/32 which caused a conflict. I also had 192.168.0.0/24 as the local network in the Allowed IP's on the other side of the tunnel. The Allowed IP's should have been 10.11.0.1/32 and once I made that change the tunnel worked. The misconfiguration though did work under 21.7 series so I was assuming my configuration was correct even though it was not. The 22.1 series I guess is less forgiving of this type of configuration error. Unfortunately it took me a long time to figure out the problem so I would go back and double check your configuration and not assume it was correct even if it worked in 21.7 series. I also posted in another thread on the 22.1 Production Series forum my resolution as that was a more active thread than this discussing a similar Wireguard problem. Good luck.
[Interface]PrivateKey = IFHejkyCiJTq7FDC8iApjL3/mfrfeYaXcIVVMEffsFs=Address = 10.10.0.14/32ListenPort = 51820[Peer]PublicKey = UND2TqvSaGOeg96OS6gHymCVe++QOg+0DKWDa/R5bT8=Endpoint = s2s.example.com:51820AllowedIPs = 10.99.0.0/24PersistentKeepalive = 30
Did not have time to investigate further (production!) but instead used ZFS to roll back to 21.7.
Quote from: pmhausen on February 23, 2022, 03:43:46 pmDid not have time to investigate further (production!) but instead used ZFS to roll back to 21.7.If you want to share how did you do this, I would be all ears.