Hi guys,
I am on Dietpi with wireguard (split tunneling), pihole and unbound for a while.
To my surprise, (almost) everything just works (after weeks of fiddling around using other software packages).
Now, I am using wireguard out of the box and it seems, only IPv4 is part of the initial setup.
https://ipv6-test.com says ipv6 is not supported.
When I disable the VPN connection, IPv6 is supported (again). So, IPv6 should work with wireguard, shouldnt it?
So, the simple question is: What do I need to add to the wg0 and client.conf files to make tunneling via IPv6 work (additionally to IPv4)? IS there anythin else to change outside of wireguard?
I googled the internet but couldnt find anything relevant, so my hope lies in this forum
I tried adding IPv6 adressess into the server and client conf files, but as soon as I enable the VPN connection on my smartphone, I dont have connectivity anymore.
This is my conf files for server and client:
As you can see, this is basically the conf files right after wireguard install with the added IPv6 addresses. The only new IP space I added to the client conf is the one of my pihole 192.168.100.0/24
Note: key information removed for security reasons
Any help would be much appreciated. What am I doing wrong?
I wouldnt want to have IPv6 traffic bypass my tunnel. There is a way, isnt there?
-K
wg0.conf:
[Interface]
Address = 10.9.0.1/24, fc00:23:5::1/64
PrivateKey = […]
ListenPort = 51820
PostUp = sysctl net.ipv4.conf.%i.forwarding=1 net.ipv4.conf.$(sed -n 3p /DietPi/dietpi/.network).forwarding=1
PostUp = sysctl net.ipv6.conf.$(sed -n 3p /DietPi/dietpi/.network).accept_ra=2
PostUp = sysctl net.ipv6.conf.%i.forwarding=1 net.ipv6.conf.$(sed -n 3p /DietPi/dietpi/.network).forwarding=1
PostUp = iptables -A FORWARD -i %i -j ACCEPT; iptables -t nat -A POSTROUTING -o $(sed -n 3p /DietPi/dietpi/.network) -j MASQUERADE
PostUp = ip6tables -A FORWARD -i %i -j ACCEPT; ip6tables -t nat -A POSTROUTING -o $(sed -n 3p /DietPi/dietpi/.network) -j MASQUERADE
PostDown = iptables -D FORWARD -i %i -j ACCEPT; iptables -t nat -D POSTROUTING -o $(sed -n 3p /DietPi/dietpi/.network) -j MASQUERADE
PostDown = ip6tables -D FORWARD -i %i -j ACCEPT; ip6tables -t nat -D POSTROUTING -o $(sed -n 3p /DietPi/dietpi/.network) -j MASQUERADE
Client 1
[Peer]
PublicKey = […]
AllowedIPs = 10.9.0.2/32, fc00:23:5::2/128
client.conf:
[Interface]
Address = 10.9.0.2/24, fc00:23:5::2/64
PrivateKey = […]
DNS = 10.9.0.1
[Peer]
PublicKey = […]
AllowedIPs = 192.168.100.0/24, 10.9.0.0/24, fc00:23:5::/64
Endpoint = publicIP:51820
PersistentKeepalive = 25