From f89812354cd773a351e02d072e71715b0392fd21 Mon Sep 17 00:00:00 2001 From: LinuxServer-CI Date: Fri, 7 Aug 2020 15:37:49 +0000 Subject: [PATCH] Bot Updating Documentation --- images/docker-wireguard.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/images/docker-wireguard.md b/images/docker-wireguard.md index 997e11069..23b7e3ff6 100644 --- a/images/docker-wireguard.md +++ b/images/docker-wireguard.md @@ -180,6 +180,8 @@ The templates used for server and peer confs are saved under `/config/templates` ## Client Mode Do not set the `PEERS` environment variable. Drop your client conf into the config folder as `/config/wg0.conf` and start the container. +If you get IPv6 related errors in the log and connection cannot be established, edit the `AllowedIPs` line in your peer/client wg0.conf to include only `0.0.0.0/0` and not `::/0`; and restart the container. + ## Road warriors, roaming and returning home If you plan to use Wireguard both remotely and locally, say on your mobile phone, you will need to consider routing. Most firewalls will not route ports forwarded on your WAN interface correctly to the LAN out of the box. This means that when you return home, even though you can see the Wireguard server, the return packets will probably get lost. @@ -207,6 +209,7 @@ We publish various [Docker Mods](https://github.com/linuxserver/docker-mods) to ## Versions +* **06.08.20:** - Replace resolvconf with openresolv due to dns issues when a client based on this image is connected to a server also based on this image. Add IPv6 info to readme. Display kernel version in logs. * **29.07.20:** - Update Coredns config to detect dns loops (existing users need to delete `/config/coredns/Corefile` and restart). * **27.07.20:** - Update Coredns config to prevent issues with non-user-defined bridge networks (existing users need to delete `/config/coredns/Corefile` and restart). * **05.07.20:** - Add Debian updates and security repos for headers.