Any chance to get WiFi direct printer, Miracast, hotspot, ... working with Wireguard and "always on vpn"? #1810
-
Hi, I'm trying to figure out if I can somehow configure RethinkDNS using WireGuard, to work with local services, like WiFi direct printer, Miracast and accessing devices connected to the protected device's hotspot. I've seen answers re split tunelling, that its not planned to be brought back, but maybe (low chances), my use case has some workaround as it's Private Address Space RFC1918 IANA? #1789 (comment) The only working set I've found is to disable kill switch on Android system level, which I don't feel comfortable with, please let me know if that's still ok, and that it will not introduce leaks, even if I have in-rethinkdns wireguard configured to capture all apps except for those I need for local services. |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 4 replies
-
is there any way to configure wireguard's AllowedIPs field for that? |
Beta Was this translation helpful? Give feedback.
-
speaking of Miracast, dunno why it wasn't working before, and if I've triggered anything, but as of now, Miracast works:
Are there any visible drawbacks of such combination Isolate + "bypass app from all proxies"? lag/delay is horrible that makes it unusable, but it may be due to my underpowered android device (will test with another one later). |
Beta Was this translation helpful? Give feedback.
Well, by "kill switch" I reckon you mean Android's VPN Lockdown mode (aka Block connections without VPN + Always-on VPN turned ON)? If so, leaving it turned ON is recommended to absolutely avoid ALL leaks (esp, given Rethink is supposed to be a "firewall"). Unfortunately, like you have found, LAN-local / WireGuard-local services are sometimes not routable by Rethink. This is something we want to desperately fix, but haven't been able to (see also: other peer-to-peer apps that don't optimally wo…