This is an automated archive.
The original was posted on /r/wireguard by /u/xcalibre1 on 2024-01-18 12:41:38+00:00.
Hi all,
Long time lurker. First time poster.
Let me preface by saying I am able to connect directly to my Wireguard server endpoint from my Android mobile.
However, I am not able to communicate if obfuscate Wireguard traffic using stunnel on Android.
Here is my current setup (selective snippet):
-
Server (public ip: 192.0.0.1)
...
[wireguard] accept = 443 connect = wireguard_server:51820 cert = /etc/stunnel/stunnel.pem
[Interface]
ListenPort = 51820 PrivateKey = xxxxx
[Peer] # phone
PublicKey = xxx
AllowedIPs =
192.168.0.1/32
-
Phone
- stunnel.conf (via SSLsocks app)
...
[wireguard]
client = yes
accept =
127.0.0.1:10000
connect:
192.0.0.1:443
[Interface] Address =
192.168.0.1/32
DNS = 1.1.1.1 PrivateKey = xxxxx
[Peer] # server
PublicKey = xxx
Endpoint = 127.0.0.1:10000 AllowedIPs =
192.168.1.0/24
SSLsocks was not displaying any logs when I enabled the Wireguard tunnel. I was expecting to see some traffic logs in SSLsocks as part of the Wireguard handshake attempt.
However, I had no issues connecting to via Chrome (i.e. SSLsocks was able to display logs each time a connection was made).
Is there a limitation to to accessing 127.0.0.1 from the official Wireguard app?
Looking forward to hear your thoughts! Thanks!