this post was submitted on 18 Jan 2024
1 points (100.0% liked)

WireGuard

3 readers
1 users here now

WireGuard - a fast, modern, secure VPN Tunnel.

founded 1 year ago
MODERATORS
 
This is an automated archive.

The original was posted on /r/wireguard by /u/xcalibre1 on 2024-01-18 12:41:38+00:00.


Hi all,

Long time lurker. First time poster.

Let me preface by saying I am able to connect directly to my Wireguard server endpoint from my Android mobile.

However, I am not able to communicate if obfuscate Wireguard traffic using stunnel on Android.

Here is my current setup (selective snippet):

  • Server (public ip: 192.0.0.1)

    • stunnel.conf:

    ...

    [wireguard] accept = 443 connect = wireguard_server:51820 cert = /etc/stunnel/stunnel.pem

    • wg0.conf:

    [Interface]

    ListenPort = 51820 PrivateKey = xxxxx

    [Peer] # phone

    PublicKey = xxx

    AllowedIPs = 192.168.0.1/32

  • Phone

    • stunnel.conf (via SSLsocks app)

    ...

    [wireguard]

    client = yes

    accept = 127.0.0.1:10000

    connect: 192.0.0.1:443

    • wg0.conf:

    [Interface] Address = 192.168.0.1/32

    DNS = 1.1.1.1 PrivateKey = xxxxx

    [Peer] # server

    PublicKey = xxx

    Endpoint = 127.0.0.1:10000 AllowedIPs = 192.168.1.0/24

SSLsocks was not displaying any logs when I enabled the Wireguard tunnel. I was expecting to see some traffic logs in SSLsocks as part of the Wireguard handshake attempt.

However, I had no issues connecting to via Chrome (i.e. SSLsocks was able to display logs each time a connection was made).

Is there a limitation to to accessing 127.0.0.1 from the official Wireguard app?

Looking forward to hear your thoughts! Thanks!

no comments (yet)
sorted by: hot top controversial new old
there doesn't seem to be anything here