ed that It already handles
KEYCODE_BACK, so I guess this could go together. Amazon has a section about
it on their documentation [1].
Cheers,
Christophe-Marie
[1]: https://developer.amazon.com/docs/fire-tv/remote-input.html
On Wed, Jan 9, 2019 at 12:07 AM Christophe-Marie Duquesne
wrote:
> L
Looks like the intent com.wireguard.android.action.SET_TUNNEL_UP does not
do much. I tried to start the tunnel like this:
am broadcast -a com.wireguard.android.action.SET_TUNNEL_UP -e tunnel wg0 -n
com.wireguard.android/.model.TunnelManager
After further investigation, the code to handle this int
>
> I guess it allows also a full shell... adb shell ?
>
Yes, adb shell works.
> No way to plug USB keyboard?
>
A keyboard would not help, you can't focus the area I need with the arrows.
You need a mouse. It is also impossible to connect a Bluetooth mouse on the
Fire TV stick (only on the regu
Hi there,
I tried to run Wireguard on the FireTV stick. The only other relevant
reference I found for doing this was on reddit [1], where people
recommended to use TunSafe. TunSafe is unfortunately still closed-souce
(AFAIK), and the wireguard developers have already expressed negative
opinions ag
Hi again,
Thinking about my former setup with Openvpn, I realized it had a setting
"bypass VPN for local networks" (under "routing"). Is there such a thing in
the Wireguard app? (In the peer config, there is a checkbox "Exclude
private IPs". In doubt, I tried to enable it, but then the wireguard
i
Hi!
I have been using the android app for a while now (non rooted phone,
android 8.0, I installed the app from the play store). It works very well.
I am here to report a little problem: I find myself unable to use a
chromecast while wireguard is running. I tried to exclude Spotify and
Google home
On Mon, May 7, 2018 at 6:34 PM, ѽ҉ᶬḳ℠ wrote:
>
> there is no (regular) external audit of WG, at least publicly available,
> neither confirming or contradicting.
>
You keep bringing this lack of security audit as if it was a big deal, but
you don't get any intrinsic security from an audit: It's j
On Sun, May 6, 2018 at 9:39 PM, ѽ҉ᶬḳ℠ wrote:
> With a thread model considering every piece of software being flawed in
> mind, and with whatever CVE unearthed being a point in case, it should be
> of little surprise that the question of mitigating surface exposure is
> raised. Once WG would gain
Re-adding the ML that I removed from my response by mistake
On Mon, May 7, 2018 at 3:12 PM, ѽ҉ᶬḳ℠ wrote:
> Thank you for the instant response.
>
>>
>> Wireguard does not mess with the DNS (afaik) so whatever is already
>> configured on the client is used.
>>
>
> Had hoped there would a way for t
If wg was binding to a particular interface, I don't think it would be
possible to support roaming scenarios. I have a travel wifi router, and I
love the fact that it will automatically switch between connecting through
the Ethernet interface or the USB tethering one.
The need you describe is orth
Hi Baptiste,
Thanks for the link! I started reading and it looks like exactly what I was
looking for.
Best,
Christophe-Marie
On Thu, Apr 19, 2018, 19:31 Baptiste Jonglez
wrote:
> Hi,
>
> On 18-04-18, Christophe-Marie Duquesne wrote:
> > Hi list,
> >
> > Maybe the a
Hi list,
Maybe the answer is obvious to some of you, but I don't quite
understand why wireguard does not support broadcasting, and I found no
clear explanation in the archive. In fact, this [1] seems to indicate
that implementing it would be doable, so I am wondering why this has
not been done.
C
Hi Jason,
Sure, I would be happy to help!
@Martin: based on your name and some quick googling, I assume you are
German. If you are in Munich, let me know, we could meet and discuss about
your gsoc topic in real life.
Best,
Christophe-Marie
On Sat, Apr 14, 2018, 00:25 Jason A. Donenfeld wrote:
Weird. Once again, I did not receive this answer and saw it on the
online archive.
from https://lists.zx2c4.com/pipermail/wireguard/2018-April/002598.html:
> > I could add this to the script, but I figured that for the number of
> > peers I have and for the network ranges I am using, it is utterly
Hum, I thought this thread had gone unanswered because nothing ever
reached my inbox, but I just found out about the answers browsing the
archive:
from https://lists.zx2c4.com/pipermail/wireguard/2018-April/002594.html:
> I'm interested in it being integrated into WG, as it is exactly what I
> ask
Hi,
In an old thread [1], danrl suggested deriving node addresses from the
peer public keys. I liked this idea, so I wrote a tool to do it. It
works like this:
generate an ipv6 address from the default ipv6 subnet of the script
(fd1a:6126:2887::/48):
wg-ip -6 gen uymIRDopubn0XRLLRTymOvuK2iG90wRcX
On Sat, Mar 3, 2018 at 5:04 AM, Reuben Martin wrote:
> ARP is layer2. Wireguard is layer3. If you want ARP requests to propogate
> between the networks you will have to set up layer2 tunneling of some sort.
Ok, thanks a lot. The other VPN software I have used can also
transport layer2: openvpn ha
Hi,
The lack of answer suggested nobody was familiar enough with
avahi-autoipd, so I am giving more details.
According to the manpage, avahi-autoipd is an implementation of
https://tools.ietf.org/html/rfc3927.html. To achieve autoconfiguration
of their ip address, hosts randomly select an address
Hi,
I have been using tinc in the past, and they had a super convenient
mode called "switch", which could be used to assign ip addresses with
avahi:
https://www.tinc-vpn.org/examples/zeroconf-ip-and-dns/
I was wondering if there was a way to do the same with wireguard.
Similarly, I was wonderin
19 matches
Mail list logo