Wireguard is a vpn technology, that is used outside of your wifi to access your local lan via foreign wifi or mobile network…
But due to its flawless roaming functionality it doesn’t matter, if you still use it, when you are back home in your own wifi, where you are in you local lan… its just more overhead and maybe slower…
The dns is defined in the client wireguard config with the option DNS … So the client wireguard daemon sets the dns setting… the server does not push the setting as you might know from openvpn…
The network witch wireguard uses internal is of course another subnet as the hom lan network…
[Interface]
Address = 10.13.32.1/24,fd42:42:42::1/64
ListenPort = 53120
PrivateKey =
PostUp = iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE; ip6tables -t nat -A POSTROUTING -o enp2s0f0 -j MASQUERADE
PostDown = iptables -t nat -D POSTROUTING -o eth0 -j MASQUERADE; ip6tables -t nat -D POSTROUTING -o enp2s0f0 -j MASQUERADE
[Peer]
PublicKey =
AllowedIPs = 10.13.32.2/32,fd42:42:42::2/128
[Peer]
PublicKey =
AllowedIPs = 10.13.32.3/32,fd42:42:42::3/128
[Peer]
PublicKey =
AllowedIPs = 10.13.32.4/32,fd42:42:42::4/128
[Peer]
PublicKey =
AllowedIPs = 10.13.32.5/32,fd42:42:42::5/128
[Peer]
PublicKey =
AllowedIPs = 10.13.32.6/32,fd42:42:42::6/128
[much more peers]
The openvpn side of the gl.net software uses a /etc/openvpn/update-resolv-conf
Maybe Wireguard needs a similar script for changing the dns after proper connection to the server…
By the way I moved to another location and i am using wifi as wan connection now…
Problem still persists… I manually edit /etc/resolv.conf after proper wireguard connection, because the dns submitted via wifi connection from my wan provider can’t be reached afterwards…
After changing resolv.conf “opkg update” finds its servers again…
Thanks for your support never the less…