No se recibieron paquetes a través de WireGuard y Pi-Hole (Raspberry Pi 4) #1835
Replies: 1 comment
-
NO WORKS |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Hi there, I want to use pivpn to be able to connect to my company's network remotely. I have everything set up according to this Youtube tutorial using Pi-Hole as well: https://youtu.be/VfOz8RWgnz4?si=gBkw_HVQ8QPV8fcz
I have a certain amount of computer knowledge, but this is getting out of hand
The problem is that when I search through the web the browser gives me this error: "DNS_PROBE_FINISHED_NO_INTERNET"
I don't know what else to try. Yes, I will list suggestions found on the internet that have not worked:Changing Pi-Hole to "Listen on All Interfaces, Allow All Sources"
Change the port to something else in case the router is blocking it
Another thing I've tried is to use the web page: https://www.canyouseeme.org/ to check that you could see the WireGuard port from the outside, the answer of this one is no and I don't know if that could be the fault that makes me not leave
Please Help
`::: Generating Debug Output
:::: PiVPN debug ::::
:::: Latest commit ::::
Branch: master
Commit: ececd4e
Author: 4s3ti
Date: Sat Apr 13 16:00:00 2024 +0200
Summary: build: Add automated release actions
:::: Installation settings ::::
PLAT=Raspbian
OSCN=bullseye
USING_UFW=0
pivpnforceipv6route=0
IPv4dev=eth0
dhcpReserv=1
IPv4addr=192.168.1.154/24
IPv4gw=192.168.1.1
install_user=pi
install_home=/home/pi
VPN=wireguard
pivpnPORT=51820
pivpnDNS1=10.41.51.1
pivpnDNS2=
pivpnHOST=REDACTED
INPUT_CHAIN_EDITED=1
FORWARD_CHAIN_EDITED=0
INPUT_CHAIN_EDITEDv6=
FORWARD_CHAIN_EDITEDv6=
pivpnPROTO=udp
pivpnMTU=1420
pivpnDEV=wg0
pivpnNET=10.41.51.0
subnetClass=24
pivpnenableipv6=0
ALLOWED_IPS="0.0.0.0/0"
UNATTUPG=1
INSTALLED_PACKAGES=()
:::: Server configuration shown below ::::
[Interface]
PrivateKey = server_priv
Address = 10.41.51.1/24
MTU = 1420
ListenPort = 51820
begin Cliente
[Peer]
PublicKey = Cliente_pub
PresharedKey = Cliente_psk
AllowedIPs = 10.41.51.2/32
end Cliente
=============================================
:::: Client configuration shown below ::::
[Interface]
PrivateKey = Cliente_priv
Address = 10.41.51.2/24
DNS = 10.41.51.1
[Peer]
PublicKey = server_pub
PresharedKey = Cliente_psk
Endpoint = REDACTED:51820
AllowedIPs = 0.0.0.0/0
:::: Recursive list of files in ::::
:::: /etc/wireguard shown below ::::
/etc/wireguard:
configs
keys
wg0.conf
/etc/wireguard/configs:
Cliente.conf
clients.txt
/etc/wireguard/keys:
Cliente_priv
Cliente_psk
Cliente_pub
server_priv
server_pub
:::: Self check ::::
:: [OK] IP forwarding is enabled
:: [OK] Iptables MASQUERADE rule set
:: [OK] Iptables INPUT rule set
:: [OK] WireGuard is running
:: [OK] WireGuard is enabled
(it will automatically start on reboot)
:: [OK] WireGuard is listening on port 51820/udp
:::: Having trouble connecting? Take a look at the FAQ:
:::: https://docs.pivpn.io/faq
:::: WARNING: This script should have automatically masked sensitive ::::
:::: information, however, still make sure that PrivateKey, PublicKey ::::
:::: and PresharedKey are masked before reporting an issue. An example key ::::
:::: that you should NOT see in this log looks like this: ::::
:::: YIAoJVsdIeyvXfGGDDadHh6AxsMRymZTnnzZoAb9cxRe ::::
:::: Debug complete ::::
:::
::: Debug output completed above.
::: Copy saved to /tmp/debug.log
:::
`
sudo iptables -t nat -S
-P PREROUTING ACCEPT -P INPUT ACCEPT -P OUTPUT ACCEPT -P POSTROUTING ACCEPT -A POSTROUTING -s 10.41.51.0/24 -o eth0 -m comment --comment wireguard-nat-rule -j MASQUERADE -A POSTROUTING -s 10.216.142.0/24 -o eth0 -m comment --comment wireguard-nat-rule -j MASQUERADE
sudo iptables -S
-P INPUT ACCEPT -P FORWARD ACCEPT -P OUTPUT ACCEPT -A INPUT -i eth0 -p udp -m udp --dport 51820 -m comment --comment wireguard-input-rule -j ACCEPT -A INPUT -i wg0 -p udp -m udp --dport 53 -m comment --comment pihole-DNS-rule -j ACCEPT -A INPUT -i wg0 -p udp -m udp --dport 53 -m comment --comment pihole-DNS-rule -j ACCEPT -A INPUT -i wg0 -p udp -m udp --dport 53 -m comment --comment pihole-DNS-rule -j ACCEPT -A INPUT -i wg0 -p udp -m udp --dport 53 -m comment --comment pihole-DNS-rule -j ACCEPT -A INPUT -i wg0 -p udp -m udp --dport 53 -m comment --comment pihole-DNS-rule -j ACCEPT -A INPUT -i eth0 -p udp -m udp --dport 51826 -m comment --comment wireguard-input-rule -j ACCEPT -A INPUT -i wg0 -p udp -m udp --dport 53 -m comment --comment pihole-DNS-rule -j ACCEPT
sudo netstat -uanp
Active Internet connections (servers and established) Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program n ame udp 0 0 0.0.0.0:51820 0.0.0.0:* - udp 0 0 0.0.0.0:5353 0.0.0.0:* 355/avahi-dae mon: r udp 0 0 0.0.0.0:40437 0.0.0.0:* 355/avahi-dae mon: r udp 0 0 0.0.0.0:53 0.0.0.0:* 643/pihole-FT L udp 0 0 0.0.0.0:68 0.0.0.0:* 623/dhcpcd udp6 0 0 :::51820 :::* - udp6 0 0 :::5353 :::* 355/avahi-dae mon: r udp6 0 0 :::53 :::* 643/pihole-FT L udp6 0 0 :::35144 :::* 355/avahi-dae mon: r
Beta Was this translation helpful? Give feedback.
All reactions