Wireguard cannot access other wireguard peers, despite Network settings
First, Rethink is an excellent app combining a VPN and an app filter, whitelisting only a limited number of apps connecting to the internet, determined by the user, which is very good, particularly in public wifi networks.
I have used my Wireguard server that it allows peer to peer connections by running once sudo ufw route allow in on wg0 out on wg0 to 10.12.0.0/24 on the Wireguard server to allow connecting own devices within the own Wireguard subnet.
I tested it with the 'official' Wireguard app and indeed I could connect the peers (the other my laptop connected to the same Wireguard server) with each other. But when I use Rethink this did not work, so under 'Network' settings I enabled these three options:
-
Enable network visibility Allow requesting apps to access all available networks. These apps may bypass Rethink's VPN tunnel on-demand. Some audio/video conference apps like Zoom and Meet may require this to function properly.
-
Do not route Private IPs (experimental) Exclude LAN, loopback, multicast, link-local routes from Rethink's VPN tunnel.
-
Use all available networks (experimental) When enabled, Rethink uses all available networks to connect to Internet. If not, it uses whichever network is deemed active by Android.
but to no avail.
How can I allow the Rethink client peer to peer connections in Wireguard ?
How can I allow the Rethink client peer to peer connections in Wireguard
You can't, because Rethink doesn't support this, yet. I'm not sure if we be able to implement this in the current architecture (where WireGuard is run as a TCP/UDP "proxy" and not as a "VPN"), let's see.