• 1 Post
  • 9 Comments
Joined 4 days ago
cake
Cake day: July 2nd, 2025

help-circle

  • Thanks. It approximately took one or two weeks to setup it up and configure it step by step. I know using a distro without systemd is not the easiest thing for a beginner but I’m already running MX Linux for a while after I had used plain Debian, so I felt pretty confident. Also there are really good guides out there as I mentioned before. The most difficult part was to configure the VPN so that there are no leaks and stuff like that. For that I needed to a lot of tests and do some research. One thing that would be really cool is to do application based split tunneling or even workspace based split tunneling. But first I will need to find a solution to open the port of my torrent client to outside traffic to torrent properly. I think I have a solution to this.


  • Nope, I checked the traffic with mtr and it connects directly to the internal IP address of the server. Also I’ve bound the torrent client to the network interface of the VPN to ensure the traffic goes through the VPN.

    I understand. The problem with the rules above though is that it would block my regular network interface even after the VPN goes down. That’s why I created some postup and postdown rules for the Wireguard config. PostUp = iptables -I OUTPUT -o %i -p udp --dport 53 -j ACCEPT && iptables -A OUTPUT ! -o %i -p udp --dport 53 -j DROP PreDown = iptables -D OUTPUT -o %i -p udp --dport 53 -j ACCEPT && iptables -D OUTPUT ! -o %i -p udp --dport 53 -j DROP This only activates the rules while the VPN interface is on.