Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

[BUG] connection to AVM FritzBox's wireguard fails. #396

Copy link
Copy link
@nuthub

Description

@nuthub
Issue body actions

Is there an existing issue for this?

  • I have searched the existing issues

Current Behavior

This is a follow-up on the closed issue #391, which I can't comment on anymore.
In contrast to the closing comment of #391, the issue is related to wireguard, of course. Networking works perfectly fine otherwise. NAT is not involved in any way, the machine (proxmox VM) has its own dedicated public IP addresses. The same machine (proxmox VM) can connect to other wireguard servers from within a container, but not to a FritzBox Wireguard.

Expected Behavior

The wireguard tunnel should allow me to reach and ping hosts at the other side of the tunnel (FritzBox side).

Steps To Reproduce

see #391

Environment

- docker host OS: Debian 12.11 on a Proxmox VM with public IP address, networking works fine.
- Docker container was configured as described (but I also created manually an ubuntu derived container, and tried wg-quick, same behavior)

CPU architecture

x86-64

Docker creation

docker compose up --force-recreate

Container logs

[migrations] started
[migrations] no migrations found
───────────────────────────────────────

      ██╗     ███████╗██╗ ██████╗
      ██║     ██╔════╝██║██╔═══██╗
      ██║     ███████╗██║██║   ██║
      ██║     ╚════██║██║██║   ██║
      ███████╗███████║██║╚██████╔╝
      ╚══════╝╚══════╝╚═╝ ╚═════╝

   Brought to you by linuxserver.io
───────────────────────────────────────

To support the app dev(s) visit:
WireGuard: https://www.wireguard.com/donations/

To support LSIO projects visit:
https://www.linuxserver.io/donate/

───────────────────────────────────────
GID/UID
───────────────────────────────────────

User UID:    1000
User GID:    1000
───────────────────────────────────────
Linuxserver.io version: 1.0.20250521-r0-ls81
Build-date: 2025-07-29T17:05:49+00:00
───────────────────────────────────────

Uname info: Linux a8e182305a85 6.1.0-37-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.140-1 (2025-05-22) x86_64 GNU/Linux
**** As the wireguard module is already active you can remove the SYS_MODULE capability from your container run/compose. ****
****     If your host does not automatically load the iptables module, you may still need the SYS_MODULE capability.     ****
**** Client mode selected. ****
[custom-init] No custom files found, skipping...
**** Disabling CoreDNS ****
**** Found WG conf /config/wg_confs/wg_nuthome.conf, adding to list ****
**** Activating tunnel /config/wg_confs/wg_nuthome.conf ****
[#] ip link add dev wg_nuthome type wireguard
[#] wg setconf wg_nuthome /dev/fd/63
[#] ip -4 address add 192.168.178.203/24 dev wg_nuthome
[#] ip link set mtu 1420 up dev wg_nuthome
**** All tunnels are now active ****
[ls.io-init] done.
**** Disabling tunnel /config/wg_confs/wg_nuthome.conf ****
[#] ip link delete dev wg_nuthome

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    Status

    Issues
    Show more project fields

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions

      Morty Proxy This is a proxified and sanitized view of the page, visit original site.