WireGuard kernel mode is no longer supported

Explanations can be found here: https://forum.xda-developers.com/showpost.php?p=81750257&postcount=362

Users are recommended to use WireGuard userspace implementation instead.
This commit is contained in:
Mygod
2020-02-12 20:03:36 -05:00
committed by GitHub
parent cae191b991
commit 2474b4a90b

View File

@@ -43,7 +43,6 @@ Default settings are picked to suit general use cases and maximize compatibility
* Upstream network interface: Main upstream used to reroute traffic.
Leave blank for auto detect system VPN (allow/do not bypass this app to use VPN for it to work).
Put `none` (or other similarly invalid entries) to suppress tethering VPN.
Put your interface name for tethering WireGuard.
* Fallback upstream:
Fallback upstream is used when some VPN leave certain routes fallback to default network interface.
Leave blank for auto detect.
@@ -53,7 +52,7 @@ Default settings are picked to suit general use cases and maximize compatibility
- None:
Nothing will be done to remap address/port from downstream.
I find turning this option off sometimes works better for dummy VPNs like ad-blockers and socksifiers than Simple mode, e.g. Shadowsocks.
But you should never use this for real VPNs like OpenVPN, WireGuard, etc.
But you should never use this for real VPNs like OpenVPN, etc.
- Simple: Source address/port from downstream packets will be remapped and that's about it.
- (since Android 9) Android Netd Service:
Let your system handle masquerade.