From 2474b4a90ba2598e860f48401b1f50cc19c2b3ef Mon Sep 17 00:00:00 2001 From: Mygod Date: Wed, 12 Feb 2020 20:03:36 -0500 Subject: [PATCH] WireGuard kernel mode is no longer supported Explanations can be found here: https://forum.xda-developers.com/showpost.php?p=81750257&postcount=362 Users are recommended to use WireGuard userspace implementation instead. --- README.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/README.md b/README.md index d15f5b9c..c4741e19 100644 --- a/README.md +++ b/README.md @@ -43,7 +43,6 @@ Default settings are picked to suit general use cases and maximize compatibility * Upstream network interface: Main upstream used to reroute traffic. Leave blank for auto detect system VPN (allow/do not bypass this app to use VPN for it to work). Put `none` (or other similarly invalid entries) to suppress tethering VPN. - Put your interface name for tethering WireGuard. * Fallback upstream: Fallback upstream is used when some VPN leave certain routes fallback to default network interface. Leave blank for auto detect. @@ -53,7 +52,7 @@ Default settings are picked to suit general use cases and maximize compatibility - None: Nothing will be done to remap address/port from downstream. I find turning this option off sometimes works better for dummy VPNs like ad-blockers and socksifiers than Simple mode, e.g. Shadowsocks. - But you should never use this for real VPNs like OpenVPN, WireGuard, etc. + But you should never use this for real VPNs like OpenVPN, etc. - Simple: Source address/port from downstream packets will be remapped and that's about it. - (since Android 9) Android Netd Service: Let your system handle masquerade.