lexsilico 0 Posted ... Hi, I'm using the AirVPN Suite for Linux 2.0.0 installed on my raspberry, with wireguard. Everything works fine, but I noticed that it seems that when mounting tun0, bluetit is choosing my wifi interface instead of my wired interface for routing. From the logs I can see : Network gateway is IPv4 192.168.1.254/32 via interface wlan0 Added route IPv4 141.98.XXX.XXX/32 via 192.168.1.254 dev wlan0 Successfully initialized WireGuard device tun0 I have both interfaces enabled on my raspberry (wired : end0 and wifi wlan0), but my wired interface has a lower metric for routing, so I was expecting bluetit to use end0 instead of wlan0. I would prefer to use end0 instead of wlan0 for my vpn. Can you help me to use wlan0 as a first choice ? (btw I don't want to disable wifi interface). Thx Quote Share this post Link to post
Staff 10515 Posted ... @lexsilico Hello! You still have the option to configure policy-based routing using ip to force WireGuard traffic to go through a specific interface, regardless of the default gateway metric. This specific configuration must be created by you as you have no options to force Bluetit to bypass WireGuard (kernel) decisions, and you have no option to tell WireGuard to do the same. You can add your command(s) on the PostUp and PostDown directives to ensure the correct interface is used during the WireGuard connection lifecycle. Note that in this case you will have to use your own profile with Hummingbird (or with Bluetit and Goldcrest), and not the AirVPN integrated Bluetit/Goldcrest connection mode. We will also consult with the Suite development team to study your case in more details and we will update this thread if necessary. We do not rule out the possibility to add in the future special options to compile PostUp and PostDown commands directly from within Bluetit run control file (possibly not via Goldcrest because WireGuard runs PostUp and PostDown specified executable files with root privileges). Kind regards Quote Share this post Link to post
lexsilico 0 Posted ... Thanks a lot for your detailed answer. FYI, I have changed the route on the fly to use wired connection instead of wireless. And it seems after bluetit restart, it now uses the wired one. Also, to be sure I get only one default route at a time, I have setup a network manager dispatch script (/etc/NetworkManager/dispatcher.d/70-wifi-wired-exclusive.sh) that will disable wifi if wired ethernet is connected, and enable it if it is disconnected (I may also add to restart bluetit service in such case so that routing is recreated correctly in such case). BTW, by default on debian I think both wired & wifi are always up, so my case is probably the general one ! Thx again Quote Share this post Link to post
Staff 10515 Posted ... On 4/18/2026 at 11:05 AM, lexsilico said: FYI, I have changed the route on the fly to use wired connection instead of wireless. And it seems after bluetit restart, it now uses the wired one. Hello! We're glad to know it. On 4/18/2026 at 11:05 AM, lexsilico said: by default on debian I think both wired & wifi are always up, so my case is probably the general one ! Consider that when OpenVPN finds two interfaces with the same default gateway it stops immediately by throwing a critical error due to the ambiguity. Can you publish the system's routing table and the various interface settings before WireGuard is launched? Kind regards Quote Share this post Link to post
lexsilico 0 Posted ... root@pi:~# route Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface default 192.168.1.254 0.0.0.0 UG 100 0 0 end0 default 192.168.1.254 0.0.0.0 UG 600 0 0 wlan0 192.168.1.0 0.0.0.0 255.255.255.0 U 100 0 0 end0 192.168.1.0 0.0.0.0 255.255.255.0 U 600 0 0 wlan0 root@pi:~# systemctl start bluetit root@pi:~# route Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 0.0.0.0 0.0.0.0 248.0.0.0 U 0 0 0 tun0 0.0.0.0 0.0.0.0 128.0.0.0 U 0 0 0 tun0 default 192.168.1.254 0.0.0.0 UG 100 0 0 end0 default 192.168.1.254 0.0.0.0 UG 600 0 0 wlan0 8.0.0.0 0.0.0.0 254.0.0.0 U 0 0 0 tun0 11.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0 tun0 12.0.0.0 0.0.0.0 252.0.0.0 U 0 0 0 tun0 16.0.0.0 0.0.0.0 240.0.0.0 U 0 0 0 tun0 32.0.0.0 0.0.0.0 224.0.0.0 U 0 0 0 tun0 64.0.0.0 0.0.0.0 192.0.0.0 U 0 0 0 tun0 128.0.0.0 0.0.0.0 224.0.0.0 U 0 0 0 tun0 128.0.0.0 0.0.0.0 128.0.0.0 U 0 0 0 tun0 141.98.100.146 192.168.1.254 255.255.255.255 UGH 0 0 0 wlan0 160.0.0.0 0.0.0.0 248.0.0.0 U 0 0 0 tun0 168.0.0.0 0.0.0.0 252.0.0.0 U 0 0 0 tun0 172.0.0.0 0.0.0.0 255.240.0.0 U 0 0 0 tun0 172.32.0.0 0.0.0.0 255.224.0.0 U 0 0 0 tun0 172.64.0.0 0.0.0.0 255.192.0.0 U 0 0 0 tun0 172.128.0.0 0.0.0.0 255.128.0.0 U 0 0 0 tun0 173.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0 tun0 174.0.0.0 0.0.0.0 254.0.0.0 U 0 0 0 tun0 176.0.0.0 0.0.0.0 240.0.0.0 U 0 0 0 tun0 192.0.0.0 0.0.0.0 255.128.0.0 U 0 0 0 tun0 192.128.0.0 0.0.0.0 255.224.0.0 U 0 0 0 tun0 192.160.0.0 0.0.0.0 255.248.0.0 U 0 0 0 tun0 192.168.1.0 0.0.0.0 255.255.255.0 U 100 0 0 end0 192.168.1.0 0.0.0.0 255.255.255.0 U 600 0 0 wlan0 192.169.0.0 0.0.0.0 255.255.0.0 U 0 0 0 tun0 192.170.0.0 0.0.0.0 255.254.0.0 U 0 0 0 tun0 192.172.0.0 0.0.0.0 255.252.0.0 U 0 0 0 tun0 192.176.0.0 0.0.0.0 255.240.0.0 U 0 0 0 tun0 192.192.0.0 0.0.0.0 255.192.0.0 U 0 0 0 tun0 193.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0 tun0 194.0.0.0 0.0.0.0 254.0.0.0 U 0 0 0 tun0 196.0.0.0 0.0.0.0 252.0.0.0 U 0 0 0 tun0 200.0.0.0 0.0.0.0 248.0.0.0 U 0 0 0 tun0 208.0.0.0 0.0.0.0 240.0.0.0 U 0 0 0 tun0 224.0.0.0 0.0.0.0 224.0.0.0 U 0 0 0 tun0 root@pi:~# uname -a Linux pi 6.12.47+rpt-rpi-v8 #1 SMP PREEMPT Debian 1:6.12.47-1+rpt1 (2025-09-16) aarch64 GNU/Linux Quote Share this post Link to post
lexsilico 0 Posted ... root@pi:~# nmcli connection show NAME UUID TYPE DEVICE Wired connection 1 1693fcab-84c6-3f41-bc4e-31c30b6a8c08 ethernet end0 preconfigured 9b934a92-9fe6-431c-b425-4211bcaa1166 wifi wlan0 lo ace10a9f-6ae4-4b51-a444-560071316ec0 loopback lo tun0 65f15452-619d-4848-9793-a519f7b08139 wireguard tun0 Please let me know what other info on configuration you would need Quote Share this post Link to post
Staff 10515 Posted ... 2 hours ago, lexsilico said: Please let me know what other info on configuration you would need Hello! Please send also the output of ip a ip route show before you start Bluetit and/or WireGuard. Kind regards Quote Share this post Link to post
lexsilico 0 Posted ... root@pi:~# ip a 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host noprefixroute valid_lft forever preferred_lft forever 2: end0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000 link/ether dc:a6:32:ef:f9:dc brd ff:ff:ff:ff:ff:ff altname enxdca632eff9dc inet 192.168.1.52/24 brd 192.168.1.255 scope global dynamic noprefixroute end0 valid_lft 43166sec preferred_lft 43166sec inet6 2a01:e0a:28:f0c0:d38d:33af:741e:3159/64 scope global dynamic noprefixroute valid_lft 86367sec preferred_lft 86367sec inet6 fe80::3c39:6635:ed98:53a4/64 scope link noprefixroute valid_lft forever preferred_lft forever 3: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000 link/ether dc:a6:32:ef:f9:dd brd ff:ff:ff:ff:ff:ff inet 192.168.1.58/24 brd 192.168.1.255 scope global dynamic noprefixroute wlan0 valid_lft 43199sec preferred_lft 43199sec inet6 2a01:e0a:28:f0c0:5b03:a4c1:9a28:18b3/64 scope global dynamic noprefixroute valid_lft 86388sec preferred_lft 86388sec inet6 fe80::fca1:6d80:5ad6:a4ef/64 scope link noprefixroute valid_lft forever preferred_lft forever root@pi:~# ip route show default via 192.168.1.254 dev end0 proto dhcp src 192.168.1.52 metric 100 default via 192.168.1.254 dev wlan0 proto dhcp src 192.168.1.58 metric 600 192.168.1.0/24 dev end0 proto kernel scope link src 192.168.1.52 metric 100 192.168.1.0/24 dev wlan0 proto kernel scope link src 192.168.1.58 metric 600 Quote Share this post Link to post
Staff 10515 Posted ... 16 hours ago, lexsilico said: root@pi:~# ip route show default via 192.168.1.254 dev end0 proto dhcp src 192.168.1.52 metric 100 default via 192.168.1.254 dev wlan0 proto dhcp src 192.168.1.58 metric 600 192.168.1.0/24 dev end0 proto kernel scope link src 192.168.1.52 metric 100 192.168.1.0/24 dev wlan0 proto kernel scope link src 192.168.1.58 metric 600 Hello! Thanks. Now let's see which route the kernel picks to reach WireGuard's EndPoint. Pick a specific server and verify that the connection takes place through wlan0. From your initial message we see that you may have picked a UK server, let's say Arber (entry-IP addresses 3: 141.98.100.148 and 2001:ac8:31:368:e619:164f:9446:ff2e). Connect to Arber (not to UK in general, connect to this specific server) and verify from the log that WireGuard picks wlan0. Disconnect, shut down Bluetit (sudo systemctl stop bluetit), and check the route the kernel picks on its own: ip route get 141.98.100.148 ip -6 route get 2001:ac8:31:368:e619:164f:9446:ff2e Publish the whole output. Kind regards Quote Share this post Link to post
lexsilico 0 Posted ... Hi, before bluetit startup: root@pi:~# route -n Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 0.0.0.0 192.168.1.254 0.0.0.0 UG 100 0 0 end0 0.0.0.0 192.168.1.254 0.0.0.0 UG 600 0 0 wlan0 192.168.1.0 0.0.0.0 255.255.255.0 U 100 0 0 end0 192.168.1.0 0.0.0.0 255.255.255.0 U 600 0 0 wlan0 root@pi:~# ip route get 141.98.100.148 141.98.100.148 via 192.168.1.254 dev end0 src 192.168.1.52 uid 0 cache root@pi:~# ip -6 route get 2001:ac8:31:368:e619:164f:9446:ff2e 2001:ac8:31:368:e619:164f:9446:ff2e from :: via fe80::8e97:eaff:fe32:b526 dev end0 proto ra src 2a01:e0a:28:f0c0:d38d:33af:741e:3159 metric 100 pref medium bluetit startup log: Apr 19 11:42:23 pi systemd[1]: Starting bluetit.service - AirVPN Bluetit Daemon... Apr 19 11:42:23 pi hummingbird[1366]: Hummingbird - WireGuard/OpenVPN3 Client 2.0.0 - 22 July 2025 Apr 19 11:42:23 pi hummingbird[1366]: OpenVPN core 3.12 AirVPN (20250606) linux arm64 64-bit Apr 19 11:42:23 pi hummingbird[1366]: Copyright (C) 2012- OpenVPN Inc. All rights reserved. Apr 19 11:42:23 pi hummingbird[1366]: OpenSSL 3.5.5 27 Jan 2026 Apr 19 11:42:23 pi hummingbird[1366]: AirVPN WireGuard Client 2.0.0 Linux aarch64 64-bit Apr 19 11:42:23 pi hummingbird[1366]: Sun Apr 19 11:42:23.341 2026 Scanning for system DNS addresses Apr 19 11:42:23 pi hummingbird[1366]: Sun Apr 19 11:42:23.344 2026 Found system IPv4 DNS 1.1.1.1 Apr 19 11:42:23 pi hummingbird[1366]: Sun Apr 19 11:42:23.344 2026 Found system IPv4 DNS 8.8.8.8 Apr 19 11:42:23 pi hummingbird[1366]: Sun Apr 19 11:42:23.344 2026 Found system IPv4 DNS 192.168.1.254 Apr 19 11:42:23 pi hummingbird[1366]: Sun Apr 19 11:42:23.344 2026 Found 3 system DNS addresses Apr 19 11:42:23 pi hummingbird[1366]: It seems this program has properly exited in its last run and it has already Apr 19 11:42:23 pi hummingbird[1366]: restored network settings on exit. Apr 19 11:42:23 pi hummingbird[1366]: Network recovery is not needed. Apr 19 11:42:23 pi bluetit[1375]: Starting Bluetit - AirVPN WireGuard/OpenVPN3 Service 2.0.0 - 22 July 2025 Apr 19 11:42:23 pi bluetit[1375]: OpenVPN core 3.12 AirVPN (20250606) linux arm64 64-bit Apr 19 11:42:23 pi bluetit[1375]: Copyright (C) 2012- OpenVPN Inc. All rights reserved. Apr 19 11:42:23 pi bluetit[1375]: SSL Library: OpenSSL 3.5.5 27 Jan 2026 Apr 19 11:42:23 pi bluetit[1375]: AirVPN WireGuard Client 2.0.0 Linux aarch64 64-bit Apr 19 11:42:23 pi bluetit[1378]: Bluetit daemon started with PID 1378 Apr 19 11:42:23 pi bluetit[1378]: Reading run control directives from file /etc/airvpn/bluetit.rc Apr 19 11:42:23 pi bluetit[1378]: Network check mode is gateway Apr 19 11:42:23 pi bluetit[1378]: Creating AirVPN Boot server list Apr 19 11:42:23 pi systemd[1]: Started bluetit.service - AirVPN Bluetit Daemon. Apr 19 11:42:23 pi bluetit[1378]: Added server http://63.33.78.166 Apr 19 11:42:23 pi bluetit[1378]: Added server http://54.93.175.114 Apr 19 11:42:23 pi bluetit[1378]: Added server http://82.196.3.205 Apr 19 11:42:23 pi bluetit[1378]: Added server http://63.33.116.50 Apr 19 11:42:23 pi bluetit[1378]: Added server http://[2a03:b0c0:0:1010::9b:c001] Apr 19 11:42:23 pi bluetit[1378]: Added server http://bootme.org Apr 19 11:42:23 pi bluetit[1378]: Boot server http://bootme.org resolved into IPv6 2a03:b0c0:0:1010::9b:c001/128 IPv4 82.196.3.205/32 Apr 19 11:42:23 pi bluetit[1378]: AirVPN Boot server list successfully created. Added 6 servers. Apr 19 11:42:23 pi bluetit[1378]: External network is reachable via IPv4 gateway 192.168.1.254 through interface wlan0 Apr 19 11:42:23 pi bluetit[1378]: External network is reachable via IPv6 gateway 192.168.1.254 through interface wlan0 Apr 19 11:42:23 pi bluetit[1378]: Successfully connected to D-Bus Apr 19 11:42:23 pi bluetit[1378]: IPv6 is available in this system Apr 19 11:42:23 pi bluetit[1378]: Default VPN type for AirVPN connections is set to WireGuard Apr 19 11:42:23 pi bluetit[1378]: Bluetit successfully initialized and ready Apr 19 11:42:23 pi bluetit[1378]: Scanning for system DNS addresses Apr 19 11:42:23 pi bluetit[1378]: Found system IPv4 DNS 1.1.1.1 Apr 19 11:42:23 pi bluetit[1378]: Found system IPv4 DNS 8.8.8.8 Apr 19 11:42:23 pi bluetit[1378]: Found system IPv4 DNS 192.168.1.254 Apr 19 11:42:23 pi bluetit[1378]: Found 3 system DNS addresses Apr 19 11:42:23 pi bluetit[1378]: Requesting network IP and country to AirVPN ipleak.net via secure connection Apr 19 11:42:23 pi bluetit[1378]: Network IP: 2a01:e0a:28:f0c0:d38d:33af:741e:3159 Apr 19 11:42:23 pi bluetit[1378]: System country: FR Apr 19 11:42:23 pi bluetit[1378]: AirVPN Manifest updater thread started Apr 19 11:42:23 pi bluetit[1378]: Default AirVPN Manifest update interval is 15 minutes Apr 19 11:42:23 pi bluetit[1378]: AirVPN Manifest update suspended: AirVPN boot connection initialization in progress Apr 19 11:42:23 pi bluetit[1378]: Trying to load the local instance of AirVPN Manifest Apr 19 11:42:23 pi bluetit[1378]: Starting AirVPN WireGuard boot connection Apr 19 11:42:23 pi bluetit[1378]: IPv6 over IPv4 is enabled Apr 19 11:42:23 pi bluetit[1378]: Network filter and lock are using nftables Apr 19 11:42:23 pi bluetit[1378]: AirVPN Manifest successfully retrieved from local instance Apr 19 11:42:23 pi bluetit[1378]: Kernel module nf_tables is already loaded Apr 19 11:42:23 pi bluetit[1378]: Network filter successfully initialized Apr 19 11:42:23 pi bluetit[1378]: Private network is allowed to pass the network filter Apr 19 11:42:23 pi bluetit[1378]: Ping output is allowed to pass the network filter Apr 19 11:42:23 pi bluetit[1378]: IPv6 NDP is allowed to pass the network filter Apr 19 11:42:25 pi bluetit[1378]: Session network filter and lock successfully enabled. Private network is allowed. Apr 19 11:42:25 pi bluetit[1378]: Adding AirVPN bootstrap server 63.33.78.166/32 to network filter Apr 19 11:42:25 pi bluetit[1378]: Adding AirVPN bootstrap server 54.93.175.114/32 to network filter Apr 19 11:42:25 pi bluetit[1378]: Adding AirVPN bootstrap server 82.196.3.205/32 to network filter Apr 19 11:42:25 pi bluetit[1378]: Adding AirVPN bootstrap server 63.33.116.50/32 to network filter Apr 19 11:42:25 pi bluetit[1378]: Adding AirVPN bootstrap server 2a03:b0c0:0:1010::9b:c001/128 to network filter Apr 19 11:42:25 pi bluetit[1378]: Adding AirVPN bootstrap server 2a03:b0c0:0:1010::9b:c001/128 to network filter Apr 19 11:42:25 pi bluetit[1378]: Adding AirVPN bootstrap server 82.196.3.205/32 to network filter Apr 19 11:42:25 pi bluetit[1378]: Updating AirVPN Manifest Apr 19 11:42:25 pi bluetit[1378]: AirVPN bootstrap servers are now allowed to pass through the network filter Apr 19 11:42:25 pi bluetit[1378]: Logging in AirVPN user lexsilico Apr 19 11:42:25 pi bluetit[1378]: Trying connection to AirVPN bootstrap server at http://63.33.78.166 Apr 19 11:42:25 pi bluetit[1378]: Trying connection to AirVPN bootstrap server at http://63.33.78.166 Apr 19 11:42:25 pi bluetit[1378]: AirVPN user lexsilico successfully logged in Apr 19 11:42:25 pi bluetit[1378]: Selected user key: PI Apr 19 11:42:25 pi bluetit[1378]: Starting WireGuard connection to AirVPN server Arber, London (United Kingdom) Apr 19 11:42:25 pi bluetit[1378]: Local interface lo - IPv4 127.0.0.1 IPv6 ::1 Apr 19 11:42:25 pi bluetit[1378]: Local interface end0 - IPv4 192.168.1.52 IPv6 2a01:e0a:28:f0c0:d38d:33af:741e:3159 IPv6 fe80::3c39:6635:ed98:53a4 Apr 19 11:42:25 pi bluetit[1378]: Local interface wlan0 - IPv4 192.168.1.58 IPv6 2a01:e0a:28:f0c0:5b03:a4c1:9a28:18b3 IPv6 fe80::fca1:6d80:5ad6:a4ef Apr 19 11:42:25 pi bluetit[1378]: Default IPv4 gateway via 192.168.1.254 dev wlan0 Apr 19 11:42:25 pi bluetit[1378]: Default IPv6 gateway via 192.168.1.254 dev wlan0 Apr 19 11:42:25 pi bluetit[1378]: Starting WireGuard boot connection Apr 19 11:42:25 pi bluetit[1378]: AirVPN Manifest successfully retrieved from server Apr 19 11:42:25 pi bluetit[1378]: AirVPN Manifest update interval is now set to 30 minutes Apr 19 11:42:25 pi bluetit[1378]: Successfully loaded kernel module wireguard Apr 19 11:42:25 pi bluetit[1378]: WireGuard client successfully created and initialized. Apr 19 11:42:25 pi bluetit[1378]: Ping output is allowed to pass the network filter Apr 19 11:42:25 pi bluetit[1378]: IPv6 NDP is allowed to pass the network filter Apr 19 11:42:25 pi bluetit[1378]: Allowing system IPv4 DNS 1.1.1.1 to pass through the network filter Apr 19 11:42:25 pi bluetit[1378]: Allowing system IPv4 DNS 8.8.8.8 to pass through the network filter Apr 19 11:42:25 pi bluetit[1378]: Allowing system IPv4 DNS 192.168.1.254 to pass through the network filter Apr 19 11:42:27 pi bluetit[1378]: Setting up WireGuard network interface tun0 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv4 0.0.0.0/0 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv6 ::/0 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv4 0.0.0.0/5 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv4 8.0.0.0/7 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv4 11.0.0.0/8 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv4 12.0.0.0/6 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv4 16.0.0.0/4 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv4 32.0.0.0/3 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv4 64.0.0.0/2 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv4 128.0.0.0/3 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv4 160.0.0.0/5 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv4 168.0.0.0/6 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv4 172.0.0.0/12 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv4 172.32.0.0/11 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv4 172.64.0.0/10 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv4 172.128.0.0/9 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv4 173.0.0.0/8 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv4 174.0.0.0/7 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv4 176.0.0.0/4 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv4 192.0.0.0/9 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv4 192.128.0.0/11 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv4 192.160.0.0/13 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv4 192.169.0.0/16 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv4 192.170.0.0/15 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv4 192.172.0.0/14 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv4 192.176.0.0/12 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv4 192.192.0.0/10 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv4 193.0.0.0/8 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv4 194.0.0.0/7 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv4 196.0.0.0/6 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv4 200.0.0.0/5 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv4 208.0.0.0/4 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv4 224.0.0.0/3 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv6 8000::/2 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv6 c000::/3 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv6 e000::/4 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv6 f000::/5 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv6 f800::/6 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv6 fc00::/8 Apr 19 11:42:27 pi bluetit[1378]: Allowing IPv6 fe00::/7 Apr 19 11:42:27 pi bluetit[1378]: WireGuard end point set to IPv4 141.98.100.146, port 1637 Apr 19 11:42:27 pi bluetit[1378]: Successfully created WireGuard device tun0 Apr 19 11:42:27 pi bluetit[1378]: WireGuard interface tun0 set to IPv4 10.162.161.237/32 Apr 19 11:42:27 pi bluetit[1378]: WireGuard interface tun0 set to IPv6 fd7d:76ee:e68f:a993:f55b:14f8:7d12:5913/128 Apr 19 11:42:27 pi bluetit[1378]: WireGuard interface tun0 successfully configured Apr 19 11:42:27 pi bluetit[1378]: MTU WireGuard network interface tun0 set to 1320 Apr 19 11:42:27 pi bluetit[1378]: WireGuard network interface tun0 successfully initialized and ready Apr 19 11:42:27 pi bluetit[1378]: Adding IPv4 server 141.98.100.146 to network filter Apr 19 11:42:28 pi bluetit[1378]: Network filter and lock successfully activated Apr 19 11:42:28 pi bluetit[1378]: Added route IPv4 0.0.0.0/0 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv6 ::/0 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv4 0.0.0.0/5 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv4 8.0.0.0/7 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv4 11.0.0.0/8 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv4 12.0.0.0/6 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv4 16.0.0.0/4 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv4 32.0.0.0/3 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv4 64.0.0.0/2 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv4 128.0.0.0/3 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv4 160.0.0.0/5 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv4 168.0.0.0/6 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv4 172.0.0.0/12 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv4 172.32.0.0/11 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv4 172.64.0.0/10 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv4 172.128.0.0/9 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv4 173.0.0.0/8 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv4 174.0.0.0/7 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv4 176.0.0.0/4 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv4 192.0.0.0/9 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv4 192.128.0.0/11 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv4 192.160.0.0/13 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv4 192.169.0.0/16 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv4 192.170.0.0/15 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv4 192.172.0.0/14 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv4 192.176.0.0/12 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv4 192.192.0.0/10 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv4 193.0.0.0/8 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv4 194.0.0.0/7 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv4 196.0.0.0/6 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv4 200.0.0.0/5 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv4 208.0.0.0/4 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv4 224.0.0.0/3 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv6 8000::/2 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv6 c000::/3 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv6 e000::/4 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv6 f000::/5 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv6 f800::/6 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv6 fc00::/8 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv6 fe00::/7 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv4 128.0.0.0/1 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv6 8000::/1 dev tun0 Apr 19 11:42:28 pi bluetit[1378]: Network gateway is IPv4 192.168.1.254/32 via interface wlan0 Apr 19 11:42:28 pi bluetit[1378]: Added route IPv4 141.98.100.146/32 via 192.168.1.254 dev wlan0 Apr 19 11:42:28 pi bluetit[1378]: Successfully initialized WireGuard device tun0 Apr 19 11:42:28 pi bluetit[1378]: Connected to AirVPN server Arber, London (United Kingdom) (WireGuard) Apr 19 11:42:28 pi bluetit[1378]: VPN Server has pushed DNS IPv4 10.128.0.1 Apr 19 11:42:28 pi bluetit[1378]: Setting pushed IPv4 DNS server 10.128.0.1 in resolv.conf Apr 19 11:42:28 pi bluetit[1378]: VPN Server has pushed DNS IPv6 fd7d:76ee:e68f:a993::1 Apr 19 11:42:28 pi bluetit[1378]: Setting pushed IPv6 DNS server fd7d:76ee:e68f:a993::1 in resolv.conf Apr 19 11:42:28 pi bluetit[1378]: Server has pushed its own DNS. Rejecting system DNS from network filter. Apr 19 11:42:28 pi bluetit[1378]: System IPv4 DNS 1.1.1.1 is now rejected by the network filter Apr 19 11:42:28 pi bluetit[1378]: System IPv4 DNS 8.8.8.8 is now rejected by the network filter Apr 19 11:42:28 pi bluetit[1378]: System IPv4 DNS 192.168.1.254 is now rejected by the network filter Apr 19 11:42:28 pi bluetit[1378]: WireGuard connection monitor thread started Apr 19 11:42:28 pi bluetit[1378]: Connected to AirVPN server Arber, London (United Kingdom) IP address 141.98.100.146 - VPN Type WireGuard - Port 1637 - Protocol UDPv4 - Cipher CHACHA20-POLY1305 Apr 19 11:42:28 pi bluetit[1378]: Pushed DNS: 10.128.0.1 (IPv4) fd7d:76ee:e68f:a993::1 (IPv6) Apr 19 11:42:28 pi bluetit[1378]: Connection monitor thread started After stopping bluetit: root@pi:~# ip route get 141.98.100.148 141.98.100.148 via 192.168.1.254 dev end0 src 192.168.1.52 uid 0 cache root@pi:~# ip -6 route get 2001:ac8:31:368:e619:164f:9446:ff2e 2001:ac8:31:368:e619:164f:9446:ff2e from :: via fe80::8e97:eaff:fe32:b526 dev end0 proto ra src 2a01:e0a:28:f0c0:d38d:33af:741e:3159 metric 100 pref medium Regards Quote Share this post Link to post
Staff 10515 Posted ... @lexsilico Hello! Thank you. We now have all the data. We will update this thread when we have more definite information. In the meantime keep using the successful patch you have already applied. Kind regards Quote Share this post Link to post