Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature Request: Access to all options limiting interfaces and propagation #66

Open
noseshimself opened this issue Aug 6, 2022 · 1 comment
Labels
enhancement New feature or request

Comments

@noseshimself
Copy link

(not necessarily needed in the "GUI"; I would be happy if I could do it editing a text file and including that in the configuraton)

Reason: ChromeOS is using Android applications for VPN applications taht are not included in the standard ChromeOS (basically anything interesting, even Wireguard is not enabled in most Chrome-device specific kernels).

(Reasonably current) ChromeOS is turning the device into a collection of virtual machines (one of them running the Nebula app itself...) which results the system showing up with a bunch of reported addresses which are completely useless, especially if the device is inside some carrier-grade NATbehind-NAT-behind-NAT setup. It would be good to be able to suppress all of these reported addresses on the client (and keeping in mind that the client will never know about the device's real network addresses at all).

@congzhangzh
Copy link

yes, like wireguard

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

3 participants