diff options
author | Jason A. Donenfeld <Jason@zx2c4.com> | 2020-11-19 18:23:00 +0100 |
---|---|---|
committer | Jason A. Donenfeld <Jason@zx2c4.com> | 2020-11-22 22:00:32 +0100 |
commit | 06447c39fad2398e4c35c56acc5e66cc1e581f65 (patch) | |
tree | bd9d332f9d114ce2ae8f147b637c4900438aa547 /ui | |
parent | installer: remove admin knobs in cleanup (diff) | |
download | wireguard-windows-06447c39fad2398e4c35c56acc5e66cc1e581f65.tar.xz wireguard-windows-06447c39fad2398e4c35c56acc5e66cc1e581f65.zip |
tunnel: only enable DNS blocking for 0/0 configs
This lets people use split tunnel DNS for the more common case.
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
Diffstat (limited to 'ui')
-rw-r--r-- | ui/editdialog.go | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/ui/editdialog.go b/ui/editdialog.go index 5c6d0ac0..97dcb612 100644 --- a/ui/editdialog.go +++ b/ui/editdialog.go @@ -129,7 +129,7 @@ func newEditDialog(owner walk.Form, tunnel *manager.Tunnel) (*EditDialog, error) return nil, err } dlg.blockUntunneledTrafficCB.SetText(l18n.Sprintf("&Block untunneled traffic (kill-switch)")) - dlg.blockUntunneledTrafficCB.SetToolTipText(l18n.Sprintf("When a configuration has exactly one peer, and that peer has an allowed IPs containing at least one of 0.0.0.0/0 or ::/0, then the tunnel service engages a firewall ruleset to block all traffic that is neither to nor from the tunnel interface, with special exceptions for DHCP and NDP.")) + dlg.blockUntunneledTrafficCB.SetToolTipText(l18n.Sprintf("When a configuration has exactly one peer, and that peer has an allowed IPs containing at least one of 0.0.0.0/0 or ::/0, then the tunnel service engages a firewall ruleset to block all traffic that is neither to nor from the tunnel interface or is to the wrong DNS server, with special exceptions for DHCP and NDP.")) dlg.blockUntunneledTrafficCB.SetVisible(false) dlg.blockUntunneledTrafficCB.CheckedChanged().Attach(dlg.onBlockUntunneledTrafficCBCheckedChanged) |