This is a good decision all things considered, but there are plenty of hardware vendors with proprietary firmware that only support ovpn and now mullvad is unusable for them. I suppose the onus is on them to support wireguard, but still think of how long it took python3 to become standard after it was released, I hope to see wireguard become the standard soon but I expect lots of vendors will take their time on the transition.
Never been a Mullvad user, but namespaced-openvpn (https://github.com/slingamn/namespaced-openvpn) was one of the only ways to torrent-over-proxies that I found (years ago); user namespace with the torrent client & openvpn as it's only link out.
There is gluetun, https://github.com/qdm12/gluetun, which servers a similar purpose whole supporting ovpn and wireguard (including prepared configs for various commercial VPN providers). It's usable with, e. g., Docker to have namespace-based proxying of traffic for a container.
serf|1 year ago
I love wireguard and the configuration methods compared to openvpn.
big-green-man|1 year ago
Arnt|1 year ago
Which raises the question: how much warning do you think is reasonable?
jauntywundrkind|1 year ago
Not sure what else folks do for this use case.
c0balt|1 year ago
duskwuff|1 year ago
https://www.wireguard.com/netns/
unknown|1 year ago
[deleted]