• В чём сложность настройки fastd?

    @fastodor Автор вопроса
    не помогло там, ввёл на сервере А:
    spoiler
    # Log warnings and errors to stderr
    log level warn;
    
    # Log informational messages to syslog
    log to syslog level info;
    
    # Hides IP addresses in log output
    hide ip addresses no;
    
    # Hides MAC addresses in log output
    hide mac addresses no;
    
    # Sets the mode of the interface; the default is TAP mode.
    # In TAP mode, a single interface will be created for all peers
    # in multi-TAP and TUN mode, each peer gets its own interface.
    # mode multitap;
    mode tap;
    
    # Use the L2TP kernel implementation for the “null@l2tp” method.
    # Enabling offloading allows for significantly higher throughput,
    # as data packets don’t need to be copied between kernel and userspace.
    # We do not use methods without encryption so setting this option to
    # "yes" does not make any sense
    offload l2tp no;
    
    # Set the interface name
    interface "mesh-vpn";
    
    # If set to no, fastd will create peer-specific interfaces
    # only as long as there’s an active session with the peer.
    # Does not have an effect in TUN mode.
    #persist interface no;
    persist interface yes;
    
    # Set the interface MTU for TAP mode with xsalsa20/aes128 over IPv4 with a base MTU of 1492 (PPPoE)
    # (see MTU selection documentation)
    # The basic overhead of a fastd packet in TUN mode over IPv4 is 28 bytes plus method-specific overhead
    # Method “null” uses 1 additional header byte, “null@l2tp” 8 bytes, and all other methods 24 bytes
    # TAP mode needs 14 bytes more than TUN mode
    # Tunneling over IPv6 needs 20 bytes more than IPv4
    # If your base MTU is 1500 and you want to use TUN mode over IPv4 with any crypto method
    # Choose 1500 - 28 - 24 = 1448 bytes.
    mtu 1434;
    
    # Enables or disabled forwarding packets between peers.
    forward yes;
    
    # Support salsa2012+umac #and null methods, prefer salsa2012+umac
    method "salsa2012+umac";
    
    # Bind to a fixed port, IPv4 only
    bind 0.0.0.0:10000;
    
    # Sets the user to run fastd as.
    user "nobody";
    
    # Sets the group to run fastd as.
    # Use group "nogroup" in Debian/Ubuntu and "nobody" on RHEL-based distros.
    group "nogroup";
    #group "nogroup";
    
    # By default, fastd switches to the configured user
    # and/or drops its POSIX capabilities after the on-up command has been run
    drop capabilities yes;
    
    # Configures a shell command that is run after the interface is created,
    # before the interface is destroyed, when a handshake is sent to make
    # a new connection, when a new peer connection has been established,
    # or after a peer connection has been lost
    #on pre-up [ sync | async ] "<command>";
    #on up [ sync | async ] "<command>";
    #on down [ sync | async ] "<command>";
    #on post-down [ sync | async ] "<command>";
    #on connect [ sync | async ] "<command>";
    #on establish [ sync | async ] "<command>";
    #on disestablish [ sync | async ] "<command>";
    #on up sync "/usr/local/bin/peer-fastd up virtsrvbr0";
    on up "ip addr add 172.16.0.11/30 dev mesh-vpn";
    
    # Secret key generated by `fastd --generate-key`
    secret "f0a31725e3750e40c7664599359ef80dc209431c865ed3b56f94346c2009d96c";
    
    # An inline peer configuration.
    # peer "peer-01" { remote 198.51.100.11:10000; key "71fdf3236cd5e26a528449b5a9a7ab8c1d78382fa7c740685d4e717a67d21f2d"; }
    peer "peer-02" { remote 192.0.2.12:10000; key "b5b9a0187324e9581c332f9701411ee32da2d0d8c875f2bc0e6d1a72b4241ee2"; }
    #peer "peer-03" { remote 203.0.113.13:10000; key "c7eeafa25a59b910f85dd570dc27dd6889cf3acdf3f1561200f754b377b9d693"; }
    # Include peers from the directory 'peers'
    #include peers from "peers";
    Написано