If you use a docker-compose.yml with network_mode: host and something like command: [ "-ephemeral-ports-range", "30000:30010" ], why does
netstat -tulpen | grep proxy
also lists the Snowflake proxy on the Docker (172.17.0.1) and WireGuard (I have it installed) interface, in addition to eth0 - and that for every single configured port (30000, 30001, …)? Is this correct behavior?
Unfortunately, this parameter does not change anything. Even with -outbound-address set to the local IPv4 of eth0 the process uses/connects to the Docker and WireGuard interface. Strange, or at least unusual, behavior.
Though I suspect this is not gonna be a high-priority one since the connections on other interfaces should not be happening since the Snowflake proxy never passes them to the client as ICE candidates. Not much to worry about.
So, seems to work, there are client connections to the unrestricted proxy and the process is only connected to eth0, not to Docker and WireGuard interface anymore.
What I don’t know is whether the above configuration has a negative impact on clients connecting via IPv6 (udp6).