Security Exceptions
This page groups options that intentionally weaken default guarantees.
DNS containment exceptions
Section titled “DNS containment exceptions”dns.mode = "compat"disables strict DNS containment.dns.allowHostResolverIPC = trueallows resolver helper IPC paths and weakens strict-mode isolation.
Use these only when workloads break under strict mode and you cannot fix the application behavior.
Endpoint exceptions
Section titled “Endpoint exceptions”wireguard.allowHostnameEndpoints = trueallows hostname endpoints and moves endpoint resolution outside strict DNS guarantees.- If you need endpoint pinning, use literal endpoints.
Host ingress exceptions
Section titled “Host ingress exceptions”publishToHost.tcpandhostLink.enablecreate host-to-namespace communication paths.- This is expected for admin UIs/reverse proxies, but it expands attack surface compared to no host ingress.
publishToHost.tcp is the common-path abstraction. Raw hostLink.* tuning is
for advanced deployments only.
High-assurance behavior
Section titled “High-assurance behavior”securityProfile = "highAssurance" rejects multiple weaker paths by design.
dns.allowHostResolverIPC = truewireguard.allowHostnameEndpoints = true- inline
networking.wireguard.interfaces.<if>.privateKey allowedIPsAsRoutes = false
Use this profile when compatibility trade-offs are acceptable and destination-constrained policy is required.