In Kubernetes environments using Cilium or similar CNI plugins, pod
CIDR addresses (e.g. 100.65.x.x) from the RFC 6598 CGNAT range
(100.64.0.0/10) were being gathered as valid ICE host candidates.
This caused WireGuard endpoints to resolve to non-routable pod IPs,
producing overlay-routed connections with degraded latency instead of
true P2P paths between hosts.
Add three layers of defense:
- Expand the default interface blacklist with common Kubernetes CNI
interface prefixes (cilium_, lxc, cali, flannel, cni, weave)
- Filter local and remote ICE candidates whose addresses fall within
the CGNAT range but outside the NetBird WireGuard network
- Reject UDP mux writes to CGNAT addresses as a defense-in-depth
fallback