-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
On Fri, Feb 15, 2019 at 09:14:51PM +0000, 'Evastar' via qubes-users wrote:
> Hello,
>
> Seems after last whonix update my old VPN VM begin leaking traffic. After investigation I found that it's because ipv6 primary connection to whonix-gw. I guess that whonix-gw now supporting ipv6. It leak traffic through ipv6 connection to whonix and ignore my default old ipv4 setup.
> "qvm-features VM ipv6 0" fixed this issue!
"0" in the command above is _not_ the correct way to disable it. It
should be an empty string:
qvm-features VM ipv6 ''
Details:
https://www.qubes-os.org/doc/networking/#ipv6
Anyway, Whonix comes with firewall rules blocking native IPv6, regardless of
the above setting. If you reach some IPv6, it must be tunneled over Tor
- - which does support IPv6.
> But I'm not sure about all my others vpns and leaking with ipv6. How I must fix this at vpn setup (on load) to be 100% sure that it never happen again?
As Chris already mentioned, one way is to add extra firewall rules:
https://github.com/QubesOS/qubes-doc/pull/795
qubes-vpn-support / qubes-tunnel also comes with relevant firewall
rules.
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-----BEGIN PGP SIGNATURE-----
iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAlxx5PAACgkQ24/THMrX
1yxNqQgAjVLqHETPZrpGoSIDCSEuqeK+vxsC8qjYKZnxOpUYBF4aEY54Jl1Uuo/n
9teh/XisK/25tarxSi+IZyvO//fA9KXHxB4ebFW5WJOqR3a+KakjvudXwuZFUNpv
Zy76Tm6cBlnqWfCxUyJX93RX1TIysz9NoCPyqIQKeLmj01IdRmJGR8nZWnRVqzw7
7AgnCBjscz2h8WJfIZVHCefNH8uOlL3NWU7N7jzCLvVXjZ6NsWaUq3uYqbGskz6O
v1X+daV1618H26NGUmg0vHUPjWvund/53uXSxuEj+bjk6ryXrtZZ8cP2u3YzqpCY
QxzzLb+/HBNn1GF2ICJkT7tzWKN9Rw==
=njJG
-----END PGP SIGNATURE-----