this post was submitted on 24 Aug 2023
70 points (98.6% liked)

Linux

48655 readers
549 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS
 

cross-posted from: https://lemmy.world/post/3754933

While experimenting with ProtonVPN's Wireguard configs, I realized that my real IPv6 address was leaking while IPv4 was correctly going through the tunnel. How do I prevent this from happening?

I've already tried adding ::/0 to the AllowedIPs option and IPv6 is listed as disabled in the NetworkManager profile.

you are viewing a single comment's thread
view the rest of the comments
[–] wmassingham 2 points 1 year ago (1 children)

You can either route IPv6 through the tunnel, or if the tunnel doesn't support it, you have to block it somehow if you don't want it going out to the Internet. You can do that by creating a firewall rule to block it on your host or network, or by disabling IPv6 entirely at the host or network level.

[–] Molecular0079 1 points 1 year ago (1 children)

You can either route IPv6 through the tunnel

That's what I am trying to do with the ::/0 option but it doesn't seem to work. I am guessing because the tunnel itself doesn't have IPv6?

[–] [email protected] 1 points 1 year ago (1 children)

Add a dummy IPv6 on the WireGuard interface, like a completely random fd00::/128 address on it so it thinks it's IPv6 enabled. It'll then just go nowhere as the remote end won't accept it. You can then drop it at the firewall level before it goes into the tunnel to save some bandwidth.

[–] Molecular0079 3 points 1 year ago* (last edited 1 year ago) (1 children)

Thanks for the suggestion! It gave me the idea to try setting the connection profile's IPv6 setting to either Link Local or Ignored. Both those options, along with the ::/0 in AllowedIPs, seem to work according to ipleak.net, but I am unsure what the bigger ramifications of this change are.

[–] [email protected] 3 points 1 year ago

It's going to still send that IPv6 traffic through the tunnel and get discarded at the other end but that's about it. You can firewall that off if you want, ideally with a reject rule so things don't have to timeout before realizing it goes nowhere.