Proper gateway redirect leaks real IP on wired network
Posted: Thu Mar 05, 2015 1:45 pm
Hi,
Something odd is happening with a vpn of mine. here are the running versions:
server: Debian Wheezy 64 bit, OpenVPN 2.2.1, installed from debian stable repository.
client: Windows 8.1 Pro Enterprise, OpenVPN 2.3.5, installed from install-kit @openvpn.net website
Server has 1 public IP adress (IPv4) so clients do a NAT on internal subnet, 10.8.0.1/24
I use redirect-gateway def1 bypass-dhcp and it works fine, the client can access the internet via the VPN server.
I also use a localhost unbound instance on the VPN server, for DNS resolving, which listens on IP 10.8.0.1 (vpn server IP) and the client is able to resolve DNS just fine via the VPN server, with no DNS leaks on client side. Checked it via multiple ways and it's ok.
This happens while connected to the internet and obviously to the VPN via a Wireless base connection (the initial network connection, where the client-server VPN tunnel is built into).
When I am on wired network connection, the same client-server analogy, the same config files and versions, the leak tests detect my non-VPN IP address using RTCPeerConnection.
While when connected to the VPN server via a wireless network connection it says RTCPeerConnection not available, when on wired network connection RTCPeerConnection is available and the initial non-VPN IP address along with its DNS servers is disclosed.
P.S. Tests were done in Mozilla Firefox and Google Chrome latest versions.
Why would things happen different when on Wired network connection as opposite to wireless (wi-fi)?
Something odd is happening with a vpn of mine. here are the running versions:
server: Debian Wheezy 64 bit, OpenVPN 2.2.1, installed from debian stable repository.
client: Windows 8.1 Pro Enterprise, OpenVPN 2.3.5, installed from install-kit @openvpn.net website
Server has 1 public IP adress (IPv4) so clients do a NAT on internal subnet, 10.8.0.1/24
I use redirect-gateway def1 bypass-dhcp and it works fine, the client can access the internet via the VPN server.
I also use a localhost unbound instance on the VPN server, for DNS resolving, which listens on IP 10.8.0.1 (vpn server IP) and the client is able to resolve DNS just fine via the VPN server, with no DNS leaks on client side. Checked it via multiple ways and it's ok.
This happens while connected to the internet and obviously to the VPN via a Wireless base connection (the initial network connection, where the client-server VPN tunnel is built into).
When I am on wired network connection, the same client-server analogy, the same config files and versions, the leak tests detect my non-VPN IP address using RTCPeerConnection.
While when connected to the VPN server via a wireless network connection it says RTCPeerConnection not available, when on wired network connection RTCPeerConnection is available and the initial non-VPN IP address along with its DNS servers is disclosed.
P.S. Tests were done in Mozilla Firefox and Google Chrome latest versions.
Why would things happen different when on Wired network connection as opposite to wireless (wi-fi)?