On 6/16/16, Mirimir <miri...@riseup.net> wrote:
> https://vpntesting.info/
>
> I tested 29 Windows VPN clients for DNS, IPv4 and IPv6 Leaks.

Nice.

You might want to include
- For clients that may be doing packet filtering instead of just modifying
kernel routing tables... test ICMP, generic UDP (non-DNS), TCP, etc.
- The codebase and VPN protocol of each client (OpenVPN, SoftEther, etc)

> hit VPN-specified nameservers directly while
> reconnecting after uplink interruption. But that's not a huge issue,
> in that they didn't hit other nameservers.

Seems big if the direct hits were not encrypted over the VPN
and user's requirement is to encrypt to the VPN termination.

> After uplink interruption,
> some failed to reconnect automatically

These interruption, reconnect, renegotiation, timeout,
edge cases are important to discover.


More advanced users of Tor + OpenVPN might be interested
in this capability...
https://community.openvpn.net/openvpn/ticket/577

Reply via email to