On 2/15/19 10:14 PM, 'Evastar' via qubes-users wrote:
Seems after last whonix update my old VPN VM begin leaking traffic. After investigation I found that it's because ipv6 primary connection to whonix-gw. I guess that whonix-gw now supporting ipv6. It leak traffic through ipv6 connection to whonix and ignore my default old ipv4 setup. "qvm-features VM ipv6 0" fixed this issue! But I'm not sure about all my others vpns and leaking with ipv6. How I must fix this at vpn setup (on load) to be 100% sure that it never happen again?
For debian templates, you can also set in /etc/sysctl.conf: net.ipv6.conf.all.disable_ipv6 = 1 I guess debian updates might mess with it though.In particular I didn't notice `man qvm-features` to explain the setting you mentioned.
But thanks for the notice! It is somewhat odd to observe this change, yes. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/9de03e8e-de73-ef11-0b49-0070514e2ddc%40hackingthe.net. For more options, visit https://groups.google.com/d/optout.
smime.p7s
Description: S/MIME Cryptographic Signature