On 2/15/19 10:14 PM, 'Evastar' via qubes-users wrote:
Seems after last whonix update my old VPN VM begin leaking traffic. After investigation I 
found that it's because ipv6 primary connection to whonix-gw. I guess that whonix-gw now 
supporting ipv6. It leak traffic through ipv6 connection to whonix and ignore my default 
old ipv4 setup. "qvm-features VM ipv6 0" fixed this issue! But I'm not sure 
about all my others vpns and leaking with ipv6. How I must fix this at vpn setup (on 
load) to be 100% sure that it never happen again?

For debian templates, you can also set in /etc/sysctl.conf:
net.ipv6.conf.all.disable_ipv6 = 1
I guess debian updates might mess with it though.

In particular I didn't notice `man qvm-features` to explain the setting you mentioned.

But thanks for the notice!

It is somewhat odd to observe this change, yes.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9de03e8e-de73-ef11-0b49-0070514e2ddc%40hackingthe.net.
For more options, visit https://groups.google.com/d/optout.

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

Reply via email to