The IPV6 address leaks in the default configuration. I tested it less than a week ago. It has been like this since I first tested it three years ago.
Edit:
Be sure to disable IPV6 on your Wi-Fi/Ethernet network and keep the DNS resolver at the distribution default, and everything will run smoothly without leaks.
Be sure to follow the advice of other forum members to enable the permanent Killswitch or at least the automatic connection to the profile when manually adding the Wireguard profile, since when you restart your computer, Fedora may automatically connect to Wi-Fi without automatically connecting to the Wireguard profile.
It happens even when connected to a server.
I agree.
However, a recommended Torrent application when opening Flathub, called Fragments (recommended by Gnome Circle), does not offer this option.
This leak also does not occur when using Windscribeâs permanent Killswitch, which I tested before switching to Proton.
It could also involve a valid application that makes requests of this type. If there is one, I am unaware of it. In this case, the user would leak their IP address.
Or the scenario of some exploitation whose sole motivation is to de-anonymize the user.
- I donât know.
2. It is valid to answer this question in order to compare the Killswitch of VPN providers. Anyone with a subscription to these tools can test it. If the other recommended providers face the same problem, another topic can be opened, requesting notes to be added to the site if the other providers do not implement a fix within a reasonable time. Outside of these situations, this discussion is off-topic.
3. This is a discussion exclusively about Linux. This discussion is off-topic.
No, since the function of Killswitch is to prevent any type of leak on any interface, unless the user explicitly chooses to allow that interface, application, etc., to access the internet outside the VPN tunnel. Another scenario is one in which the platform prevents the full application of the VPN, as is the case with Android, which makes calls outside the tunnel. This is a known scenario and is transparently disclosed to the public.
Any other scenario where an interface, application, etc., accesses the internet with the advanced/permanent Killswitch turned on can be considered a bug.
It is also important to take into account the linked article and what the blog author said.
My memory may be failing me, and I apologize if that is the case, but when âBlock connections without VPNâ is disabled, other applications may leak your IP address using their own protocols. Some privileged Google services may also access the internet outside the tunnel even when âBlock connections without VPNâ is enabled.
Please correct me if I am wrong.
In any case, although Android is based on Linux, it is a mobile platform and is built differently, beyond the topic of the Linux desktop environment.
It would be appropriate to open another topic to talk about Android.
I completely agree.
What made me decide to switch to another VPN provider a few years ago was a bug in Protonâs Killswitch that allowed network connections when the computer came out of sleep mode in Windows.
I currently use Linux, so the above problem does not affect me. Although I remember testing it on Linux at the time, I donât recall the test results, since it wouldnât have affected me then, as I decided to switch back to Windows.
Excellent explanation.
â
Thank you to everyone who is participating in this discussion. Your contributions are valuable.