Hi all,
I managed to get my AC56U to run both OpenVPN client and Server.
For the client, I have setup the firewall rules to drop any connection outside in case the VPN drops. All working well until I enabled IPV6.
The router is doing DHCP6 (IPV6 enabled), since my I receive IPV6 from my ISP. (!)
The surprise comes because now my IPV6 is visible, instead of being obscured by the VPN tunnel just like my IPV4. -> Leak!
I'm wondering if this is already a bug from the firmware that should not be there. But in any other case, does anyone have a clue on how to prevent this?.
IPV6 are bound to interfaces, which is shared with my IPV4 of course, so not sure how to block/drop the connection via ipv6tables for example, while keeping the VPN alive via IPV4 of course.
Appreciated if any input is available. As well as I'd like to hear a piece of mind message from @RMerlin, in case this is an unintended leak and users might not be aware, or only a false alarm. FW I'm running is 378.54_alpha3, which was so far so good till now.
I managed to get my AC56U to run both OpenVPN client and Server.
For the client, I have setup the firewall rules to drop any connection outside in case the VPN drops. All working well until I enabled IPV6.
The router is doing DHCP6 (IPV6 enabled), since my I receive IPV6 from my ISP. (!)
The surprise comes because now my IPV6 is visible, instead of being obscured by the VPN tunnel just like my IPV4. -> Leak!
I'm wondering if this is already a bug from the firmware that should not be there. But in any other case, does anyone have a clue on how to prevent this?.
IPV6 are bound to interfaces, which is shared with my IPV4 of course, so not sure how to block/drop the connection via ipv6tables for example, while keeping the VPN alive via IPV4 of course.
Appreciated if any input is available. As well as I'd like to hear a piece of mind message from @RMerlin, in case this is an unintended leak and users might not be aware, or only a false alarm. FW I'm running is 378.54_alpha3, which was so far so good till now.