Jump to content
Not connected, Your IP: 18.191.100.41
lj2019

IP address changed on wi-fi but not on phone data

Recommended Posts

Hello,

 

I very recently started using AirVPN for my android phone by using the config generator to create a ovpn file for OpenVPN for Android. When I connect to AirVPN using wifi, my public IP address changes. However, when I connect using my phone's 4g connection, my public ip address does not change and sites like whatismyipaddress.com show my location and ISP. Is AirVPN not compatible with an android's wireless network? If it isn't, what can I do to ensure all my data is routed through AirVPN when I am using my phone's 4g connection?

 

Thanks.

 

Share this post


Link to post

There was a similar topic about LTE connectivity, I can't find it anymore. Please provide a logfile of a failed connection, from line 1, into spoilers (how-to in signature).


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

Ok. Before I post though, I want to point out another observation I had. When I connect my laptop to the internet via my android phone's mobile hotspot, and I search for my IP using the laptop, I noticed that it still refers to my phone's real IP and even my phone's ISP. This is despite the fact that both my android phone and my laptop show that I am successfully connected to an AIRVPN server. I don't know if that's normal (If you haven't noticed, I'm a noob at this, so please take the explanations slow), but it's getting me very worried about my privacy.

 

Anyway, here's my log from my android phone after I connected to an AIRVPN server.

 

2017-01-03 05:19:23 Used x 1 tries to get current version (4/4) of the profile

2017-01-03 05:19:23 Building configuration…

2017-01-03 05:19:23 started Socket Thread

2017-01-03 05:19:23 Network Status: CONNECTED CDMA - eHRPD to MOBILE VZWINTERNET

2017-01-03 05:19:23 P:WARNING: linker: /data/data/de.blinkt.openvpn/cache/c_pie_openvpn.arm64-v8a: unused DT entry: type 0x6ffffffe arg 0x510

2017-01-03 05:19:23 P:WARNING: linker: /data/data/de.blinkt.openvpn/cache/c_pie_openvpn.arm64-v8a: unused DT entry: type 0x6fffffff arg 0x1

2017-01-03 05:19:23 P:WARNING: linker: libopenvpn.so: unused DT entry: type 0x6ffffffe arg 0x46390

2017-01-03 05:19:23 P:WARNING: linker: libopenvpn.so: unused DT entry: type 0x6fffffff arg 0x2

2017-01-03 05:19:23 P:Initializing Google Breakpad!

2017-01-03 05:19:23 Current Parameter Settings:

2017-01-03 05:19:23   config = '/data/data/de.blinkt.openvpn/cache/android.conf'

2017-01-03 05:19:23   mode = 0

2017-01-03 05:19:23   show_ciphers = DISABLED

2017-01-03 05:19:23   show_digests = DISABLED

2017-01-03 05:19:23   show_engines = DISABLED

2017-01-03 05:19:23   genkey = DISABLED

2017-01-03 05:19:23   key_pass_file = '[uNDEF]'

2017-01-03 05:19:23   show_tls_ciphers = DISABLED

2017-01-03 05:19:23   connect_retry_max = 0

2017-01-03 05:19:23 Connection profiles [0]:

2017-01-03 05:19:23   proto = udp

2017-01-03 05:19:23   local = '[uNDEF]'

2017-01-03 05:19:23   local_port = '[uNDEF]'

2017-01-03 05:19:23   remote = 'america.vpn.airdns.org'

2017-01-03 05:19:23   remote_port = '443'

2017-01-03 05:19:23   remote_float = DISABLED

2017-01-03 05:19:23   bind_defined = DISABLED

2017-01-03 05:19:23   bind_local = DISABLED

2017-01-03 05:19:23   bind_ipv6_only = DISABLED

2017-01-03 05:19:23   connect_retry_seconds = 2

2017-01-03 05:19:23   connect_timeout = 120

2017-01-03 05:19:23   socks_proxy_server = '[uNDEF]'

2017-01-03 05:19:23   socks_proxy_port = '[uNDEF]'

2017-01-03 05:19:23   tun_mtu = 1500

2017-01-03 05:19:23   tun_mtu_defined = ENABLED

2017-01-03 05:19:23   link_mtu = 1500

2017-01-03 05:19:23   link_mtu_defined = DISABLED

2017-01-03 05:19:23   tun_mtu_extra = 0

2017-01-03 05:19:23   tun_mtu_extra_defined = DISABLED

2017-01-03 05:19:23   mtu_discover_type = -1

2017-01-03 05:19:23   fragment = 0

2017-01-03 05:19:23   mssfix = 1450

2017-01-03 05:19:23   explicit_exit_notification = 5

2017-01-03 05:19:23 Connection profiles END

2017-01-03 05:19:23   remote_random = DISABLED

2017-01-03 05:19:23   ipchange = '[uNDEF]'

2017-01-03 05:19:23   dev = 'tun'

2017-01-03 05:19:23   dev_type = '[uNDEF]'

2017-01-03 05:19:23   dev_node = '[uNDEF]'

2017-01-03 05:19:23   lladdr = '[uNDEF]'

2017-01-03 05:19:23   topology = 1

2017-01-03 05:19:23   ifconfig_local = '[uNDEF]'

2017-01-03 05:19:23   ifconfig_remote_netmask = '[uNDEF]'

2017-01-03 05:19:23   ifconfig_noexec = DISABLED

2017-01-03 05:19:23   ifconfig_nowarn = ENABLED

2017-01-03 05:19:23   ifconfig_ipv6_local = '[uNDEF]'

2017-01-03 05:19:23   ifconfig_ipv6_netbits = 0

2017-01-03 05:19:23   ifconfig_ipv6_remote = '[uNDEF]'

2017-01-03 05:19:23   shaper = 0

2017-01-03 05:19:23   mtu_test = 0

2017-01-03 05:19:23   mlock = DISABLED

2017-01-03 05:19:23   keepalive_ping = 0

2017-01-03 05:19:23   keepalive_timeout = 0

2017-01-03 05:19:23   inactivity_timeout = 0

2017-01-03 05:19:23   ping_send_timeout = 0

2017-01-03 05:19:23   ping_rec_timeout = 0

2017-01-03 05:19:23   ping_rec_timeout_action = 0

2017-01-03 05:19:23   ping_timer_remote = DISABLED

2017-01-03 05:19:23   remap_sigusr1 = 0

2017-01-03 05:19:23   persist_tun = ENABLED

2017-01-03 05:19:23   persist_local_ip = DISABLED

2017-01-03 05:19:23   persist_remote_ip = DISABLED

2017-01-03 05:19:23   persist_key = DISABLED

2017-01-03 05:19:23   passtos = DISABLED

2017-01-03 05:19:23   resolve_retry_seconds = 1000000000

2017-01-03 05:19:23   resolve_in_advance = ENABLED

2017-01-03 05:19:23   username = '[uNDEF]'

2017-01-03 05:19:23   groupname = '[uNDEF]'

2017-01-03 05:19:23   chroot_dir = '[uNDEF]'

2017-01-03 05:19:23   cd_dir = '[uNDEF]'

2017-01-03 05:19:23   writepid = '[uNDEF]'

2017-01-03 05:19:23   up_script = '[uNDEF]'

2017-01-03 05:19:23   down_script = '[uNDEF]'

2017-01-03 05:19:23   down_pre = DISABLED

2017-01-03 05:19:23   up_restart = DISABLED

2017-01-03 05:19:23   up_delay = DISABLED

2017-01-03 05:19:23   daemon = DISABLED

2017-01-03 05:19:23   inetd = 0

2017-01-03 05:19:23   log = DISABLED

2017-01-03 05:19:23   suppress_timestamps = DISABLED

2017-01-03 05:19:23   machine_readable_output = ENABLED

2017-01-03 05:19:23   nice = 0

2017-01-03 05:19:23   verbosity = 4

2017-01-03 05:19:23   mute = 0

2017-01-03 05:19:23   gremlin = 0

2017-01-03 05:19:23   status_file = '[uNDEF]'

2017-01-03 05:19:23   status_file_version = 1

2017-01-03 05:19:23   status_file_update_freq = 60

2017-01-03 05:19:23   occ = ENABLED

2017-01-03 05:19:23   rcvbuf = 0

2017-01-03 05:19:23   sndbuf = 0

2017-01-03 05:19:23   sockflags = 0

2017-01-03 05:19:23   fast_io = DISABLED

2017-01-03 05:19:23   comp.alg = 2

2017-01-03 05:19:23   comp.flags = 1

2017-01-03 05:19:23   route_script = '[uNDEF]'

2017-01-03 05:19:23   route_default_gateway = '[uNDEF]'

2017-01-03 05:19:23   route_default_metric = 0

2017-01-03 05:19:23   route_noexec = DISABLED

2017-01-03 05:19:23   route_delay = 0

2017-01-03 05:19:23   route_delay_window = 30

2017-01-03 05:19:23   route_delay_defined = DISABLED

2017-01-03 05:19:23   route_nopull = DISABLED

2017-01-03 05:19:23   route_gateway_via_dhcp = DISABLED

2017-01-03 05:19:23   allow_pull_fqdn = DISABLED

2017-01-03 05:19:23   management_addr = '/data/data/de.blinkt.openvpn/cache/mgmtsocket'

2017-01-03 05:19:23   management_port = 'unix'

2017-01-03 05:19:23   management_user_pass = '[uNDEF]'

2017-01-03 05:19:23   management_log_history_cache = 250

2017-01-03 05:19:23   management_echo_buffer_size = 100

2017-01-03 05:19:23   management_write_peer_info_file = '[uNDEF]'

2017-01-03 05:19:23   management_client_user = '[uNDEF]'

2017-01-03 05:19:23   management_client_group = '[uNDEF]'

2017-01-03 05:19:23   management_flags = 4390

2017-01-03 05:19:23   shared_secret_file = '[uNDEF]'

2017-01-03 05:19:23   key_direction = 2

2017-01-03 05:19:23   ciphername = 'AES-256-CBC'

2017-01-03 05:19:23   ncp_enabled = ENABLED

2017-01-03 05:19:23   ncp_ciphers = 'AES-256-GCM:AES-128-GCM'

2017-01-03 05:19:23   authname = 'SHA1'

2017-01-03 05:19:23   prng_hash = 'SHA1'

2017-01-03 05:19:23   prng_nonce_secret_len = 16

2017-01-03 05:19:23   keysize = 0

2017-01-03 05:19:23   engine = DISABLED

2017-01-03 05:19:23   replay = ENABLED

2017-01-03 05:19:23   mute_replay_warnings = DISABLED

2017-01-03 05:19:23   replay_window = 64

2017-01-03 05:19:23   replay_time = 15

2017-01-03 05:19:23   packet_id_file = '[uNDEF]'

2017-01-03 05:19:23   use_iv = ENABLED

2017-01-03 05:19:23   test_crypto = DISABLED

2017-01-03 05:19:23   tls_server = DISABLED

2017-01-03 05:19:23   tls_client = ENABLED

2017-01-03 05:19:23   key_method = 2

2017-01-03 05:19:23   ca_file = '[[iNLINE]]'

2017-01-03 05:19:23   ca_path = '[uNDEF]'

2017-01-03 05:19:23   dh_file = '[uNDEF]'

2017-01-03 05:19:23   cert_file = '[[iNLINE]]'

2017-01-03 05:19:23   extra_certs_file = '[uNDEF]'

2017-01-03 05:19:23   priv_key_file = '[[iNLINE]]'

2017-01-03 05:19:23   pkcs12_file = '[uNDEF]'

2017-01-03 05:19:23   cipher_list = '[uNDEF]'

2017-01-03 05:19:23   tls_verify = '[uNDEF]'

2017-01-03 05:19:23   tls_export_cert = '[uNDEF]'

2017-01-03 05:19:23   verify_x509_type = 0

2017-01-03 05:19:23   verify_x509_name = '[uNDEF]'

2017-01-03 05:19:23   crl_file = '[uNDEF]'

2017-01-03 05:19:23   ns_cert_type = 0

2017-01-03 05:19:23   remote_cert_ku = 160

2017-01-03 05:19:23   remote_cert_ku = 136

2017-01-03 05:19:23   remote_cert_ku = 0

2017-01-03 05:19:23   remote_cert_ku = 0

2017-01-03 05:19:23   remote_cert_ku = 0

2017-01-03 05:19:23   remote_cert_ku = 0

2017-01-03 05:19:23   remote_cert_ku = 0

2017-01-03 05:19:23   remote_cert_ku = 0

2017-01-03 05:19:23   remote_cert_ku = 0

2017-01-03 05:19:23   remote_cert_ku = 0

2017-01-03 05:19:23   remote_cert_ku = 0

2017-01-03 05:19:23   remote_cert_ku = 0

2017-01-03 05:19:23   remote_cert_ku = 0

2017-01-03 05:19:23   remote_cert_ku = 0

2017-01-03 05:19:23   remote_cert_ku = 0

2017-01-03 05:19:23   remote_cert_ku = 0

2017-01-03 05:19:23   remote_cert_eku = 'TLS Web Server Authentication'

2017-01-03 05:19:23   ssl_flags = 0

2017-01-03 05:19:23   tls_timeout = 2

2017-01-03 05:19:23   renegotiate_bytes = -1

2017-01-03 05:19:23   renegotiate_packets = 0

2017-01-03 05:19:23   renegotiate_seconds = 3600

2017-01-03 05:19:23   handshake_window = 60

2017-01-03 05:19:23   transition_window = 3600

2017-01-03 05:19:23   single_session = DISABLED

2017-01-03 05:19:23   push_peer_info = DISABLED

2017-01-03 05:19:23   tls_exit = DISABLED

2017-01-03 05:19:23   tls_auth_file = '[[iNLINE]]'

2017-01-03 05:19:23   tls_crypt_file = '[uNDEF]'

2017-01-03 05:19:23   client = ENABLED

2017-01-03 05:19:23   pull = ENABLED

2017-01-03 05:19:23   auth_user_pass_file = '[uNDEF]'

2017-01-03 05:19:23 OpenVPN 2.5-icsopenvpn [git:icsopenvpn-d0314998c474c182+] android-21-arm64-v8a [sSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Dec 26 2016

2017-01-03 05:19:23 library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09

2017-01-03 05:19:23 MANAGEMENT: Connected to management server at /data/data/de.blinkt.openvpn/cache/mgmtsocket

2017-01-03 05:19:23 MANAGEMENT: CMD 'hold release'

2017-01-03 05:19:24 MANAGEMENT: CMD 'bytecount 2'

2017-01-03 05:19:24 MANAGEMENT: CMD 'proxy NONE'

2017-01-03 05:19:24 MANAGEMENT: CMD 'state on'

2017-01-03 05:19:25 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2017-01-03 05:19:25 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2017-01-03 05:19:25 LZO compression initializing

2017-01-03 05:19:25 Control Channel MTU parms [ L:1622 D:1184 EF:66 EB:0 ET:0 EL:3 ]

2017-01-03 05:19:25 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]

2017-01-03 05:19:25 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'

2017-01-03 05:19:25 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'

2017-01-03 05:19:25 TCP/UDP: Preserving recently used remote address: [AF_INET]137.63.71.50:443

2017-01-03 05:19:25 Socket Buffers: R=[229376->229376] S=[229376->229376]

2017-01-03 05:19:25 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'

2017-01-03 05:19:25 UDP link local: (not bound)

2017-01-03 05:19:25 UDP link remote: [AF_INET]137.63.71.50:443

2017-01-03 05:19:25 MANAGEMENT: >STATE:1483438765,WAIT,,,,,,

2017-01-03 05:19:25 MANAGEMENT: >STATE:1483438765,AUTH,,,,,,

2017-01-03 05:19:25 TLS: Initial packet from [AF_INET]137.63.71.50:443, sid=049cc28b e47e8978

2017-01-03 05:19:25 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

2017-01-03 05:19:25 Validating certificate key usage

2017-01-03 05:19:25 ++ Certificate has key usage  00a0, expects 00a0

2017-01-03 05:19:25 VERIFY KU OK

2017-01-03 05:19:25 Validating certificate extended key usage

2017-01-03 05:19:25 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

2017-01-03 05:19:25 VERIFY EKU OK

2017-01-03 05:19:25 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

2017-01-03 05:19:30 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

2017-01-03 05:19:30 [server] Peer Connection Initiated with [AF_INET]137.63.71.50:443

2017-01-03 05:19:31 MANAGEMENT: >STATE:1483438771,GET_CONFIG,,,,,,

2017-01-03 05:19:31 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

2017-01-03 05:19:32 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.13.40 255.255.0.0'

2017-01-03 05:19:32 OPTIONS IMPORT: timers and/or timeouts modified

2017-01-03 05:19:32 OPTIONS IMPORT: compression parms modified

2017-01-03 05:19:32 OPTIONS IMPORT: --ifconfig/up options modified

2017-01-03 05:19:32 OPTIONS IMPORT: route options modified

2017-01-03 05:19:32 OPTIONS IMPORT: route-related options modified

2017-01-03 05:19:32 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

2017-01-03 05:19:32 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:406 ET:0 EL:3 ]

2017-01-03 05:19:32 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

2017-01-03 05:19:32 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

2017-01-03 05:19:32 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

2017-01-03 05:19:32 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

2017-01-03 05:19:32 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo HWADDR=00:00:00:00:00:00

2017-01-03 05:19:32 do_ifconfig, tt->did_ifconfig_ipv6_setup=0

2017-01-03 05:19:32 MANAGEMENT: >STATE:1483438772,ASSIGN_IP,,10.4.13.40,,,,

2017-01-03 05:19:32 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'

2017-01-03 05:19:32 MANAGEMENT: CMD 'needok 'ROUTE' ok'

2017-01-03 05:19:32 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'

2017-01-03 05:19:32 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'

2017-01-03 05:19:32 Opening tun interface:

2017-01-03 05:19:32 Local IPv4: 10.4.13.40/16 IPv6: null MTU: 1500

2017-01-03 05:19:32 DNS Server: 10.4.0.1, Domain: null

2017-01-03 05:19:32 Routes: 0.0.0.0/0, 10.4.0.0/16

2017-01-03 05:19:32 Routes excluded:  

2017-01-03 05:19:32 VpnService routes installed: 0.0.0.0/0

2017-01-03 05:19:32 Disallowed VPN apps:

2017-01-03 05:19:32 MANAGEMENT: CMD 'needok 'OPENTUN' ok'

2017-01-03 05:19:32 Initialization Sequence Completed

2017-01-03 05:19:32 MANAGEMENT: >STATE:1483438772,CONNECTED,SUCCESS,10.4.13.40,137.63.71.50,443,,

Share this post


Link to post

This is despite the fact that both my android phone and my laptop show that I am successfully connected to an AIRVPN server.

 

Tethering does not work with the VPNService API on Android, it will get routed through conventional interfaces (wlan0 for example) and not through tun0. On Windows, the tethering NIC should have a lower metric than the primary physical interface (routing works by using the interface with the lowest metric first), apparently it's even lower than TAP-Windows.

You request your IP with Windows, Windows routes it to Android, Android routes it through WLAN or 2G/3G/4G whichever is available. Ergo, you see the phone's provider


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

Ah.. i'm gonna be honest. I only partially understood the first part of your post - although im glad you did provide that cause thats how im learning - but i understood perfectly the part where you broke it down neatly. Tethering does not work with AirVPN. Got it. Thx.

 

But that still doesnt solve my original problem. Why is my Android's LTE connection not being routed through an AirVPN server even though OpenVPN says im successfully connected? Am i doomed to being able to use AirVPN only through wi-fi?

Share this post


Link to post

Hello,

 

I very recently started using AirVPN for my android phone by using the config generator to create a ovpn file for OpenVPN for Android. When I connect to AirVPN using wifi, my public IP address changes. However, when I connect using my phone's 4g connection, my public ip address does not change and sites like whatismyipaddress.com show my location and ISP. Is AirVPN not compatible with an android's wireless network? If it isn't, what can I do to ensure all my data is routed through AirVPN when I am using my phone's 4g connection?

 

Thanks.

 

Do you have Android 7.0 (Nougat)?

Share this post


Link to post

Tethering does not work with AirVPN.

 

Tethering does not work with any VPN client you use on Android which does not need root access.

 

Would you mind trying a TCP connection?

 

Do you have Android 7.0 (Nougat)?

 

It's in the logs.

2017-01-03 05:19:23 OpenVPN 2.5-icsopenvpn [git:icsopenvpn-d0314998c474c182+] android-21-arm64-v8a [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Dec 26 2016

API level 21 is Lollipop 5.0.


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

 

Tethering does not work with AirVPN.

 

Tethering does not work with any VPN client you use on Android which does not need root access.

 

Would you mind trying a TCP connection?

 

Do you have Android 7.0 (Nougat)?

 

It's in the logs.

2017-01-03 05:19:23 OpenVPN 2.5-icsopenvpn [git:icsopenvpn-d0314998c474c182+] android-21-arm64-v8a [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Dec 26 2016
API level 21 is Lollipop 5.0.

I tried that, but it didnt work. I think i figured out what's going on though, but I don't know how to fix it.

 

When my phone uses LTE and connects to AirVPN, it turns out that it's generating both an IPv4 and an IPv6 address. When I search for specifically my IPv4 public address, it does indeed show an airvpn server. However, and correct me if im wrong, AirVPN does not support IPv6. This is why sites like whatismyipaddress.com show my location and ISP - theyre reading my IPv6 address. When i connect to AirVPN through wifi, as far as I can tell, my phone does not produce an IPv6.

 

Assuming all those assumptions I just made are correct, my question is now this: Is there a way to prevent my phone from producing an IPv6 address when I use its LTE? I briefly googled this, and the only solution i found needed a rooted android, which is something I dont want to do. I also dont want to prevent my phone from permanently producing an IPv6 address... just when it connects to AirVPN

Share this post


Link to post

Go into the settings of your preferred connection profile, then Routing tab > Deleselct "Bypass VPN for local networks". I found a few threads on GitHub though they're all a bit old. But one of them references Android 5.0 and deselecting this apparently disabled IPv6, too.


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...