Snowplow 2 Posted ... I periodically check my gmail account for login activity. Typically I don't see anything awkward. Occasionally I see my real IP showing up in there from my iPhone, which I have attributed to periodic drops of the VPN. I go through some patchy service areas and OpenVPN doesn't always reconnect successfully. However today I noticed that while actively connected to an AirVPN server, Gmail was logging both my VPN ipv4 address and what appears to be my real ipv6 address from the mobile network. I used ipleak.net and it only showed my VPN ipv4 address. I did this repeatedly in a matter of minutes, checking on ipleak and refreshing my mail via the iOS Mail app and it consistently showed only my VPN ipv4 address at ipleak.net, and both my VPN ipv4 and real ipv6 addresses in Gmail. My instinct said to reboot the phone, which appears to have resolved the issue at least for now. Naturally I'm concerned because the phone claims it is VPN-connected, ipleak.net only shows my VPN information, but somehow I'm getting an ipv6 leak. If I were not checking in Gmail at the time, I would have no indication of a leak. Similarly, I don't know whether there was a corresponding DNS leak. Does anybody have any suggestions of what to check or how to better secure iOS? I have iOS 10.3.3 with the latest OpenVPN client, and I connect via UDP. Quote Share this post Link to post
jean claud 45 Posted ... I periodically check my gmail account for login activity. Typically I don't see anything awkward. Occasionally I see my real IP showing up in there from my iPhone, which I have attributed to periodic drops of the VPN. I go through some patchy service areas and OpenVPN doesn't always reconnect successfully. However today I noticed that while actively connected to an AirVPN server, Gmail was logging both my VPN ipv4 address and what appears to be my real ipv6 address from the mobile network. I used ipleak.net and it only showed my VPN ipv4 address. I did this repeatedly in a matter of minutes, checking on ipleak and refreshing my mail via the iOS Mail app and it consistently showed only my VPN ipv4 address at ipleak.net, and both my VPN ipv4 and real ipv6 addresses in Gmail. My instinct said to reboot the phone, which appears to have resolved the issue at least for now. Naturally I'm concerned because the phone claims it is VPN-connected, ipleak.net only shows my VPN information, but somehow I'm getting an ipv6 leak. If I were not checking in Gmail at the time, I would have no indication of a leak. Similarly, I don't know whether there was a corresponding DNS leak. Does anybody have any suggestions of what to check or how to better secure iOS? I have iOS 10.3.3 with the latest OpenVPN client, and I connect via UDP.I'm using ios 11 (which is more leaky than ios10) and I don't get leak with AirVpn . maybe your email is leaking ... take a look to http://emailipleak.com/ (and if possible let down Gmail for ProtonMail ) Quote Share this post Link to post
Snowplow 2 Posted ... Thank you for the reply and link. I ran that and Gmail does "leak" my ipv4 VPN IP. My concern is a bit different that the mail app is connecting to Gmail's servers using both my ipv4 VPN IP and my ipv6 'real' IP address. Edit: It also seems intermittent. After my reboot, I notice it did this again, however I just used the app again and it only showed my ipv4 VPN information. When it does leak my ipv6, it appears to be simultaneous with my ipv4 connection, based on matching time stamps. My OpenVPN settings are configured as follows:Seamless tunnel (iOS8+) -> ONConnect via -> Any networkReconnect on wakeup -> ONProtocol -> AdaptiveCompression -> FullConnection timeout -> 2 minutesNetwork state detection -> ActiveIPv6 -> disabled Force AES-CBC ciphersuites -> OFFMinimum TLS version -> Profile DefaultGoogle DNS fallback -> ONLayer 2 reachability -> ONSSL log level -> 0 (default) Quote Share this post Link to post
jean claud 45 Posted ... My OpenVPN settings are configured as follows:Seamless tunnel (iOS8+) -> ONConnect via -> Any networkReconnect on wakeup -> ONProtocol -> AdaptiveCompression -> FullConnection timeout -> 2 minutesNetwork state detection -> ActiveIPv6 -> disabled Force AES-CBC ciphersuites -> OFFMinimum TLS version -> Profile DefaultGoogle DNS fallback -> ONLayer 2 reachability -> ONSSL log level -> 0 (default) # for me :Force AES-CBC ciphersuites = ON Google DNS failback = OFF Quote Share this post Link to post