Lurchi 0 Posted ... On Android mobile: having configured a proxy for WIFI connection. then enabling Eddie for Android v.3.2.1 VPN with default settings. When running ipleak.net, I'd expect to see airVPN adresses, Instead I get addresses used by the proxy. Even setting VPN lock didn't change this. Is this a bug or how Eddie is supposed to work? Quote Share this post Link to post
Staff 9971 Posted ... @Lurchi Hello! It could be correct, i.e. it is plausible that the traffic is encrypted & wrapped for the proxy, then OpenVPN/WireGuard library encrypts, wraps and tunnels via VPNService API the traffic to the VPN server, the VPN server unwraps and decrypts for the proxy, finally the proxy decrypts the "final layer" and sends out the traffic to the Internet "real final" destination. A different, less comfortable option is that the Android proxy setup at WiFi level bypasses the VPNService API, but if that happened then the traffic should get blocked by the Android leaks prevention options (but not necessarily by the "VPN Lock" feature of Eddie). Have you enabled "Always on VPN" and "Block traffic if VPN is inactive"? If you provide more details we should be able to reproduce the setup more closely and try to understand what happens exactly. Kind regards Quote Share this post Link to post
Lurchi 0 Posted ... I don't want to always use VPN, so neither 'always-on VPN' nor 'Block traffic if VPN ' is active on Android. If things work as you described, I would consider it a bug. With eddie being connected and VPN tunnel active, traffic should not "bypass". It is pretty misleading to see a lock icon and understand traffic is not tunneled. Quote Share this post Link to post
Staff 9971 Posted ... 1 hour ago, Lurchi said: I don't want to always use VPN, so neither 'always-on VPN' nor 'Block traffic if VPN ' is active on Android. If things work as you described, I would consider it a bug. With eddie being connected and VPN tunnel active, traffic should not "bypass". It is pretty misleading to see a lock icon and understand traffic is not tunneled. Hello! Let's verify before jumping to conclusions. Remember that VPN routing is managed by Android API VPNService, not by the apps themselves. Also, the 1st considered option would be a correct behavior as, according to it, the traffic IS tunneled. Please answer when you have time to the questions. In particular: provide more details to allow us to reproduce the setup and try to understand what happens exactly. Which proxy is it (SOCKS5, HTTP(S)...)? Do you connect over WireGuard or OpenVPN? check what happens with "Always on VPN" and "Block traffic if VPN is inactive" options enabled check what happens with "Always on VPN" disabled and WireGuard app to manage the connection (in place of Eddie) Kind regards Quote Share this post Link to post
Lurchi 0 Posted ... 1) Http proxy AFAIK tinyproxy and air using WG 2) seems to work as expected (note I am no more connected to that WLAN) 3) need to wait until am back again. Based on your theory, is there something specific to look for in trace route? Quote Share this post Link to post
Staff 9971 Posted ... 17 minutes ago, Lurchi said: Based on your theory, is there something specific to look for in trace route? Hello! Yes, definitely, if you can run traceroute please do it and feel free to send us the whole output. It is probably the best way to understand the whole matter. Quote 1) Http proxy AFAIK tinyproxy and air using WG 2) seems to work as expected (note I am no more connected to that WLAN) Excellent, we will test and let you know. Point 2 is very re-assuring. Kind regards Quote Share this post Link to post