IPv6 Leak Exploit

I have discovered a site that is able to to expose an IPV6 address along with the fake IPv4 and ISP:     http://test-ipv6.com/       If I then copy'n'paste the IPV6 address into this site:      https://www.ultratools.com/tools/ipv6Info      It exposes my real ISP and geolocation.         Please run this and Comment your results. Thanks

Comments

  • edited May 2017
    My test didn't show any IPv6 address, so I suggest you look for a way to disable that...something like:
    https://support.microsoft.com/en-us/help/929852/how-to-disable-ipv6-or-its-components-in-windows
  • edited June 2017
    This sounds like a "you" issue. The site in question, ipv6.com, can only see what your system presents to it for the test. It does not 'expose' anything. Its an IPv6 test site intended to do 'diagnostics' on the incoming connection to determine IPv6 readiness. That site is used by many, including professionals in the IT field as well as ISPs and large corporations to test their IPv6 capability and operation and just about every internet network in the world to also test their IPv6 operational capability. If you saw an IPv6 address then your system is leaking either a native or Teredo IPv6 address.

    You do not need the MS site posted above to correct this. To correct this turn on the PIA IPv6 leak protection in the client settings, and uncheck the IPv6 protocol in the interface properties.
  • edited June 2017
    bgxsec said:
    This sounds like a "you" issue. The site in question, ipv6.com, can only see what your system presents to it for the test. It does not 'expose' anything. Its an IPv6 test site intended to do 'diagnostics' on the incoming connection to determine IPv6 readiness. That site is used by many, including professionals in the IT field as well as ISPs and large corporations to test their IPv6 capability and operation and just about every internet network in the world to also test their IPv6 operational capability. If you saw an IPv6 address then your system is leaking either a native or Teredo IPv6 address.

    You do not need the MS site posted above to correct this. To correct this turn on the PIA IPv6 leak protection in the client settings, and uncheck the IPv6 protocol in the interface properties.
    Thanks for checking if it was more than just "me" I have finally found the sollution. My gateway "modem/router combo" doesn't have a documented way to disable IPv6. I managed to hack it by going to "Parental Controls" > "Manage Services" and blocked the IPv6 service on port 80 of my computer. I use The Chrome extension and it controls a proxy on port 444. This has stopped my IPv6 leak without any adverse connection effect. I know a lot of PIA forum members don't have much respect for Chrome. But, Currently it is considered to be one of the most secure OS's available.
  • edited June 2017
    <removed - never mind >
     
Sign In or Register to comment.