Announced IPV6 through firewall Linux
I'm pretty baffled by this one, when using ipleak.net every test except for the torrent test will pass. It will return
IP: <PIA IP ADDR>, Port: <some Port> , Annonced IPV6: <My Real IPV6 ADDR>
I have a very basic ip6tables firewall
$ ip6tables -L -v Chain INPUT (policy ACCEPT 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 19 1988 DROP all any any anywhere anywhere Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 0 0 DROP all any any anywhere anywhere Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 12 990 DROP all any any anywhere anywhere
The ip6tables appears to be working, how could my ipv6 possibly be going through? Why can it leak only through a torrent check?
Comments