Re: [PLUG] a question for Google Bard
How is it that a 2nd vpn tunnel coming in is authenticating in? Ted -Original Message- From: PLUG On Behalf Of American Citizen Sent: Thursday, March 30, 2023 4:45 PM To: plug@pdxlinux.org Subject: Re: [PLUG] a question for Google Bard Paul: I am acquainted with nmcli. What I have to track down is where a 2nd vpn tunnel is coming from. It's not visible in the cable/modem/router end, and it was only caught by using wireshark in raw mode. I actually automated setting up the openvpn connections working from presupplied ones from a certain email company by cli scripts. Sorry, I should have pointed this out in the question for Google's Bard. Randall
Re: [PLUG] a question for Google Bard
Paul I just ran this dns leak test on my Mozilla browser DNS Leak Test Your IP Address IP Address 185.236.200.246 ISP M247 Europe SRL Location United States, Los Angeles Hide your IP addressDNS Leak Test Test Results Found 11 Servers, 2 ISP, 1 Location Your DNS Servers IP Address : ISP : Location : 185.236.200.243 M247 Europe SRL United States, Los Angeles 185.236.200.244 M247 Europe SRL United States, Los Angeles 185.236.200.245 M247 Europe SRL United States, Los Angeles 185.236.200.246 M247 Europe SRL United States, Los Angeles 204.194.237.29 Cisco OpenDNS, LLC United States, Los Angeles 2620:0:cc8::31 Cisco OpenDNS, LLC United States, Los Angeles 2620:0:cc8::36 Cisco OpenDNS, LLC United States, Los Angeles 2620:0:cc8::57 Cisco OpenDNS, LLC United States, Los Angeles 2620:0:cc8::72 Cisco OpenDNS, LLC United States, Los Angeles 2620:0:cc8::79 Cisco OpenDNS, LLC United States, Los Angeles 2620:0:cc8:3::81 Cisco OpenDNS, LLC United States, Los Angeles We only want the M247 DNS addresses, NOT any of the Cisco OpenDNS connections. Oddly IPV6 addressing is being used. nmcli shows owner@localhost:~> nmcli eth0: connected to eth0 "Intel 82579LM" ethernet (e1000e), 40:A8:F0:4F:D2:2F, hw, mtu 1500 ip4 default inet4 192.168.0.12/24 route4 0.0.0.0/0 route4 185.236.200.242/32 route4 192.168.0.0/24 proton0: connected (externally) to proton0 "proton0" tun, sw, mtu 1500 inet4 10.18.0.18/16 route4 10.18.0.0/16 route4 0.0.0.0/1 route4 128.0.0.0/1 This is part of the problem I am facing
Re: [PLUG] a question for Google Bard
Paul: I am acquainted with nmcli. What I have to track down is where a 2nd vpn tunnel is coming from. It's not visible in the cable/modem/router end, and it was only caught by using wireshark in raw mode. I actually automated setting up the openvpn connections working from presupplied ones from a certain email company by cli scripts. Sorry, I should have pointed this out in the question for Google's Bard. Randall
Re: [PLUG] a question for Google Bard
On Thu, 30 Mar 2023, American Citizen wrote: I would love to see Google Bard's answer on how to redo the openSuse Network Manager openvpn software in such a way as to permit easy debugging, so that the hidden vpn established by the NM can be uncovered and understood. Randall, You typically ask questions only after doing your own research, so it's with some fear of suggesting what you've already done to point to nmcli as a way to get to stuff: # list NetworkManager connections nmcli co # note the NAME of the vpn connection, then export # its configuration nmcli co export $vpnName /path/to/vpn.conf -- Paul Heinlein heinl...@madboa.com 45°22'48" N, 122°35'36" W
[PLUG] a question for Google Bard
I would love to see Google Bard's answer on how to redo the openSuse Network Manager openvpn software in such a way as to permit easy debugging, so that the hidden vpn established by the NM can be uncovered and understood. I have looked into the openvpn module for NM and it's not simple. This question would be a good one for uncovering Bard's true capabilities. Randall