Thanks, Arne. Sorry if I wasn't a clear as I should have been. On Wed, Oct 12, 2016 at 8:08 AM, Arne Schwabe <a...@rfc2549.org> wrote: > > Am 12.10.16 um 13:17 schrieb Jonathan K. Bullard: > > Hi. > > > > On Wed, Oct 12, 2016 at 5:13 AM, Arne Schwabe <a...@rfc2549.org> wrote: > >> This option was useful when Ipv6 tun support was > >> non standard and was an internal/user specified flag > >> that tracked the Ipv6 capability of the tun device. > >> > >> All supported OS support IPv6. Also tun-ipv6 is > >> pushable by the remote so not putting tun-ipv6 > >> does not forbid ipv6 addresses. > > How will this patch affect a VPN on a system that has IPv6 disabled? > > > > > Short version: Fail as miserable as before.
Connections don't fail in the situation I describe (IPv6 disabled at the OS level). At least not when there are no IPv6 options enabled in the OpenVPN configuration or pushed from the server, which is the setup that many VPN service providers use. > You might think that leaving out tun-ipv6 might fix your > problem but tun-ipv6 is a pushable option and the server-ipv6 macro will > push it, so you end up with tun-ipv6 without having it in the client config. The problem was not that the server was pushing tun-ipv6 (the configurations and server pushes did not have any IPv6 references). The problem was that the OS prefers IPv6 over IPv4 when both were available. So the OS was sending out IPv6 packets, which caused information leakage. The solution was not leaving out the tun-ipv6 option, but disabling IPv6 in the OS. What I should have asked is: with this patch will an OpenVPN client still send out IPv4 packets if there are no IPv6 options specified or pulled from the server? If yes, the connection will succeed. If no, then disabling IPv6 in the OS will cause failed connections. (Unless with IPv6 disabled the OS translates IPv6 packets to IPv4 and sends them, which seems unlikely to me.) ------------------------------------------------------------------------------ Check out the vibrant tech community on one of the world's most engaging tech sites, SlashDot.org! http://sdm.link/slashdot _______________________________________________ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel