* Stella Ashburne <rewe...@gmx.com>:
> Hi
> 
> Below is a partial log after my machine has connected successfully to my VPN 
> provider's server:
> 
> 2021-11-20 09:18:08 us=74921 Outgoing Data Channel: Cipher 'AES-256-GCM' 
> initialized with 256 bit key
> 2021-11-20 09:18:08 us=74956 Incoming Data Channel: Cipher 'AES-256-GCM' 
> initialized with 256 bit key
> 2021-11-20 09:18:08 us=75010 net_route_v4_best_gw query: dst 0.0.0.0
> 2021-11-20 09:18:08 us=75225 net_route_v4_best_gw result: via 192.168.0.1 dev 
> enp850kd
> 2021-11-20 09:18:08 us=75299 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 
> IFACE=enp850kd HWADDR=25:d3:a1:0e:6c:13
> 
> Am I correct to say that my VPN provider can store personally identifiable 
> information such as IFACE and HWADDR to fingerprint me?

That's your log or the server's log?

> To mitigate the fingerprinting, is it possible to prevent the details of 
> IFACE and HWADDR from being transmitted to my VPN provider?

Are they REALLY transmitted to your VPN provider?

Ralf Hildebrandt
Charité - Universitätsmedizin Berlin
Geschäftsbereich IT | Abteilung Netzwerk

Campus Benjamin Franklin (CBF)
Haus I | 1. OG | Raum 105
Hindenburgdamm 30 | D-12203 Berlin

Tel. +49 30 450 570 155
ralf.hildebra...@charite.de
https://www.charite.de


_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to