IPv6 traffic bypasses OpenVPN tunnel |
||
Issue descriptionThe builtin Chrome OS VPN clients do not currently support IPv6. If the system's physical network connection supports IPv6, IPv6 traffic will "leak" past the VPN and out onto the untrusted LAN. It should be blocked (like third party VPNs do). Related: bug 642040
,
Nov 25 2017
The following revision refers to this bug: https://chromium.googlesource.com/chromiumos/third_party/autotest/+/80de77a887f505c4b9a19d94444e60fb0d9f3a66 commit 80de77a887f505c4b9a19d94444e60fb0d9f3a66 Author: Kevin Cernekee <cernekee@chromium.org> Date: Sat Nov 25 01:41:50 2017 network_VPNConnect: Add IPv6 blackhole test shill was recently updated to blackhole IPv6 traffic when connected to an IPv4-only VPN. Check to make sure the routing change is working as intended. BUG=chromium:787674 TEST=run network_VPNConnect tests CQ-DEPEND=CL:784311 Change-Id: Ia12640802db80df6b655ad10df77ada46738f691 Reviewed-on: https://chromium-review.googlesource.com/784358 Commit-Ready: Kevin Cernekee <cernekee@chromium.org> Tested-by: Kevin Cernekee <cernekee@chromium.org> Reviewed-by: Ben Chan <benchan@chromium.org> [modify] https://crrev.com/80de77a887f505c4b9a19d94444e60fb0d9f3a66/client/site_tests/network_VPNConnect/network_VPNConnect.py
,
Nov 25 2017
One risk of rolling this out before shill's IPConfig logic fully supports IPv6 is that if the OpenVPN gateway itself is available via IPv6 (e.g. it has both AAAA and A records in DNS), the blackhole route may block access after the connection is established. We don't have a clean way to add an exclusion for it. I don't think this is the case for v.ext but maybe other installations will be affected.
,
Aug 1
|
||
►
Sign in to add a comment |
||
Comment 1 by bugdroid1@chromium.org
, Nov 22 2017