• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

how to hide connection information in openvpn?

Scheduled Pinned Locked Moved OpenVPN
12 Posts 5 Posters 1.5k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • U
    usus1
    last edited by usus1 Aug 30, 2021, 4:43 AM Aug 30, 2021, 4:22 AM

    hi. I used pfSense and created a client to site layer 3 openvpn connection. clients can connect to this network without any problem. but this website https://ips.ac can detect connection information of openvpn like network link and operation system of client and another information.
    how i can avoid this information leak?
    I added missfix into config.ovpn file and this problem fixed. but i dont want do this on client side. how i can add missfix and fix this problem on server side?

    G 1 Reply Last reply Aug 30, 2021, 6:38 AM Reply Quote 0
    • G
      Gertjan @usus1
      last edited by Gertjan Aug 30, 2021, 6:46 AM Aug 30, 2021, 6:38 AM

      @usus1 said in how to hide connection information in openvpn?:

      but this website https://ips.ac

      This site doesn't exist ??

      Correction :

      dig ips.ac +short
      157.7.174.95
      

      It does .... but doesn't answer for me.

      edit again : it's a "http" only site !! That must be the last one on planet earth.
      Why would this site 'scan' VPN connections ?

      I think I don't understand the question.
      The VPN client connects too the OpenVPN server, and when the tunnel comes up, all traffic form the client goes over the tunnel to the OpenVPN server.
      The clients visits the site "ips.ac" - and "ips.ac" could see that traffic comes from the WAN IP of the OpenVPN server, but also sees details from the OpenVPN client ?
      Like what : an IP ?

      No "help me" PM's please. Use the forum, the community will thank you.
      Edit : and where are the logs ??

      U 2 Replies Last reply Aug 30, 2021, 6:57 AM Reply Quote 0
      • U
        usus1 @Gertjan
        last edited by Aug 30, 2021, 6:57 AM

        This post is deleted!
        1 Reply Last reply Reply Quote 0
        • U
          usus1 @Gertjan
          last edited by Aug 30, 2021, 7:00 AM

          @gertjan said in how to hide connection information in openvpn?:

          @usus1 said in how to hide connection information in openvpn?:

          but this website https://ips.ac

          This site doesn't exist ??

          Correction :

          dig ips.ac +short
          157.7.174.95
          

          It does .... but doesn't answer for me.

          edit again : it's a "http" only site !! That must be the last one on planet earth.
          Why would this site 'scan' VPN connections ?

          I think I don't understand the question.
          The VPN client connects too the OpenVPN server, and when the tunnel comes up, all traffic form the client goes over the tunnel to the OpenVPN server.
          The clients visits the site "ips.ac" - and "ips.ac" could see that traffic comes from the WAN IP of the OpenVPN server, but also sees details from the OpenVPN client ?
          Like what : an IP ?

          sorry for this mistake.
          the website is : https://ipx.ac/run
          in this website under tab "TCP Connection" can detect my Network link as OpenVPN Connection and also detect client OS. i do not like this. how i can avoid detecting my OS and Network link? i want to detect Network link as PPPOE replace OpenVPN Here.
          7777777.jpg

          G 1 Reply Last reply Aug 30, 2021, 10:56 AM Reply Quote 0
          • G
            Gertjan @usus1
            last edited by Aug 30, 2021, 10:56 AM

            @usus1 said in how to hide connection information in openvpn?:

            https://ipx.ac/run

            I'm using my ISP connection, no VPN that I know of.

            I saw :

            f3a909ba-8518-44b0-8a5e-3850936b7046-image.png

            That info is wrong.

            No "help me" PM's please. Use the forum, the community will thank you.
            Edit : and where are the logs ??

            U 1 Reply Last reply Aug 30, 2021, 11:42 AM Reply Quote 0
            • N
              neogrid
              last edited by Aug 30, 2021, 11:33 AM

              That's interesting...

              My results:

              • ISP connection the result is PPPoE
              • over my AirVPN (which is setup on OpenVPN on pfsense) it's ????
              • over my own OpenVPN it's OpenVPN TCP bs128 SHA256 lzo.
              • over my own OpenVPN which exits out of the AirVPN WAN it's ???

              Must be something on the OpenVPN server config.

              1 Reply Last reply Reply Quote 0
              • U
                usus1 @Gertjan
                last edited by Aug 30, 2021, 11:42 AM

                @gertjan said in how to hide connection information in openvpn?:

                @usus1 said in how to hide connection information in openvpn?:

                https://ipx.ac/run

                I'm using my ISP connection, no VPN that I know of.

                I saw :

                f3a909ba-8518-44b0-8a5e-3850936b7046-image.png

                That info is wrong.

                no it isn't wrong for me.
                how i can avoid to displaying OS and Network link in this result?

                B G 2 Replies Last reply Aug 30, 2021, 1:17 PM Reply Quote 0
                • B
                  bingo600 @usus1
                  last edited by bingo600 Aug 30, 2021, 1:37 PM Aug 30, 2021, 1:17 PM

                  @usus1
                  Most of the info you see is obtained from/via your browser.

                  Lock your browser down.

                  I'm running Linux mint , and use Firefox.

                  I just installed this extension , can actually come in handy sometimes.
                  Ie. If you need to download an OSX app , on a webpage that only offers to your reported OS.
                  098309ec-7f9c-4353-b9ba-2a7c9b741751-image.png

                  I told my agent switcher to "fake to be a Chrome on Win 10"
                  eef099b3-ec7c-4a1f-8156-d84abf3f8188-image.png

                  And it works ... Your site now shows :

                  387286e6-c579-4486-b79d-cbfb0ae986fa-image.png

                  9344d712-27d0-4a7f-8d85-1247c63bde5d-image.png

                  This info seems to be mostly guesswork (at least for my pc)
                  25ca003d-c63c-4274-a0c0-1dd44712bb1a-image.png

                  My Linux is a 5.4 not 2 or 3

                  uname -a
                  Linux TXXXs 5.4.0-xx-generic #91~18.04.1-Ubuntu SMP Fri Jul 23 13:36:29 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux
                  

                  My uptime:

                  uptime
                   15:30:44 up 1 day,  3:08,  1 user,  load average: 0,44, 0,45, 0,39
                  

                  So as i wrote lock down your web browser , that's the one leaking most of the info.

                  I use NoScript on FF , works so nice

                  /Bingo

                  Edit...
                  I had to be a Mac too

                  Just select in the extension

                  db835995-53a6-4a20-aa2f-0e7b7c36793f-image.png

                  09cb5bc1-28c7-4340-a781-9e62f867d77a-image.png

                  3f0a9be0-f052-4372-b83d-925c48e51add-image.png

                  If you find my answer useful - Please give the post a 👍 - "thumbs up"

                  pfSense+ 23.05.1 (ZFS)

                  QOTOM-Q355G4 Quad Lan.
                  CPU  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                  LAN  : 4 x Intel 211, Disk  : 240G SAMSUNG MZ7L3240HCHQ SSD

                  U 1 Reply Last reply Aug 31, 2021, 5:23 AM Reply Quote 0
                  • U
                    usus1 @bingo600
                    last edited by Aug 31, 2021, 5:23 AM

                    @bingo600 said in how to hide connection information in openvpn?:

                    @usus1
                    Most of the info you see is obtained from/via your browser.

                    Lock your browser down.

                    I'm running Linux mint , and use Firefox.

                    I just installed this extension , can actually come in handy sometimes.
                    Ie. If you need to download an OSX app , on a webpage that only offers to your reported OS.
                    098309ec-7f9c-4353-b9ba-2a7c9b741751-image.png

                    I told my agent switcher to "fake to be a Chrome on Win 10"
                    eef099b3-ec7c-4a1f-8156-d84abf3f8188-image.png

                    And it works ... Your site now shows :

                    387286e6-c579-4486-b79d-cbfb0ae986fa-image.png

                    9344d712-27d0-4a7f-8d85-1247c63bde5d-image.png

                    This info seems to be mostly guesswork (at least for my pc)
                    25ca003d-c63c-4274-a0c0-1dd44712bb1a-image.png

                    My Linux is a 5.4 not 2 or 3

                    uname -a
                    Linux TXXXs 5.4.0-xx-generic #91~18.04.1-Ubuntu SMP Fri Jul 23 13:36:29 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux
                    

                    My uptime:

                    uptime
                     15:30:44 up 1 day,  3:08,  1 user,  load average: 0,44, 0,45, 0,39
                    

                    So as i wrote lock down your web browser , that's the one leaking most of the info.

                    I use NoScript on FF , works so nice

                    /Bingo

                    Edit...
                    I had to be a Mac too

                    Just select in the extension

                    db835995-53a6-4a20-aa2f-0e7b7c36793f-image.png

                    09cb5bc1-28c7-4340-a781-9e62f867d77a-image.png

                    3f0a9be0-f052-4372-b83d-925c48e51add-image.png

                    hi.
                    i dont use anything in client side. only i want to disable this information leak on server side.

                    B 1 Reply Last reply Aug 31, 2021, 5:31 AM Reply Quote 0
                    • B
                      bingo600 @usus1
                      last edited by Aug 31, 2021, 5:31 AM

                      @usus1
                      So your client connects to your pfSense via VPN , and then connects to : ipx.ac site , and leaks information.

                      And you want to solve that on the pfSense (server site) ?

                      Good luck with that.

                      /Bingo

                      If you find my answer useful - Please give the post a 👍 - "thumbs up"

                      pfSense+ 23.05.1 (ZFS)

                      QOTOM-Q355G4 Quad Lan.
                      CPU  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                      LAN  : 4 x Intel 211, Disk  : 240G SAMSUNG MZ7L3240HCHQ SSD

                      1 Reply Last reply Reply Quote 0
                      • G
                        Gertjan @usus1
                        last edited by Aug 31, 2021, 8:30 AM

                        @usus1 said in how to hide connection information in openvpn?:

                        no it isn't wrong for me.

                        Check your MTU value.

                        I've set the MTU to the default '1500' value.
                        Now I have

                        79bb2aae-8c5c-4b3f-8adf-2c6e62eaf37d-image.png

                        When I lower the MTU a bit, like 1478, as some PPPOE connection do, then "https://ipx.ac/run" says I'm using a tunnel or VPN connection.
                        Plain wrong as I don't use a VPN.

                        That is :

                        f25c0a22-571a-4d4a-9ff6-0fd2df013c7a-image.png

                        I'm using he.net as my IPv6 "ISP".
                        My IPv6 traffic goes tunnled out to a he.net IPv6 POP in Paris.
                        This means that IPv6 packets are stashed into an IPv4 'tunnel'. The MTU or my IPv6 is lower as the classic MTU, 1478. This because the IPv6 packet has to be put in a 1500 classic IPv4 packet. remove the header space, and less (less then 1500) is left over for the IPv6 packet.
                        So, https://ipx.ac/run thinks I'm using a VPN ....

                        No "help me" PM's please. Use the forum, the community will thank you.
                        Edit : and where are the logs ??

                        N 1 Reply Last reply Aug 31, 2021, 9:24 AM Reply Quote 0
                        • N
                          NogBadTheBad @Gertjan
                          last edited by Aug 31, 2021, 9:24 AM

                          Split tunnel maybe ?

                          Andy

                          1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                          1 Reply Last reply Reply Quote 0
                          12 out of 12
                          • First post
                            12/12
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                            This community forum collects and processes your personal information.
                            consent.not_received