Has This Tunnel Been Breached?
Posted: Sun Apr 14, 2019 8:10 pm
Hi,
Once I installed EtherApe on my Debian Thinkpad I began noticing some internet providers allowed the vpngate tunnel to be breached. (see image1) Voxitity.net had it's own HTTPS at this provider and the last provider, too.
Going back a month ago I turned off the IVP6 because my downloads were showing up going through the vpngate tunnel and then jumped to another part of EtherApe to show the download continuing between two IPV6 addresses, which really looked like a bad breach.
For example, My tunnel came through vpngate's 224.0.0.251 to T500b.local while you can see Torix.ca was breaching before the download started... , but once the download started then ...ipv6.telus.net began taking all the traffic on this EtherApe monitoring software. Here is the image after I started a download
I used the linux command to stop ipv6 on the old laptop so only ipv4 worked and the "breach?" stopped and data flowed only through the vpngate tunnel.
Thanks for your input,
Once I installed EtherApe on my Debian Thinkpad I began noticing some internet providers allowed the vpngate tunnel to be breached. (see image1) Voxitity.net had it's own HTTPS at this provider and the last provider, too.
Going back a month ago I turned off the IVP6 because my downloads were showing up going through the vpngate tunnel and then jumped to another part of EtherApe to show the download continuing between two IPV6 addresses, which really looked like a bad breach.
For example, My tunnel came through vpngate's 224.0.0.251 to T500b.local while you can see Torix.ca was breaching before the download started... , but once the download started then ...ipv6.telus.net began taking all the traffic on this EtherApe monitoring software. Here is the image after I started a download
I used the linux command to stop ipv6 on the old laptop so only ipv4 worked and the "breach?" stopped and data flowed only through the vpngate tunnel.
Thanks for your input,