Replies: 2 comments 1 reply
-
2 protections ( 1 optional) + 1 kill switch). docker-transmission-openvpn/openvpn/start.sh Line 232 in 42eb2ee
|
Beta Was this translation helpful? Give feedback.
-
There are also questions when using wireguard (another vpn solution): https://unix.stackexchange.com/questions/733430/does-wireguard-postup-predown-really-work-as-a-kill-switch. I also add a blocklist to transmission. Deleting default route is an extra protection, depending on the risk of leaking you are willing to take. You may run some tests with https://bash.ws/torrent-leak-test to check if leakage is detected when you disable the vpn interface ( ifconfig ) |
Beta Was this translation helpful? Give feedback.
-
I have a question regarding the setup this repo offers, and I would greatly appreciate any insights you can provide.
I was wondering if it directly binds transmission to the VPN, or if it incorporates a killswitch mechanism to disconnect the internet in case the VPN connection is lost. I've come across some information suggesting that killswitches may not be entirely secure, which has raised my curiosity about the specific approach employed in this setup.
Thank you kindly in advance for your assistance. I am grateful for any clarifications you can offer.
Best regards,
Thor
Beta Was this translation helpful? Give feedback.
All reactions