I encountered several VPN related bugs when using Silverblue 38 which I didn’t have in MicroOS, another immutable distro.
1. Windscribe VPN not able to connect to any server. 2. I wasn’t able to connect to my university’s websites if I connected to my university wifi. Other websites ran totally fine. This happened to three VPN providers I tested. Already reported the bug here.
It seems VPN experience on Silverblue 38 has been…rocky. I’m wondering if any body else had the same issue here. Would might be the causes of the VPN issues?
I found myself unable to open any of my university’s websites if I connected to my university wifi (WPA2-Enterprise) when using a VPN. No matter which connection method I tried and which server I tried it remained the same. I have tried multiple VPN providers (Mullvad, iVPN, and Windscribe), and the results were the same.
However, I was able to connect to my university’s websites when I connected to my phone hotspot instead of my university wifi. I didn’t have this VPN issue when using other Linux OS before.
is it only after fedora38?
1)A naive assumption is that your uni website just blocks any connection with device fingerprint “Fedora/linux” since some admin could be quite (funny or lack of experience).They just assume anyone using linux is a Hacker*.
2)Your vpn is just those common advertised vpn.they even kept your OS environment in your connection.great privacy! while using hotspot probably overwritten the connection.OS as android.In naive sense your hotspot has better privacy.
$ resolvectl status --no-pager
Global
Protocols: LLMNR=resolve -mDNS -DNSOverTLS DNSSEC=no/unsupported
resolv.conf mode: stub
Link 2 (wlp170s0)
Current Scopes: DNS LLMNR/IPv4 LLMNR/IPv6
Protocols: +DefaultRoute LLMNR=resolve -mDNS -DNSOverTLS
DNSSEC=no/unsupported
Current DNS Server: 8.8.4.4
DNS Servers: 8.8.8.8 8.8.4.4
DNS Domain: umhs.med.umich.edu med.umich.edu umich.edu
$ ip route show table all
default dev wg0-mullvad table 1836018789 proto static
default via 10.65.0.1 dev wlp170s0 proto dhcp src 10.65.34.72 metric 600
10.64.0.1 dev wg0-mullvad proto static
10.65.0.0/17 dev wlp170s0 proto kernel scope link src 10.65.34.72 metric 600
local 10.65.34.72 dev wlp170s0 table local proto kernel scope host src 10.65.34.72
broadcast 10.65.127.255 dev wlp170s0 table local proto kernel scope link src 10.65.34.72
local 10.135.195.24 dev wg0-mullvad table local proto kernel scope host src 10.135.195.24
local 127.0.0.0/8 dev lo table local proto kernel scope host src 127.0.0.1
local 127.0.0.1 dev lo table local proto kernel scope host src 127.0.0.1
broadcast 127.255.255.255 dev lo table local proto kernel scope link src 127.0.0.1
fe80::/64 dev wlp170s0 proto kernel metric 1024 pref medium
local ::1 dev lo table local proto kernel metric 0 pref medium
local fe80::583:a017:2563:202a dev wlp170s0 table local proto kernel metric 0 pref medium
multicast ff00::/8 dev wlp170s0 table local proto kernel metric 256 pref medium
multicast ff00::/8 dev wg0-mullvad table local proto kernel metric 256 pref medium
$ ip rule show; ip -6 rule show
0: from all lookup local
32764: from all lookup main suppress_prefixlength 0
32765: not from all fwmark 0x6d6f6c65 lookup 1836018789
32766: from all lookup main
32767: from all lookup default
0: from all lookup local
32766: from all lookup main
$ resolvectl status --no-pager
Global
Protocols: LLMNR=resolve -mDNS -DNSOverTLS DNSSEC=no/unsupported
resolv.conf mode: stub
Link 2 (wlp170s0)
Current Scopes: DNS LLMNR/IPv4 LLMNR/IPv6
Protocols: +DefaultRoute LLMNR=resolve -mDNS -DNSOverTLS
DNSSEC=no/unsupported
Current DNS Server: 8.8.4.4
DNS Servers: 8.8.8.8 8.8.4.4
DNS Domain: umhs.med.umich.edu med.umich.edu umich.edu
Link 12 (wg0-mullvad)
Current Scopes: DNS
Protocols: +DefaultRoute LLMNR=resolve -mDNS -DNSOverTLS
DNSSEC=no/unsupported
Current DNS Server: 100.64.0.55
DNS Servers: 100.64.0.55
DNS Domain: ~.
I think this is unlikely since simply enabling socks5 makes it work properly, but split tunneling does not, and because I have never had trouble reaching the website while off site, even with the VPN enabled.
I will try your suggestions next time I am on site.
Actually, Mullvad allows split tunneling to public ip addresses as well. I can access any other public website when split tunneling is enabled - but not my institution’s website. Does this mean that your solution is unlikely to work? Correct me if I’m not understanding something.