Would my VPN setup be secure enough?

Aug 20, 2017
1
0
510
Currently using VMWare with Windows 7 and SoftEther VPN with VPN from 24VC. No anti virus software.

Im very paranoid of potential VPN disconnections and Windows 7 automatically switching to the local area connection leaking my real IP.

I use Firefox only and I set windows firewall rules to block inbound/outbound data which are PRIVATE or DOMAIN and unblocked PUBLIC. When I connect to the VPN and I check the Windows Network and Sharing Center the VPN network shows PUBLIC and home network also switches to PUBLIC (I dont know why it does this). When I disconnect the VPN the VPN disappears from Network and Sharing Center and home switches back to local area connection.

Heres the tutorial to implement the firewall: http://www.24vc.com/guide?v=how-to-block-non-vpn-traffic

I tested this firewall and it works as it would.

Regardless, I am still paranoid there is a possibility of leakage from error or something I overlooked. This is my first VPN so I dont have experience with this.

Is there anything else I could do to ensure my real IP is not leaked? What are your suggestions and tips? Is the windows firewall I set up adequate?

What other software or practices can I invest in to further protect myself from potential IP leakage and any sort of profile fingerprinting? Would uBlock Origin be suitable enough?

Thank you.
 
Solution
As it seems you found it is very difficult to hide your machines details from itself. Technically anything that runs in admin mode could bypass anything you put in place. The vmware hides thing one level deeper so it makes it harder.

Your best option if it is available is to do as much as possible on your router. Putting in the firewall rules that say your internal pc can only access the VPN site pretty much insures that no traffic can go around it. Since the router can not be affected by software running on the pc these rules can not be easily bypassed. Since your pc does not have it real ip address and all the traffic must go to the vpn it pretty much prevents the leakage of the IP address.

You could also run the VPN on the...
As it seems you found it is very difficult to hide your machines details from itself. Technically anything that runs in admin mode could bypass anything you put in place. The vmware hides thing one level deeper so it makes it harder.

Your best option if it is available is to do as much as possible on your router. Putting in the firewall rules that say your internal pc can only access the VPN site pretty much insures that no traffic can go around it. Since the router can not be affected by software running on the pc these rules can not be easily bypassed. Since your pc does not have it real ip address and all the traffic must go to the vpn it pretty much prevents the leakage of the IP address.

You could also run the VPN on the router if it has that ability. This would allow you to force traffic that is not compatible with vpn clients to use vpn.

Preventing other unique stuff from being transmitted is harder. Very simple stuff like having IPv6 turned on exposes you mac address since it is part of even the private ipv6 addresses. There are ways for software to get the serial number of thing like your mother board or video card. Used to be a way to get the serial number of the cpu but I think Intel disable that.

It tends to be almost impossible to completely block this type of traffic. Its like trying to block all the garbage tracking in windows 10. The tracking bypasses the software firewalls so you can not use the pc itself. If you attempt to use a router there seems to be a massive number of ever changing IP addresses they send this data to. I quickly hit the limits of ip I could block in my router and would have had to use a more advanced device if I wanted to continue to figure out how to block that data.
 
Solution