I am running VPN server on my firewalla. I then connect via wireguard to my home network.
My understanding is (and I’ve checked to verify) that my exit IP therefore is always my home IP address.
I frequently get captcha checks and security notifications however – somehow websites know I’m using a VPN even though it’s self.hosted and I’m exiting from my own IP address.
Why does this happen and is there something I can do about it within the firewalla app or my computer?
I ran into an issue where the “local” geolocation could leak via IPv6 when I was testing some VPN options with Firewalla last year. In my scenario, I was using an Apple TV connecting via a local Firewalla, which was tunnelling to another Firewalla in a different location. IPv4 was “transported” fine. I think I tried every variation the GUI seemed to have available, but still never figured out what I was missing. Disabling IPv6 entirely on both sides was certainly not a surgical solution, but it did end up being a functional workaround…
Perhaps the device you’re streaming from and/or your home Firewalla are giving you away in a similar fashion via IPv6?
My best guess is information in a web cookie about your local interface type being forwarded to the website. The local interface type probably shows as a “tunnel” type, instead of Wi-Fi or Ethernet.
Does this happen when you are just at home. I ran a MystVPN server that allowed others to use my ip address to exit, my home IP got marked as a VPN service.
I am the only one using the VPN - I use it at work and when traveling to have remote access to my network services without opening ports. Nobody else is using.
It seems to happen elsewhere (when I am connected to the VPN server outside my home) as well as when I’m at home (with the tunnel still on).