this post was submitted on 24 Mar 2024
30 points (100.0% liked)

Linux

1253 readers
75 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS
 

Hey! Ive just got Fedora 39 on my PC. I'm new into Linux, but I liked the way Fedora looks and so on. But as a former windows user, I was glad to use Proton VPN. On windows it just worked well, and my local Broadcaster homepage didn't notice that I was using, Secure Core, via example Switzerland though a server in my country. But now, when I use Proton VPN in fedora, the broadcaster notice that my internet goes via another country, and dosnt let me whatch. I juse the App I found on Flatpak. Is there something I should investigate more , of some easy tweaks to make it work well again?

top 13 comments
sorted by: hot top controversial new old
[–] d3Xt3r@lemmy.nz 35 points 6 months ago (2 children)

Don't use Flatpak etc for VPNs, it's limited, insecure and pointless.

It's highly likely that the Flatpak version is not routing your DNS queries, thus leaking your location. I wouldn't be surprised if other traffic is being leaked as well.

Since you're on normal Fedora, just use the normal app (.rpm): https://protonvpn.com/support/official-linux-vpn-fedora/. Don't use the CLI version though, as it's still on the old version (v3).

[–] Sunny@slrpnk.net 6 points 6 months ago

Man i wish I knew about this earlier... Thanks for the tip 🙌

[–] FriedRice@lemmy.ml 1 points 6 months ago (1 children)

Oh. So what wikk be OK to use the flatpack store for?

Thank you for help.

[–] helenslunch@feddit.nl 11 points 6 months ago* (last edited 6 months ago) (1 children)

Use the official app.

Remember that many Flatpak apps are not the "official" version. Go directly to the website, when possible. Just like Windows.

[–] Grangle1@lemm.ee 4 points 6 months ago

Well, the first place to go would be the system repos unless said repos only offer the flatpak version. Then if only the flatpak is in the repos go to the website.

[–] pineapplelover@lemm.ee 6 points 6 months ago

This is the proper native way to get protonvpn on fedora

https://protonvpn.com/support/official-linux-vpn-fedora/

[–] Molten_Moron@lemmings.world 4 points 6 months ago

I've got ProtonVPN set up through wireguard on my system and it works great. Only caveat is that you have to set up multiple profiles if you want different locations, secure core, etc. Not a big deal in my use case, but something to consider.

https://protonvpn.com/support/wireguard-manual-linux/

[–] candywashing@infosec.pub 4 points 6 months ago

Not 100% sure about the flatpak, but if you have access to the terminal interface, the command line app is really well done and you can turn of "secure core"

[–] communism@lemmy.ml 2 points 6 months ago

Seconding to use the protonvpn CLI program, it always worked well for me. These days I just use wireguard config files though, they're much easier as you can just add them to networkmanager and you'll auto connect on boot. IME the official VPN programs are often buggy. I also added a module to my waybar to show if I'm connected or not for peace of mind that the vpn started up correctly without any other indicator (if you use a DE you might already have an indicator for vpn connections)

[–] FriedRice@lemmy.ml 1 points 6 months ago (2 children)

Hey! Thank you all for the support. Well im trying to learn all the wonders of Linux. Ive now installed the app with the terminal, it didnt help with my problem, maybe my browser sends some location?, but now ive got the official app, and that feels more secure. thank you.

[–] crispy_kilt@feddit.de 3 points 6 months ago* (last edited 6 months ago)

Try to completely delete your browser data, cookies, cache, etc.

The website might've set a cookie or something in your browser that marks your location when the VPN wasn't working properly and is using this now to identify you despite the fixed VPN.

[–] Mechanize@feddit.it 2 points 6 months ago* (last edited 6 months ago)

Considering you are not using the Flatpak anymore it is, indeed, strange. The only reasons I can think of are: your network manager is using the wrong network interface to route your traffic ( if you go on an ip checking site like for example ipinfo do you see yours or the VPN's IP?) or that you have WebRTC enabled and the broadcaster is getting your real ip through that.

For the first case it can get pretty complicated, but it is probably an error during the installation of the VPN app or you set up multiple network managers and it gets confused on which one to configure. You should also enable the Advanced Kill Switch in the configuration.

For the second case you could try adding something like the Disable WebRTC add-on for firefox and check if it works. Remember to enable it for Private Windows too.

The last thing I can think of is that you allowed the broadcaster to get your real geolocation (in firefox it should be a small icon on the left of the address bar), or you are leaking some kind of information somewhere: there are a bunch of site that check for ip leak, but I don't know if that goes too deep for you.
If you want to check anyway the first two results from DDG are browserleaks and ipleak. Mullvad offered one too but it is currently down.

EDIT: If you enable the Advanced Kill Switch, and the app is working correctly, internet will not work while you are not connected to a VPN server or until you disable the switch again, so pay attention to that.