{{Box|text=
'''Introduction'''
{{project_name_gateway_short}} uses the sysctl parameter net.ipv4.conf.*.arp_ignore=2
to prevent network information leaks, such as VPN IP address leaks on the local network.[https://github.com/mullvad/mullvadvpn-app/blob/main/audits/2024-12-10-X41-D-Sec.md#mllvd-cr-24-03-virtual-ip-address-of-tunnel-device-leaks-to-network-adjacent-participant-severity-medium] This is known to interfere with advanced configurations, such as routing a VPN through {{project_name_gateway_short}} or using a {{project_name_customworkstation_short}}. It might also cause issues in other, yet unknown, cases. Therefore, the configuration must be made more lenient for these use cases.
Changing arp_ignore=2
to arp_ignore=1
will resolve these issues. Doing so may allow some additional data about {{project_name_gateway_short}}'s network configuration to be leaked to other machines on the local network (or to other VMs on the same Qubes OS machine), but it should not allow leakage of information such as VPN IP addresses to other machines.
'''Downgrade arp_ignore
'''
To change arp_ignore=2
in {{project_name_gateway_short}} to arp_ignore=1
: [
{{kicksecure_wiki
|wikipage=Networking#ARP_sysctl_settings
|text=ARP sysctl settings
}}
]
'''1.''' Launch a terminal in {{project_name_gateway_short}}. (If using Qubes OS, launch a terminal in the whonix-gateway-17
template.)
'''2.''' {{Open with root rights|filename=
/etc/sysctl.d/99_user.conf
}}
'''3.''' Paste.
{{CodeSelect|code=
net.ipv4.conf.*.arp_ignore=1
}}
'''4.''' Save and exit.
'''5.''' Reboot {{project_name_gateway_short}}. (If using Qubes OS, shut down the whonix-gateway-17
template and reboot all Qubes based on that template.)
'''6.''' Done.
The process of changing arp_ignore=2
to arp_ignore=1
in {{project_name_gateway_short}} is complete.
}}