VPNDemon monitors your VPN connection and kills a target program upon disconnect. It's the safest and easiest way to help prevent DNS leaks and enhance your security while connected over a VPN.
It's as simple as this:
- Run vpndemon.sh.
- Enter the name of the target process to kill when the VPN disconnects.
That's it!
- Download vpndemon.sh and place it in a folder, such as ~/Documents/vpndemon.
cd ~/Documents/vpndemon
bash vpndemon.sh
- Enter the name of a program to kill when the VPN disconnects. This can be a substring of the name, such as "chrome", "firefox", etc.
- Click OK to start monitoring.
- VPNDemon is now monitoring your VPN connection. If your not already connected to your VPN, go ahead and connect now.
- Try disconnecting your VPN. VPNDemon will detect the disconnect, kill all instances of the target program, and update its status.
- Download vpndemon.sh and install.sh. Run install.sh.
cd ~/Documents/vpndemon
sudo bash install.sh
- After installing, open the start menu and search for VPNDemon. Right-click the result and select "Add to Panel" or "Add to Desktop".
VPNDemon monitors the VPN connection by listening to events from the linux NetworkManager. When a VPN connect/disconnect event is received, the signal is checked to see which state it relates to. If it's a connect state, the status is simply displayed in the main window. If it's a disconnect state, VPNDemon immediately issues a kill command for all processes that match the target process name:
for i in `pgrep $killProgramName`
do
kill $i
done
Since the NetworkManager is being listened to, directly via the dbus-monitor, disconnect events are detected almost instantly. Likewise, the target process is killed almost instantly.
VPNDemon should be compatible with any linux system that uses NetworkManager for VPN connections.
- A log file is saved to /tmp/vpndemon, which contains the list of VPN connect/disconnect events and a list of processes terminated. The log is cleared each time the app is run. However, you can review the log during or after running the app, to help determine any troubleshooting issues.
If you want even tighter privacy, you can disable IPv6. This is easy to do. IPv6 incorporates hardware MAC addresses, and since many VPN services do not yet route IPv6 traffic, it creates a potential leak for network activity.
To disable IPv6, edit the file /etc/sysctl.conf and add the following lines:
net.ipv6.conf.all.disable_ipv6 = 1
net.ipv6.conf.default.disable_ipv6 = 1
net.ipv6.conf.lo.disable_ipv6 = 1
After making these changes, refresh the file by running:
sudo sysctl -p
To verify IPv6 is actually disabled, run ifconfig and verify that "inet6" is not present in the output:
ifconfig | grep inet6
MIT
Kory Becker http://www.primaryobjects.com/kory-becker