I can't avoid my clients to get IPv6 address. I have Pi-role and 3 more routers.
1- Cable Motorola provider (DHCP disabled).
2- Wifi TP-Link for the house (DHCP disable)
3- Wifi Openwrt for outside (DHCP disable)
For pi-hole, only IPv4 is enabled and all config inside sysclt.conf are done disabling IPv6.
IPv6 is really getting me trouble since it not only leak some of my VPN connections, but also pi-hole.
pi-hole only shows ipv4, but when I open my phone, I see an IPv6. The same for any computer or device.
Expected Behaviour:
Since pi-hole is the only DHCP server, only ipv4 should be addressed
Your cable modem is providing the addresses. If there is not customer interface to completely disable IPv6 then you will have to call the ISP and have them do it for you.
Following your lead, I tuned of my RapPi and try to get an IP. It took some time, but I got an IPv6.
When I try to catch the responsible, I got no answer:
$ ip r
$ ip route
$ route
Tabela de Roteamento IP do Kernel
Destino Roteador MáscaraGen. Opções Métrica Ref Uso Iface
$ netstat -r -n
Tabela de Roteamento IP do Kernel
Destino Roteador MáscaraGen. Opções MSS Janela irtt Iface
Do you suggest something to be sure where it is leaking?
I see, can't I track it?
I can't disable it either. Some have suggested just put it behind another router. I really appreciate your indication. I was only hopping to learn something about it, for instance, why route cmd can' t track ipv6.
If I disable IPv6 inside the client, I can track the gateway.
$ ip r
default via 192.168.200.1 dev enp4s0 proto dhcp metric 100
169.254.0.0/16 dev enp4s0 scope link metric 1000
192.168.200.0/24 dev enp4s0 proto kernel scope link src 192.168.200.78 metric 100
Why I can't do the same for IPv6? If I try the same command, I get blank result.