How do I prevent IPv6 leaks when connecting over IPv6

Hey guys,

I have been using Wireguard to tunnel IPv4 traffic from my remote devices to my home network when I am on the go. The main goal for this was to be able to connect to services running on my homelab, management of my homelab and other LAN devices, and doing remote development using SSH with JetBrains Gateway - which is just such a cool feature if you haven’t tried it before! The Wireguard endpoint inside my LAN is my PFSense box btw.

I also set it up to tunnel all traffic over the VPN connection by setting the allowed IP to 0.0.0.0/0 on the “client” devices. I thought this was a good idea so that I could be more secure on public wifi networks. However, there is a fatal flaw with this. My devices are leaking IPv6 traffic. How can I fix this? I understand very little about IPv6, and I don’t even get an IPv6 lease from my ISP (Google Fiber) over the WAN. I have researched a little into the issue of not getting an IPv6 lease from GFiber, and it seems to be a widespread issue amongst their customers who use their own routers.

Correction, it appears that my network does in fact support IPv6. My IPv4 address provided to me by GFiber is static which is really awesome, and my IPv6 address is assigned via DHCP6.