I've been looking at webRTC and stun scripts in general and their ability to bypass VPN's. And have a few questions I hope someone can help me with.
1) Since using openVPN and other VPN protocols/methods normally sets the default adaptor to itself, (like makes the primary network device the TAP adaptor for VPN) how does the stun script/webRTC script actually leak real IPv4 addresses and other information as shouldn't it route via this VPN by default?
2) I understand programs such as skype and others implement stun scripts which to me seems like it could be leaking info. Is it possible to disable stun/webRTC scripts system wide, or at least monitor them and authorise them using a HIPS style system? And would this cause any serious issues?