I am working in Kali Linux. I have disabled ipv6 by the command, "sysctl -w net.ipv6.conf.all.disable_ipv6=1". Below output of "ifconfig -a" shows no IPV6.
I believe these 127.0.0.1 loopbacks are not "true network connections" and so IPV6 traffic will not pass since you blocked IPV6 networking.
The title of your post is:
These 127.0.0.1 internal loopbacks are not "true connections" per se.
Did you actually try to pass IPV6 traffic thought that host? If you did, I would be surprised if any IPV6 traffic would pass since you have already disabled IPV6 networking via "sysctl -w net.ipv6.conf.all.disable_ipv6=1 ".
You might want to check to make sure when you installed your proxy server that it did not unintentionally enable your intended block / disabled setup.
PS: You should use CODE tags when you post and insure your posts are well formatted and easy for everyone to read.
If you do not want your proxy server to listen on the kernel loopback interface (127.0.0.1), you can easily fix this by configuring your proxy server to only listen on an IP address.
Just like mysql and other daemon processes, you can configure it to listen on 127.0.0.1 or not.
For example, many people configure mysql to only listen on 127.0.0.1 because they do not want any external connections to mysql; and 127.0.0.1 does not permit external connections.
If you don't want your proxy server to listen on 127.0.0.1, then you simply configure your proxy server to not listen on 127.0.0.1.
From the linux code base:
/* The loopback device is special if any other network devices
* is present in a network namespace the loopback device must
* be present. Since we now dynamically allocate and free the
* loopback device ensure this invariant is maintained by
* keeping the loopback device as the first device on the
* list of network devices. Ensuring the loopback devices
* is the first device that appears and the last network device
* that disappears.
*/