You are not logged in.

#1 2018-10-06 06:51:51

leethaxor
Member
Registered: 2018-07-09
Posts: 31

dnsmasq with openvpn creates a new tun interface called tun1

dnsmasq.conf changes

port=0
no-resolv
 isten-address=1.1.1.1, 1.0.0.1

drill test

drill archlinux.org | grep "Query time"
;; Query time: 80 msec
drill archlinux.org | grep "Query time"
;; Query time: 14 msec

resolv.conf

nameserver 1.1.1.1
nameserver 1.0.0.1

By the way, my network does not go up if the name server is 127.0.0.1

Some options I have added at the end of my vpn config to prevent DNS leak.

push "redirect-gateway def1 bypass-dhcp"
push "dhcp-option DNS 1.1.1.1"
push "dhcp-option DNS 1.0.0.1"

script-security 2
up /etc/openvpn/update-resolv-conf
down /etc/openvpn/update-resolv-conf

DNSMasq redirects traffic from tun0, where my openvpn is set up, and routes it through tun1 instead. How come? Is ALL of my data traffic still being fully encrypted? I can still read some of the data sent over tun1 when I check in Wireshark, does that mean it is not encrypted?

Edit: I am not using NetworkManager and it DOES NOT seem like dnsmasq works even when the output of "dnsmasq --test" is OK. I made this conclusion after stopping dnsmasq and executing "drill gnu.org | grep Query" a few times and did not see a difference...

Last edited by leethaxor (2018-10-06 09:22:31)

Offline

Board footer

Powered by FluxBB