I realized I never attached my rules on my original post so adding them now.
I tried shutting down my firewall a few times to replicate but I have struggled to replicate this issue in the last few days….
I have decided to test the "policy filtering" in what was detailed in this post below:
https://www.infotechwerx.com/blog/Prevent-Any-Traffic-VPN-Hosts-Egressing-WAN
I added a "mark" of "NO_WAN_EGRESS" to my rule #1 and rule #3 and a "Quick" floating rule with my outgoing WAN per the blog....
Beyond the "tin foil hat"/DNS leak/ISP monitoring concern (I admit I am one of those!) this seems like a possible attack path for a malicious actor. Simply attack and restart a vulnerable downstream modem(seems like a lot of them are already vulnerable), briefly shutdown the OpenVPN connection and then monitor the ongoing traffic of the unencrypted traffic after a modem restart that ensues(while the user thinks they are using a VPN)? The only reason I discovered my DNS was going through my Cable company was I happened to do a DNSleak test one morning....
I'll surely report back if this solution doesn't work....thank you pfSense you are the rock in my network!
Happy holidays,
V

