Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    DNS leaks

    Scheduled Pinned Locked Moved DHCP and DNS
    22 Posts 6 Posters 13.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • panzP
      panz
      last edited by

      @kejianshi:

      That DNS leak test thing doesn't show crap for me…

      With pfsense acting as OpenVPN client to a VPN provider?

      pfSense 2.3.2-RELEASE-p1 (amd64)
      motherboard: MSI C847MS-E33 Micro ATX (with Intel Celeron CPU 847 @ 1.10 GHz) ~ PSU: Corsair VS350 ~ RAM: Kingston KVR1333D3E9S 4096 MB 240-pin DIMM DDR3 SDRAM 1.5 volt ~ NIC: Intel EXPI9301CTBLK (LAN) ~ NIC: D-Link DFE-528TX (CAM) ~ Hard Disk: Western Digital WD10JFCX Red ~ Case: Cooler Master HAF XB ~ power consumption: 21 Watts.

      1 Reply Last reply Reply Quote 0
      • K
        kejianshi
        last edited by

        No - With clients directly on pfsense or using pfsense as openvpn server.
        All that page is doing is looking at where you get your DNS, so far as I can tell.

        1 Reply Last reply Reply Quote 0
        • panzP
          panz
          last edited by

          @kejianshi:

          No - With clients directly on pfsense or using pfsense as openvpn server.
          All that page is doing is looking at where you get your DNS, so far as I can tell.

          I have no problems at all with your configuration. No leaks. My conf is different: pfsense is acting as OpenVPN client to a VPN service provider, so I'd like to use ONLY provider's DNS server.

          pfSense 2.3.2-RELEASE-p1 (amd64)
          motherboard: MSI C847MS-E33 Micro ATX (with Intel Celeron CPU 847 @ 1.10 GHz) ~ PSU: Corsair VS350 ~ RAM: Kingston KVR1333D3E9S 4096 MB 240-pin DIMM DDR3 SDRAM 1.5 volt ~ NIC: Intel EXPI9301CTBLK (LAN) ~ NIC: D-Link DFE-528TX (CAM) ~ Hard Disk: Western Digital WD10JFCX Red ~ Case: Cooler Master HAF XB ~ power consumption: 21 Watts.

          1 Reply Last reply Reply Quote 0
          • K
            kejianshi
            last edited by

            If they have a couple DNS servers, that should be no problem.  If they aren't providing DNS servers, you are out of luck.  You could also run your own DNS server?

            1 Reply Last reply Reply Quote 0
            • panzP
              panz
              last edited by

              @kejianshi:

              If they have a couple DNS servers, that should be no problem.  If they aren't providing DNS servers, you are out of luck.  You could also run your own DNS server?

              They definitely have their own DNS servers! The matter seems to be that pfsense is not accepting all the pushed configs (OpenVPN foreign_option).

              pfSense 2.3.2-RELEASE-p1 (amd64)
              motherboard: MSI C847MS-E33 Micro ATX (with Intel Celeron CPU 847 @ 1.10 GHz) ~ PSU: Corsair VS350 ~ RAM: Kingston KVR1333D3E9S 4096 MB 240-pin DIMM DDR3 SDRAM 1.5 volt ~ NIC: Intel EXPI9301CTBLK (LAN) ~ NIC: D-Link DFE-528TX (CAM) ~ Hard Disk: Western Digital WD10JFCX Red ~ Case: Cooler Master HAF XB ~ power consumption: 21 Watts.

              1 Reply Last reply Reply Quote 0
              • K
                kejianshi
                last edited by

                Is it possible you can get their server IPs from them and enter them manually?

                1 Reply Last reply Reply Quote 0
                • D
                  doktornotor Banned
                  last edited by

                  @kejianshi:

                  Is it possible you can get their server IPs from them and enter them manually?

                  Not really an option for most people, you are stuck with no DNS at all once the client gets disconnected. The foreign options support is pretty much required to work not just on Windows. Usually done via up/down scripts and resolvconf package on Linux distros.

                  1 Reply Last reply Reply Quote 0
                  • K
                    kejianshi
                    last edited by

                    Thats good - Then when the vpn is down, the internet won't work, which is how I like it when I want a full time vpn running.
                    Thats exactly the way my phone behaves.  You either have vpn or you have nothing.

                    1 Reply Last reply Reply Quote 0
                    • H
                      humungus
                      last edited by

                      Its been several years, is this still the case? Followed this tutorial below and ended up in the same boat with VPN provided DNS servers not being picked up by pfsense/openvpn client. Would it be possible to add an additional argument to make this work? Thanks in advance

                      https://forum.pfsense.org/index.php?topic=76015.0

                      1 Reply Last reply Reply Quote 0
                      • G
                        gjaltemba
                        last edited by

                        Wow. Resurrecting a thread from 2013? OK, I'll bite.

                        When I run dnsleaktest, the result is my vpn server ip for wan and dns.

                        Make sure dns resolver is running.
                        Uncheck forwarding mode.
                        Select the vpn interface in Outgoing Network Interfaces.
                        Do not enter dns servers in General settings.

                        1 Reply Last reply Reply Quote 0
                        • H
                          humungus
                          last edited by

                          @gjaltemba:

                          Wow. Resurrecting a thread from 2013?

                          Well I ran into the same problem lol.

                          @gjaltemba:

                          When I run dnsleaktest, the result is my vpn server ip for wan and dns.

                          Make sure dns resolver is running.
                          Uncheck forwarding mode.
                          Select the vpn interface in Outgoing Network Interfaces.
                          Do not enter dns servers in General settings.

                          That does the trick and gives me the ability to use my vpn dns for my lan traffic. Kind of something I didn't even know I wanted. Thanks!!

                          1 Reply Last reply Reply Quote 1
                          • G
                            gjaltemba
                            last edited by

                            This is off topic but I would like to highlight the firewall rules for the LAN interface in the PIA tutorial

                            The proposed changes to the default LAN firewall rules are only necessary with more advanced firewall configurations.

                            https://forum.pfsense.org/index.php?topic=76015.0

                            1 Reply Last reply Reply Quote 0
                            • H
                              humungus
                              last edited by

                              @gjaltemba:

                              This is off topic but I would like to highlight the firewall rules for the LAN interface in the PIA tutorial

                              The proposed changes to the default LAN firewall rules are only necessary with more advanced firewall configurations.

                              https://forum.pfsense.org/index.php?topic=76015.0

                              For my setup I required the defined gateway on my lan but not on the my vpn interface. (I had defined both gateways which blocked me from accessing my LAN from the VPN) Thank you so much!

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.