Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    DNS leaks using OpenVPN client tunnel

    Scheduled Pinned Locked Moved OpenVPN
    69 Posts 7 Posters 23.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DerelictD
      Derelict LAYER 8 Netgate
      last edited by

      WHAT DNS SERVERS ARE YOUR CLIENTS SET TO USE?

      DNS is NOT this hard, people.

      With your rules like that, the express_vpn_dns servers will be queried using the default gateway, NOT the VPN, unless you have redirect gateway for the VPN itself.

      Chattanooga, Tennessee, USA
      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
      Do Not Chat For Help! NO_WAN_EGRESS(TM)

      1 Reply Last reply Reply Quote 0
      • S
        strangegopher
        last edited by

        @gschmidt:

        I have specified the Google servers at System/General Setup/DNS Server Settings

        No need to do this as unbound by default uses root servers for dns, so no need for dns forwarding.
        If you want you can remove all the dns servers from this section and dns will still work.

        above or under which rule should your "I am also blocking any access to dns server on the firewall" rule be located?

        Sorry I posted the wrong image.
        This is what the dns rule should look like:
        (above all other rules in your case [except anti-lockout])
        Action: Block
        Protocol: IPv4 TCP/UDP
        Source: ExpressVPN_Hosts
        Src Port: Any
        Destination: This Firewall
        Dst Port: 53 (DNS)

        That will block access to firewall's dns server.

        Now you will have to to do to is go to:
        Services/DHCP Server/LAN
        and Under DNS Servers add dns server of your choice (like google dns).

        Also like Derelict mentioned you can remove the 2nd rule of NAT redirection to expressvpn.
        And any other port forwarding rules u created under Firewall -> Nat.

        1 Reply Last reply Reply Quote 0
        • G
          gschmidt
          last edited by

          On the static DHCP mappings in pfSense (which is my main router): Empty
          On client 1 (Window 10 PC): automatically (which is the gateway 192.168.1.1)
          On client 2 (linux device): 192.168.1.1

          1 Reply Last reply Reply Quote 0
          • S
            strangegopher
            last edited by

            Do you not see this under Services/DHCP Server/LAN?

            Capture.PNG
            Capture.PNG_thumb

            1 Reply Last reply Reply Quote 0
            • DerelictD
              Derelict LAYER 8 Netgate
              last edited by

              That DOES NOT MEAN that you do not have static DNS servers on the client you are testing, bro.

              This really is. not. that. hard.

              Chattanooga, Tennessee, USA
              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
              Do Not Chat For Help! NO_WAN_EGRESS(TM)

              1 Reply Last reply Reply Quote 0
              • G
                gschmidt
                last edited by

                Ok….I have created the rule =Block rule.jpg
                Added the google dns servers = "DHCP Server DNS Server.jpg"
                and the ExpressVPN DNS servers = Static DHCP Mapping.jpg"

                dnsleaktest result= dnsleaktest.jpg

                :o

                ![Block Rule.JPG](/public/imported_attachments/1/Block Rule.JPG)
                ![Block Rule.JPG_thumb](/public/imported_attachments/1/Block Rule.JPG_thumb)
                ![DHCP Server DNS Server.JPG](/public/imported_attachments/1/DHCP Server DNS Server.JPG)
                ![DHCP Server DNS Server.JPG_thumb](/public/imported_attachments/1/DHCP Server DNS Server.JPG_thumb)
                ![Static DHCP Mapping.JPG](/public/imported_attachments/1/Static DHCP Mapping.JPG)
                ![Static DHCP Mapping.JPG_thumb](/public/imported_attachments/1/Static DHCP Mapping.JPG_thumb)
                dnsleaktest.JPG
                dnsleaktest.JPG_thumb

                1 Reply Last reply Reply Quote 0
                • G
                  gschmidt
                  last edited by

                  I did an nslookup at the client W10 PC
                  Which shows the DNS server of ExpressVPN
                  Which I entered in the Static Mapping DNS servers in pfSense

                  nslookup.JPG
                  nslookup.JPG_thumb

                  1 Reply Last reply Reply Quote 0
                  • S
                    strangegopher
                    last edited by

                    try removing the ExpressVPN DNS servers from Static DHCP Mapping and replacing it with 8.8.8.8 and 8.8.4.4

                    1 Reply Last reply Reply Quote 0
                    • DerelictD
                      Derelict LAYER 8 Netgate
                      last edited by

                      It doesn't matter where anything is configured. What are the DNS servers configured on the client. Use ipconfig /all

                      Hell, if you're having this much trouble, configure them statically.

                      Chattanooga, Tennessee, USA
                      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                      Do Not Chat For Help! NO_WAN_EGRESS(TM)

                      1 Reply Last reply Reply Quote 0
                      • G
                        gschmidt
                        last edited by

                        ipconfig /all

                        I dont see static dns servers?
                        Only the express vpn dns servers i have specified in pfsense

                        ipconfig-all.JPG
                        ipconfig-all.JPG_thumb

                        1 Reply Last reply Reply Quote 0
                        • S
                          strangegopher
                          last edited by

                          my guess is expressvpn dns servers might be the issue, so try using 8.8.8.8 in windows go to Control Panel\Network and Internet\Network Connections right click your interface, select properties, double click "Internet Protocol Version 4", select "Use Following DNS server addresses" and enter 8.8.8.8 and 8.8.4.4

                          and run dns leak test again

                          1 Reply Last reply Reply Quote 0
                          • G
                            gschmidt
                            last edited by

                            @strangegopher:

                            try removing the ExpressVPN DNS servers from Static DHCP Mapping and replacing it with 8.8.8.8 and 8.8.4.4

                            Check!…Still leaking Google and openDNS servers....looks exact the same as with the NAT redirection of port 53
                            I just did a default pfsense 2.4.2 setup (update to 2.4.3), nothing special

                            1 Reply Last reply Reply Quote 0
                            • S
                              strangegopher
                              last edited by

                              Well I am out of ideas then. I don't know what could be going wrong.

                              1 Reply Last reply Reply Quote 0
                              • DerelictD
                                Derelict LAYER 8 Netgate
                                last edited by

                                What matters is that they are not coming from YOU. You cannot control where the resolvers you query go to get their information. If the resolvers you query don't do what you like, use different resolvers.

                                Chattanooga, Tennessee, USA
                                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                1 Reply Last reply Reply Quote 0
                                • G
                                  gschmidt
                                  last edited by

                                  @strangegopher:

                                  Well I am out of ideas then. I don't know what could be going wrong.

                                  Look now I have removed the DNS servers at System/General Setup
                                  And in DNS Resolver i set (see picture)
                                  In DHCP Server all DNS Servers are empty
                                  Also Clients have no DNS specified
                                  Your rule (stopped temporarily)

                                  See dnsleaktest pic!

                                  ![DNS Resolver.JPG](/public/imported_attachments/1/DNS Resolver.JPG)
                                  ![DNS Resolver.JPG_thumb](/public/imported_attachments/1/DNS Resolver.JPG_thumb)
                                  NoDNSleak.JPG
                                  NoDNSleak.JPG_thumb

                                  1 Reply Last reply Reply Quote 0
                                  • G
                                    gschmidt
                                    last edited by

                                    But with this setup, all my network clients use the EXPRESSVPN interface….so if this interface is down...no internet for all

                                    1 Reply Last reply Reply Quote 0
                                    • S
                                      strangegopher
                                      last edited by

                                      you can try setting the outgoing interface in dns to WAN and try with dhcp settings and firewall rule again and see if that works.

                                      1 Reply Last reply Reply Quote 0
                                      • G
                                        gschmidt
                                        last edited by

                                        @Derelict:

                                        What matters is that they are not coming from YOU. You cannot control where the resolvers you query go to get their information. If the resolvers you query don't do what you like, use different resolvers.

                                        ….my knowledge is not that fancy of pfsense I admit...but i knew that my clients did NOT have static dns servers
                                        On a simple modem with OPENWRT this was a piece of cake....on their forum they helped instead of shouting

                                        1 Reply Last reply Reply Quote 0
                                        • G
                                          gschmidt
                                          last edited by

                                          @strangegopher:

                                          you can try setting the outgoing interface in dns to WAN and try with dhcp settings and firewall rule again and see if that works.

                                          Thanx man for your help sofar, I will try tomorrow…have to get some sleep now...ciao!

                                          1 Reply Last reply Reply Quote 0
                                          • G
                                            gcu_greyarea
                                            last edited by

                                            In my opinion handing out DNS Servers via DHCP isn't sufficient to prevent DNS Leaks. There are Clients that will use hard coded DNS Servers. E.g. I had a Roku Player and a Fire TV that bypassed my specified DNS Server with hard coded Google DNS Servers. Perhaps even Apps installed on the FireTV may use their own DNS Server.
                                            The only thing that worked reliably was to port forward (DNAT) DNS Requests (Dest. Port 53) to my DNS Server of Choice, which is my VPN providers own internal DNS Server. If you trust your VPN provider with your Data traffic you might as well trust them with your DNS Traffic.

                                            My VPN Provider also has a public DNS Server which pfSense uses to resolve the VPN Servers. Once the Tunnel is up my LAN clients will send their DNS Queries through the Tunnel to the VPN providers internal DNS Server.

                                            For Clients that do not need tunneling via VPN you can hand out DNS Servers via DHCP (e.g. Google or OpenDNS). You do not need to have a DNS Forwarder or Resolver run on your pfSense box.

                                            @gschmitt:
                                            In your screenshot your Windows IP Config shows a DNS Server of 85.203.37.1. That is a public DNS Server. Use this Server under pfSense General Setup.
                                            Uncheck "Allow DNS server list to be overridden by DHCP/PPP on WAN"
                                            Check "Do not use the DNS Forwarder/DNS Resolver as a DNS server for the firewall"

                                            I assume you use the pfSense OpenVPN Client to connect to Express VPN. Express VPN will assign you an RFC1918 Address (an internal IP Address) . E.g.

                                            10.8.0.5 with a Gateway of 10.8.0.1

                                            My VPN Provider (Mullvad) also has a DNS Server listening on 10.8.0.1.

                                            So the DNAT(Port Forward rule) should forward DNS Traffic to 10.8.0.1 and there shouldn't be any leaks anymore.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.