Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Dynamic DNS gets cached IP as VPN client IP

    Scheduled Pinned Locked Moved DHCP and DNS
    41 Posts 3 Posters 8.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DerelictD
      Derelict LAYER 8 Netgate
      last edited by

      Do you have Don't pull routes checked in your VPN client config?

      Chattanooga, Tennessee, USA
      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
      Do Not Chat For Help! NO_WAN_EGRESS(TM)

      1 Reply Last reply Reply Quote 0
      • T
        teknikalcrysis
        last edited by

        No...I have that option Unchecked

        @derelict said in Dynamic DNS gets cached IP as VPN client IP:

        Do you have Don't pull routes checked in your VPN client config?

        0_1528824804968_vpn1.png

        2.4.3-RELEASE-p1 (amd64) - FreeBSD 11.1-RELEASE-p10
        AMD G-T40E Processor - 2 CPUs: 1 package(s) x 2 core(s)

        1 Reply Last reply Reply Quote 0
        • DerelictD
          Derelict LAYER 8 Netgate
          last edited by

          Right. That means they are giving you a default route. That likely means your dyndns request is going that way too.

          If you are policy routing traffic out the VPN by setting gateways on inside interface rules, try checking that box and seeing if dyndns now does the right thing.

          Chattanooga, Tennessee, USA
          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
          Do Not Chat For Help! NO_WAN_EGRESS(TM)

          1 Reply Last reply Reply Quote 0
          • T
            teknikalcrysis
            last edited by

            Okay, I have CHECKED that option

            0_1528830136019_fixed ip.png

            However, after Checking that box, I now have a DNS leak

            0_1528830210281_leak.png

            If I leave the box UNCHECKED, this is the DNS test result

            0_1528830703252_No_leak.png

            2.4.3-RELEASE-p1 (amd64) - FreeBSD 11.1-RELEASE-p10
            AMD G-T40E Processor - 2 CPUs: 1 package(s) x 2 core(s)

            1 Reply Last reply Reply Quote 0
            • T
              teknikalcrysis
              last edited by

              Here are some related settings
              0_1528831085547_dns_setup.png

              LAN Rules related to TorGuard
              0_1528831141206_Lan rules.png

              2.4.3-RELEASE-p1 (amd64) - FreeBSD 11.1-RELEASE-p10
              AMD G-T40E Processor - 2 CPUs: 1 package(s) x 2 core(s)

              G 1 Reply Last reply Reply Quote 0
              • T
                teknikalcrysis
                last edited by

                forgot to post the (unbound) DNS Resolver settings
                0_1528832591911_resolver settings.png

                2.4.3-RELEASE-p1 (amd64) - FreeBSD 11.1-RELEASE-p10
                AMD G-T40E Processor - 2 CPUs: 1 package(s) x 2 core(s)

                1 Reply Last reply Reply Quote 0
                • DerelictD
                  Derelict LAYER 8 Netgate
                  last edited by

                  Set your VPN clients to use outside DNS servers instead of the DNS resolver on the local firewall.

                  Chattanooga, Tennessee, USA
                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                  T 1 Reply Last reply Reply Quote 0
                  • T
                    teknikalcrysis @Derelict
                    last edited by teknikalcrysis

                    @derelict You'll have to excuse my ignorance LBVS
                    How do I do that?

                    I thought I was accomplishing that in the General System Settings by providing a DNS server tagged to the TorGuard VPN gateway

                    2.4.3-RELEASE-p1 (amd64) - FreeBSD 11.1-RELEASE-p10
                    AMD G-T40E Processor - 2 CPUs: 1 package(s) x 2 core(s)

                    1 Reply Last reply Reply Quote 0
                    • DerelictD
                      Derelict LAYER 8 Netgate
                      last edited by

                      Nope. Set them in the DHCP server most likely, else static on the hosts.

                      The DHCP server will automatically give hosts the interface address if DNS servers are not specified.

                      Chattanooga, Tennessee, USA
                      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                      Do Not Chat For Help! NO_WAN_EGRESS(TM)

                      1 Reply Last reply Reply Quote 0
                      • T
                        teknikalcrysis
                        last edited by

                        So your saying I should setup the TorGuard Interface as DHCP? as I have it set to none at the moment and it just sets a Virtual IP
                        0_1528833441467_torguard interface.png

                        0_1528833622836_openvpn.png

                        2.4.3-RELEASE-p1 (amd64) - FreeBSD 11.1-RELEASE-p10
                        AMD G-T40E Processor - 2 CPUs: 1 package(s) x 2 core(s)

                        1 Reply Last reply Reply Quote 0
                        • DerelictD
                          Derelict LAYER 8 Netgate
                          last edited by

                          No. It's about what the CLIENTS that are routed over TorGuard are, themselves, configured to use as DNS servers. The DHCP configuration would be on that interface. If you only want to change certain hosts, use DHCP static mappings.

                          Chattanooga, Tennessee, USA
                          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                          Do Not Chat For Help! NO_WAN_EGRESS(TM)

                          1 Reply Last reply Reply Quote 0
                          • T
                            teknikalcrysis
                            last edited by

                            You're talking about here?
                            0_1528835117652_here.png

                            If I do that, then when the TorGuard Service has been disabled/disconnected, won't the PC constantly use those specific DNS servers rather than Only use the TorGuard Servers when the service is enabled and default to using Unbound DNS Resolver when TorGuard is disconnected like it performed before the "Do Not Pull Routes" option was checked?

                            2.4.3-RELEASE-p1 (amd64) - FreeBSD 11.1-RELEASE-p10
                            AMD G-T40E Processor - 2 CPUs: 1 package(s) x 2 core(s)

                            1 Reply Last reply Reply Quote 0
                            • DerelictD
                              Derelict LAYER 8 Netgate
                              last edited by Derelict

                              Yup.

                              You can't have everything.

                              The most straightforward option I can think of is to run a DNS server off the firewall. That way DNS queries get policy routed like all other traffic.

                              Some people set the OpenVPN interface as the outgoing interface in DNS Resolver but, when you do that, all DNS can go south when the VPN is not connected.

                              If you're concerned about DNS leaks, policy route, and choose to use a DNS resolver on the firewall, there are compromises. If you otherwise choose to accept a default route from a VPN provider, there are compromises.

                              Maybe someone else has a better idea.

                              Chattanooga, Tennessee, USA
                              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                              Do Not Chat For Help! NO_WAN_EGRESS(TM)

                              1 Reply Last reply Reply Quote 1
                              • G
                                gjaltemba @teknikalcrysis
                                last edited by

                                @teknikalcrysis said in Dynamic DNS gets cached IP as VPN client IP:

                                Here are some related settings
                                0_1528831085547_dns_setup.png

                                LAN Rules related to TorGuard
                                0_1528831141206_Lan rules.png

                                Have you tried a pass rule for source This Firewall(self) destination ?.ddns.net gateway WAN_DHCP

                                1 Reply Last reply Reply Quote 0
                                • DerelictD
                                  Derelict LAYER 8 Netgate
                                  last edited by Derelict

                                  It won't matter because the dyndns session doesn't arrive into LAN where it can be policy routed. It is sourced from the firewall itself.

                                  A dyndns client on the inside that updates that name and could be policy routed could perhaps solve the problem being seen when the VPN connection is active with def1 routes accepted.

                                  Chattanooga, Tennessee, USA
                                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                  G 1 Reply Last reply Reply Quote 0
                                  • G
                                    gjaltemba @Derelict
                                    last edited by gjaltemba

                                    @derelict said in Dynamic DNS gets cached IP as VPN client IP:

                                    It won't matter because the dyndns session doesn't arrive into LAN where it can be policy routed. It is sourced from the firewall itself.

                                    A dyndns client on the inside that updates that name and could be policy routed could perhaps solve the problem being seen when the VPN connection is active with def1 routes accepted.

                                    Oops. How about outbound NAT on WAN interface source This Firewall(self) destination ?.ddns.net gateway WAN_DHCP?

                                    It may be simpler just to run ddns client on the outside edge router if it has one.

                                    1 Reply Last reply Reply Quote 0
                                    • DerelictD
                                      Derelict LAYER 8 Netgate
                                      last edited by

                                      Outbound NAT does not have anything to do with where traffic goes (routing). It only determines what NAT happens when traffic flows that way according to policy routing and the routing table.

                                      Chattanooga, Tennessee, USA
                                      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                      Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                      G 1 Reply Last reply Reply Quote 0
                                      • G
                                        gjaltemba @Derelict
                                        last edited by

                                        @derelict said in Dynamic DNS gets cached IP as VPN client IP:

                                        Outbound NAT does not have anything to do with where traffic goes (routing). It only determines what NAT happens when traffic flows that way according to policy routing and the routing table.

                                        Oops again should be. How about outbound NAT on WAN interface source This Firewall(self) destination ?.ddns.net NAT address WAN address?

                                        T 1 Reply Last reply Reply Quote 0
                                        • T
                                          teknikalcrysis
                                          last edited by

                                          I have been trying a bit of everything...I was leaning on hope that there would be a way to create a rule somewhere that would route the dyndns traffic to a specific gateway like I have made with having my PC pushed trough the TorGuard VPN and simultaneously default traffic from the kids' tablets to bypass the TorGuard gateway and use the WAN directly...

                                          While having the "Do Not Pull Routes" option checked in the TorGuard VPN config, I tried to make use of both the DNS Forwarder (dnsmasq) and DNS Resolver (Unbound) at the same time by creating a Virtual IP of 10.1.10.1 having Unbound listen on port 53 and dnsmasq listen on 5305 and then NAT Port-forward traffic DNS to the Virtual IP
                                          0_1528862027103_test.png

                                          While this does make a change is the right direction by making use of the DNS server listed in General Setup
                                          0_1528862173667_dns.png

                                          RESULT: 0_1528862315153_result.png

                                          It tries to force all traffic to the DNS Forwarder (dnsmasq) even when the TorGuard VPN has been disabled/disconnected and it bypass the DNS Resolver (Unbound) all together
                                          And then thing I dont like about using (dnsmasq) is that the DNSBL in pfBlockerNG is then circumvented is it not?

                                          I DID try to use the static DNS setting in the DHCP mapping as suggested, but it forces the PC to consistently use those specified DNS servers even when TorGuard has been disconnected, and again by having DHCP specify those servers, isn't DNSBL in pfBlockerNG getting bypassed at that point?

                                          2.4.3-RELEASE-p1 (amd64) - FreeBSD 11.1-RELEASE-p10
                                          AMD G-T40E Processor - 2 CPUs: 1 package(s) x 2 core(s)

                                          1 Reply Last reply Reply Quote 0
                                          • T
                                            teknikalcrysis @gjaltemba
                                            last edited by

                                            @gjaltemba said in Dynamic DNS gets cached IP as VPN client IP:

                                            @derelict said in Dynamic DNS gets cached IP as VPN client IP:

                                            Outbound NAT does not have anything to do with where traffic goes (routing). It only determines what NAT happens when traffic flows that way according to policy routing and the routing table.

                                            Oops again should be. How about outbound NAT on WAN interface source This Firewall(self) destination ?.ddns.net NAT address WAN address?

                                            This has already been listed via autorule
                                            0_1528864391104_mappings.png

                                            2.4.3-RELEASE-p1 (amd64) - FreeBSD 11.1-RELEASE-p10
                                            AMD G-T40E Processor - 2 CPUs: 1 package(s) x 2 core(s)

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.