-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DNS Leaks for all connections #13
Comments
@markubiak in case you are interested, this is how I solve the issue (with NetworkManager):
In other words, as long as VPN is connected, the |
Huh, that chmod stuff is some bash black magic. I'm gonna go do research on why that works. It completely fixed DNS leaks for me though. Thank you! I'm leaving this issue open as it really should be mitigated. |
I will have to look more into this. @markubiak considering most scripts/changes would probably not change the attrib on the file from RO, it stands to reason that setting it to RO would mitigate some other application changing the DNS settings. |
I wonder if it has something to do how https://github.com/masterkorp/openvpn-update-resolv-conf works. I'll have to look at this when I get back to my Linux box. |
Running |
Connecting through the Japan end point. The DNS leak test shows fine: OpenVPN Config
Conman Config
|
I can actually confirm that DNS is not leaking anymore, neither on "normal" nor on "strong" configurations (tested with NM). The hack I posted earlier is not required anymore. I imagine the issue was somewhere else (perhaps in PIA's configs or in update-resolv-conf), and now it got fixed. |
@maximbaz okay, then I'll close this. =D |
I have just been able to observe the leak. Interestingly enough, when I re-run the same test, the leak is gone! I think this is what happens. Without any extra hacks, the
Which means, whenever possible PIA's DNS take priority. But if for some reason those servers are unable to resolve an address, my provider's DNS kicks in and therefore leaks the location. It's not reproducing 100% of the time, and I'm not exactly sure why. But in my mind inconsistent DNS leak is even worse than permanent leak, because you never know when it happened. I'm returning back to using the hack that I posted earlier. These are the websites which were able to detect the leak when the site was loaded for the first time: |
well shoot... I will look at it. |
I'm not sure though that the changes needs to be done in this project. We need to investigate why the line |
exactly... I will look in a bit |
@maximbaz what doe Mine:
|
This is the contents of the
I don't know exactly what is the process behind generating it. I think I use systemd (I manage services using systemctl tool, which is the part of systemd, right?). I use router, and 192.168.1.1 is the address of the router. |
yes, it's managed by systemclt. |
Can you do a |
No matches. Maybe let's switch to a chat, @flamusdiu? |
that's odd ... it's always best to catch me on G+/HO -> https://bit.ly/AzuleOnyx |
@maximbaz Is this still happening? I haven't noticed it on my end, yet. =( |
Yep, still happens. Try this website again, it constantly shows the leak for me: https://whoer.net/ |
Yeah, I dislike that page. I feel it's pushing FUD.
DNS appears to be fine for me here. |
Agree on all points, the website is obscure, however it does show me a leak, and that's why I suggested it :) As soon as I disable my "fix" mentioned above, in this column I begin to see my own country: When the "fix" is enabled, as you can see, the DNS IP address matches my own IP address. |
Here's mine. very odd. |
FYI, I cannot set nameservers to localhost as you have in your Is it possible that you have some kind of a DNS resolver service running locally? Or how does that work in your case? But I don't know, maybe the problem is with NetworkManager ¯\_(ツ)_/¯ I'm perfectly fine using the workaround, so it's up to you @flamusdiu, if you want, close the issue as "Won't fix", or make the workaround be installed as a part of |
Maybe it has to do with the diff between ConnMan and NM? |
I don't know; I may play with it some more. I might have to do a clean install just with NM (maybe using Gnome DE or something) and see if it happens. ¯_(ツ)_/¯ |
@maximbaz are you running systemd-resolved? |
Looks like it keeps using 8.8.8.8 and not my local DNS server. grr. Also, see this -> https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1449001 |
Apparently I do not, so that's how your localhost entries do resolve hosts for you. Good to know! I think there's something (NetworkManager itself?) that adds extra records to Also good point is that systemd-resolved also falls back to 8.8.8.8, it's not cool, though I think not as vulnerable as using DNS of your own internet provider, which when is known basically tells your location pretty accurately. |
Yes, just it's not using my local DNS for some dam reason. I just noticed this. Though, i don't mind them using it; It for the love of something holy, shouldn't be forcing configuring. I expect it to fail -- this isn't windows or ubuntu -- when things are not configured right. Not some blind work around. |
NM automatically changes |
FYI: this bug is also tracked in alfredopalhares/openvpn-update-resolv-conf#14, however it is also closed there with a conclusion that it is probably NetworkManager that is doing all the trouble. |
Using the default configuration, openvpn may use DNS servers that are not protected by the VPN, causing these DNS providers to possibly snoop on which sites you're browsing. Openvpn can mitigate this by adding the line "block-outside-dns" to the end of every file in /etc/openvpn/*.conf. This fixes the DNS leak and ensures nobody can snoop on you. You can test the leak and the fix using http://dnsleaktest.com
EDIT: This fix does not seem to work. I'm exploring other options. Will update.
The text was updated successfully, but these errors were encountered: