Hi,
what is the possibility to stop openvpn from leaking the DNS outside of the ipfire?
Where should i bring the “block-outside-dns”? The server.conf overwrites by each restarting in the WUI.
So is it the solution and if so, where could the “block-outside-dns” be written?
OpenVPN has nothing to do with DNS resolution here, as the latter are handled by a different software and are usually not transmitted through an OpenVPN tunnel.
In case you are trying to do something like connecting a branch office to a company’s headquarter, and want internal DNS namespace to be resolved by an internal nameserver, please refer to the documentation on how to do so.
In case you are trying connect IPFire to a VPN provider, please do not do so for reasons mentioned here.
First of all, have you established whether the DNS queries are bypassing the VPN tunnel?
You can add additional configuration options in /var/ipfire/ovpn/scripts/server.conf.local.
I don’t have any experience of using OpenVPN on a phone but, generally, the (IPFire) server can “push” a number of configuration options to the client, which might include DNS (eg push "dhcp-option DNS 11.22.33.44"). The client, in this case your phone, should then act on those instructions.
So, you need to find out if the server is pushing a DNS address and, if so, whether the smartphone is doing anything with the instruction.
thanks!
i found the setting in the client config on the server, there you can set the DNS. So i can set there the internal network dns and it works. Very fine!
The push possibility can be find via WUI in the further server settings, i think it could be another workaround.