-
Notifications
You must be signed in to change notification settings - Fork 18
DNS leak on Ubuntu 17.04 #7
Comments
Further information: From within the namespace:
from the host:
|
Did a little test and DNS wasn't leaking in chromium/firefox for me. The contents of When I re-enter the vpnshift netns with Basically, I can't reproduce. What does your |
I'm on Ubuntu 17.04. I confirm that commands ran from any terminal that are preceded by I made sure that no other instances of firefox vivaldi chromium were running. |
FYI the openvpn config:
|
Huh, I spun up an ubuntu vm and it's happening to me also. If I had to guess, maybe it's |
Humm... don't know why the browser only is affected... all browsers so far I've tested, chrome, chromium, firefox, vivaldi. |
Running Doing the However, all webbrowser traffic completely bypasses the namespace The problem might be "namespace aware applications" as discussed in a comment on stackoverflow... very strange |
Ubuntu 17.10 (beta 2) also affected |
Solution! The resolver is systemd-resolvd (by default since 17.04 Ubuntu) To solve it you need to add |
hmm -- it's not that simple. The above doesn't seem to work.
from github |
Maybe this helps... (i am on ubuntu 18.04, so maybe not)
Then add this fragment to your openvpn client.conf file:
Start the vpn: If the connected network uses its own suffix, e.g. example.com, then you could also try
Which makes lookup for e.g. www.example.com go to the vpn-dns. The DOMAIN-ROUTE dhcp-option does not append .example.com to short names (without dots). For that you may want to add Any of this might fail to prevent all dns leakage:
|
Do you want this change to individual clients or the vpnshift script?
…On Sun, Dec 16, 2018 at 11:14 AM Mike ***@***.***> wrote:
Maybe this helps... (i am on ubuntu 18.04, so maybe not)
apt install openvpn-systemd-resolved
Then add this fragment to your openvpn client.conf file:
dhcp-option DOMAIN-ROUTE .
verb 3
script-security 2
up /etc/openvpn/update-systemd-resolved
down /etc/openvpn/update-systemd-resolved
down-pre
Start the vpn: systemctl restart ***@***.*** replacing client with
whatever you have.
Run ip r to verify that the tunnel is up.
Maybe check /var/log/syslog for messages (as verb 3 logs more than
default).
Now run systemd-resolve --flush-caches (for the next checks only).
Check with systemd-resolve --status, do you see DNS Domain: ~.?
and run the test at https://www.dnsleaktest.com
If the connected network uses its own suffix, e.g. example.com, then you
could also try
dchp-option DOMAIN-ROUTE example.com
Which makes lookup for e.g. www.example.com go to the vpn-dns.
In the output of systemd-resolve --status you should see DNS Domain: ~
example.com
The DOMAIN-ROUTE dhcp-option does not append .example.com to short names
(without dots). For that you may want to add dchp-option DOMAIN-SEARCH
example.com
Any of this might fail to prevent all dns leakage:
- shortly after the tunnel goes down, you may be initiating sensitive
lookups to your isp again;
- your local dns names may leak into the vpn-dns, if you have a search
domain confiigured.
—
You are receiving this because you modified the open/close state.
Reply to this email directly, view it on GitHub
<#7 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/ABum-wDWCSpyX5tqAU5R3gcpVxSOk6v5ks5u5lUugaJpZM4OWVmW>
.
|
No changes needed. It was more like a FYI. |
The application running in the new namespace uses the real host's DNS ( from the host's /etc/resolv.conf ) not the hardcoded cryptostorm address.
The text was updated successfully, but these errors were encountered: