Cannot reproduce here. I just tested all modes. I have one OpenVPN client configured with DNS set in Exclusive mode.
I set Force Internet Traffic through Tunnel to Yes, and dnsleaktest.com reports the VPN's DNS.
Then I switched to Policy Mode, added my test laptop to the VPN, and dnsleaktest still reports the tunnel VPN.
Switched to Force Internet Traffic to No, tested again: still reporting the VPN's DNS.
Turned tunnel off, tested one last time: back to ISP DNS.
Please post the content of /etc/openvpn/client1/dns.sh, /etc/openvpn/client1/config.ovpn, as well as the system log entries during the client connection.
Here is the requested information. The router's logdata is attached in 'RT_AX88U_log.txt'.
/etc/openvpn/client1/dns.sh:
xxxxxxx@RT-AX88U-F5E0:/# cat /etc/openvpn/client1/dns.sh
#!/bin/sh
/usr/sbin/iptables -t nat -N DNSVPN1
/usr/sbin/iptables -t nat -I PREROUTING -p udp -m udp --dport 53 -j DNSVPN1
/usr/sbin/iptables -t nat -I PREROUTING -p tcp -m tcp --dport 53 -j DNSVPN1
/etc/openvpn/client1/config.ovpn:
intrepid@RT-AX88U-F5E0:/# cat /etc/openvpn/client1/config.ovpn
daemon ovpn-client1
client
dev tun11
txqueuelen 1000
proto udp
remote netherlands-thehague-ca-version-2.expressnetw.com 1195
connect-retry-max 15
nobind
persist-key
persist-tun
compress
ncp-ciphers AES-256-GCM:AES-128-GCM:AES-256-CBC:AES-128-CBC
cipher AES-256-CBC
auth SHA512
route-noexec
tls-auth static.key 1
ca ca.crt
cert client.crt
key client.key
verify-x509-name "Server" name-prefix
auth-user-pass auth
up 'ovpn-up 1 client'
down 'ovpn-down 1 client'
script-security 2
route-delay 2
route-up vpnrouting.sh
route-pre-down vpnrouting.sh
verb 1
status-version 2
status status 5
# Custom Configuration
fast-io
tun-mtu 1500
fragment 1300
mssfix 1200
verify-x509-name Server name-prefix
Update:
I was doing some more tests with 384.19b1 and I noticed something that might be of interest:
If an IP-address is specified, then there are
no DNS leaks! The VPN provider's DNS server is used.
(172.16.1.11 is the LAN IP address of my PC)
When performing
iptables --line -t nat -nvL DNSVPN1, I see this in the console:
intrepid@RT-AX88U-F5E0:/tmp/home/root# iptables --line -t nat -nvL DNSVPN1
Chain DNSVPN1 (2 references)
num pkts bytes target prot opt in out source destina tion
1 134 9094 DNAT all -- * * 172.16.1.11 0.0.0.0 /0 to:10.57.0.1
If a subnet is specified, then I have
DNS leaks! The WAN's DNS server is used.
When performing
iptables --line -t nat -nvL DNSVPN1, I see this in the console:
intrepid@RT-AX88U-F5E0:/tmp/home/root# iptables --line -t nat -nvL DNSVPN1
Chain DNSVPN1 (2 references)
num pkts bytes target prot opt in out source destination
In the above output, a rule is missing and I guess that's the reason I have these DNS leaks..
Why is this rule missing?? I don't know. Could this is be a timing-related issue? In that case it might be machine dependent.
In both scenarios individually tested,
ipleak.net does report the VPN provider's IP-address. I don't see my ISP public WAN IP and this tells me that traffic is routed through the VPN tunnel.