What a good joke hahahahaha (I hope it's a joke )I believe what's on the WAN page is less important than what's on the LAN page as that defines what is given out to clients. As long as no-resolv is in dnsmasq.conf, I don't think the WAN page DNS servers have any influence.
#!/bin/sh
cp /jffs/configs/resolv.dnsmasq /tmp/resolv.dnsmasq
service restart_dnsmasq
#!/bin/sh
. /opt/share/diversion/file/post-conf.div # Added by Diversion
#!/bin/sh
[ -x /jffs/dnscrypt/manager ] && /jffs/dnscrypt/manager dnsmasq
. /opt/share/diversion/file/post-conf.div # Added by Diversion
dnsmasq)
sed -i "/^servers-file=.*$/d" /etc/dnsmasq.conf
append_on_demand /etc/dnsmasq.conf "no-resolv" "server=127.0.0.1#65053"
;;
#!/bin/sh
CONFIG=$1
source /usr/sbin/helper.sh
. /opt/share/diversion/file/post-conf.div # Added by Diversion
pc_append "no-resolv" "server=127.0.0.1" $CONFIG
# Need these for stubby.
#dnssec
no-resolv
server=127.0.0.1#5453
servers-file=/tmp/resolv.dnsmasq
server=1.1.1.1
server=127.0.0..1
nvram set wan0_dns1_x=127.0.0.1
nvram set wan_dns=127.0.0.1
nvram set wan_dns1_x=127.0.0.1
nvram set wan0_xdns=127.0.0.1
nvram set wan0_dns1_x=127.0.0.1
nvram commit
service restart_dnsmasq
server=127.0.0..1
server= 127.0.0.1
server= 10.9.0.1
server= 10.8.0.1
server=1.1.1.1
server= 10.9.0.1
server= 10.8.0.1
server=1.1.1.1
server= 127.0.0.1
server= 10.9.0.1
server= 10.8.0.1
server= 127.0.0.1
server= 10.9.0.1
server= 10.8.0.1
server= 127.0.0.1
server= 10.9.0.1
server= 10.8.0.1
server= 10.9.0.1
server= 10.8.0.1
server= 127.0.0.1
server= 10.9.0.1
server= 10.8.0.1
server=1.1.1.1
It looks like I can. However, the multiple server entries still causes stubby not to resolve:can you include the port number of stubby in the dhcp-option entry on the VPN client?
server= 127.0.0.1#5453
server= 10.9.0.1
server= 10.8.0.1
server= 127.0.0.1
server= 10.9.0.1
server= 10.8.0.1
server= 127.0.0.1
server= 10.9.0.1
server= 10.8.0.1
server= 10.9.0.1
server= 10.8.0.1
server= 127.0.0.1
server= 10.9.0.1
server= 10.8.0.1
server=1.1.1.1
#!/bin/sh
cp /jffs/configs/resolv.dnsmasq /tmp/resolv.dnsmasq
Easy to do once I complete testing!it will be nice a script to install and config
edit: sh*! dont have entware installed
#!/bin/sh
stubby_status=$(ps | grep stubby | grep -v grep)
logger -t "($(basename "$0"))" $$ "$stubby_status"
cru a Chk_Stubby "* * * * * sh /jffs/scripts/Chk_Stubby.sh"
<snip>
* * * * * sh /jffs/scripts/Chk_Stubby.sh #Chk_Stubby#
I've been pondering an entry in dnsmasq for my own servers file. I have a concern that the default entry the firmware creates for servers=/tmp/resolv.dnsmasq would take precedence over an entry I create in dnsmasq.conf.add. I need more testing to confirm. But I was trying this with a another dnsamsq parameter the other day and that was the result.according to the man page of dnsmasq
--servers-file=<file>
A special case of --conf-file which differs in two respects. Firstly, only --server and --rev-server are allowed in the configuration file included. Secondly, the file is re-read and the configuration therein is updated when dnsmasq receives SIGHUP.
and
--conf-file=<file>
Specify a different configuration file. The conf-file option is also allowed in configuration files, to include multiple configuration files. A filename of "-" causes dnsmasq to read configuration from stdin.
So not sure if that would override the server= entry you already have in dnsmasq.conf?
Sep 14 08:20:58 RT-AC88U-8248 ovpn-client2[1452]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.9.0.1,dhcp-option DNS 10.8.0.1,route 10.24.0.1,topology net30,ping 5,ping-restart 30,compress,ifconfig 10.24.0.10 10.24.0.9,peer-id 1,cipher AES-128-GCM'
dhcp-option DNS 10.9.0.1
dhcp-option DNS 10.8.0.1
Good question. I did look at that the other day and did not notice any conflicts. I ran another check and saw some orphaned iptables Chain for one of the VPN clients in DNSVPNx. This is the result of some work I am doing on a project. I went ahead and cleaned it up.is there a port issue here?.... stubby will be trying to use port 853 whereas the regular DNS is port 53..perhaps what ever mechanism in deciding how to route the DNS requests (probably IPtables) is only looking at port 53?
# Need these for stubby. If comment out, already in /etc/dnsmasq.conf
#dnssec
no-resolv
server=127.0.0.1#5453
#listen-address=127.0.0.1
<snip>
listen_addresses:
- 127.0.0.1@5453
upstream_recursive_servers:
# IPv4 addresses
# # Cloudflare servers
- address_data: 1.1.1.1
tls_port: 853
tls_auth_name: "cloudflare-dns.com"
# # Cloudflare servers
- address_data: 1.0.0.1
tls_port: 853
tls_auth_name: "cloudflare-dns.com"
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!