When I first started to use unbound, I could not get "unbound_manager vpn=3" to work either. Then I found the script by @Swinson and it works right away. So yes, I leave "vpn=disable" in unbound and rely on this script to facilitate it.OK, this is interesting. Can you explain a little how this works, and what you're seeing behavior-wise from your end? When I call the "unbound_manager vpn=3", it will change the "outgoing-interface:" dynamically to the internal VPN IP, usually in the form of an address, like: 10.0.8.3...
Are you saying you change the outgoing interface to 192.168.1.1 (or internal router br0 IP), and use this script to facilitate setting the rules for unbound to traverse over the VPN in this case?
Say you put the script in '/jffs/addons/unbound/unbound_DNS_via_OVPN.sh', you can manually run it. For ovpnc3, syntax to start and stop is
Code:
/jffs/addons/unbound/unbound_DNS_via_OVPN.sh 3 start
/jffs/addons/unbound/unbound_DNS_via_OVPN.sh 3 stop
Once stop is run, unbound traffic will go back to WAN interface. It can bind to another ovpn client by changing the vpn id.
I suspect it is going through your WAN interface. Perhaps you run tcpdump on your WAN interface and see if it is there. By the way, if it is cached by unbound, there will be no outgoing query.So really weird... DNSMON is showing that queries are initiating from my tun14 interface (IP is 10.8.1.2)... yet, when I run the command:
Code:tcpdump -i tun14 -p port 53
...it doesn't report any traffic whatsoever. And the mystery continues...
Last edited: