CaptainSTX
Part of the Furniture
Just to the PC that is running the second VPN and I am testing to.Just to the PC running the 2nd connection or all devices connecting through the appliance as well?
Just to the PC that is running the second VPN and I am testing to.Just to the PC running the 2nd connection or all devices connecting through the appliance as well?
It's a bit odd to see that big of drop in speed with both of them using WG.Just to the PC that is running the second VPN and I am testing to.
So when I turn off openvpn in VPN Director for my local IP of my computer AND if my computer is connected to Nordlynx via app on my computer then I can bypass the router's VPN without conflicting VPN tunnels? Nord has you configure the router's WAN DNS server #1 to 106.86.96.100 and to server #2 106.86.99.100. In this configuration when running DNS leak tests and WebRTC leak tests on the COMPUTER running Nordlynx I get Nords assigned public IP and and DNS address the same (or very close with last 3 digits of both addresses a few numbers apart).You will end up having the desktop VPN traffic tunneled through the router's VPN. The protocol or application used on the desktop doesn`t matter. Just make sure however you don`t connect to the same server, as many providers only allow one login per server.
Your configuration is all over the place, with way too many variables for anyone to accurately predict what will happen. You need to simplify your setup. Don't use two different VPN technology configured in two different location, and don't change your WAN DNS on top of it.So when I turn off openvpn in VPN Director for my local IP of my computer AND if my computer is connected to Nordlynx via app on my computer then I can bypass the router's VPN without conflicting VPN tunnels? Nord has you configure the router's WAN DNS server #1 to 106.86.96.100 and to server #2 106.86.99.100. In this configuration when running DNS leak tests and WebRTC leak tests on the COMPUTER running Nordlynx I get Nords assigned public IP and and DNS address the same (or very close with last 3 digits of both addresses a few numbers apart).
I contacted NORD and they said having two different VPNs running could cause a problem for the integrity of the VPN process. So I assume you can choose to utilize either the router's openvpn setup or say a computer on the network utilizing the router to get to the modem but not run both? Thanks.
@eibgradThanks.
That seems like a reasonable mitigation. But the bigger takeaway here is that the OpenVPN provider's instructions can NOT be trusted. And most end-users are naively going to assume they should be. And that's a big mistake.
Even if Strict worked as intended (i.e., the OpenVPN provider's DNS servers were prepended to /tmp/resolv.dnsmasq), that's no guarantee against DNS leaks. Even if the highest priority DNS server was that of the OpenVPN provider, if that server refuses to respond for any reason (e.g., temporarily overloaded), DNSMasq will move on to the next available DNS server. If you monitor connection tracking over time, you'll find the WAN's DNS servers being accessed, at least occasionally. It won't be the dominant choice, but it's NOT as if your DNS is leak proof. At best, it's leak resistant.
The only safe choice is Exclusive, since it forces the DNS server to be routed through the same OpenVPN routing table as everything else by those clients bound to the VPN. But it comes at a price; no access to DNSMasq features (local name resolution, caching, ad blocking, DoT, etc.). The advantage of using Strict was to maintain access to DNSMasq.
Seems to me it would be better if Strict only provided access to the OpenVPN provider's DNS servers, rather than merging w/ the WAN's DNS servers and trying to relying on strict-order. For anyone who wants the latter, they can use Relaxed (as it stands today, there really isn't much difference between the two anyway). Finally, Exclusive would be for the purposes of bypassing DNSMasq entirely, with the absolute assurance of using the OpenVPN provider's DNS over the VPN. That would make more sense to me. And if requires renaming these options, so be it.
ping 5
ping-exit 30
remote-random
remote-cert-tls server
auth-nocache
route-metric 1
cipher AES-256-CBC
192.168.1.1 = WAN
192.168.1.0/24 = VPN1
@eibgrad
I noticed you used VPN Unlimited (KeepSolid) in the past. Do you have any special recommendations on how to setup as a VPN Client under OpenVPN or do you simply upload the opvn file that you download thru their website and upload it and call it a day?
Would you mind sharing any additional settings (if any) under Custom Configuration, I have default settings:
Code:ping 5 ping-exit 30 remote-random remote-cert-tls server auth-nocache route-metric 1 cipher AES-256-CBC
that you recommend i.e, to speed up things?
I have setup VPN Director with 2 rules:
Code:192.168.1.1 = WAN 192.168.1.0/24 = VPN1
I also have disabled the "Accept the DNS configuration" and set DNSFilter "Router".
Any assistance is greatly appreciated.
I appreciate the information.You have to realize that may times when I mention a specific VPN provider, it's NOT because that's my daily driver. I have many such accounts solely for the purposes of testing. When writing scripts or doing analysis, I don't want to become fixated on how one particular VPN provider works or behaves and assume it applies to all. The fact that KeepSolid and FastestVPN have a nasty habit of pushing DNS servers outside the scope of the tunnel is a classic example. You rarely see this kind of thing from the major players (ExpressVPN, NordVPN, PIA, etc.).
I tend to stick w/ the major players for my own personal needs. As it happens though, I'm between VPN providers at the moment and using KeepSolid until I make a final decision. I will say that the performance ranges from mediocre (65Mbps) to satisfactory (100Mbps) on a good day (esp. if the server is close). But my ISP only provides 150Mbps anyway. So what's "good" is relative. And there's very little of anything you can do to speed things up. More likely it's the limits of your hardware. I'm using an ASUS RT-AC68U, which limits my OpenVPN speeds to ~30Mbps. And because of that, a few years ago I moved my OpenVPN client to a small form-factor PC to get better performance, using DD-WRT x86. The difference is like night and day.
Because I use DD-WRT to host my OpenVPN client, and that firmware doesn't have an import feature, I have to manually configure the OpenVPN based on downloaded .ovpn files from the VPN provider. Not a fun experience. But as a result, I don't enter a lot of the fields you see in the custom config field of Merlin's OpenVPN client because much of it is irrelevant and unnecessary. Most of it is already part of the default configuration. In a few cases, it may even do harm (e.g., reneg-sec 0). But more often than not, it's just benign.
Realize that when using the VPN Director, that removes the router itself from the VPN, and therefore any processes its running are bound to the WAN (e.g., DNSMasq). That's what sometimes leads to DNS leaks. Just depends on the rest of the configuration.
The '192.168.1.1 WAN' rule is actually superfluous. It won't do any harm, but it's not likely to provide any benefit either. The router rarely if ever uses the LAN interface (192.168.1.1) for internet access purposes. It's either the WAN or VPN. And that's because unlike the other LAN devices on that same network, the router is the one hosting those network interfaces. IOW, it's a special case. It's the other LAN devices that have to route to the internet via their LAN network interface (192.168.1.0/24), NOT the router. That's why that WAN rule just doesn't do what most ppl think it does.
If you have disabled Accept DNS Configuration and are using the VPN Director, you are at a higher risk for DNS leaks since you're relying on whatever DNS servers were established on the WAN, either ISP or custom. And setting DNSFilter to Router ensures the LAN clients are routed through DNSMasq, which defaults to whatever is defined on the WAN for DNS purposes. Not unless you've configured DoT on the WAN.
https://github.com/MartineauUK/Unbound-Asuswrt-Merlin/blob/dev/unbound_DNS_via_OVPN.sh
vpnclient1-route-pre-down
vpnclient1-route-up
I did get VPN Unlimited (KeepSolid) when they offer a cheap lifetime deal. I wasn't aware they were pushing DNS servers outside of tunnel. Did you find out by looking thru router syslog?
I previously used PIA and my offer expires in Mar but it seems more & more websites/programs are failing due to blocking PIA IPs (pages normally show me "You're offline or DNS cannot be reached" errors). Once I turn off PIA everything works like normal so I am also trying to decide which VPN I would like to try next...decisions...decisions?? haha
People have reported to fix this issue is to change the PIA DNS to any built-in resolver (Cloudflare/Quad9 DNS) but since I use Unbound this does not work for me.
Forgot to mention that I'm using Unbound with the additional script below:
Code:https://github.com/MartineauUK/Unbound-Asuswrt-Merlin/blob/dev/unbound_DNS_via_OVPN.sh
The added script basically allows for the router to resolve through the DNS provided in your WAN settings and everything else should resolve through unbound with your VPNs IP (DNS packets appear to originate off thru the VPN host provider & not the WAN ISP host provider).
I haven't noticed any leaks once the script is started. I also have added:
Code:vpnclient1-route-pre-down vpnclient1-route-up
I suppose I'm not being clear on this as I am not as technologically sophisticated as many of the members on this forum. What I'm trying to say is can you turn on off an individual IP listed in Director (say a listed computer) and thus bypass OpenVPN and go straight to WAN when you are running a VPN app on say your computer?Your configuration is all over the place, with way too many variables for anyone to accurately predict what will happen. You need to simplify your setup. Don't use two different VPN technology configured in two different location, and don't change your WAN DNS on top of it.
Yes. VPN Director will let you enable/disable rules on-the-fly if you want control a specific client (if you have a rule with that client's IP).I suppose I'm not being clear on this as I am not as technologically sophisticated as many of the members on this forum. What I'm trying to say is can you turn on off an individual IP listed in Director (say a listed computer) and thus bypass OpenVPN and go straight to WAN when you are running a VPN app on say your computer?
Thank you for taking the time to respond. PeaceYes. VPN Director will let you enable/disable rules on-the-fly if you want control a specific client (if you have a rule with that client's IP).
I'm still getting DNS leaks connecting to the majority of servers I've tried with this configuration - which is the same result I was getting with a prior configuration on 386.3 that had "Accept DNS configuration" to "strict", and no route entries in the custom config field.Found another solution as well (this is all based on 386.4; I can't speak to any prior version).
1. Define custom DNS servers of your choice (NordVPN or whatever you prefer, e.g., Cloudflare) on the WAN. For the rest of this example, we'll assume Cloudflare (1.1.1.1 and 1.0.0.1).
2. On the OpenVPN client, configure "Accept DNS Configuration" as Disabled, and add the WAN's custom DNS servers as static routes in the custom config field.
Code:route 1.1.1.1 route 1.0.0.1
3a. If "Redirect Internet traffic through tunnel" is set to "Yes (all)", then you're done.
If you know what might explain the variation I've discussed I'm interested in knowing.It's not baffling. A lot of things have changed since 386.4.
The internet isn't a static entity, it is constantly evolving, shifting, and morphing itself into the future 'now'. Even as the base rules are (mostly) preserved.
Some good info here. As I understand it, with DNS leaks a user's actual IP address and every site they connect to is exposed, which to me is data exposure. It seems you might be indicating something else, however (please forgive my lack of experience in this area).@NB_8
It also depends on where you're testing from.
https://www.expressvpn.com/dns-leak-test - this one shows a bunch of random IP'sDNS Leak Tests
DNS Leak Test is a free tool for the internet allowing end users to test their DNS activity to see if their VPN or Proxy service is leaking DNS requests, effectively unmasking end user's privacy and security.dnsleak.com
Worrying about a leak test result is one thing but, data exposure is more important. Also, depends on the browser and if you're blocking other services from leaking info. For chrome I added WebRTC block specifically for one result that showed exposure. Shutting off things like "secure DNS" on the browser prevents things not following your rules. There's a setting for this in Chrome and Android. I had an issue recently with Chrome displaying ads after upgrading my phone to A12 from A11. It took me a couple of days to figure out the issue as nothing else had changed. I disabled the DNS setting on the phone and still had the issue but, turned out Chrome was bypassing the settings itself and also had a DNS setting that needed to be disabled. It's odd though because my laptop / chrome had the setting enabled as well but didn't have the issue of passing ads to my browser. Though IIRC when it was enabled DNS leaks looked different usually resulting in several results vs the test I just did now linked above.
There's a lot of different techniques from apps being used more recently to skim data to sell. i wouldn't have looked into the chrome setting if it hadn't been for the phone ads showing up.
Very true. The most you can do is plug the holes in the dam with a layered approach to mitigate leaks.'if you're online, you're not private',
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!