rohko 17 Posted ... AirVPN should support DNS over TLS within the VPN tunnels, but currently, this is not the case. Of course, we know that DNS over TLS does not provide any benefit because all DNS traffic goes over the VPN as well (which is also stated in the service description). Quote Every gateway/daemon assigned to you acts as a DNS (port 53), DoH (dns-over-http, port 443), DoT (dns-over-tls, port 853). DoH and DoT don't add any actual benefit, because plain DNS requests are encrypted inside our tunnel anyway. However, I use Linux, and when the VPN is off, I always keep DoT on. The setting is simply enabled by DNSOverTLS=yes at the resolved.conf file. Because 99% of the time I do not use VPN, I prefer to keep the DoT setting on and not disable it whenever I start a VPN session. But when deploying a VPN session from a WireGuard conf file, the DNS resolution is halted. It is possible to reach the internet through direct IP-address-based connections, but DNS resolution does not work at all. I see that the internal DNS server (10.128.0.1) does respond to the incoming requests at port 853, and I receive the responses, but that is all. Naturally, it is not possible to sniff more deeply into the content of the DNS packets with Wireshark because they are encrypted. But there is a lot of that traffic going back and forth through the tunnel. Do you have any idea what might be wrong? If the DoT setting is disabled, the DNS resolution works inside the tunnel as it should. Quote Share this post Link to post
rohko 17 Posted ... Am I the only one who is experiencing this issue? I can test other distros or Windows as well. Quote Share this post Link to post
rohko 17 Posted ... DNS over TLS seems to work in Windows but not in Arch when the VPN tunnel is on. Looks like the setting DNSOverTLS=opportunistic suffices for now (it disables DoT if it fails). Also, restarting the systemd-resolved service right after the VPN tunnel seems to enable DoT even in Arch. Weird. Quote Share this post Link to post