Networking Oddity
-
-
-
DNS leak test comes back the same mobile data with VPN as it does WiFi with VPN pointing back to DNS reflecting my upstream DNS, Quad9.
-
I turned on query logging for my PiHole. I chose a random site I don't typically browse, and confirmed I saw it logged in my PiHole. Though, I am thinking it's likely DNS that's causing issues.
I even tried turning off split tunneling, and it does the same thing.
I checked automatic DNS setting on my phone.
I don't know if it will make a difference but the DNS records for my local services are CNAME records, so I am going to change it to an A/AAAA record on PiHole.
I have these set in PiHole and not my Unbound.
-
-
-
-
Awesome! Interesting with MTU. This was a first hit google search, seems MTU in wireguard setup plays a role also. https://gist.github.com/nitred/f16850ca48c48c79bf422e90ee5b9d95
-
Thank you for the info, I may try that out of curiosity
-
I was having issues getting my Android device to use my local DNS server over VPN, what worked for me was setting it up through RethinkDNS. There's a setting to prevent DNS leaks by capturing all traffic on port 53 and directing it to the DNS server you set. It doesn't feel like an elegant solution but hey, it works.
Note, you'll have to make sure your private DNS setting is off, in the internet section of the system settings.