dnsleaktest
namespaced-openvpn
Our great sponsors
dnsleaktest | namespaced-openvpn | |
---|---|---|
5 | 8 | |
377 | 302 | |
- | - | |
3.6 | 0.0 | |
about 2 months ago | about 2 years ago | |
Shell | Python | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
dnsleaktest
-
Should i use my vpn provider's native client or use a wireguard/openvpn client instead?
I am currently trying out Guetun in docker with ExpressVPN but am getting possible DNS leaks reported by this test. I ran this test in the docker exec console for my qBittorrent container which is routed through my Gluetun container. This is the output I get after running. I have also tried some other tests like doileak.com torrent IPtest. The reults i get from that say that I have an ipv4 udp leak. How do i know for sure that I'm not leaking my IP? TIA!
-
Do I need to install Stubby or dnscrypt-proxy ?
If you want to check what DNS is being used system-wide. https://github.com/macvk/dnsleaktest
-
Please, help me understand how my IP was leaked
I've confirmed the following: * curl ifconfig.cc inside the qbittorrent container gives me the VPN IP, not my own. * Using https://ipleak.net shows my VPN IP, not my own, when downloading their torrent in qbittorrent. * When using https://github.com/macvk/dnsleaktest inside my qbittorrent container, I get a different set of DNS server than when using it outside of it. These are the servers specifically from inside: You use 6 DNS servers: 104.156.251.15 [United States of America AS20473 The Constant Company LLC] 107.191.42.180 [United States of America AS20473 The Constant Company LLC] 144.202.14.9 [United States of America AS20473 The Constant Company LLC] 2001:19f0:5:18e8:5400:1ff:febe:3032 [United States of America AS20473 The Constant Company LLC] 2001:19f0:300:60d2::33 [United States of America AS20473 The Constant Company LLC] 2001:19f0:300:6256:5400:ff:fe1a:c6e7 [United States of America AS20473 The Constant Company LLC]
-
How do I perform a DNS leak test from the CLI?
Check this
-
DNS for wireguard interface inside netns (with systemd-resolved)
I recreated the simple (wg moved into netns) setup and introduced the nsswitch file you posted above. I then ran a DNS leak test script from within the netns and it didn't report any leaks. I ran wireshark in parallel, and unlike before, there was no DNS traffic on the host's ethernet interface. This looks really promising.
namespaced-openvpn
-
Linux - namespaces: Network namespace
Network namespaces are a really nice feature for me. I use them for a few things. They are a simple and foolproof way of running programs in VPNs without having the whole system use the VPN, and you can have multiple of them, and even chain/nest them (foolproof as long as you remember to run it in the network namespace, such as a wrapper script or systemd service). WireGuard remembers the namespace it was created in and uses it for connecting to the VPN endpoint, so if you create it in your init namespace, then move it to a different namespace, programs in that different namespace can use the WireGuard interface which connects to the VPN endpoint using the original connection. Programs have no direct access to the internet if the VPN interface disappears. (https://www.wireguard.com/netns/#ordinary-containerization). There is also https://github.com/slingamn/namespaced-openvpn for OpenVPN.
- Use expressvpn on per-process basis?
-
How to run multiple minecraft clients on one computer with different IP for each client?
namespaced-openvpn can do this.
-
Before I get a VPN I have a question: How do I define what programs go through the VPN and what programs don't? (Linux)
Even found namespaced-openvpn, a ready-made solution for this problem.
- DNS for wireguard interface inside netns (with systemd-resolved)
-
VPN through Hotspot
It would depend of your device but on linux you can use namespaced-openvpn (https://github.com/slingamn/namespaced-openvpn). It would let you connect to vpn1 and running vpn2 over vpn1 for example.
-
Is there a way to use a VPN for only certain programs?
There are ready-made solutions like namespaced-openvpn for OpenVPN. See #27 when using with libtorrent-rasterbar. For WireGuard, you can read up on https://www.wireguard.com/netns but it might be a bit confusing. I've easily made my own script which implements this so that it creates a network namespace, creates a WG interface, moves the WG interface into the new network namespace, then configures the WG interface (which is now in the new network namespace).
-
With The Office leaving Netflix for a, apparently, crappy streaming service I think the entertainment companies need this reminder.
If you don't feel like using docker, this is an awesome script to seamlessly launch OpenVPN and spawn a new network namespace with only the tun interface in it. Handy af.
What are some alternatives?
arch-privoxyvpn - Docker build script for Arch Linux base with Privoxy and OpenVPN
firejail - Linux namespaces and seccomp-bpf sandbox
vpn-only-network-namespace
arch-qbittorrentvpn - Docker build script for Arch Linux base with qBittorrent, Privoxy and OpenVPN
systemd - The systemd System and Service Manager
docker-transmission-openvpn - Docker container running Transmission torrent client with WebUI over an OpenVPN tunnel
dns-server-setup - Ansible playbook to easily deploy new, fully configured, DNS servers.
Sonarr - Smart PVR for newsgroup and bittorrent users.
gluetun - VPN client in a thin Docker container for multiple VPN providers, written in Go, and using OpenVPN or Wireguard, DNS over TLS, with a few proxy servers built-in.
blokada - The official repo for Blokada apps.
VPNHotspot - Share your VPN connection over hotspot or repeater! (root required)