Hello, so i’ve added Encrypted DNS - NixOS Wiki into my system but i have a problem with dnscrypt-proxy when i connect to mullvad vpn i have a dns leak because the vpn is using dnscrypt-proxy dns…
Please is there a way to fix this issue ? I’ve find this topic talking about this subject : https:/reddit.com/r/VPN/comments/e3wh7x/using_dnscryptproxy_together_with_a_vpn_or_not/
But nobody explain how to force VPN to use the vpn dns servers instead of dnscrypt-proxy
If you are using wireguard, one approach is to use network namespaces. A network namespace gets a separate network stack and you can override things like nsswitch.conf on a per-namespace basis. WG works very well with this model as you can create an adapter in the default namespace and then move it inside the NS.
The GUI app is probably very specific to your VPN provider and you may have better luck asking on the VPN provider’s forum/support channel/github issues/etc.
I did find WG configuration challenging at first, but there’s not really much to it. Once set up, I haven’t changed some of the network configs for a few years now. You can probably set up a wireguard point to point setup using two NixOS testdriver VMs to see how the configuration options work.
The blog post you mentioned seems to omit network manager configuration steps which may be necessary to get your setup to work.
Online tools can only verify whether you’re using some provider’s DNS server or not. If you’re using dnscrypt, you’re most likely not using your VPN provider’s DNS but the dnscrypt traffic is still going via the proxy, so you’re not leaking any info.
Well that’s a lot harder. I’d capture IP traffic and check whether DNS traffic is going via your hardware interface or VPN tunnel’s virtual one.
If your DNS is not your network’s local DNS but one on the internet (this is important!) and the default route is through the tunnel, I think it’d be a reasonable assumption that you wouldn’t have a DNS leak.
The only way to confirm is to look at network dumps though.