Greetings.

1) I have configured my home OPNsense firewall as an OpenVPN client connecting 
to my own Ubuntu OpenVPN server running in the cloud - a DigitalOcean droplet.

2) I have configured the firewall so that I can direct client traffic going 
through the firewall to exit through the WAN gateway or VPN gateway based on 
criteria defined in the firewall rules.

3) I am *NOT* pushing "redirect-gateway" or "dhcp-option DNS" commands from the 
VPN server to the firewall, though.  Thus, by default, traffic goes out the WAN 
gateway - not the VPN gateway - including *ALL* DNS queries.

4) I have installed/configured "dnscrypt-proxy" on the firewall so that DNS 
queries go through the proxy (and are encrypted) to the DNS resolver of my 
choice.

I hope that is clear...


The idea is that I don't want clients that the firewall rules direct through 
the WAN to depend on the VPN for DNS resolution - in case the VPN is down, for 
example.  But at the same time I want to protect the DNS queries from 
disclosure to my ISP.

So while I'm technically "leaking" the DNS queries for the clients directed to 
exit through the VPN, those queries are protected with encryption.  And at the 
same time, I am also protecting the DNS queries for the client directed to exit 
through the WAN as well.


My question is this:  is this a reasonable design?  If not, why not?

Thanks!

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most 
engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to