I use our work server DNS (Consul/Unbound), and the options get pushed. The Apple Menu list still shows the DHCP provided address, but the actual resolver
Used is my Consul/Unbound servers. I know this because we use a private domain that is not resolvable publicly.
So, I’d ignore what the system report says, and trust what TunnelBlick says.
Also “scutil –dns” gives the right answer:
[lrosenman:~] $ scutil --dns
DNS configuration
resolver #1
search domain[0] : w2
search domain[1] : aws.w2
search domain[2] : azure.w2
search domain[3] : node.aws.w2
search domain[4] : node.azure.w2
search domain[5] : lerctr.org
nameserver[0] : 172.31.0.102
nameserver[1] : 172.31.1.242
nameserver[2] : 172.31.6.37
flags : Request A records, Request AAAA records
reach : 0x00000002 (Reachable)
resolver #2
domain : local
options : mdns
timeout : 5
flags : Request A records, Request AAAA records
reach : 0x00000000 (Not Reachable)
order : 300000
resolver #3
domain : 254.169.in-addr.arpa
options : mdns
timeout : 5
flags : Request A records, Request AAAA records
reach : 0x00000000 (Not Reachable)
order : 300200
resolver #4
domain : 8.e.f.ip6.arpa
options : mdns
timeout : 5
flags : Request A records, Request AAAA records
reach : 0x00000000 (Not Reachable)
order : 300400
resolver #5
domain : 9.e.f.ip6.arpa
options : mdns
timeout : 5
flags : Request A records, Request AAAA records
reach : 0x00000000 (Not Reachable)
order : 300600
resolver #6
domain : a.e.f.ip6.arpa
options : mdns
timeout : 5
flags : Request A records, Request AAAA records
reach : 0x00000000 (Not Reachable)
order : 300800
resolver #7
domain : b.e.f.ip6.arpa
options : mdns
timeout : 5
flags : Request A records, Request AAAA records
reach : 0x00000000 (Not Reachable)
order : 301000
DNS configuration (for scoped queries)
resolver #1
search domain[0] : w2
search domain[1] : aws.w2
search domain[2] : azure.w2
search domain[3] : node.aws.w2
search domain[4] : node.azure.w2
search domain[5] : lerctr.org
nameserver[0] : 172.31.0.102
nameserver[1] : 172.31.1.242
nameserver[2] : 172.31.6.37
if_index : 6 (en0)
flags : Scoped, Request A records, Request AAAA records
reach : 0x00000002 (Reachable)
[lrosenman:~] $
US Mail: 5708 Sabbia Drive, Round Rock, TX 78665-2106
--
You received this message because you are subscribed to the Google Groups "tunnelblick-discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to
tunnelblick-dis...@googlegroups.com.
Visit this group at
https://groups.google.com/group/tunnelblick-discuss.
For more options, visit https://groups.google.com/d/optout.

To unsubscribe from this group and stop receiving emails from it, send an email to tunnelblick-discuss+unsub...@googlegroups.com.
(coming in late)
What options do you have for DNS in the tunnelblick config both basic and advanced for that connection?



To unsubscribe from this group and stop receiving emails from it, send an email to tunnelblick-dis...@googlegroups.com.
Visit this group at https://groups.google.com/group/tunnelblick-discuss.
For more options, visit https://groups.google.com/d/optout.
--
You received this message because you are subscribed to the Google Groups "tunnelblick-discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to tunnelblick-dis...@googlegroups.com.
Hrm. I’m at a loss, here, as that config is literally what I’m running here, and I also have lots of users using the same config with my nameservers / vpn server.
US Mail: 5708 Sabbia Drive, Round Rock, TX 78665-2106
From: "tunnelbli...@googlegroups.com" <tunnelbli...@googlegroups.com> on behalf of Mache Creeger <machec...@gmail.com>
Reply-To: "tunnelbli...@googlegroups.com" <tunnelbli...@googlegroups.com>
Date: Sunday, October 14, 2018 at 1:03 PM
To: tunnelblick-discuss <tunnelbli...@googlegroups.com>
Subject: Re: [tunnelblick-discuss] Re: Problem allocating DD-WRT OpenVPN server's DNS and IP Address to Tunnelblick client
I tried it your way, no change when I try to access ibm.com web page I get a pop-up windows that says WARNING, After connecting to Home, DNS does not appear to be working.
This may mean that your VPN is not configured correctly.
When I run nslookup ibm.com it just hangs.
On Sunday, October 14, 2018 at 10:53:40 AM UTC-7, Mache Creeger wrote:
Running the OpenVPN config I get this
$ nslookup ibm.com
;; connection timed out; no servers could be reached
Without OpenVPN I get this
$ nslookup ibm.com
Server: 2600:1010:b016:c49b::64
Address: 2600:1010:b016:c49b::64#53
Non-authoritative answer:
Name: ibm.com
Address: 129.42.38.10
On Sunday, October 14, 2018 at 10:45:18 AM UTC-7, Mache Creeger wrote:
To unsubscribe from this group and stop receiving emails from it, send an email to tunnelblick-dis...@googlegroups.com.
Visit this group at https://groups.google.com/group/tunnelblick-discuss.
For more options, visit https://groups.google.com/d/optout.
--
You received this message because you are subscribed to the Google Groups "tunnelblick-discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to tunnelblick-dis...@googlegroups.com.


To unsubscribe from this group and stop receiving emails from it, send an email to tunnelblick-discuss+unsub...@googlegroups.com.
Visit this group at https://groups.google.com/group/tunnelblick-discuss.
For more options, visit https://groups.google.com/d/optout.
--
You received this message because you are subscribed to the Google Groups "tunnelblick-discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to tunnelblick-discuss+unsub...@googlegroups.com.
iptables -I FORWARD 1 --source 192.168.133.1/24 -j ACCEPT iptables -I INPUT 1 -p udp --dport 80 -j ACCEPT iptables -I INPUT 3 -i tun0 -j ACCEPT iptables -I FORWARD 3 -i tun0 -o tun0 -j ACCEPT iptables -I FORWARD 1 --source 10.0.2.0/24 -j ACCEPT iptables -t nat -A POSTROUTING -s 10.0.2.0/24 -j MASQUERADE iptables -I FORWARD -i br0 -o tun0 -j ACCEPT iptables -I FORWARD -i tun0 -o br0 -j ACCEPT
I don’t see anything there for port 53 (both tcp and udp).
US Mail: 5708 Sabbia Drive, Round Rock, TX 78665-2106
From: "tunnelbli...@googlegroups.com" <tunnelbli...@googlegroups.com> on behalf of Mache Creeger <machec...@gmail.com>
Reply-To: "tunnelbli...@googlegroups.com" <tunnelbli...@googlegroups.com>
Date: Sunday, October 14, 2018 at 3:19 PM
To: tunnelblick-discuss <tunnelbli...@googlegroups.com>
Subject: Re: [tunnelblick-discuss] Re: Problem allocating DD-WRT OpenVPN server's DNS and IP Address to Tunnelblick client
OK, I have some iptables commands on DD-WRT.
iptables -I FORWARD 1 --source 192.168.133.1/24 -j ACCEPT
iptables -I INPUT 1 -p udp --dport 80 -j ACCEPT
iptables -I INPUT 3 -i tun0 -j ACCEPT
iptables -I FORWARD 3 -i tun0 -o tun0 -j ACCEPT
iptables -I FORWARD 1 --source 10.0.2.0/24 -j ACCEPT
iptables -t nat -A POSTROUTING -s 10.0.2.0/24 -j MASQUERADE
iptables -I FORWARD -i br0 -o tun0 -j ACCEPT
iptables -I FORWARD -i tun0 -o br0 -j ACCEPT
Is there routing information that would tell us? Can you suggest some CLI commands that I could run on the router?
On Sunday, October 14, 2018 at 11:52:35 AM UTC-7, Tunnelblick developer wrote:
If DD-WRT is acting as both the OpenVPN server and the DNS server, perhaps DD-WRT it isn't forwarding the packets from OpenVPN to the DNS server.
On Sunday, October 14, 2018 at 2:31:21 PM UTC-4, Mache Creeger wrote:
Maybe its some weird interaction with the OpenVPN server on DD-WRT.
Here is my config
Error! Filename not specified.
To unsubscribe from this group and stop receiving emails from it, send an email to tunnelblick-dis...@googlegroups.com.
Visit this group at https://groups.google.com/group/tunnelblick-discuss.
For more options, visit https://groups.google.com/d/optout.
--
You received this message because you are subscribed to the Google Groups "tunnelblick-discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to tunnelblick-dis...@googlegroups.com.
Visit this group at https://groups.google.com/group/tunnelblick-discuss.
For more options, visit https://groups.google.com/d/optout.
--
You received this message because you are subscribed to the Google Groups "tunnelblick-discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to tunnelblick-dis...@googlegroups.com.
iptables -I INPUT -i `get_wanface` -dport 22 -j ACCEPT iptables -I OUTPUT -i `get_wanface` -dport 53 -j ACCEPT iptables -I FORWARD --source 192.168.133.1/24 -j ACCEPT iptables -I INPUT -p udp --dport 80 -j ACCEPT iptables -I INPUT -i tun0 -j ACCEPT iptables -I FORWARD -i tun0 -o tun0 -j ACCEPT iptables -I FORWARD 1 --source 10.0.2.0/24 -j ACCEPT iptables -t nat -A POSTROUTING -s 10.0.2.0/24 -j MASQUERADE iptables -I FORWARD -i br0 -o tun0 -j ACCEPT iptables -I FORWARD -i tun0 -o br0 -j ACCEPT
Also the br0 to tun0 should address all ports including 52
To unsubscribe from this group and stop receiving emails from it, send an email to tunnelblick-discuss+unsub...@googlegroups.com.
Visit this group at https://groups.google.com/group/tunnelblick-discuss.
For more options, visit https://groups.google.com/d/optout.
--
You received this message because you are subscribed to the Google Groups "tunnelblick-discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to tunnelblick-discuss+unsub...@googlegroups.com.
Visit this group at https://groups.google.com/group/tunnelblick-discuss.
For more options, visit https://groups.google.com/d/optout.
--
You received this message because you are subscribed to the Google Groups "tunnelblick-discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to tunnelblick-discuss+unsub...@googlegroups.com.
I’m not an IPTables expert. As jkbullard (tunnelblick developer) says, check with the DD-WRT folks/lists/etc.
US Mail: 5708 Sabbia Drive, Round Rock, TX 78665-2106
From: "tunnelbli...@googlegroups.com" <tunnelbli...@googlegroups.com> on behalf of Mache Creeger <machec...@gmail.com>
Reply-To: "tunnelbli...@googlegroups.com" <tunnelbli...@googlegroups.com>
Date: Sunday, October 14, 2018 at 3:47 PM
To: tunnelblick-discuss <tunnelbli...@googlegroups.com>
Subject: Re: [tunnelblick-discuss] Re: Problem allocating DD-WRT OpenVPN server's DNS and IP Address to Tunnelblick client
I updated the firewall script with port 53, still no go.
Error! Filename not specified.
Error! Filename not specified.
To unsubscribe from this group and stop receiving emails from it, send an email to tunnelblick-dis...@googlegroups.com.
Visit this group at https://groups.google.com/group/tunnelblick-discuss.
For more options, visit https://groups.google.com/d/optout.
--
You received this message because you are subscribed to the Google Groups "tunnelblick-discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to tunnelblick-dis...@googlegroups.com.
Visit this group at https://groups.google.com/group/tunnelblick-discuss.
For more options, visit https://groups.google.com/d/optout.
--
You received this message because you are subscribed to the Google Groups "tunnelblick-discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to tunnelblick-dis...@googlegroups.com.
Visit this group at https://groups.google.com/group/tunnelblick-discuss.
For more options, visit https://groups.google.com/d/optout.
--
You received this message because you are subscribed to the Google Groups "tunnelblick-discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to tunnelblick-dis...@googlegroups.com.
Updated October 24, 2018
Below are the steps I followed to get Tunnelblick 3.7.8beta01 (build 5160) on a MacBook Pro with macOS Mojave, 10.14 connecting to an OpenVPN server running DD-WRT v3.0-r36527 std 8/9/18 firmware on a Netgear R7000 router.
1. Create Certificates and KeysCreate OpenVPN certificates and keys by following the directions here - https://firxworx.com/blog/it-devops/sysadmin/creating-certificates-and-keys-for-openvpn-server-with-easyrsa-on-macos/
This will generate an EasyRSA-X.Y.Z directory.
2. Create ta.keySSH or Telnet to the DD-WRT router command line.Run the following commands# openvpn –-genkey –-secret ta.key# cat ta.key
Highlight the key and copy it to TextEdit on the Mac.
proto udpdev tun0push "redirect-gateway def1"push "route 192.168.x.0 255.255.255.0" -- This is the primary LAN of the routerpush "dhcp-option DNS 192.168.x.1" -- This is the DNS for the LAN, on my LAN its the router
keepalive 10 120daemonverb 5
Note** - This configuration may have some redundant statements but I know it works. Optimize at your own risk.
TLS Auth Key: Paste the contents of the ~/EasyRSA-X.Y.Z/pki/private/ta.key file found on the Mac.At the bottom of the web page, first click on Save, and when the page comes back, click on Apply SettingsGo to Services, Services web configuration pageFind the Additional DNSMasq Options windowAdd the following statement.
interface=tun0
Click on Save, and after the page comes back click on Apply SettingsGo to Administration, Commands web page
Add the following commands to the Firewall.iptables -I FORWARD --source 192.168.x.1/24 -j ACCEPT -- This address has the LAN address of the routeriptables -I INPUT -p udp --dport <X> -j ACCEPT -- Port number <X> that was chosen in the Services, VPN configuration page
iptables -I INPUT -i tun0 -j ACCEPTiptables -I FORWARD -i tun0 -o tun0 -j ACCEPT
iptables -I FORWARD 1 --source 10.x.y.0/24 -j ACCEPT -- This address has the address of the VPN as stated on the Services, VPN OpenVPN configurationsiptables -t nat -A POSTROUTING -s 10.x.y.0/24 -j MASQUERADE -- This address has the address of the VPN as stated on the Services, VPN OpenVPN configurations
iptables -I FORWARD -i br0 -o tun0 -j ACCEPTiptables -I FORWARD -i tun0 -o br0 -j ACCEPT
iptables -t nat -A POSTROUTING -o `get_wanface` -j MASQUERADE
Note it might be possible to successfully run by deleting all or some of the above Firewall statements except the last one. I know that it works as published and optimizations are left as an exercise to the reader.Once you added these statements click on Save Firewall.
When the web page comes back, click on Administration, ManagementAt the bottom of the page click on the red Router Reboot button and reboot the router. Wait 3 minutes for the router to complete its reboot.4. Tunnelblick on the MacInstall Tunnelblick on the MacLaunch Tunnelblick on the Mac.Create a folder on your Desktop with the <session_name>. I called mine Home.Add the following statements to TextEdit.clientauth RSA-SHA256cipher AES-256-CBCauth-nocache# Use the same setting as you are using on
# the server.dev tun0
# Are we connecting to a TCP or
# UDP server? Use the same setting as# on the server.
proto udptun-mtu 1500# The hostname/IP and port of the server.
remote <internet domain of OpenVPN server> -- <port that was defined on the DD-WRT OpenVPN web configuration page>
# Keep trying indefinitely to resolve the# host name of the OpenVPN server. Very useful# on machines which are not permanently connected# to the internet such as laptops.
resolv-retry infinite# Most clients don't need to bind to
# a specific local port number.
nobind# Try to preserve some state across restarts.persist-keypersist-tun
# SSL/TLS parms.ca ca.crtcert <client_name>.crtkey <client_name>.key
tls-auth ta.key 1# Verify server certificate by checking# that the certicate has the nsCertType# field set to "server". This is an# important precaution to protect against# a potential attack discussed here:# ns-cert-type serverremote-cert-tls server# Enable compression on the VPN link.# comp-lzocompress lzo# Allow me to change my IP address
# and/or port number (if I get a new# local IP address at Starbucks).floatSave the file with the name <session_name>.conf to the desktop folderAdd to that folder, the ca.crt, <client_name>.crt, <client_name>.key, and ta.keyOnce all the files are in the folder rename the folder to <session_name>.tblk
The folder will then convert itself to a file.Click and drag that file to the Tunnelblick icon at the top of the screen. When you see a + show up, release the click.Add the session to ALL users of the MacDelete the <session_name>.tblk file from the Desktop.Click on the Tunnelblick icon at the top of the screen on the Mac and click on VPN Details.Highlight the <session_name>.
In the VPN Details screen click on the gear icon at the bottom left of the page.
Scroll down and click on Make Configuration Private.Type in the Mac password when requested.Log into a WiFi link that is not on your local LAN. For testing I use my smartphone hotspot. Click on Tunnelblick icon and click on Connect to start up VPN.
Use the Internet over VPN.
On Saturday, October 13, 2018 at 11:31:04 PM UTC-7, Mache Creeger wrote:
I am running macOS 10.13.6 and Tunnelblick 3.7.8beta01 (build 5160) - Set DNS/WINS: Set Nameserver 3.0b10 and OpenVPN version: Latest (2.5 git 57d6f10 - OpenSSL v1.1.1) . After I connect to my DD-WRT (DD-WRT v3.0-r36527 std (08/09/18)) router running an OpenVPN server, I can access the Internet and can access IP Addresses on the DD-WRT OpenVPN server LAN, but my Tunnelblick client still has the remote ISP's IP Address and DNS. I am not provided DD-WRT's DHCP allocated IP Address and DNS (listed in the configuration as 192.168.X.1). I need the 192.168.X.1 DNS to resolve DD-WRT LAN domains so I can use resources (like printers and servers) on that LAN. My current client configuration file is:
clientauth RSA-SHA256auth-nocacheredirect-gateway def1push "dhcp-option DNS 192.168.X.1"
# Use the same setting as you are using on
# the server.dev tun0
# Are we connecting to a TCP or
# UDP server? Use the same setting as# on the server.proto udp
# The hostname/IP and port of the server.
remote home.creeger.com 80# Keep trying indefinitely to resolve the# host name of the OpenVPN server. Very useful# on machines which are not permanently connected# to the internet such as laptops.
resolv-retry infinite# Most clients don't need to bind to
# a specific local port number.
nobind# Try to preserve some state across restarts.persist-keypersist-tun
# SSL/TLS parms.ca ca.crtcert client.crtkey client.key
tls-auth ta.key 1# Verify server certificate by checking# that the certicate has the nsCertType# field set to "server". This is an# important precaution to protect against# a potential attack discussed here:# ns-cert-type serverremote-cert-tls server# Enable compression on the VPN link.# comp-lzocompress lzo# Allow me to change my IP address
# and/or port number (if I get a new# local IP address at Starbucks).float