Question DNS configuration and weird behavior - Oppo Find N

Hello to all,
I have a Pi-Hole system implemented on my network (to block ads directly on my network) and all my devices, except my Find N, appears on the Pi-Hole's list of blocked pages.
After some digging, I noticed that all my devices (except Find N) only have the DNS server set as my Pi-Hole machine. The weird fact is that my Find N has 2 (two) DNS servers: my Pi-Hole server and Google DNS server 8.8.8.8.
If I manually set my IP address and only one DNS server, I still have the 8.8.8.8 server on my DNS list and that "breaks" my Pi-Hole system (because the traffic is going through the 8.8.8.8 DNS).
So, my question, do you also notice the same thing? How can I remove this 2nd DNS server, since, with this behavior, my Find N cannot be blocked from Pi-Hole.

No one faces this situation?

Connection & Sharing / private DNS. OFF

Related

wifi DNS ip???

when ever i give th ip in the wifi network the sgs2 automatically save the ::1 ip in dns 1 and there is no internet please help me to solve this problem
Sorry, neither do I understand the title nor what your exact problem is
What do you mean by "i give the ip in the wifi network"? Are you trying to give your phone a fix IP address?
What do you mean by "sgs2 automatically save the ::1 ip in dns 1"? Do you mean the property for DNS1 is set to "::1"?
Normally, when using Wifi, you're using DHCP, and the DNS server is provided by the DHCP server.
So you should check the settings on your wifi access point.
I use the Google DNS (primary 8.8.8.8, secondary 8.8.4.4) and adjusted my access point to use that so that all of my DHCP clients also use it.

[Q] CM11/OpenVPN Not Routing Connections Over VPN Correctly

I just noticed that my moto E (running CM11) is not correctly routing my traffic to my openvpn server. I noticed when I was looking at the current connections on my OpenWRT router that I could see the VPN's local IP address, and the remote connection:
IPV4 TCP 10.9.0.20:56657 157.166.xx.xx:80
Where 10.9.0.20 is my local VPN address, the other represents any remote address I connect to.
I could see all this in Luci's connection graphs, which means that OpenVPN is not sending my traffic over the tunnel at all, despite the reports from sites like ipleak.net and similar sites that tell me I have no leak . But if I can see the connections from my router, that means that when I connect over mobile data, my carrier can likely see all of my traffic. This is not what I want, I am having a hard time fixing it. Also, how is it even possible that my router is detecting the IP of my tun interface??
I tried two different OpenVPN frontends, tweaking the firewall on the phone (afwall+) and also playing around with the 'redirect-gateway' directives. I am not sure if this a DNS leak or total disobiedience on Android's part of my routing rules. The fact that I can see these connections from the router makes me think that the traffic is not even being encrypted before it's sent over the internet. My firewall rules are set so that every app is supposed to route over the VPN. These are my configurations:
Server Config:
mode server
tls-server
local x.x.x.x
port 35777
proto udp
dev tun0
ca /etc/openvpnca.crt
cert /etc/openvpn/randomcn.crt
key /etc/openvpn/randomcn.key
dh /etc/openvpn/dh.pem
topology p2p
server 10.8.0.0 255.255.255.0
;topology subnet
ifconfig-pool-persist ipp.txt
client-config-dir clients
;client-to-client
keepalive 7 80
tls-auth /etc/openvpn/ta.key 0
cipher AES-128-CBC
comp-lzo
max-clients 3
user nobody
group nogroup
persist-key
persist-tun
status openvpn-status.log
log openvpn.log
In my client directory, I have these settings. On my PC I do not have this IP leak problem despite the settings being the same:
push "redirect-gateway def1 bypass-dhcp"
push "dhcp-option DNS 10.8.0.1"
I have dnscrypt running with unbound on the server, serving the clients. This configuration works on my PC, but it seems no matter what I do I still can see the vpn local IP and all of my remote connections with Luci on openwrt.
I have tried using both OpenVPN connect, Openvpn for Android, and I am currently trying to use the ICS binary as well. Can anyone help me solve this problem? My goal is to tunnel all my phones traffic over the VPN and prevent IP or DNS leaks.

How can I change the DNS server locally, on the phone itself?

On my PC I always set OpenDNS's and Google's DNS servers in my WiFi network card configuration. I prefer not to mess with my router's settings, as I want to have those DNS servers wherever I go (work/friend's house, etc.)
I would like to do the same on my LeEco Le Max 2 x829 and I'm using the stock EUI Rom 16s (that's what my phone came with and I intend to keep it until AOKP is perfect). Can it be done, at least for the WiFi? I know that changing the DNS for the cellular network is almost impossible.
Some sites suggest to set a static IP because that's how the DNS settings become visible, but they also say that it's a temporary solution that may cause problems later on and that DHCP is preferable.
So, is it possible to keep the DHCP IP address and change the default DNS for the WiFi connection?
Thanks, guys.
Try override DNS from Playstore

Trying to understand the source of WiFi DNS

All,
I am aware of the various apps for changing DNS server settings - that is not the question. I would like someone to explain how the default values are being set.
My home wireless access point supports three SSIDs and I have SSID_1 bridged to my router. Within the router, I have defined 1.1.1.1 and 208.67.222.222 as my DNS servers. When my phone (Pixe3 3XL) is connected to SSID_1, however, it shows the DNS servers as being 8.8.8.8 and 64.6.64.6. (FYI - I just rebooted my router in case that might have an impact, but ti didn't.)
However, when my phone connects to SSID_2, which is not bridged to the router, the DNS shows up as 10.255.224.1, which is the gateway address.
Oddly, my desktop PC, which gets it IP via DHCP (the address is reserved) and was configured for automatic CNS, also showed the DNS servers as being 8.8.8.8 and 64.6.64.6.
I logged into my cable modem, but there are no user adjustable settings there.
So, from whence come these DNS IP addresses?

Question Automatic Google DNS added

Hello,
At my home I am running Adguard Home for filtering DNS in my network.
All of the devices getiing this Adguard DNS from the DHCP server.
But I think after the latest firmware update of the Realme the google DNS 8.8.8.8 is automatic added to the DNS list on my phone.
So the problem with this is that if my Adguard blocks a DNS request the phone checks the DNS at 8.8.8.8 and gets a ip returned.
So my filtering is not working anymore.
My Oneplus 6T had this same issue but if you add a second DNS server in you DHCP config this problem was gone.
But Realme is putting 8.8.8.8 everytime in the config. Also when you add 3 or 4 custom DNS servers in the DHCP. Realme adds 8.8.8.8 at the end.
I checked all the wifi config settings but this is not a setting that you can disable.
Firmware version is: RMX3301_11_A.18
Does anyone else has this issue?
killabeenl said:
Hello,
At my home I am running Adguard Home for filtering DNS in my network.
All of the devices getiing this Adguard DNS from the DHCP server.
But I think after the latest firmware update of the Realme the google DNS 8.8.8.8 is automatic added to the DNS list on my phone.
So the problem with this is that if my Adguard blocks a DNS request the phone checks the DNS at 8.8.8.8 and gets a ip returned.
So my filtering is not working anymore.
My Oneplus 6T had this same issue but if you add a second DNS server in you DHCP config this problem was gone.
But Realme is putting 8.8.8.8 everytime in the config. Also when you add 3 or 4 custom DNS servers in the DHCP. Realme adds 8.8.8.8 at the end.
I checked all the wifi config settings but this is not a setting that you can disable.
Firmware version is: RMX3301_11_A.18
Does anyone else has this issue?
Click to expand...
Click to collapse
Hi!
I've the same issue.
Did you fix it?
Regards,
José
Can you block Google's DNS server IPs in your Adguard Home setup? You could even set this up just for your phone if you don't want it to impact other devices on your network.
Yes, that is possible in my firewall. Was more looking for a solution on the device it self. I will test an ip block for the google DNS servers.
Just put dns.adguard.com on settings dns on phone. Works great.
Actually had the same issue, in settings go to the Private DNS menu and set it to off. Turn on areplane mode for a few seconds and your dhcp settings should be valid again.
criszz said:
Just put dns.adguard.com on settings dns on phone. Works great.
Click to expand...
Click to collapse
very true
I have exact the same problem, but i did not understand it. Im on Pihole (with, or without its the same) and on a OP 8T without Root/its default. Alle security seetings for private DNS are off (Chrome, Firefox, System). Bute, no matter was i do, 8.8.8.8 is always there. Also if i set IP/DNS manual - 2 entrys are possible, 8.8.8.8 comes at the end.
In the first picture a make a entry on purpose wrong.

Categories

Resources