15 days later

Stewart [deleted] It might prevent leaks for the Owner user but Private DNS does not mix well with VPN usage on secondary users, and using Private DNS should not be needed to prevent leaks when using VPN apps. Using different DNS will make your traffic stand out from other VPN users.

Is using built-in IPSec / IKEv2 VPN client the best mitigation as of now?

Or what else we can practically do to prevent DNS leaks?

    For WiFi you can try using IP-based VPN app (such as official WireGuard app) or built-in IPSec / IKEv2 with non-routable DNS address, such as 0.0.0.0, 127.0.0.1, or using public blackhole servers - 192.175.48.1, 192.175.48.6, and 192.175.48.42. For mobile network - no idea...

      RethinkDNS may also do the trick because it can use built-in encrypted DNS, but I don't know if does so outside VPN tunnels.

      8 days later

      GrapheneOS So as I understand this issue only occurs when a disconnect happens from the VPN side exposing the DNS. But wouldn't graphene's own "always on VPN" service prevent the leak since it waits for the VPN to re-connect before releasing traffic? (assuming the user has "always on VPN" turned... on)

        PenPusher No, unfortunately, that is the issue. Even when "always on VPN" and "block connections not going over VPN" are enabled, DNS will leak in rare circumstances. The issue is apparently very hard to fix due to how DNS is implemented in relation to app based VPNs, but the GrapheneOS developers are working on a solution.

        If you use the built-in VPN support instead of a VPN app, no leak will ever happen. The official Wireguard VPN app seemed to be more robust than some VPN provider specific ones, if you need to use Wireguard.

          ryrona If you use the built-in VPN support instead of a VPN app

          Do you think it is possible with Protonvpn? Thank you.

          • mmmm replied to this.

            mmmm I tried to setup a native IPSec / IKEv2 client with Proton VPN but couldn't make it work. If you succeed, please post your settings, thank you 🌷

            • mmmm replied to this.