Skip to main content
edited body
Source Link

In order to let openvpn to alter the system DNS settings, therefore eliminating the leak, add the following lines at the end of the your *.ovpn configuration file:

script-security 2
up /etc/openvpn/update-resolv-conf
down /etc/openvpn/update-resolv-conf

Most likely that solution will help, depending on the OpenVPN server settings.

If you're curious of the meaning of the directives above, those do the following:

  1. script-security 2 - this directive offers policy-level control over OpenVPN's usage of external programs and scripts. Script security level 2 allows calling of built-in executables and user-defined scripts.

  2. up and down directive specifiesdirectives specify the commandcommands to run after successful TUN/TAP device open and close, in this case, which are /etc/openvpn/update-resolv-conf and /etc/openvpn/update-resolv-conf correspondingly. These scripts align the resolv.conf with the DNS address supplied by OpenVPN server, returning it to its original state when the connection is closed.

In order to let openvpn to alter the system DNS settings, therefore eliminating the leak, add the following lines at the end of the your *.ovpn configuration file:

script-security 2
up /etc/openvpn/update-resolv-conf
down /etc/openvpn/update-resolv-conf

Most likely that solution will help, depending on the OpenVPN server settings.

If you're curious of the meaning of the directives above, those do the following:

  1. script-security 2 - this directive offers policy-level control over OpenVPN's usage of external programs and scripts. Script security level 2 allows calling of built-in executables and user-defined scripts.

  2. up and down directive specifies the command to run after successful TUN/TAP device open and close, in this case, which are /etc/openvpn/update-resolv-conf and /etc/openvpn/update-resolv-conf correspondingly. These scripts align the resolv.conf with the DNS address supplied by OpenVPN server, returning it to its original state when the connection is closed.

In order to let openvpn to alter the system DNS settings, therefore eliminating the leak, add the following lines at the end of the your *.ovpn configuration file:

script-security 2
up /etc/openvpn/update-resolv-conf
down /etc/openvpn/update-resolv-conf

Most likely that solution will help, depending on the OpenVPN server settings.

If you're curious of the meaning of the directives above, those do the following:

  1. script-security 2 - this directive offers policy-level control over OpenVPN's usage of external programs and scripts. Script security level 2 allows calling of built-in executables and user-defined scripts.

  2. up and down directives specify the commands to run after successful TUN/TAP device open and close, in this case, which are /etc/openvpn/update-resolv-conf and /etc/openvpn/update-resolv-conf correspondingly. These scripts align the resolv.conf with the DNS address supplied by OpenVPN server, returning it to its original state when the connection is closed.

edited body
Source Link

In order to let openvpn to alter the system DNS settings, therefore eliminating the leak, add the following lines at the end of the your *.ovpn configuration file:

script-security 2
up /etc/openvpn/update-resolv-conf
down /etc/openvpn/update-resolv-conf

Most likely that solution will help, depending on the OpenVPN server settings.

If you're curious of the meaning of the statementsdirectives above, those do the following:

  1. script-security 2 - this directive offers policy-level control over OpenVPN's usage of external programs and scripts. Script security level 2 allows calling of built-in executables and user-defined scripts.

  2. up and down directive specifies the command to run after successful TUN/TAP device open and close, in this case, which are /etc/openvpn/update-resolv-conf and /etc/openvpn/update-resolv-conf correspondingly. These scripts align the resolv.conf with the DNS address supplied by OpenVPN server, returning it to its original state when the connection is closed.

In order to let openvpn to alter the system DNS settings, therefore eliminating the leak, add the following lines at the end of the your *.ovpn configuration file:

script-security 2
up /etc/openvpn/update-resolv-conf
down /etc/openvpn/update-resolv-conf

Most likely that solution will help, depending on the OpenVPN server settings.

If you're curious of the meaning of the statements above, those do the following:

  1. script-security 2 - this directive offers policy-level control over OpenVPN's usage of external programs and scripts. Script security level 2 allows calling of built-in executables and user-defined scripts.

  2. up and down directive specifies the command to run after successful TUN/TAP device open and close, in this case, which are /etc/openvpn/update-resolv-conf and /etc/openvpn/update-resolv-conf correspondingly. These scripts align the resolv.conf with the DNS address supplied by OpenVPN server, returning it to its original state when the connection is closed.

In order to let openvpn to alter the system DNS settings, therefore eliminating the leak, add the following lines at the end of the your *.ovpn configuration file:

script-security 2
up /etc/openvpn/update-resolv-conf
down /etc/openvpn/update-resolv-conf

Most likely that solution will help, depending on the OpenVPN server settings.

If you're curious of the meaning of the directives above, those do the following:

  1. script-security 2 - this directive offers policy-level control over OpenVPN's usage of external programs and scripts. Script security level 2 allows calling of built-in executables and user-defined scripts.

  2. up and down directive specifies the command to run after successful TUN/TAP device open and close, in this case, which are /etc/openvpn/update-resolv-conf and /etc/openvpn/update-resolv-conf correspondingly. These scripts align the resolv.conf with the DNS address supplied by OpenVPN server, returning it to its original state when the connection is closed.

Source Link

In order to let openvpn to alter the system DNS settings, therefore eliminating the leak, add the following lines at the end of the your *.ovpn configuration file:

script-security 2
up /etc/openvpn/update-resolv-conf
down /etc/openvpn/update-resolv-conf

Most likely that solution will help, depending on the OpenVPN server settings.

If you're curious of the meaning of the statements above, those do the following:

  1. script-security 2 - this directive offers policy-level control over OpenVPN's usage of external programs and scripts. Script security level 2 allows calling of built-in executables and user-defined scripts.

  2. up and down directive specifies the command to run after successful TUN/TAP device open and close, in this case, which are /etc/openvpn/update-resolv-conf and /etc/openvpn/update-resolv-conf correspondingly. These scripts align the resolv.conf with the DNS address supplied by OpenVPN server, returning it to its original state when the connection is closed.