Hello everyone,
I'm contacting you again with a question:
I've noticed that some things are using hard-coded GoogleDNS (FireStick, Android phones etc)
I want these devices to use my DNS settings as well.
I would have tried to set a traffic rule, which unfortunately did not work.
Thanks tried this, did not work.
I am using another subnet for my IoT devices - like 192.168.20.*, maybe this is a problem too. Of course I did choose this interface and not 'lan'
I rebooted several times, it's still using Google's DNS. Here is my current config. Also tried to set DNS servers for the interfaces too. Maybe the HTTPS DNS Proxy needs to be reconfigured too? I mean - I do not have a clue why this should be necessary since we blackhole the request before, right?
cat /etc/config/network
config interface 'loopback'
option device 'lo'
option proto 'static'
option ipaddr '127.0.0.1'
option netmask '255.0.0.0'
config route
option interface 'loopback'
option type 'blackhole'
option target '8.8.8.8/32'
option metric '1234'
config globals 'globals'
option ula_prefix 'CLEARED'
config device
option name 'br-lan'
option type 'bridge'
list ports 'lan1'
list ports 'lan2'
list ports 'lan3'
config device
option name 'lan1'
option macaddr 'CLEARED'
config device
option name 'lan2'
option macaddr 'CLEARED'
config device
option name 'lan3'
option macaddr 'CLEARED'
config interface 'lan'
option device 'br-lan'
option proto 'static'
option ipaddr '192.168.1.1'
option netmask '255.255.255.0'
option ip6assign '60'
config device
option name 'wan'
option macaddr 'CLEARED'
config interface 'wan'
option device 'wan'
option proto 'dhcp'
config interface 'wan6'
option device 'wan'
option proto 'dhcpv6'
config interface 'WGINTERFACE'
option proto 'wireguard'
option force_link '1'
option private_key ''
option mtu '1320'
list addresses 'CLEARED'
list addresses 'CLEARED'
list dns '194.242.2.3'
config wireguard_WGINTERFACE
option description ''
option public_key 'CLEARED'
option preshared_key 'CLEARED'
list allowed_ips '0.0.0.0/0'
list allowed_ips '::/0'
option endpoint_host 'CLEARED'
option endpoint_port '1637'
option persistent_keepalive '15'
option disabled '1'
config device
option type 'bridge'
option name 'br-guest'
option bridge_empty '1'
config interface 'guest'
option proto 'static'
option device 'br-guest'
option ipaddr '192.168.10.1'
option netmask '255.255.255.0'
config interface 'iot'
option proto 'static'
option device 'br-iot'
option ipaddr '192.168.20.1'
option netmask '255.255.255.0'
option type 'bridge'
list dns '10.64.0.1'
config wireguard_WGINTERFACE
option description ''
option public_key 'CLEARED'
option preshared_key 'CLEARED'
list allowed_ips '0.0.0.0/0'
list allowed_ips '::/0'
option endpoint_host 'CLEARED'
option endpoint_port '1637'
option persistent_keepalive '15'
option disabled '1'
config wireguard_WGINTERFACE
option description ''
option public_key 'CLEARED'
list allowed_ips '0.0.0.0/0'
list allowed_ips '::0/0'
option endpoint_host 'CLEARED'
option endpoint_port '51820'
If the Mullvad check only shows the DNSes configured on the stick, it'll be wrong, since you intercept the traffic, something they don't know anything about.
Then again, everything that's not their DNS, is good for business ,)