Replies: 2 comments 4 replies
-
Here's how DNS works on Algo by default: The A WireGuard client will send all DNS queries to the servers defined in So if you're changing If you need to use your own DNS servers then you might want to change the defaults. If you set |
Beta Was this translation helpful? Give feedback.
-
Do you have any 172.* addresses on Have you changed the hostname of this instance since Algo was deployed? I've only used the default |
Beta Was this translation helpful? Give feedback.
-
Hello.
I’m curious about some DNS things that have been happening to our setup (colleague set it up, but he’s working on other stuff at the moment).
We setup an AWS machine (Ubuntu 18.04) to set Algo in, and we just wanted people in our team to connect to the VPN, and have access to some internal systems (we did the Subnet and Security Groups tuning ourselves).
DNS =
value in peer/client configuration come from? I checked dnscrypt-proxy and Algo own folder/settings, and it didn’t find that value anywhere. Checkedip address
and related too on the server, to no avail. Only place it appears on it’s when it generates peer configuration files. I just started checking this project so it might be something easy from Ansible, but I cannot find it (and I haven’t touched Ansible).ping 8.8.8.8
for example, but no name resolution, neither for anything inside VPN/VPC (AWS network) nor Internet. I tried adding a new DNS server to entries and it works, but I don’t yet understand why initially for some clients it does and not for others. So before it wasDNS = <ip-i-dont-know-where-it-comes-from>
, and it would fail for some people, and withDNS = <ip-i-dont-know-where-it-comes-from>, 8.8.8.8
now it works for pretty much all of us. Do you know why this might be? Should I set this secondary DNS here or somewhere in the server, like indnscrypt_servers
? It’s already setup tocloudflare
there. It looks like a local issue, though.AllowedIPs
to our AWS Subnet CIDR, so in order for the system to know what I’m trying to access is a VPN-only resource, it would need to get resolve the domain on the VPN server, right? But then all of my local machine DNS resolution is actually happening on the VPN server as well, so it knows what’s VPN and what’s Internet?AllowedIPs
, should I also include there the IP that appears inDNS =
?We just want our people to access internal resources, and that such access is the only thing that passes through Algo server. It’s an internal resource with an IP in X CIDR range? VPN. It’s something not trying to access our AWS Subnet CIDR range? Use these Y DNS servers.
Just curious if you’ve have had to deal with these client (apparently) issues. If it’s any help, most of our clients use the Apple Store WireGuard official application, and when I tried it on Archlinux, I had to run/enable
systemd-resolved
before running Wireguard connection, otherwise exactly same issue as I commented about no DNS resolution would happen to me. I’m just curious that I see so few issues on name resolution on these discussions, so I’m not sure if we did something bad on the server or what.Thanks for tolerating the lots of newbie and sometimes ignorant inquiries! 😬
Beta Was this translation helpful? Give feedback.
All reactions