Wireguard VPN setup

This is an option that will work. There may be better, but I do not have a Mullvad VPN account anymore, so I can’t make any test to provide something better.

From what I understand you’re last step in the guide on “preventing dns leaks”…

# Redirect all the DNS traffic to the preferred DNS server
DNS=9.9.9.9

I will try this now.

you need the nftables rules that comes with this, the piece of code you quoted is just a variable assigned, it does nothing.

You mean the 3 nft add chain commands below, yeah I added those and restarted the sys-vpn qube but curl https://am.i.mullvad.net still fails.

I think the killswitch is using PostUp and PreDown commands in the configuration. This may screw a bit Qubes OS nftables setup.

Could you try with a non killswitch configuration file? The killswitch can be implemented using Qubes OS firewall. (and better than from the configuration file)

I figured you would ask me that haha.

I will try now mate.

No it does not like that.

Tried non kill switch .conf

This does not work for the sys-vpn qube itself in fact. The rules are only applied to NAT packets… :sweat:

Setting a DNS address in network manager may be enough for all maybe?

Hmm, that’s very interesting. My Proton VPN connection stopped working this morning, also.

Is it a Qubes OS problem maybe? Like a bad update or something?

Can I do this via the Qubes settings tab for sys-vpn or via cli within the qube?

I did the below to set DNS address
nmcli connection modify “your-connection-name” ipv4.dns "9.9.9.9``
nmcli connection down “your-connection-name”
nmcli connection up “your-connection-name”

they had an incident today

could you do this as well for the “virtual” network eth0? I don’t know how it’s called. Try to run /usr/lib/qubes/qubes-setup-dnat-to-ns after

I see.

Sure enough, there’s an incident listed on https://status.proton.me/ from today. Looks like all the Proton services are supposed to be back up though.

Thanks for the heads up

ran that command mate

I have the below setup.

Global
         Protocols: -LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported
  resolv.conf mode: foreign
Current DNS Server: 9.9.9.9
       DNS Servers: 9.9.9.9

Link 2 (eth0)
    Current Scopes: none
         Protocols: -DefaultRoute -LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported

Link 3 (vpn)
    Current Scopes: DNS
         Protocols: +DefaultRoute -LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported
Current DNS Server: 9.9.9.9
       DNS Servers: 9.9.9.9
        DNS Domain: ~.

but did it help?

curl https://am.i.mullvad.net/connected
curl: (6) Could not resolve host: am.i.mullvad.net

can you share the output of systemd-resolve am.i.mullvad.net ?

am.i.mullvad.net: resolve call failed: Lookup failed due to system error: Connection refused

By the way is there a cap on the number of messages I can make. I keep getting blocked from posting to this thread for some reason.

Right so I’ve managed to fix it.

Man what a painful experience haha

Thanks @solene for the guidance

Turned out the Wireguard server I was connecting to was the issue. I tried a different 1 but that did not work either. Well a few hours later and per some blood and tears, I decided to use a another server from Mullvad and lo and behold, that 1 works.

And yeah looks like this is a Mullvad issue, I only noticed as another 1 of my devices could not resolve hostnames on the same 2 wireguard servers I was struggling with over Qubes.