OpenVPN – Websites & Tools

back to OpenVPN

Websites

Some very handy websites for IP discovery and DNS:

Other bits and bobs:

Books

Tools

Dig

Tool for looking up DNS entries.

john@ubuntu:~$ dig google.com

; <<>> DiG 9.18.30-0ubuntu0.24.04.2-Ubuntu <<>> google.com
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 49676
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;google.com.			IN	A

;; ANSWER SECTION:
google.com.		110	IN	A	142.250.186.142

;; Query time: 12 msec
;; SERVER: 127.0.0.53#53(127.0.0.53) (UDP)
;; WHEN: Wed Mar 05 16:05:44 UTC 2025
;; MSG SIZE  rcvd: 55

The @x.x.x.x can be used to specify the DNS server

john@ubuntu:~$ dig @1.1.1.1 google.com

; <<>> DiG 9.18.30-0ubuntu0.24.04.2-Ubuntu <<>> @1.1.1.1 google.com
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 10682
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 1232
;; QUESTION SECTION:
;google.com.			IN	A

;; ANSWER SECTION:
google.com.		223	IN	A	142.250.180.110

;; Query time: 2 msec
;; SERVER: 1.1.1.1#53(1.1.1.1) (UDP)
;; WHEN: Wed Mar 05 16:06:04 UTC 2025
;; MSG SIZE  rcvd: 55

In each of the responses above you can see the SERVER section gives the IP of the DNS server. In the first case the IP of 127.0.0.53 indicates a local resolver is running.

Route

If you want to tell how your Mac is sending traffic, the route command will show you interface the request is sent over.

(base)  9:47:john@rizzo2:/Users/john route get 1.1.1.1                    
   route to: one.one.one.one
destination: one.one.one.one
    gateway: 10.8.0.1
  interface: utun8
      flags: <UP,GATEWAY,HOST,DONE,WASCLONED,IFSCOPE,IFREF,GLOBAL>
 recvpipe  sendpipe  ssthresh  rtt,msec    rttvar  hopcount      mtu     expire
       0         0         0        31         6         0      1500         0 
(base)  9:48:john@rizzo2:/Users/john 

Another example – this will show the “default route” to the internet

(base)  10:04:john@rizzo2:/Users/john route -n get 0.0.0.0                 

   route to: default
destination: default
       mask: default
    gateway: 192.168.1.254
  interface: en12
      flags: <UP,GATEWAY,DONE,STATIC,PRCLONING,GLOBAL>
 recvpipe  sendpipe  ssthresh  rtt,msec    rttvar  hopcount      mtu     expire
       0         0         0         0         0         0      1500         0

netstat

to check the routing table on you mac

(base)  10:29:john@rizzo2:/Users/john netstat -rn
Routing tables

Internet:
Destination        Gateway            Flags               Netif Expire
0/1                10.8.0.1           UGScg               utun8       
default            192.168.1.254      UGScg                en12       
10.8/24            10.8.0.2           UGSc                utun8       
10.8.0.2           10.8.0.2           UH                  utun8       
127                127.0.0.1          UCS                   lo0       

DNSTop

DNS Top is a tool that lets you see the DNS requests travelling out/in on a network interface. The project homepage can be found at http://dns.measurement-factory.com/tools/dnstop/index.html

It can be installed via apt on ubuntu

john@ubuntu:~$ sudo apt-get install dnstop

It can be installed on Mac with

11:22:john@rizzo2:/Users/john brew install dnstop

When you run it, you specify the interface you want to monitor. For the VPN traffic, we use tun0 as the interface name

john@ubuntu:~$ sudo dnstop tun0

Press 2 (e.g. the number 2 on your keyboard) to see the requests coming in – this is great when you use it with a tool like dig, as you can actually see the DNS request coming in.

If you leave it running while you work, you can see all of the background chatter as services lookup addresses

To reset the counters press CTRL-R

To exit press CTRL-X

If you have it running on the VPN server prior to connecting (on screen 2) then when you connect you’ll see a spike in traffic as soon as you connect. If you simultaneously have it running on your local machine on your regular network interface you will see the count of requests stays static – e.g. all of the dns request are being sent out over the VPN. When you disconnect the VPN the local dnstop will show a spike and the VPN server dnstop will show no more updates – showing the DNS requests are going out over the local interface as expected.