Adguard Home+Unbound not working if DietPi-VPN is connected

I installed Adguard Home + Unbound and configured Adguard to use Unbound as the upstream DNS server. I configured the DHCP-server settings of my router to use the dietpi IP address as DNS server which is Adguard Home’s IP. If I connect NordVPN using DietPi-VPN other devices on my network can’t access the internet but if I disconnect the DietPi-VPN they are able to access the internet using Adguard as the DNS server. Is it possible to run Adguard and the DietPi-VPN simultaneously?

I guess you enabled killswitch? If yes, it is e expected behaviour

Hey Joulinar.
No, I have the killswitch disabled.

When connected to the VPN, what is the output of:
iptables-save -c; ip -4 addr; ip -4 ro list table all; ip -4 ru

Hi Trendy.
The following:

root@DietPi:~# iptables-save -c; ip -4 addr; ip -4 ro list table all; ip -4 ru
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group defaul                                                                              t qlen 1000
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group defa                                                                              ult qlen 1000
    altname end0
    inet 192.168.3.2/24 brd 192.168.3.255 scope global eth0
       valid_lft forever preferred_lft forever
3: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast sta                                                                              te UNKNOWN group default qlen 500
    inet 10.100.0.2/24 scope global tun0
       valid_lft forever preferred_lft forever
0.0.0.0/1 via 10.100.0.1 dev tun0
default via 192.168.3.1 dev eth0 onlink
10.100.0.0/24 dev tun0 proto kernel scope link src 10.100.0.2
128.0.0.0/1 via 10.100.0.1 dev tun0
185.245.86.107 via 192.168.3.1 dev eth0
192.168.3.0/24 dev eth0 proto kernel scope link src 192.168.3.2
local 10.100.0.2 dev tun0 table local proto kernel scope host src 10.100.0.2
broadcast 10.100.0.255 dev tun0 table local proto kernel scope link src 10.100.0                                                                              .2
local 127.0.0.0/8 dev lo table local proto kernel scope host src 127.0.0.1
local 127.0.0.1 dev lo table local proto kernel scope host src 127.0.0.1
broadcast 127.255.255.255 dev lo table local proto kernel scope link src 127.0.0                                                                              .1
local 192.168.3.2 dev eth0 table local proto kernel scope host src 192.168.3.2
broadcast 192.168.3.255 dev eth0 table local proto kernel scope link src 192.168                                                                              .3.2
0:      from all lookup local
32766:  from all lookup main
32767:  from all lookup default

From a first look, it seems that it should be working. But there is no output from iptables.
Can you verify that iptables-save -c is not returning anything?
Maybe there are nftables? nft list ruleset

Hi Trendy

The first command returns nothing and the second command returns “command not found”

root@DietPi:~# iptables-save -c
root@DietPi:~# nft list ruleset
-bash: nft: command not found

What about iptables -L -n ?

root@DietPi:~# iptables -L -n
Chain INPUT (policy ACCEPT)
target prot opt source destination

Chain FORWARD (policy ACCEPT)
target prot opt source destination

Chain OUTPUT (policy ACCEPT)
target prot opt source destination

Quite strange, there doesn’t seem to be any firewall running there.
Let’s verify that we have packets. Install tcpdump if it is not already there: apt update && apt install -y tcpdump
Then capture 50 DNS packets:
tcpdump -i any -vnn -c 50 port 53

This topic was automatically closed 178 days after the last reply. New replies are no longer allowed.