Tom, I followed your link for setting up openvpn with PIA on pfense. I did everything, and I’m routing out of my gateway with the rules you mentioned. I did a DNS leak test, which still shows up under Verizon. I manually set DNS servers via IP reservations. I did some research, and some mentioned disabling DNS over TLS, but nothing seems to work. I checked my client using ipconfig and it uses PIA’s DNS servers. Any idea?
Currently, I have this in my custom options under the client settings:
dhcp-option DNS 10.0.0.241
dhcp-option DNS 10.0.0.243
When I do an ipconfig command on the Windows device, it shows that the DNS address is PIA’s servers. I read somewhere to prevent leaking; you should use the VPN’s DNS servers. I also made sure to flush the DNS as well. I’m not sure what other settings would trigger this to happen. I read somewhere PIA doesn’t play nice with DNSSEC. The only other thing I can think of is DNS resolver is messing something up, but I am unsure because I haven’t fooled around with it in-depth yet. Do you have any idea where I should be looking? If I am getting a Verizon hostname on the DNS leak test, that would mean VPN traffic is going out of the WAN interface, no? I also did make sure to disable the create route rule, I followed the video you posted step by step.