Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)MU
Posts
2
Comments
504
Joined
2 yr. ago

  • Smoking. First nicotine and then weed.

    Currently working on my addiction to junkfood, sugar and general overeating.

    Still highly addicted to caffeine and possibly in denial about a sex addiction. But I think I'll keep those two.

  • Traceroute won't show if you leak DNS requests outside of your VPN. (Unless you coincidentally also leak traffic, but then you're pretty much just not using your VPN).

    To confirm you'll need to analyze your traffic-flow using a tool like tcpdump or Wireshark and check the source and destination for DNS traffic. If you see incoming DNS responses on an interface that is not your VPN-adaptor or maybe a loopback interface then you're probably not tunnelling DNS through the VPN.

    To answer the question in the headline: Regular DNS is unencrypted and quite easy to snoop on, so any node on the route between you and the DNS server will be able to read it if not using a VPN (i.e. DNS leak). Not sure what you mean by adversary, but it's not like anyone on the internet can see your traffic. The DNS server may log your request and if you're not on VPN, your IP address may be logged too.

  • Check that you actually have persistent storage enabled. (See man journald.conf and search for Storage)

    Read up on the numerous parameters to journalctl. (man journalctl)

    journalctl --boot -2 will show logs from previous boot.

    journalctl --since "-2 weeks" --unit=sshd last two weeks worth of sshd logs.