[quote='813223022, DTS Engineer, /thread/768025?answerId=813223022#813223022']
Can you elaborate on that?
[/quote]
Sure! I'll describe the general problem that we're facing and how we wanted to overcome it.
In our scenario, we have two variables in play:
Configuration profile with DNS over HTTPS settings
our VPN app
Here are the scenarios that we have investigated so far. In all of them, the device is connected to the captive network.
Device with DoH settings, no VPN app - struggles with Captive Portal, as the DNS gets encrypted and dropped by the gateway
Device with VPN app, no DoH settings - works with Captive Portal, as we're able to detect the Captive Portal and opt out of the traffic until the Captive Portal is cleared.
Device with VPN and DoH settings - this is the pain point. By opting out of the traffic, we're getting to the first scenario where the user struggles with Captive Portal - DNS traffic leaks from the VPN to the DoH payload, gets encrypted and then blocked.
We wanted to prevent this situation by not opting out of the DNS traffic from the VPN and sending it to the DNS server provided by the gateway instead (root of my original question) so it won't fall back to the DoH.
Note to the configuration profiles with DoH: They are provided to our users either by us, or they can be freely downloaded from the internet (like Quad9 configuration profiles). And we want our VPN app to be compatible with both.
Thank you for looking into this!
Topic:
App & System Services
SubTopic:
Networking
Tags: