It’s easy to check the IP of the DNS’ that you got via the scripts online. It might just be that you are getting a more local DNS server than the one on their site, that could be for US for example (if you are somewhere else
Remember guys, SOMEONE has to be your DNS provider, so dnsleaktest.com will always show some IPs for DNS. What you don’t want is your DNS provider to be your ISP, if you’re worried that they’ll try and correlate your DNS activity to your VPN activity (which is actually not all that much to be worried about, IMO).
I’m reluctant to suggest Cloudfare to newbies as it turns out that some vendors (and more than one hotel I’ve visited) are violating RFCs and using 1.0/8 as internal, non-routeable addresses (i.e., on AT&T U-Verse) so queries on 22.214.171.124 don’t make it out onto the network
Yeah you are right. I did a quick look and i couldn’t find any alternative DNS ips for Cloudflare, which is a shame.
Anyway, Google DNS is good enough, they also only save logs for 24 hours or something like that, i read about it somewhere. Also the sheer number of requests google gets means that any request you make will be hidden in the sea of data, so in that way you get even higher security i would say, compared to a smallish DNS service that can be potentially hacked.
BTW, AT&T said it was a mistake they blocked it and they would fix it, or have fixed it
I don’t know the dns for Nord, but in your ovpn file that you get from them. Open it and add in the line dhcp-option DNS add.res.she.re before the security certificates. Then upload it to the router and try.
Edit try these two lines:
dhcp-option DNS 126.96.36.199
dhcp-option DNS 188.8.131.52
Yes and no. I think they will only function if the vpn is connected. If you do it through the interface then you may not have internet unless the vpn is connected. The point of the scripts mentioned above is to automatically change them when the vpn connects, and back again if connection is lost. In case the vpn needs name resolution to begin.