So, as promised, the logs. The only thing I needed to replicate the issue was to add again a DNS server on the network manager configuration. I found out that removing it from there + using UFW was doing the trick (meaning the test didn't crash when tried to resolve using the alternative DNS server and the possible rogue requests are stopped).
For this I'm using openvpn on the CLI. The issue was more or less the same for the openvpn-nm applet but I wasn't able to find a way to get it to work there. For connecting I use ovpn files with these options: client dev tun proto udp remote us-ga.gw.ivpn.net 2049 auth-user-pass /home/tux/pass.txt resolv-retry infinite nobind persist-tun persist-key persist-remote-ip cipher AES-256-CBC tls-cipher TLS-DHE-RSA-WITH-AES-256-CBC-SHA:TLS-DHE-DSS-WITH-AES-256-CBC-SHA:TLS-RSA-WITH-AES-256-CBC-SHA ns-cert-type server verify-x509-name us-ga name-prefix key-direction 1 comp-lzo verb 3 ;ca ca.crt <ca> -----BEGIN CERTIFICATE----- (...) </ca> <tls-auth> -----BEGIN OpenVPN Static key V1----- (...) -----END OpenVPN Static key V1----- </tls-auth> up /etc/openvpn/update-resolv-conf down /etc/openvpn/update-resolv-conf script-security 2 ** Attachment added: "logs mentioned in the comment" https://bugs.launchpad.net/ubuntu/+source/openvpn/+bug/1652525/+attachment/4873016/+files/logs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1652525 Title: DNS leak in ubuntu 16.10 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openvpn/+bug/1652525/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs