Description:
Domain-group based policy routing currently only works when clients use VyOS’s DNS resolver. When clients use external DNS servers (e.g., 8.8.8.8, 1.1.1.1, or DoH/DoT), the resolved IP addresses may differ from VyOS’s cache, causing policy routing to fail for those domains.
Steps to Reproduce:
- Configure a domain-group containing a FQDN (e.g., chat.openai.com)
- Set up policy routing for traffic matching that domain-group
- On a client machine, configure an external DNS server
- Verify the client gets different IPs than VyOS for the domain
- Observe traffic to that domain bypasses the policy route
Expected Behavior:
VyOS should route based on the FQDN itself , or should otherwise reconcile client and gateway DNS results so that domain‑based routing always works, regardless of the client’s chosen DNS.
Actual Behavior:
Policy routing only works when Clients use VyOS’s DNS resolver, or the external DNS returns identical IPs to VyOS’s resolver
Workarounds Tried:
- Forcing all DNS through VyOS (e.g., NAT‑redirecting port 53) — not acceptable in my environment.
- Static IP lists in the domain-group (requires constant manual updates).
Questions / Feature Request:
- Is there an existing VyOS configuration or recommended plugin that enables true FQDN‑based routing without forcing all client DNS through the VyOS?
- Are there plans to add deep‑packet inspection (e.g., matching TLS SNI or HTTP Host headers) to domain-group so that routing can be applied directly based on domain names, regardless of client DNS settings?
Thank you for any guidance or suggestions!