No, it has to do with when connecting to a gateway the client should use that gateway as the DNS server through a search string.
For instance when I connect to my mifi (mobile wifi router) it sets a string in "/etc/resolv.conf" like this:
search www.huaweimobilewifi.com
nameserver 192.168.0.11
And in the router I've set where my queries should go.
But at home the router is at 192.168.0.1 and not that mifi router.
It should've been auto-magically altered on connection AFAIK.
It's not a big deal for me, I've added nameservers to resolv.conf countless of times in the past with: "echo "nameserver blabla.bla.org" >> /etc/resolv.conf" also because I don't want my DNS queries to pass through Google owned ones.
But it could be an issue for others if this was a system bug. Looks like it isn't so that's good.
Read this if you're interested why I'm leary of certain DNS servers:
If you want to use one of their servers just use my string above (with sudo) and reblace blabla.bla.org with the given IP adresses.
It comes down to the network scripts when initializing a new connection or device.
Thinking about it:
Taking the offered gateway as nameserver is not a good idea (safety wise) when on unknown networks if one doesn't have a VPN or ssh proxy or at least a firewall running.
I am not even fully in the clear [yet] if, when running over VPN and using i.e DNS through Google, the whole idea of privacy through VPN gets defeated.
I suspect it does!
/etc/resolv.conf is fairly immutable so a fixed setting to an external [i.e FreeDNS] server by default is a better/safer option IMO... Even when using other precautions like VPN and/or firewall.
I don't remember, when using VPN, how to validate / check wich DNS I am using.... Suppose it is the normal, default one ? YEs traffic goes trough VPN, but the DNS used is the one we got when we got our IP ( DHCP) ?