You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
But if there is some new type of DNS query, it still send query, which might cause leaking of IP.
For security, I think we could introduce allowTypes for outbounds DNS config.
User could set allowTypes to [1,28], and if there is new type, such as 65(https), this query still be blocked.
It's safe for user to against leaking of IP.
BTW, it still useful for option nonIPQuery? nonIPQuery:"drop" is equals to allowTypes:[1,28].
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
-
We have blockTypes at
outbounds/dns
to block some type of DNS record.But if there is some new type of DNS query, it still send query, which might cause leaking of IP.
For security, I think we could introduce
allowTypes
for outbounds DNS config.User could set allowTypes to
[1,28]
, and if there is new type, such as 65(https), this query still be blocked.It's safe for user to against leaking of IP.
BTW, it still useful for option
nonIPQuery
?nonIPQuery:"drop"
is equals toallowTypes:[1,28]
.Beta Was this translation helpful? Give feedback.
All reactions