Securing VPN DNS Leaks
Securing from DNS Leaks
Firefox and Chrome browsers, long held as the gold standards for getting around the web, have recently taken a hit due to an exploit that was allowing IPs to leak, even when someone was aiming to browse securely by using a proxy of VPN service.
The exploit was done – even against browsers that were being used in conjunction with a VPN – by the execution of a WEBRTC Javascript code, which allowed those doing the snooping to see a user’s actual IP addressed, the one issued by their ISP. For the most part the exploit seems to have been focused on Windows machines, with those running Android, Linux or OSx versions operating relatively securely.
There does appear to be a fairly simple solution to the problem. So, roll up your sleeves and prepare to fix a problem if you’re running Windows versions of these browsers.
How To Fix DNS Leaks:
Firefox – This requires a bit of work, but is worth the security. In Firefox, type in “about: config” in the URL bar. When the page comes up, enter “media.peerconnection.enabled” into the search bar. When it appears, set that entry to “false” (this can be done by double clicking it, or by right clicking and selecting “Toggle”).
Chrome – A free extension has been made available for installation that patches the issues. It can be downloaded here (https://chrome.google.com/webstore/detail/webrtc-block/nphkkbaidamjmhfanlpblblcadhfbkdm?hl=en).
After you have completed the steps above for your browser of choice you can test the settings to make sure your DNS information isn’t being leaked with our DNS leak testing tool.
And that’s it, you’re done!
If you want to take an extra step for security reasons – and who doesn’t – you could also choose to run a VPN directly through your router, which leaves little chance for external shenanigans when it comes to accessing your private information. Check out our (https://vpnzoom.com/vpn-setup/ddwrt-routers/) option for doing just this on your DD-WRT router.