Replies: 4 comments 2 replies
-
Do you mean that you still get the correct IPv6 address as a response? |
Beta Was this translation helpful? Give feedback.
-
You mean proxied responses? I disabled ODoH and didn't enable Anon Relays. I just tested NSLOOKUP command and it didn't return any IPv6 addresses... I guess BrowserLeaks does something... else? |
Beta Was this translation helpful? Give feedback.
-
The DNS leak test at https://browserleaks.com/dns does not tell you about any DNS responses you receive, it tells you which DNS resolvers connected to the BrowserLeaks service during the test. If you see IPv6 addresses on that test, it means a resolver with that address requested information on your behalf. The tool should be used to identify if for example your ISP resolver requests information when you expect only VPN resolvers, not to test if locally disabling IPv6 had any effect. |
Beta Was this translation helpful? Give feedback.
-
Yes, I tested other DNS Leak Test sites and BrowserLeaks is the only one reporting IPv6 results. It does something other DNS Leak Test sites don't. Thank you for clarification. |
Beta Was this translation helpful? Give feedback.
-
Rather than posting this as an issue, I am posting this as a discussion to make sure I am not misunderstanding DNSCrypt-Proxy configuration on Windows 11 OS. I want to disable IPv6 servers and resolving to any IPv6 addresses, but it doesn't work. Here are the 2 configuration changes that are supposed to disable IPv6, but I receive IPv6 responses regardless:
ipv6_servers = false
block_ipv6 = true
I also tried disabling HTTP3 DoH, but that also didn't prevent IPv6 responses.
Beta Was this translation helpful? Give feedback.
All reactions