- Apr 1, 2019
- 2,867
What really bothered me is it still happens even if I block port 53 on the router and if I use DoH in browser. I’m not worried about Amazon, but I am annoyed it negates any filtering DNS.
It doesn’t appear every test but I have it in any browser using any of these after 2 or 3 tests:
dnscheck.tools
browserleaks.com
dnsleaktest.com
Still happening for me this morning.
Does route 53 run parallel to thee ole route 66, as I have traveled that once, its very scenic 🫣I've yet to see Route 53 or anything besides my chosen DNS.
rem Disable IPv6
netsh int ipv6 isatap set state disabled
netsh int teredo set state disabled
netsh interface ipv6 6to4 set state state=disabled undoonstop=disabled
reg add "HKLM\Software\Policies\Microsoft\Windows\TCPIP\v6Transition" /v "6to4_State" /t REG_SZ /d "Disabled" /f
reg add "HKLM\Software\Policies\Microsoft\Windows\TCPIP\v6Transition" /v "ISATAP_State" /t REG_SZ /d "Disabled" /f
reg add "HKLM\Software\Policies\Microsoft\Windows\TCPIP\v6Transition" /v "Teredo_State" /t REG_SZ /d "Disabled" /f
reg add "HKLM\System\CurrentControlSet\Services\Tcpip6\Parameters" /v "DisabledComponents" /t REG_DWORD /d "255" /f
reg add "HKLM\System\CurrentControlSet\Services\Tcpip6\Parameters" /v "EnableICSIPv6" /t REG_DWORD /d "255" /f
rem Disable Discovery of Designated Resolvers (DDR), a mechanism for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration
reg add "HKLM\Software\Policies\Microsoft\Windows NT\DNSClient" /v "EnableDdr" /t REG_DWORD /d "0" /f
rem 3 - Require DoH / 2 - Allow DoH / 1 - Prohibit DoH
reg add "HKLM\Software\Policies\Microsoft\Windows NT\DNSClient" /v "DoHPolicy" /t REG_DWORD /d "3" /f
rem Disable IDN (internationalized domain name)
reg add "HKLM\Software\Policies\Microsoft\Windows NT\DNSClient" /v "DisableIdnEncoding" /t REG_DWORD /d "1" /f
reg add "HKLM\Software\Policies\Microsoft\Windows NT\DNSClient" /v "EnableIdnMapping" /t REG_DWORD /d "0" /f
rem 1 - Discovery of Network-designated Resolvers DNS over TLS (DoT), DNS over HTTPS (DoH), DNS over QUIC (DoQ)
reg add "HKLM\System\CurrentControlSet\Services\Dnscache\Parameters" /v "EnableDnr" /t REG_DWORD /d "0" /f
rem Disable smart multi-homed name resolution
reg add "HKLM\Software\Policies\Microsoft\Windows NT\DNSClient" /v "DisableSmartNameResolution" /t REG_DWORD /d "1" /f
reg add "HKLM\System\CurrentControlSet\Services\Dnscache\Parameters" /v "DisableParallelAandAAAA" /t REG_DWORD /d "1" /f
rem Disable Multicast/mDNS repeater / https://f20.be/blog/mdns
reg add "HKLM\System\CurrentControlSet\Services\Dnscache\Parameters" /v "EnableMDNS" /t REG_DWORD /d "0" /f
reg add "HKLM\Software\Policies\Microsoft\Windows NT\DNSClient" /v "EnableMulticast" /t REG_DWORD /d "0" /f
reg add "HKLM\System\CurrentControlSet\Services\Dnscache\Parameters" /v "EnableAutoDoh" /t REG_DWORD /d "2" /f
rem 1 - Disable Domain Name Devolution (DNS AutoCorrect) / 0 - Enabled (Default)
reg add "HKLM\System\CurrentControlSet\Services\Tcpip\Parameters" /v "UseDomainNameDevolution" /t REG_DWORD /d "0" /f
I’m about to go have dinner on the street that used to be Route 66 in my city.Does route 53 run parallel to thee ole route 66, as I have traveled that once, its very scenic 🫣
Japanese Curry, it was delicious.I’m about to go have dinner on the street that used to be Route 66 in my city.
Do you also block it in the firewall? Because Windows overrules router. In WFC you can allow only specific DNS IPsWhat really bothered me is it still happens even if I block port 53 on the router and if I use DoH in browser. I’m not worried about Amazon, but I am annoyed it negates any filtering DNS.
Next, I uninstalled F-Secure from the other Windows 11 Notebook, and what do you know, no more Amazon servers. If you have F-Secure installed, try uninstalling it and see if it works for you. As I did remember in GlassWire, that F-Secure does connect to Ireland servers, its plug in hosting service, so maybe somehow those get tied in together? So it's no longer an issue on those PCs with either Brave or Chrome. Needless to say, F-Secure is being replaced by Kaspersky Plus for the time being
View attachment 282614
Thanks At least now I'm back to this. I used the DNS leak test extended testI believe you, I do, but that makes it even weirder for me? I do not use F-Secure, and granted after that first one it has not happened to me any more? (So far that is.)
Blocked the port in the firewall on the router. I even made sure it was working by changing the Windows setting and seeing if the router blocked the internet if it didn't have a DHCP provided DNS. And it did.Do you also block it in the firewall? Because Windows overrules router. In WFC you can allow only specific DNS IPs
View attachment 282615
Maybe another program that uses it.I believe you, I do, but that makes it even weirder for me? I do not use F-Secure, and granted after that first one it has not happened to me any more? (So far that is.)
Thanks! I have had F-Secure installed. I will try with it uninstalled later and see. I'm guessing you're right.Thanks At least now I'm back to this. I used the DNS leak test extended test
View attachment 282616
View attachment 282617
I agree, I haven't installed anything yet, and in thinking about it, I will not install Kaspersky Plus with it's 42 modules and all its settings. Granted, some of them can be disabled to only manually run, so I get that part. But when you need a search bar, which was helpful, to find a module or setting, is a bit much. The free version is wonderful though Even their Internet Security had ~39 modules. I had gone to F-Secure Internet Security for it's simplicity, protection and its 3 module home screen. So, we'll see@Jonny Quest Looks like we have a winner! Uninstall of F-Secure and it's gone. Maybe it's part of the network filtering process. Also, my resolutions are snappier. Not in a way that matters, but it definitely was inspecting DNS requests. I know others like Avast also mess with DNS. F-Secure would still be me option for a 3rd party AV. But I think I may just done messing with any 3rd party AV for now. Things always go smoother without.