@Andy Ful ,your observation is technically accurate and highlights the fundamental difference between Application-Layer DNS Proxies (NextDNS/YogaDNS) and Network-Layer Tunnels (Cloudflare WARP).
The "leak" you are seeing in Firefox and CMD happens because NextDNS and YogaDNS primarily act as local DNS resolvers. Modern browsers (like Firefox) often bypass local resolvers entirely using their own encrypted DNS (DoH), and the Windows Command Line (ping) can fallback to secondary DNS servers (like Google or your ISP) if the local NextDNS proxy doesn't strictly enforce a "No-Fallback" policy. Cloudflare WARP, conversely, creates a virtual VPN tunnel that captures all network traffic at the interface level, making it nearly impossible for any application to bypass it.
The Bypass
Your local NextDNS app never sees the request. Firefox effectively creates a private tunnel for its DNS queries, side-stepping your system-wide filter.
Fix
You must set Firefox’s network.trr.mode to 5 (Off) or configure it to use your specific NextDNS profile.
MANUAL VERIFICATION KIT
To confirm the "Leak" hypothesis, run these checks.
The Firefox Check
Type about
:config in the Firefox address bar.
Search for network.trr.mode.
If the value is 2 (Preferred) or 3 (Strict), it is bypassing your OS. Change it to 5 (Off) to force it to use NextDNS.
The IPv6 Leak Check (CMD)
Run ipconfig /all in CMD.
Look at your active adapter. Do you see IPv6 DNS servers listed that aren't NextDNS addresses? If yes, that is your leak.
REMEDIATION VECTORS
The "Nuclear" Option (System-Wide Disable)
Recommended for users who do not specifically need IPv6 connectivity. This is the only way to guarantee Chrome/Edge compliance.
For Windows (PowerShell Method)
Right-click the Start Button and select Terminal (Admin) or PowerShell (Admin).
Paste the following command to identify your active adapter.
Powershell
Code:
Get-NetAdapterBinding -ComponentID ms_tcpip6
Execute the disable command (Replace Name with your adapter name, usually "Wi-Fi" or "Ethernet")
Powershell
Code:
Disable-NetAdapterBinding -Name "Wi-Fi" -ComponentID ms_tcpip6
Disable-NetAdapterBinding -Name "Wi-Fi" -ComponentID ms_tcpip6
(
Result: Windows will stop generating IPv6 traffic entirely. The leak is physically impossible now.)
For macOS (Terminal Method)
Open Terminal
Run this command to list network services.
Bash:
networksetup -listallnetworkservices
Disable IPv6 on your active service (e.g., "Wi-Fi")
Bash:
sudo networksetup -setv6off "Wi-Fi"
The "Surgical" Option (Firefox Only)
Use this if you only want to stop the leak in Firefox but keep IPv6 for other system functions.
Open Firefox and type about:config in the address bar.
Accept the "Risk" warning.
Search for: network.dns.disableIPv6
Double-click it to set the value to TRUE.
Optional Secondary Lock: Search for network.trr.mode and set it to 5 (This forces Firefox to use your system DNS, preventing it from bypassing NextDNS).
The "Filtering" Option (YogaDNS Specific)
Use this if you want to keep IPv6 enabled but block it through YogaDNS.
Driver Check: Ensure you are using the WFP Driver (Settings > Network Interface). The standard driver cannot reliably trap IPv6 leaks.
Create a Block Rule:
Go to Configuration > Rules.
Click Add.
Name: "Block AAAA"
Type: Select AAAA (IPv6 record type) from the request type dropdown (if available) or create a generic rule.
Action: Block.
Note: It is often cleaner to just disable IPv6 on the adapter (Vector 1) than to try to filter it, as "leaks" often bypass the filter driver entirely.
VERIFICATION STEP
After applying the fix, verify the containment.
Clear DNS Cache.
Windows: ipconfig /flushdns
Browser: chrome://net-internals/#dns -> "Clear host cache"
Test: Visit
test-ipv6.com.
Success State: The site should say "No IPv6 address detected" or "IPv6 Not Supported."
Fail State: If it shows an IPv6 address (e.g., 2001:db8::...), the leak persists.