My head is spinning,can someone give me a simple solution that will not bonk my computer? I'm getting parioid (for no reason maybe)
Me too.My head is spinning,can someone give me a simple solution that will not bonk my computer? I'm getting parioid (for no reason maybe)
As somebody said earlier in the thread, google dns protects against this attack.( 8.8.8.8, 8.8.4.4,. DOH: dns.google/dns-query )All I want to know, if using reputable dns provider, but not providing dns rebinding protection, am I too vulnerable?
Lost internet connectivity after usingAs somebody said earlier in the thread, google dns protects against this attack.( 8.8.8.8, 8.8.4.4,. DOH: dns.google/dns-query )
Even ControlD own free dns fails their test; only NextDNS and AdGuard DNS were able to pass.Using Cloudflare Zero Trust, I thought I explicitly set up DNS rebinding protection with a policy blocking private IP address traffic. I fail the ControlD test in both Brave and Firefox.
I don't know how definitive this test is, but I can try playing around with things later.
I'm using Cloudfare as my DNS and passed the test Dave.My head is spinning,can someone give me a simple solution that will not bonk my computer? I'm getting parioid (for no reason maybe)
I looked a little more into it, and people do report false positives from the timing/latency sensitivity of the test's methodology, even with verifiable DNS rebinding protection enabled. It's simple, but it isn't a bulletproof test.Even ControlD own free dns fails their test; only NextDNS and AdGuard DNS were able to pass.
That's what I thought too; everytime the test declares vulnerability, it shows the figure of response variability in seconds, which apparently what it relies on mostly.I looked a little more into it, and people do report false positives from the timing/latency sensitivity of the test's methodology, even with verifiable DNS rebinding protection enabled. It's simple, but it isn't a bulletproof test.
Add https:// in front, so https://dns.google/dns-queryLost internet connectivity after using
Thank you; this worked.Add https:// in front, so https://dns.google/dns-query
Also using Zero Trust and have the same private IP address blocking policy enabled. But according to the logs, they were not blocked. But in the test site, I passed the test.Using Cloudflare Zero Trust, I thought I explicitly set up DNS rebinding protection with a policy blocking private IP address traffic. I fail the ControlD test in both Brave and Firefox.
I don't know how definitive this test is, but I can try playing around with things later.
As I said in a different thread, this is not an unencrypted DNS leak. Chromium browsers need to know the IP address of your DoH provider. It resolves the IP address by using the system DNS by querying it over plain DNS, bypassing the browser DNS. It is a normal behavior.Chromium browsers leak via unencrypted DNS, when it is blocked, Edge causes 5 secs delay every 5 mins (DNS Cache). I reported it 3 years ago, still no fix.
https://dns.google/dns-query is 8.8.8.8 and 8.8.4.4Controld D's own filter is basic, a simple filter that avoids issues and false positives. Use Control D with Hagezi and DoT and you will pass the test.Even ControlD own free dns fails their test; only NextDNS and AdGuard DNS were able to pass.
Cannot use DOT, but tried the different Hagezi profiles of ControlD free, in addition to the native profile; all could not pass the test.Use Control D with Hagezi and DoT and you will pass the test
You clearly have issues with your web browser. Have you tried to test in Firefox Portable, or system-wide as I asked you to do so?Thank you; this worked.
But still no luck with the test.
View attachment 293352View attachment 293353
Cannot use DOT, but tried the different Hagezi profiles of ControlD free, in addition to the native profile; all could not pass the test.
Also tried different reputable, free public dns providers on DOH, such as Google, Cloudflare, and Quad9, the same result.
I have DNS Rebind Protection disabled, but I have AI Protection, maybe it's related. Or maybe it's the browser/extensions.Anybody thought about what I said earlier? Maybe the protection is not related to ControlD but rather to your router which already has DNS Rebinding Protection enabled. @Parkinsond said his router probably doesn't have that feature enabled. So you guys should check wether it's enabled in your router settings and do the test with ControlD again with the router protection disabled.
Just installed Chrome (may God forgive me)You clearly have issues with your web browser. Have you tried to test in Firefox Portable, or system-wide as I asked you to do so?
If we're passing the test using various DNS servers, and you fail, that's issue on your end.
If you get this Edge, you'll get it in Chrome, Brave, Opera, Vivaldi, SRWare Iron, Ungoogled Chromium and other Chromium based browsers; no need to install any of them. This is why I specifically mentioned Firefox as it's completely different and DoH works in a different way. I know you hate it, but unless you're willing to test, we will never find out what is causing the issue for you. But one thing is certain—it's problem on your side, certainly not on DNS server side.Just installed Chrome (may God forgive me)
The same results
View attachment 293354View attachment 293355