-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On 05/06/2016 02:37 PM, Michael Carbone wrote:
> yes, I can confirm Bitmask is leaking DNS requests by default.
>
Ouch, really it is not exclusive of Bitmask. ProxyVM's are forwarding
DNS queries to their NetVM by default. So, if you do not disable/block
this explicitly, any VPN software is leaking by default
(since them do not run /usr/lib/qubes/qubes-setup-dnat-to-ns).
I think that ProxyVM should have an option for block all FORWARD chain
with eth0, like:
iptables -I FORWARD 1 -o eth0 -j DROP
iptables -I FORWARD 2 -i eth0 -j DROP
Some checkbox like "leak protection", "only VPN",...
Also, since we will have to edit all VPN or similar software to run
/usr/lib/qubes/qubes-setup-dnat-to-ns , maybe it should be auto
executed when /etc/resolv.conf is modified.
Regards.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQIcBAEBAgAGBQJXLLO/AAoJEBQTENjj7QildGwQAI7J89mPLAeV43oXztJk6lRI
CuQhwazpbWYtujTdS4HDQL20tO0XPN7t24MNtaOe+od+ZqHhoNButCnuvPPsdQF9
A88lxAAsnc0E6DtfY/ChqXH4T3vIeTM3wPvKxsIdGCs8e8+lzG1oXrYRhW58bjOk
Y7I5mFYoy3Ny/88apjaxYNU0xpJ8YW5N9penhWNZA054Di8CVYvIBCjW++awUSOo
HKegKeZs2u8HvbAekuM9K9w62FhwizrTN4/bTywuPvC8dAa+h4TTEhuaK2ssBAlh
bXXpKaQiTXfUrgcqrIVYPJZox5rZYGG2FbQtxZkoXkN5GqXjaFqODzWp4koa2wcQ
Lsh/3dNVHW/YqZrH1e9PQ3EI8Efiy0OfKNU7eatYQzao7vhqGnN4jsVKYMeteU7f
okMDr7WC3raxI/rGso5GtY1H+c2tS/3Hou35+hOoaUVmDyQDo76g6cRz0KVAqbV/
FSk3ZofhMGHpwg9tm8gdAL88xRIPxwV4xhJ6akXN5PCLeSHQfLwA/Z6c7HsSyYGb
E7d05isL4tPhBAYWflXtifhj0lerYCJJESmTdEyO1WKX91l7OSB4mTXw9+r0xhJj
/e5OBMkeLmF7EjwtTYRTBGcMfuU1aWmM/4TAvm/ehCLaeHnfqQOYHf4ChAMkbHgO
HbPQrOoDC654BAnCIznA
=ZFv1
-----END PGP SIGNATURE-----