Assigned
Status Update
Comments
ra...@google.com <ra...@google.com> #2
Also confirmed issue persists on 4.4.
da...@mullvad.net <da...@mullvad.net> #3
There are a lot of expensive accessories I've purchased or been gifted that quit workin with android 4.2. Android devs need to get on this. 3 broken versions and numerous minor updates and it hasn't even been triaged yet. Completely unprofessional.
da...@mullvad.net <da...@mullvad.net> #4
We are loyal to Android as and they treat us like this.. I have a google device and yet it still is not fixed.
om...@paradigmnetworks.ai <om...@paradigmnetworks.ai> #5
Please fix
ri...@gmail.com <ri...@gmail.com> #6
Yes, please fix it. =)
[Deleted User] <[Deleted User]> #7
I abandoned iPhone to discover something better, but I'm finding a lot of my Bluetooth paired devices won't work properly on android... I hope this gets fixed soon. I don't want to have to buy an iPhone again and suffer with their long agreements and system restrictions.
tm...@gmail.com <tm...@gmail.com> #8
[Comment deleted]
ra...@gmail.com <ra...@gmail.com> #9
fix will ya? make the android better more
za...@nymtech.net <za...@nymtech.net> #10
Yes, count me as someone who would like to see this fixed. It apparently isn't fixed in KitKat.
hu...@gmail.com <hu...@gmail.com> #11
I have two nexus devices and this is a regular issue. The kid can't play games properly. Way to replace a working stack with a subpar homebrewed one.
Description
Hello,
We’re from Mullvad VPN and after a recent user report about DNS traffic leaking in specific circumstances we immediately started investigating the issue. We were able to confirm that Android leaks DNS requests outside the VPN tunnel and that the leaks weren’t limited to the specific case raised by the user. We’ve done multiple tests over the last few days but all the details surrounding under which conditions the leak happens is yet not clear, what is clear though is that Android do leak DNS traffic outside the VPN tunnel in certain conditions.
From our testing we see that when no internet connectivity is given through the VPN tunnel, some API’s allows DNS requests to be sent out directly on the network, regardless if lockdown mode is enabled or not. The original issue was discovered using Chrome. While a working VPN connection is up, all data seemingly is sent through the tunnel.
The easiest way of reproducing the issue is with Chrome and a dummy WireGuard blackhole VPN setup (it is reproducible with other VPN apps as well):
spam_get_requests.html
; This file has embedded javascript to launch GET requests every 30 ms after you press “Start”. These requests will cause dummy DNS requests against a test tld (.test).wg.conf
tcpdump
or Wireshark to debug the network traffic.tcpdump -i <INTERFACE> udp and host <IP> and port 53
We hope you prioritize the importance of this security flaw and we’ll continue sharing updates on our investigation in this ticket.