Skip to content

DNS leak with "bypass LAN" option #3212

@ValdikSS

Description

@ValdikSS

Describe the bug

When running shadowsocks-android v5.3.4 while being connected to a Wi-Fi network which sends 192.168.70.1 as a DNS server in DHCP options, DNS requests are still performed to 192.168.70.1, regardless of what DNS is configured in Shadowsocks, if Route: Bypass LAN is selected.

To Reproduce
Steps to reproduce the behavior:

  1. Set Route: bypass LAN in the proxy configuration
  2. Enter any non-LAN DNS server in the proxy configuration
  3. Enable proxy
  4. Run tcpdump -n port 53 on the Wi-Fi hotspot
  5. Observe DNS requests from the smartphone with proxy enabled

Expected behavior

DNS requests are performed only via the supplied DNS server inside Shadowsocks configuration.

Smartphone (please complete the following information):

  • Android/Chrome OS version: Android 10
  • Device: LG V50
  • Version: v5.3.4

Configuration
Put an x inside the [ ] that applies.

  • IPv4 server address
  • IPv6 server address
  • Client IPv4 availability
  • Client IPv6 availability (tested both)
  • Encrypt method:
  • Route
    • All
    • Bypass LAN
    • Bypass China
    • Bypass LAN & China
    • GFW List
    • China List
    • Custom rules
  • IPv6 route (tested both)
  • Apps VPN mode (tested both)
    • Bypass mode
  • Remote DNS: 8.8.8.8
  • DNS over UDP
  • Plugin configuration (if applicable):
  • Auto Connect
  • TCP Fast Open
  • If you're not using VPN mode, please supply more details here:

Additional context
Add any other context about the problem here.

Metadata

Metadata

Assignees

No one assigned

    Labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions