Android bug leaks DNS queries even when VPN kill switch is enabled

Android bug leaks DNS queries even when VPN kill switch is enabled

Image: Midjourney

A Mullvad VPN user has actually found that Android gadgets leakage DNS questions when changing VPN servers despite the fact that the “Always-on VPN” function was made it possible for with the “Block connections without VPN” alternative.

“Always-on VPN” is developed to begin the VPN service when the gadget boots and keep it running while the gadget or profile is on.

Making it possible for the “Block Connections Without VPN” choice (likewise referred to as a kill switch) guarantees that ALL network traffic and connections pass through the always-connected VPN tunnel, obstructing spying eyes from keeping track of the users’ web activity.

As Mullvad discovered out whileexaminingthe concern found on April 22, an Android bug leakages some DNS info even when these functions are allowed on the current OS variation (Android 14).

This bug happens while utilizing apps that make direct calls to the getaddrinfo C function, which supplies protocol-independent translation from a text hostname to an IP address.

They found that Android leakages DNS traffic when a VPN is active (however no DNS server has actually been set up) or when a VPN app re-configures the tunnel, crashes, or is required to stop.

“We have actually not discovered any leakages from apps that just utilize Android API: s such as DnsResolverThe Chrome internet browser is an example of an app that can utilize getaddrinfo straight,” Mullvad discussed.

“The above uses no matter whether ‘Always-on VPN’ and ‘Block connections without VPN’ is made it possible for or not, which is not anticipated OS habits and ought to for that reason be repaired upstream in the OS.”

Possible mitigations

Mullvad stated that the very first DNS leakage situation, where the user changes to another server or alters the DNS server, can be reduced quickly by setting a fake DNS server while the VPN app is active.

It has yet to discover a repair for the VPN tunnel reconnect DNS inquiry leakage, which is legitimate for all other Android VPN apps seeing that they’re likewise most likely affected by this problem.

“It needs to be explained that these workarounds ought to not be required in any VPN app. Nor is it incorrect for an app to utilize getaddrinfo to solve domain,” Mullvad described.

“Instead, these concerns ought to be resolved in the OS in order to secure all Android users despite which apps they utilize.”

In October 2022, Mullvad likewise discovered that Android gadgets were dripping DNS inquiries (e.g., IP addresses, DNS lookups, and HTTPS traffic) each time they linked to a WiFi network due to the fact that of connection checks even if “Always-on VPN” was toggled on with “Block connections without VPN” made it possible for.

DNS traffic leakages provide a considerable threat to user personal privacy, possibly exposing their approximate places and the online platforms they engage with.

Offered the severity of this problem, you might wish to stop utilizing Android gadgets for delicate activities or carry out extra safeguards to alleviate the threat of such leakages up until Google fixes the bug and backports the spot to older Android variations.

Update May 03, 17:02 EDT: A Google representative sent out the following declaration: “Android security and personal privacy is a leading concern. We’re mindful of this report and are checking out its findings.”

Find out more

Leave a Reply

Your email address will not be published. Required fields are marked *