Variety of questions regarding Rethink's functions #1752
-
n/a |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 1 reply
-
No, it doesn't. Tapping on the "refresh" icon at the top of the Configure -> DNS will (in addition to tearing down the connection pools). Don't recommend doing it often.
No. DNS queries get sent to Network/OS provided DNS upstream when:
Configure -> DNS -> Never proxy DNS if turned ON would not contact the DNS upstream over Orbot, SOCKS5, HTTP, Simple-mode WireGuard, Always-on Advanced-mode WireGuard proxies, if set.
You could say that. The behaviour is very different though. Prevent DNS leaks attempts to proxy and answer DNS queries that may otherwise "leak", whereas Block when DNS is bypassed will drop the TCP/UDP connections for which it couldn't associate a corresponding outgoing DNS query.
Not really. It is block apps that may do their own DNS or connect to IPs straight up (like Syncthing). One can "Bypass Universal" or "Isolate" apps they trust to make them exempt from this (and other) "Universal firewall rules".
It seems like, yes.
Android limitation (or so we thought), but we've a workaround now to per-app split-tunnel ICMP too that will be part of the next release,
The official WireGuard can route every L3 and L4 protocol (as it functions at L3). Rethink only routes TCP and UDP (it runs WireGuard as a proxy; see / mirror) today, which likely is close to almost all Internet-bound traffic. The rest of the traffic not routed by Rethink is dropped (not leaked).
Hm. Loopback's implementation has changed in
System DNS is used if Configure -> Network -> Choose fallback DNS if set to None. A preset default is used (which is currently set to |
Beta Was this translation helpful? Give feedback.
No, it doesn't. Tapping on the "refresh" icon at the top of the Configure -> DNS will (in addition to tearing down the connection pools). Don't recommend doing it often.
No. DNS queries get sent to Network/OS provided DNS upstream when:
Configure -> DNS -> Never proxy DNS if turned ON would not contact the DNS upstream over Orbot, SOCKS5, HTTP, Simple-mode WireGuard, Always-on Advanced-mode WireGuard proxies, if set.