The Overview of DNS Leak
HI Hi, Greetings!
Intimate February 
Today, I would like to share with you an article about the overview of DNS Leak. I hope this article has more support for Web and cloud engineers. Let's move to the article and I will explain the last part of this article.
PART 02:
What Causes a DNS Leak?
There are various circumstances that can lead to a DNS leak, including:
1. An incorrect setup VPN:
When a VPN is configured incorrectly and assigns a DNS server belonging to the user's ISP, a DNS leak is most likely to occur. Because VPNs need users to connect to their ISP before logging in, this is more likely to happen when they utilize several networks often.
2. An ineffective VPN service:
A VPN provider without its own DNS servers will result in DNS leaks and will be unable to provide effective DNS leak security.
3. Unavailability of IPv6:
IP addresses were initially 32-bit Internet Protocol version 4 (IPv4) addresses with four sets of three digits and no support for Internet Protocol version 6 (IPv6). However, 128-bit IPv6 addresses were established to expand the pool of IP addresses and allow more devices to connect. Because the internet is continually evolving, certain VPNs may not support IPv6, causing a user's DNS request to be sent outside of the encrypted tunnel.
4. Transparent DNS proxies:
Some ISPs are now requiring their customers to utilize their DNS servers even if they switch to a third-party VPN. When an ISP detects DNS setting changes, it employs a transparent proxy to force a DNS leak by routing the user's web traffic to its own DNS servers.
5. Windows smart features:
Starting with Windows 8, Microsoft included a capability called Smart Multi-Homed Name Resolution (SMHNR) to devices running Windows operating systems. The functionality sends DNS requests to all accessible servers and accepts the response from the first DNS server. This can result in a DNS leak, leaving users vulnerable to spoofing attacks.
6. Teredo in Windows:
Teredo is a built-in feature in Windows operating systems that seeks to make the transition from IPv4 to IPv6 as painless as possible. It makes it easier for the two IP systems to coexist, but it poses a significant security risk for VPN users. Teredo is a tunneling protocol that can override a user's encrypted VPN tunnel because it is also a tunneling protocol.

You are welcome to like and leave feedback in the comment area.
Link:
PART 01:
The Overview of DNS Leak - PART - 01
PART 03:
PART 04:
Source:
https://www.dnsleaktest.com
https://www.expressvpn.com/dns-leak-test
https://www.geeksforgeeks.org/what-is-dns-leak
M M Zaheer Hussain
Stay Safe!




