After installing Firefox 123.0 I ran a Mullvad Connection check https://mullvad.net/en/check and found I had a DNS leak. Turns out that Firefox had changed the settings under “DNS over HTTPS” so that my Mullvad DNS wasn’t being used any more. After changing this setting to “off” in Firefox, the Mullvad check passed.

  • Atemu
    link
    fedilink
    arrow-up
    18
    ·
    10 months ago

    Note that this isn’t really a DNS leak. DoH is also going through the VPN proxy, so no data is leaked anywhere here.

    What the “DNS leak test” does is to check whether you’re using Mullvad’s DNS servers. That’s it. It doesn’t and cannot actually check whether or not your DNS requests happen through the proxy or not.

  • davelA
    link
    fedilink
    English
    arrow-up
    6
    ·
    10 months ago

    In my case the setting stayed off after upgrade.

  • Eager Eagle@lemmy.world
    link
    fedilink
    arrow-up
    4
    ·
    10 months ago

    My Firefox DNS over HTTPS settings are as they were before the upgrade. Maybe this is Flatpak-specific?

  • RotatingPartsOP
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    3
    ·
    10 months ago

    I should have mentioned, I am running the Flatpak version of Firefox on Kubuntu 23.10