DNS Leak
Property |
Value |
Binary Name |
dns-leak |
Version |
9.0.1 |
File Size |
10.1MB |
Author |
Warith Al Maawali |
License |
Proprietary |
Category |
Network & Routing |
Description |
DNS leak detection and analysis for Kodachi OS |
JSON Data |
View Raw JSON |
SHA256 Checksum
326e2e13df2674347d60628e7f669b844aca974822eeb45c6328097067fd7747
🛡️ Key Features
DNS Leak Detection & Analysis
Feature |
Description |
Multi-Interface Testing |
Tests all network interfaces simultaneously |
Leak Identification |
Pinpoints exactly where DNS queries are leaking |
Real-time Analysis |
Monitors DNS queries as they happen |
Comprehensive Reporting |
Detailed reports with analysis and findings |
Why DNS Leak Detection is Critical
Benefit |
Description |
Privacy Protection |
Even with VPN/Tor, DNS leaks can reveal your location |
ISP Bypass Verification |
Confirms DNS queries bypass your ISP |
Configuration Validation |
Verifies your privacy setup is correct |
Continuous Monitoring |
Regular testing ensures ongoing protection |
🛡️ ⚡ TL;DR - Essential Commands
# Discover available network interfaces
dns-leak discover
# Run DNS leak test on all interfaces
sudo dns-leak test
# Test specific interface
sudo dns-leak test -i eth0
# View results from previous test
dns-leak results
dns-leak results --json
# Generate detailed report
dns-leak report
🛡️ Understanding DNS Leaks
What is a DNS Leak?
A DNS leak occurs when your DNS queries bypass your VPN or Tor connection and go directly to your ISP's DNS servers.
This reveals:
Information Leaked |
Description |
Websites visited |
All domains you're accessing |
Real location |
Your actual geographic location |
ISP identity |
Your Internet Service Provider |
How DNS Leak Detection Works
# Step 1: Discover network interfaces
dns-leak discover
This shows all network interfaces that could potentially leak DNS.
# Step 2: Run comprehensive test
sudo dns-leak test
The test process:
Step |
Action |
1 |
Sends DNS queries through each interface |
2 |
Monitors where queries are routed |
3 |
Identifies any leaks to ISP or public DNS |
4 |
Reports which interfaces are secure |
Testing Specific Interfaces
# Test VPN interface
sudo dns-leak test -i tun0
# Test Tor transparent proxy
sudo dns-leak test -i eth0
# Test with custom timeout
sudo dns-leak test --dns-timeout 10
Analyzing Results
# View test results
dns-leak results
# Get results in JSON format for scripts
dns-leak results --json
# JSON output examples for automation
dns-leak test --json # Test with JSON output
dns-leak discover --json # Interface discovery in JSON
# Generate detailed report with analysis
dns-leak report
dns-leak report --json # Report in JSON format
Result Interpretation:
Status |
Meaning |
✓ SECURE |
DNS queries routed through VPN/Tor |
⚠ WARNING |
Potential leak detected |
✗ LEAKED |
DNS going to ISP/public servers |
Multi-NIC Examples and Common Leak Scenarios
Multi-Interface Testing Examples:
# Test laptop with WiFi and Ethernet
sudo dns-leak test -i wlan0 # WiFi interface
sudo dns-leak test -i eth0 # Ethernet interface
# Test system with VPN
sudo dns-leak test -i tun0 # VPN tunnel interface
sudo dns-leak test -i wg0 # WireGuard interface
# Test all discovered interfaces
dns-leak discover # Show: wlan0, eth0, tun0, lo
sudo dns-leak test # Test all automatically
Common Leak Scenarios:
Scenario |
Description |
Split Tunnel VPN |
Some traffic bypasses VPN (eth0 leaks while tun0 secure) |
IPv6 Leaks |
IPv6 DNS not routed through VPN |
WebRTC Leaks |
Browser bypassing system DNS |
Misconfigured Firewall |
DNS allowed outside VPN tunnel |
🛡️ Advanced Commands
For advanced users who need access to all available commands and options, please refer to the auto-generated command reference which includes:
Feature |
Description |
Custom Testing |
Custom DNS server testing |
Batch Testing |
Batch interface testing |
Timeout Config |
Extended timeout configurations |
JSON Filtering |
JSON filtering options |
Debug Output |
Verbose debugging output |
CLI Reference |
All command-line flags and parameters |
🛡️ Security Notes
Important Security Practices:
Practice |
Description |
Connection Testing |
Test after every VPN/Tor connection |
Location Changes |
Re-test when changing network locations |
Interface Coverage |
Check all interfaces, not just primary |
Periodic Monitoring |
Run tests periodically during long sessions |
Audit Trail |
Save reports for security audits |
Metric |
Value |
Test Duration |
5-10 seconds per interface |
Memory Usage |
~15MB during testing |
CPU Usage |
< 5% during tests |
Network Traffic |
< 1KB per DNS query |
🛡️ Support