با استفاده از اتصال VPN با تصمیم گیرنده شخص ثالث DNS IPV6

آن است معمولا توصیه زمانی که شما با استفاده از اتصال VPN چون آدرس ISP IPV6 شما ممکن است نشت (و آن را فاش نمی کند به طور کلی)، به غیرفعال کردن IPV6 اما نگرانی وجود دارد هر گونه امنیت شما اگر شخص ثالث DNS را مورد استفاده تصمیم گیرنده مانند دی ان اس گوگل یا OpenDNS، دو دو، IPV4 حل و آدرس IPV6?

خرید فیلترشکن

2 دیدگاه برای “با استفاده از اتصال VPN با تصمیم گیرنده شخص ثالث DNS IPV6”

  1. Unless your IPv6 DNS lookups are going over TLS then you need to be aware that they are in the clear. Using a third-party resolver will help against simple threats, but a one line entry in a router will bounce your requests through a resolver of choice for your ISP. DNS is unencrypted and _unathenticated_ so you have no idea if the resolver you specify is the one actually providing the response.

    tl;dr should work but still easy to compromise.

  2. When you modify DNS server while connect to VPN, VPN server will automatically change your DNS server address to the one hosted by VPN provider. Majority of VPN provider do this for security reason. This is because we connect to VPN because we only want ISP or router to know we are communicate with one IP, which is the VPN IP. All traffics must go through VPN to stay safe. If you are communicate with more than one IP some more it is ciritical DNS server, it consider unsafe. This is because when you connect to public wifi, router can change your DNS server with DNAT, hacker can change your DNS server by ARP spoofing method that hosted by them then send you to the wrong website and steal your data.

    In short, all data must flow through VPN to stay safe. If your VPN server not supporting IPv6, just unable it. Because no matter what DNS IP you key in and not pass through VPN, it can be alter.

دیدگاه‌ها بسته شده‌اند.