Even if your application is using the correct variant of the SOCKS protocol, there is still a risk that it could be leaking DNS queries.
This problem happens in Firefox extensions that resolve the destination hostname themselves, for example to show you its IP address, what country it's in, etc.
If you suspect your application might behave like this, follow the instructions below to check.
- Add
TestSocks 1
to your torrc file.
- Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 server (
socks5://127.0.0.1:9050
by default).
- Watch your logs as you use your application. For each socks connection, Tor will log a
notice
for safe connections, and a warn
for connections leaking DNS requests.
If you want to automatically disable all connections leaking DNS requests, set SafeSocks 1
in your torrc file.