I don't have time to make the video right now, but I post the following blog post, which inspired me to configure the "Internet Lock" rules more than 10 years ago, hoping you will get an idea what I'm talking about, FYI:
https://practicalrambler.blogspot.com/2 ... s-use.html
As for my "Internet Lock" rule, I've blocked all connections including ones for the "Public Profile".
https://practicalrambler.blogspot.com/2 ... affic.html
In the blog's rule (step 7), he made all VPN connections "Public" and all the other connections "Private", and then block all "Private" connections.
However, since I don't see any network interface (like TAP or TUN adapters) to connect to HideAway, so I don't think it is necessary, right?
I've also disabled all the "Allow" rules including the Windows Defender Firewall's default ones.
Then I've created and enabled two "Allow" rules to allow connections for hideaway.exe in app-x.xx.x (, not one in HideAway,) and update.exe in HideAway folders.
Since I cannot connect to HideAway, I "
HAD TO" enable WDFW's default rule "Core Networking - DNS (UDP-Out),", which opens port 53 to all programs
but now I've created the new "Allow" rule that opens port 53 to hideaway.exe only instead and "
STILL HAVE TO" have it enabled, as I mentioned in my last comment. <-- Does it make sense? What I wanted to say is that
I DON'T LIKE HAVING TO ENABLE THESE RULES because it is obvious that
THEY are causing the leaks in question and neither OpenVPN nor WireGuard official client requires these rules for them to connect to the internet.
Now, please activate your WDFW with my "Internet Lock" rules, establish a connection to HideAway, and then go to ipleak.net.
With ipleak.net open, disconnect to Hideaway and go to a site like google.com and make sure your internet connection is dead.
Then, leaving ipleak.net STILL as it is, please connect to Hideaway again, and ipleak.net should show your DNSes as well as HideAway's DNSes.
Does this make sense? Do I still need to make the video?
BTW, I think you will see this DNS leaks without my "Internet Lock", too.
############################################ Additions #############################################
Nick,
I'm sorry to respond to your post below here, as I don't like the number there.
----------------------------------------------------------------------------------------------------
Nick,
Thanks for the update.
I think the MSDN post is a bit little too old,
because the blog post I showed above says "Unfortunately, this will not work with the built-in firewall in Windows XP or Vista".
Anyway, I don't use any "Block" rule.
I've blocked all connections "
that do not match a rule"!
Please go to "Windows Defender Firewall with Advanced Security" and read what it has to say.
BTW. have you tried ipleak.net the way I mentioned above?
I don't think you have.
Please don't take this issue lightly, as it is not only my problem.
It can happen to anybody including those who don't need my configuration.
I told you that the leaks would occur in any configuration other than mine, didn't I?
I saw the leak happens when I switched to a different HideAway's server, too!
So, say, in the middle of listening to a streaming service or downloading something,
you find your HideAway's connection slow and so switch to a different HideAway's server.
Then, the company behind the service could get your real IP or DNS information if they are performing the same kind of detection as ipleak.net is doing, right?
----------------------------------------------------------------------------------------------------
Also, can you tell me why my new rule doesn't work?
Since I've allowed port 53 to be open to hideaway.exe only, all connections on my PC still go through HideAway only , right?
Can you get hideaway.exe to block port 53 while disconnected or not working?
----------------------------------------------------------------------------------------------------
Anyway, I don't want port 53 to be open on my PC.
I have seen many programs, including OpenVPN and the official WireGuard client, connect to the internet despite the WDFW blocking port 53.
Why can't Hideway do that?
----------------------------------------------------------------------------------------------------
nick.bolton wrote:It's odd though that just a normall install for you is showing leaks. No one else is seeing this.
Again? .. sigh

.
Don't trivialize the issue.
Do me a favor and just try what I said!
Please connect to and disconnect from Hideaway one or several times(,I mean, connect, disconnect and "
RE-CONNECT"), making sure to keep ipleak.net open the entire time.
(Do not refresh it as you did in your video.)
You will see what I am talking about even without my setup.
----------------------------------------------------------------------------------------------------
nick.bolton wrote:I know it's a potential issue if HideAway will not start, then traffic blocking will still happen. The only solution I can think of is another application we would make which would monitor if HideAway is running. If HideAway is not running, then that application would block all traffic, until HideAway runs again.
That is why we need the "Internet Lock", which is the solution for this issue.
Don't you think so?
it's been a week since I sent you the video. Any update on this?
Anyway, I was wrong about this.
tomor wrote:Incidentally, with both Wireguard and OpenVPN clients, I can connect to the Internet without enabling "Core Networking DNS (UDP-Out)" and my "Internet Lock" rule works perfectly ...
As for Wireguard and OpenVPN clients, I allowed connections via the "
public" interface, so DNS connections through it weren't blocked.
So I tried it blocking DNS connections via the "
public" interface.
Then, I was able to establish a connection with both Wireguard and OpenVPN clients, but I couldn't get them to connect to the web.
Looks like this
SERIOUS problem

would be difficult to solve with HideAway.

.
nick wrote:The only solution I can think of is another application we would make which would monitor if HideAway is running. If HideAway is not running, then that application would block all traffic, until HideAway runs again.
What a

!
This is what Windscribe calls "snake oil"!
https://windscribe.com/knowledge-base/a ... illswitch/
Also, check out this (
https://windscribe.com/blog/how-to-actu ... 811b7088d/, in particular, "Firewall" section), which he wrote about 10 years ago!
At that time, not many providers seemed to realize it, but I believe most of them offer this feature these days as they support Wireguard, whose default gateway cannot be deleted as OpenVPN does.
----------------------------------------------------------------------------------------------------
Anyway, are you reall working on this.
If so, I've been reading this thread(
https://www.wilderssecurity.com/threads ... op.309955/) and think it might be helpful.
I also used to use Comodo FW with AirVPN's rules and it worked great!
I don't think the rules are specific to them.
In fact, I've never used AirVPN.
IMO, my rules are better because AirVPN's rules are very complicated.
However, I believe the complicity works great here.
Additionally,, I remember seeing a post on AirVPN's forum about a script that can be used to set up your firewall to block non-VPN traffic.
I hope this will help.