Even if your application is using the correct variant of the SOCKS protocol, there is still a risk that it could be leaking DNS queries.
This problem happens in Firefox extensions that resolve the destination hostname themselves, for example to show you its IP address, what country it's in, etc.
If you suspect your application might behave like this, follow the instructions below to check.
TestSocks 1 to your torrc file.
- Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 server (
socks5://127.0.0.1:9050 by default).
- Watch your logs as you use your application. For each socks connection, Tor will log a
notice for safe connections, and a
warn for connections leaking DNS requests.
If you want to automatically disable all connections leaking DNS requests, set
SafeSocks 1 in your torrc file.