Closed charlietango1 closed 1 year ago
I agree, since DoH isn't a good idea if you're already using VPN, and Mullvad Browser is supposed to be used with one by design. VPN providers have their own DNS servers, and this option seems redundant. It's the only pref that I have to manually change, which is problematic when it comes to fingerprintng.
I also found out that the preset Mullvad DNS-over-HTTPS (DOH) does not work well in terms of physical proximity (anycast?) to the nearest resolver. A comparison with Quad9 DOH https://dns.quad9.net/dns-query shows how much better it can work.
I would suggest: Quad9 as default setting. It will block malware and is geo-located very close to internet exchange points of presence.
At the moment we have no plan to disable DoH as default in Mullvad Browser. Especially since you're free to disable DoH and/or use a custom one.
I'll report to our team in charge of DoH the issues you have encountered.
I will close this issue as we'll continue shipping Mullvad Browser without Mullvad DoH.
We're always looking into improving our DoH servers and are progressively improving the coverage.
When I am connected to a VPN in Europe that normally uses a European DNS, Mullvad browser is routing my traffic through a DNS in the United States. When I disabled DNS over HTTPS, the browser correctly used the European DNS.