Skip to content

Flashstart bypass: bypassed IPs still redirected to catch-all DNS rule #1393

@Tbaile

Description

@Tbaile

Steps to reproduce

  • Add hosts to the IPSet for Flashstart bypass.
  • Enable Flashstart ProPlus
  • Observe that DNS requests from these hosts are still redirected to port 53 of the firewall, not bypassed

Expected behavior

  • Hosts in the Flashstart bypass IPSet should bypass DNS filtering and send DNS queries freely without being caught by the catch-all rule

Actual behavior

  • DNS traffic from hosts in the bypass IPSet is still being redirected to the firewall, not bypassed.
  • Catch-all rule incorrectly applies to bypassed IPs, especially after updates or profile changes.
  • Manual workaround is required to restore intended behavior after rules are lost.

Components

  • ns-flashstart 1.0.2

See also

Metadata

Metadata

Assignees

No one assigned

    Labels

    verifiedAll test cases were verified successfully

    Type

    Projects

    Status

    Done ✅

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions