- block lookups by domain or suffix,
- pin which upstream resolvers get used,
- tune the query timeout,
- power domain-based policy rules (by mapping responses back to IPs).
Blocking domains
Block lookups by exact match or suffix (e.g.*.tracking.com). Blocked queries get a local REFUSED response, so the upstream resolver never sees them.
Pinning nameservers
By default the sandbox picks up the host’s resolver list automatically:- macOS: reads
State:/Network/Global/DNSfrom the system configuration store, with/etc/resolv.confas a fallback when the store isn’t available. - Linux: reads
/etc/resolv.confdirectly.
nameservers to pin the exact resolvers you want (e.g. 1.1.1.1, dns.google), which is useful when auto-discovery picks the wrong ones.
Values can be plain IPs, IP:PORT, hostnames, or HOST:PORT. Hostnames are resolved once at sandbox startup using the host’s OS resolver.
dig @1.1.1.1, an /etc/resolv.conf entry inside the guest, or a library call that takes a resolver IP), the interceptor forwards the query to that resolver directly instead of redirecting it to the pinned defaults. The network policy still applies: the query only goes through if the destination IP is allowed.
DNS over alternative transports
The block list and rebind protection only apply to queries the gateway can see. A guest that routes DNS through an encrypted or non-DNS protocol bypasses both unless the gateway intercepts or refuses it. Intercepted (block list and rebind protection apply):- DNS over UDP (UDP/53)
- DNS over TCP (TCP/53)
- DNS over TLS (DoT, TCP/853): requires TLS interception
- DNS over QUIC (DoQ, UDP/853)
- mDNS (UDP/5353), LLMNR (UDP/5355), NetBIOS-NS (UDP/137)
- DNS over HTTPS (DoH, TCP/443)
UDP/53, TCP/53, and TCP/853 to anything except the gateway.
Domain-based policy rules
Network policy rules can match a destination by exact domain or by suffix. The interceptor watches DNS responses as they flow back to the guest and keeps track of which IP addresses belong to which domain. A connection to93.184.216.34 is only allowed by a rule targeting example.com if that IP actually came back as an answer to a lookup for example.com from this sandbox.
Because of that, domain rules only take effect on connections that are preceded by a DNS lookup from inside the sandbox. An application that connects to a hard-coded IP it didn’t resolve through the interceptor won’t match any domain rule.
See also
- Security model: rebinding protection and DNS-to-IP binding (TOCTOU defense)
- TLS interception: domains that get intercepted also go through TLS inspection