Disguise Mozilla VPN as DNS traffic

This article is no longer maintained, so its content might be out of date.

Internet operators sometimes try to spy on your online activity and may block your browsing traffic if they detect that you are using a VPN to encrypt your data. You can configure Mozilla VPN to operate using port 53 so that the data passing through the VPN tunnel appears as DNS traffic, which is less likely to be blocked by Internet providers.

Enabling this port could also help you bypass firewalls or captive portals that show you marketing ads in exchange for internet access.

To configure Mozilla VPN to use port 53, follow these steps:

  1. Open the Mozilla VPN.
  2. Click (or tap) the settings vpn settings icon icon.
  3. Click (or tap) Network settings.
  4. Check the Tunnel VPN through port 53/DNS option.
  5. Turn the VPN on.
    Port53VPN
Warning:
  • Since DNS is not a secure protocol, some Internet service providers may attempt to manipulate traffic that appears to be DNS. As a consequence, masking the VPN traffic as DNS data may prevent the VPN from connecting at all.
  • Port 53 and Multi-Hop cannot be used at the same time on mobile devices. If you enable both, only Multi-Hop will work.
  • If you use port 53 while connected to a hotspot, Mozilla VPN may fail to connect.

Related articles

Learn more:

These fine people helped write this article:

Illustration of hands

Volunteer

Grow and share your expertise with others. Answer questions and improve our knowledge base.

Learn More