Bug Fixes
DNS Leak Prevention: Combined port rules now recognized
Fixed an issue where firewall rules blocking multiple DNS ports (e.g., 53,853) with protocol tcp_udp were not being recognized as satisfying DNS leak prevention requirements. Previously, a rule blocking both standard DNS (port 53) and DNS-over-TLS (port 853) in a single rule would incorrectly trigger the "No Leak Prevention" warning.
- Rules with combined ports like 53,853 now correctly satisfy both DNS53 and DoT blocking requirements
- Fixed recommendation text to correctly say "Block outbound UDP port 53" instead of "UDP/TCP port 53" (DNS uses UDP)