QUIC protocol

I am familiar with the limited abilities of Pihole to force traffic to use a particular DNS server, I use a firewall but I have heard of Chromium based browsers and IoT using QUIC to leak DNS and other traffic, analytics etc.

From what I know QUIC uses UDP to bypass firewall rules and other restrictions that usually expect TCP traffic.

Has anyone heard of any way to address this?

On routers one way is to block UDP/443 and then the browser will fall back on TCP for HTTP requests. When I ran Untangle on the edge of my network they had a tick box to disable QUIC

1 Like