For a couple of versions now, Blokada on Android has been trying to use encrypted DNS by default.
This is fine on mobile data, but my local Wi-Fi network already directs all DNS to Cloudflare encrypted DNS at the firewall. Clients on this network are obliged to use the DNS configuration provided by DHCP, which directs clients to use port 53 to the firewall’s IP. The firewall itself acts as a proxy to Cloudflare. All other DNS traffic is blocked.
Blokada deliberately trying to evade DHCP-provisioned DNS violates the standard and breaks internet access for my mobile on this network. It was annoying enough the first time to have to figure this out and change the settings to prefer network DNS, but now it looks like Blokada has reset that setting to default all by itself, probably during an app upgrade.
If we have to have this setting, and it has to be the default, can we at least have it persist through upgrades and not randomly break DNS on proxied networks?