I was testing 1.1.1.2 (malware blocking) and my kids found that a game on the ios apple store called zombs royale no longer works if using this for dns. Changing back to 1.1.1.1 lets the app open again.
This behaviour does not occur when accessing the web version of the game. It is exclusive to the ios app on the iphone.
Why does 1.1.1.2 get triggered by this ios app? Is it trying to contact a location that contains malware or is this an error?
Ok sure. But 1.1.1.2 says it blocks just malware only? Either way it prevents an app from opening on an iphone, so does this app have malware? Yes - good keep blocked. No? Then dns is breaking functionality in error?
Ok as there is no process from your side to fix an app broken by 1.1.1.2 dns and no process for a user of the app to work out or test why its blocked or monitor or submit anything, then the solution is not production ready and I will use something else. Thanks for your feedback. Good luck, I consider the situation closed
We don’t build or manage the app or know what DNS hostname is being called or blocked. The application vendor does, hence my suggestion you contact them.
1.1.1.1 and 1.1.1.[2/3] are privacy focused resolvers. We record as little customer identifiable information as possible in line with our privacy policy and keep it for as short of a period of time as possible. If you were using the Cloudflare 1.1.1.1 app you could file a bug report which might contain data to determine the host being called.
You could also sign up for a Gateway account and configure your own policies where you can manage your own security settings and access logs for your devices.
But without knowing the hostname being called it’s not possible to review.