My idea of the killswitch is that not one bit is forwarded from LAN to WAN as soon as the VPN tunnel is not working. This includes DNS requests, yes. It’s ok if the browser will display DNS not found. When there is not internet access (I think thats what the killswitch is designed for) a DNS access doesn’t have any advantage in my understanding because you won’t be able to reach the IP adress which is servered by the DNS server. I would clearly name it a leak because it means that you are “vunerable” as the DNS server operator can simply tell which hostnames you are requesting.
I didn’t check the actual data traffic of the WAN port for IP communication besides DNS requests with a sniffer. But I don’t even want DNS requests to leak in the internet thats why I didn’t sniff the WAN port yet. If it possible to block DNS requests with the killswitch I will probably check that as well.
Feel free to correct my if my understanding or estimations are wrong regarding the killswitch functionallity.