Перейти к содержимому
Skip to content
← All articles

DNS over HTTPS (DoH): Privacy, Security, and How It Works

DNS over SSL/TLS проверку (DoH) is a protocol that encrypts DNS queries by sending them over HTTPS connections to a DNS resolver. Traditional DNS sends queries in plaintext over UDP port 53, making them visible to anyone who can observe network traffic — ISPs, network administrators, and attackers alike. DoH wraps DNS queries inside standard HTTPS traffic on port 443, making them indistinguishable from regular web browsing.

The Problem with Traditional DNS

Standard DNS (defined in RFC 1035) has several privacy and security issues:

# Traditional DNS query — visible in plaintext
dig example.com @8.8.8.8

# Captured by network observer:
# Query: example.com A record
# Response: 93.184.216.34
# Everything visible including the domain name

How DoH Works

DoH encapsulates DNS queries in HTTP/2 requests sent to a DoH-compatible resolver over TLS-encrypted connections:

# DoH request (simplified)
POST https://dns.google/dns-query HTTP/2
Content-Type: application/dns-message
Accept: application/dns-message

[Binary DNS query payload]

The resolver processes the DNS query and returns the response over the same encrypted HTTPS connection. From a network perspective, this traffic looks identical to any other HTTPS request to the resolver's IP address.

Wire Format vs JSON Format

DoH supports two query formats:

FormatContent-TypeUse Case
Wire format (RFC 1035)application/dns-messageStandard binary DNS message, efficient for resolvers
JSON formatapplication/dns-jsonHuman-readable, convenient for debugging and API документацию
# JSON format query (Google's DoH)
curl -s "https://dns.google/resolve?name=example.com&type=A" | python3 -m json.tool
{
  "Status": 0,
  "TC": false,
  "RD": true,
  "RA": true,
  "AD": true,
  "Answer": [
    {
      "name": "example.com",
      "type": 1,
      "TTL": 3600,
      "data": "93.184.216.34"
    }
  ]
}

DoH vs DoT vs Traditional DNS

FeatureTraditional DNSDoT (DNS over TLS)DoH (DNS over HTTPS)
Port53 (UDP/TCP)853 (TCP)443 (TCP)
EncryptionNoneTLSTLS (via HTTPS)
BlockableYes (port 53)Yes (port 853)Difficult (blends with HTTPS)
PerformanceFastest (no encryption overhead)ModerateModerate (HTTP/2 multiplexing helps)
PrivacyNoneQuery content hiddenQuery content hidden + blends with traffic
VisibilityFull (queries visible)Destination visible (port 853)Destination visible (resolver IP)

Major DoH Providers

ProviderDoH URLNotable Features
Cloudflarehttps://cloudflare-dns.com/dns-queryFastest, privacy-focused, no logging
Googlehttps://dns.google/dns-queryReliable, JSON API available
Quad9https://dns.quad9.net/dns-queryMalware blocking, non-profit
NextDNShttps://dns.nextdns.io/dns-queryCustomizable filtering, analytics

Enabling DoH

Browser Configuration

Most modern browsers support DoH natively:

System-Level Configuration

# Using systemd-resolved (Linux)
# /etc/systemd/resolved.conf
[Resolve]
DNS=1.1.1.1#cloudflare-dns.com
DNSOverTLS=yes

# Using dnscrypt-proxy
# /etc/dnscrypt-proxy/dnscrypt-proxy.toml
server_names = ['cloudflare', 'google']
listen_addresses = ['127.0.0.1:53']
doh_servers = true

Implications for Network Security

DoH creates tension between user privacy and network security operations:

Benefits

Challenges

DoH and Web Monitoring

For web monitoring and uptime checking, DoH has practical implications:

Summary

DNS over HTTPS is a significant privacy improvement for internet users, encrypting DNS queries that were previously sent in plaintext. While it creates challenges for enterprise network security and content filtering, it effectively prevents DNS surveillance, spoofing, and censorship. Major browsers and operating systems now support DoH natively, and adoption continues to grow. For web professionals, understanding DoH is important for accurate monitoring, debugging, and security planning.

Check your website right now

Check now →
More articles: DNS
DNS
DNS TTL Guide: Optimal Values for Every Record Type
16.03.2026 · 10 views
DNS
DNS Propagation: Why DNS Changes Don't Take Effect Instantly
11.03.2026 · 14 views
DNS
DNS Record Types: A, AAAA, MX, CNAME, TXT and More
10.03.2025 · 11 views
DNS
DNS Propagation — Why DNS Changes Don't Work Immediately
12.03.2026 · 10 views