DNS over HTTPS

DNS over HTTPS (DoH) is a protocol developed for encrypting plaintext Domain Name System (DNS) traffic to prevent malicious parties, advertisers, ISPs and others from being able to interpret sensitive data. User privacy and security is increased and man-in-the-middle attacks are prevented by using the HTTPS protocol to encrypt data between the DoH client and DoH-based DNS resolver. It was introduced as a standard in October 2018 by the Internet Engineering Task Force (IETF).

DNS is essentially a fundamental address book. It helps computer networks attach information to each web domain. DoH encrypts DNS queries, which are disguised as normal HTTPS traffic. Once the query is sent to the resolver, It is resolved inside a DoH request and the user is given a reply, also in an encrypted manner. 

Benefits of DNS over HTTPS 

In addition to increased security, using DNS over HTTPS improves performance. Testing of ISP DNS resolvers shows that response times are often slow, due in part by the need to resolve many hostnames when loading a single web page.

DoH ensures that malicious parties cannot forge or alter DNS traffic. DoH traffic looks like other HTTPS traffic to a network administrator, meaning it appears as normal, user-driven interactions with websites and apps. 

Deployment for DNS over HTTPS 

There are multiple usage scenarios for DoH:

  • Using a DoH implementation within an application: For US-based users, Mozilla Firefox introduced DNS over HTTPS by default in February 2020. Shortly after, Google Chrome rolled out the option to enable DoH support. Other major browsers have plans to implement DoH, but there is not yet widespread support in operating systems.
  • Installing a DoH proxy on the name server in the local network: Client systems use traditional DNS to query the name server in the local network. DoH servers in the Internet are reached by gathering necessary replies via DoH. This method is transparent to the end user.
  • Installing a DoH proxy on a local system: Operating systems are configured to query a locally running DoH proxy. The proxy needs to be installed on each system using DoH. 
Webopedia Staff
Webopedia Staff
Since 1995, more than 100 tech experts and researchers have kept Webopedia’s definitions, articles, and study guides up to date. For more information on current editorial staff, please visit our About page.

Related Articles

@ Sign

Pronounced at sign or simply as at, this symbol is used in e-mail addressing to separate the user' name from the user's domain name,...

Munging

(MUHN-jing) Munging (address munging), is the act of altering an email address posted on a Web page to make it unreadable to bots and...

How to Create an RSS Feed

In the second installment of RSS how-to, we look at some of the nonrequired (optional) channel and item tags, discuss RSS specifications in-depth and...

Dictionary Attack

(n.) (1) A method used to break security systems, specifically password-based security systems, in which the attacker systematically tests all possible passwords beginning with...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...