DNS over HTTPS

DNS over HTTPS (DoH) is a protocol developed for encrypting plaintext Domain Name System (DNS) traffic to prevent malicious parties, advertisers, ISPs and others from being able to interpret sensitive data. User privacy and security is increased and man-in-the-middle attacks are prevented by using the HTTPS protocol to encrypt data between the DoH client and DoH-based DNS resolver. It was introduced as a standard in October 2018 by the Internet Engineering Task Force (IETF).

DNS is essentially a fundamental address book. It helps computer networks attach information to each web domain. DoH encrypts DNS queries, which are disguised as normal HTTPS traffic. Once the query is sent to the resolver, It is resolved inside a DoH request and the user is given a reply, also in an encrypted manner. 

Benefits of DNS over HTTPS 

In addition to increased security, using DNS over HTTPS improves performance. Testing of ISP DNS resolvers shows that response times are often slow, due in part by the need to resolve many hostnames when loading a single web page.

DoH ensures that malicious parties cannot forge or alter DNS traffic. DoH traffic looks like other HTTPS traffic to a network administrator, meaning it appears as normal, user-driven interactions with websites and apps. 

Deployment for DNS over HTTPS 

There are multiple usage scenarios for DoH:

  • Using a DoH implementation within an application: For US-based users, Mozilla Firefox introduced DNS over HTTPS by default in February 2020. Shortly after, Google Chrome rolled out the option to enable DoH support. Other major browsers have plans to implement DoH, but there is not yet widespread support in operating systems.
  • Installing a DoH proxy on the name server in the local network: Client systems use traditional DNS to query the name server in the local network. DoH servers in the Internet are reached by gathering necessary replies via DoH. This method is transparent to the end user.
  • Installing a DoH proxy on a local system: Operating systems are configured to query a locally running DoH proxy. The proxy needs to be installed on each system using DoH. 
Webopedia Staff
Webopedia Staff
Since 1995, more than 100 tech experts and researchers have kept Webopedia’s definitions, articles, and study guides up to date. For more information on current editorial staff, please visit our About page.

Related Articles

Software

Table of contents What is Software? History of Software Software vs. Hardware Software vs. Hardware Comparison Chart What Types of Software Exist? Saas vs....

Email Address

What is an Email Address? An email address is a designation for an electronic mailbox that sends and receives messages, known as email, on a...

Information Technology (IT) Architect

The information technology architect applies IT resources to meet specific business requirements. The role requires a high degree of technical expertise as well as...

Built-In Function

A built-in function is a function that is already available in a programming language, application, or another tool that can be accessed by end...

Geotargeting

Geotargeting is a method of delivering data or content to users based on...

Agile Project Management

Agile project management enables business teams to approach their projects and tasks with...

Private 5G Network

A private 5G network is a private local area network (LAN) that utilizes...