Generated by GPT-5-mini| DoH | |
|---|---|
| Name | DoH |
DoH
DoH is a protocol for resolving Domain Name System queries over encrypted Hypertext Transfer Protocol connections, designed to enhance privacy and integrity of DNS lookups. It integrates technologies from Internet Engineering Task Force, World Wide Web Consortium, and major technology firms to carry DNS messages within HTTPS traffic between clients and resolvers. DoH aims to reduce on-path visibility of DNS queries that historically traversed unencrypted UDP or TCP channels to authoritative servers such as Verisign or ICANN-managed zones.
The Domain Name System originated in the early 1980s as part of ARPANET and was formalized by contributors like Paul Mockapetris and Jon Postel; it evolved through DNSSEC and extensions such as EDNS0. In response to pervasive packet inspection used by organizations including GCHQ, NSA, and commercial middleboxes, proposals to encrypt DNS traffic emerged alongside efforts like DNS over TLS and Oblivious DNS over HTTPS. The development of DoH drew on protocols standardized in IETF working groups including the IETF DNS PRIVSUM and related drafts that intersect with standards authored by Tim Berners-Lee proponents at the W3C.
DoH tunnels DNS messages encoded in binary or wire-format into HTTP/2 or HTTP/3 payloads, leveraging mechanisms specified in RFC 8212-family and modern transport stacks such as QUIC. Clients format queries and send them as HTTPS requests to DoH-capable resolvers run by operators like Google, Cloudflare, Mozilla Foundation-partner services, or enterprises using resolvers from vendors such as Cisco or Akamai. Servers respond with HTTP status and DNS answers, permitting caching layers used by content delivery networks like Fastly and Amazon CloudFront to accelerate responses. DoH uses TLS certificates issued by certificate authorities including Let's Encrypt or DigiCert for authentication and may interoperate with certificate transparency logs maintained by entities like Google Certificate Transparency.
DoH reduces passive on-path eavesdropping by actors such as Verizon Communications middleboxes or nation-state actors like Great Firewall of China apparatus, shifting visibility to the chosen DoH resolver operator. This centralization raises concerns about data consolidation with large providers including Alphabet Inc. and Cloudflare, Inc., which may impact surveillance patterns involving agencies like FBI or NSA. DoH does not substitute for end-to-end authentication mechanisms like DNSSEC and must be combined with validation libraries used by implementations from projects such as OpenSSL or BoringSSL. Threat models discussed by security researchers from Electronic Frontier Foundation, EFF and academic labs at MIT and Stanford University emphasize risks like traffic analysis by content platforms such as Facebook or interception in corporate networks operated by firms like Cisco Systems.
Major browser vendors including Mozilla and Google Chrome have implemented DoH clients, with configurations to use resolvers hosted by Cloudflare or Google Public DNS. Operating systems like Windows 10 and distributions such as Ubuntu and Fedora Project have explored native DoH support, while networking appliances from Juniper Networks and F5 Networks provide enterprise bridging. Open-source resolver projects like Unbound (software) and Knot DNS and DNS libraries in stacks from Node.js and Go (programming language) include DoH modules. Internet service providers such as Comcast and BT Group have faced adoption decisions balancing customer expectations and existing recursive resolver infrastructure.
DoH leverages HTTP/2 multiplexing and HTTP/3/QUIC features to mitigate latency associated with TCP/TLS handshakes, with edge caching practices used by Akamai Technologies and Cloudflare to improve throughput. However, in certain topologies involving middleboxes from Nokia or Huawei and enterprise proxies like Blue Coat Systems appliances, DoH can conflict with security controls that rely on plaintext DNS. Performance evaluations by teams at IETF meetings and research groups at ETH Zurich and University of California, Berkeley compare DoH latency, cache hit rates, and connection reuse against traditional DNS and DoT deployments run by operators such as Quad9.
Policy debates involve regulators and institutions including the European Commission, Federal Communications Commission, and national telecom regulators in countries such as Germany and India, weighing privacy benefits against concerns about circumventing content filtering mandates enforced by ministries or courts. Advocacy organizations including Access Now and Center for Internet and Society have argued for user choice and transparency, while ISPs and content-control vendors cite operational impacts seen in deployments by Sky plc and AT&T. Standards discussions in IETF and hearings involving policymakers reference similar disputes over centralization, lawful intercept practices under laws like those in United Kingdom and United States frameworks, and the balance between interoperability promoted by entities like IETF and national policies.
Category:Internet protocols