DNS over HTTPS

Created
Updated
Author Nicolas Dorriere Reading 3 min

I publicly provide 2 DNS server endpoints using the HTTPS protocol. This means that the communication between your terminal and my DNS servers will be encrypted. If someone attempts a Man-in-the-Middle attack using mitmproxy, bettercap, or a simple tcpdump on port 53, they will be unable to see your traffic.

My servers use Adguard and Technitium as DNS software continuously updated.

The Adguard endpoint is useful for dispersing your DNS requests across more than 20 DNS over HTTPS servers, all hosted in Europe with extremely low latency. I have benchmarked each of them to create a curated list that respects privacy.

The Technitium endpoint is a unique DNS over HTTPS server, which can be useful for filling your list of dispersed servers, such as the one I offer above.

Regarding privacy, I host both services in separate LXC containers on my own equipment, connected to a low-latency fiber connection. I anonymize all IP addresses that connect to my DNS servers. I do not exploit any data and do not look at logs - I have better things to do... life is short 

 

🔮 Random Upstream

Software: AdGuard Home

Endpoint: https://doh-random-upstream.nicolas-dorriere.fr/dns-query

Features AdGuard Home: 

- self-hosted in France
- no filter
- no logging
- load-balancing mode
- dilution max 7.5%
- cache

Features Public Upstream: 

- keeps DNS traffic inside Europe
- 200ms max
- own recursion
- no Cloudflare
- no Google

Dilution

What is dilution? I've adopted this term to simply explain that each DNS request is systematically sent to a different DNS server, thus avoiding any notion of centralization by a single entity and reinforcing privacy.

The DNS servers of Cloudflare (1.1.1.1) or Google (8.8.8.8) concentrate too many DNS requests. They use your data to likely serve ads for Google, and for Cloudflare, likely to improve their products. 1.1.1.1 remains the recursive DNS server with the lowest latency in the world, ahead of Google and others.

The percentages in the table below show the number of requests dispatched to the different DNS servers present in Adguard's list. For example, for the server collecting the most requests, NextDNS, they will see a maximum of 7% of my DNS traffic. The public DNS server of DNSFORGE sees only 2.68% of my traffic.

We avoid centralization, as mentioned earlier, and achieve dilution. 
The more servers we have in our dilution list, the better your privacy will be.

DNS over HTTPS servers with low latency and respect for privacy (no logging, anonymization) are rare. That's why I offer a public endpoint to help improve the global privacy of internet users.

URL USED
https://dns.nextdns.io
:443
7.01%
https://dns.quad9.net
:443/
dns-query
6.74%
https://zero.dns0.eu
:443/
5.59%
https://cubedns.com
:443/
dns-query
5.31%
https://doh1.b-cdn.net
:443/
dns-query
4.08%
https://dns.nick-slowinski.de
:443/dns-query
3.86%
https://dns.digitale-gesellschaft.ch
:443
3.76%
https://dns.belnet.be
:443/dns-query
3.47%
https://doh.bortzmeyer.fr
:443/
3.45%
https://odvr.nic.cz
:443/doh
3.38%
https://dns.artikel10.org
:443/dns-query
3.32%
https://dns.silen.org
:443/dns-query
2.99%
https://ns2.4netguides.org
:443/dns-query
2.79%
https://adguard.bonis.de
:443/dns-query
2.71%
https://clean.dnsforge.de
:443/dns-query
2.68%
https://doh.cornes.me
:443/dns-query
2.45%
https://resolver.sunet.se
:443/dns-query
2.43%
https://dns.njal.la
:443/dns-query
2.15%
https://dns.lars-lehmann.net
:443/dns-query
2.14%
https://dns.t53.de
:443/dns-query
2.12%
https://dns.novg.net
:443/dns-query
2.12%
https://dns1.in-berlin.de
:443/dns-query
2.03%
https://dns.smartguard.io
:443/dns-query
1.96%
https://ns.data.haus
:443/dns-query
1.93%
https://dns.tls-data.de
:443/dns-query
1.91%
https://dukun.de
:443/dns-query
1.89%
https://eu1.dns.lavate.ch
:443/dns-query
1.74%
https://princez.uk
:443/dns-query
1.66%
https://dns.kescher.at
:443/dns-query
1.65%
https://dns.kerekes.xyz
:443/dns-query
1.61%
https://doh.ffmuc.net
:443/dns-query
1.59%
https://doh.lacontrevoie.fr
:443/dns-query
1.55%
https://dnspub.restena.lu
:443/dns-query
1.41%
https://dns.gayanalysing.co.uk
:443/dns-query
1.35%
https://abel.waringer-atg.de
:443/dns-query
1.31%
https://dns.switch.ch
:443/dns-query
1.08%
https://3dns.eu
:443/dns-query
0.69%

🍭 Own Recursion

Software: Technitium

Endpoint: https://doh-own-recursion.nicolas-dorriere.fr/dns-query

Features Technitium: 

- self-hosted in France
- own recursion
- no logging
- no filter
- cache
- DNSSEC
- 250ms speed

Features Public Upstream: no public upstream

Clients

I'm using YogaDNS on Windows to connect to my DoH servers; the free version is more than enough.

https://yogadns.com/

DNSSEC

What is DNSSEC? Dive into DNSimple's fun, illustrated comic to learn all about it!

https://howdnssec.works/