why and for what purpose? #2995
-
|
Hello, why do I need a DNS script if there are, for example, DNS over TLS and DNS Over https? What's the advantage? After all, dot and doh also encrypt traffic. Could you provide a link to download the Android app? |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 1 reply
-
AbstractThis document provides a technical comparison between DNSCrypt, DNS over TLS (DoT), and DNS over HTTPS (DoH).
This paper argues that DNSCrypt remains the most secure, efficient, and independent approach to encrypted DNS, while DoH and DoT suffer from structural and political limitations inherited from the web ecosystem. 1. IntroductionThe Domain Name System (DNS) remains a foundational Internet service—but also one of its greatest privacy weaknesses. Over the past decade, multiple encrypted DNS protocols have emerged:
DoT and DoH were introduced to integrate encrypted DNS into the TLS/HTTP ecosystem. DNSCrypt, in contrast, was engineered from first principles—to be fast, cryptographically authenticated, censorship-resistant, and independent of the CA system. 2. The Bootstrap Problem2.1 DoH/DoT BootstrappingDoH and DoT clients typically reference resolvers by hostname (e.g., This circular dependency creates serious issues:
In short, DoH/DoT depend on an insecure foundation for their initial connection. 2.2 DNSCrypt: No Bootstrap NeededDNSCrypt clients are configured with:
These are distributed in signed resolver lists such as Thus, DNSCrypt can send its very first packet already encrypted and authenticated, with no dependency on insecure DNS or PKI lookups. ✅ Result: 3. Protocol Design and Extensibility3.1 DoT: Rigid and Hard to EvolveDNS over TLS (DoT) was designed as a minimal wrapper: DNS inside a TLS session. For instance:
In other words, DoT is frozen around TLS’s limitations—every improvement requires new DNS-level hacks or complex RFC layering. 3.2 DoH: Even Heavier, HTTP-BoundDoH tunnels DNS inside HTTP requests, which are then wrapped in TLS or QUIC.
While this improves “integration” with browsers, it massively increases overhead. 3.3 DNSCrypt: Modular and Future-ProofDNSCrypt was designed as a standalone encrypted DNS protocol—simple, efficient, and extensible. It supports:
Adding new features (like new ciphers or padding rules) requires no protocol redesign or cross-layer dependencies. ✅ Result: 4. Security Model and Trust4.1 TLS PKI: The Weak Link of DoT and DoHDoT and DoH rely on the global web PKI. This introduces multiple risks:
This means control over DoH/DoT traffic can be exerted by:
4.2 DNSCrypt: Dedicated Keys, No CA DependencyDNSCrypt eliminates the CA system entirely:
Resolvers cannot be silently hijacked or spoofed without detection. ✅ Result: 5. Centralization and the CDN ProblemDoH was heavily promoted by major Content Delivery Networks (CDNs) such as Cloudflare and Google.
DoH’s deep integration into browsers (Firefox, Chrome, Edge) defaults users toward a few big resolvers—consolidating control of global DNS traffic into the hands of a few corporations. This is not privacy; it is recentralization under different owners. DNSCrypt, in contrast, was explicitly designed to be:
✅ Result: 6. Blocking and Censorship Resistance
6.1 DoT: Obvious TargetDoT’s dedicated port (853) makes it trivial for firewalls or ISPs to block. 6.2 DoH: Not as Resistant as ClaimedDoH’s use of HTTPS initially appeared censorship-resistant, but in practice:
6.3 DNSCrypt: Stealth and FlexibilityDNSCrypt avoids these issues:
✅ Result: 7. Performance and Real-World Latency7.1 UDP AdvantagesDNSCrypt’s UDP-based design delivers:
7.2 Real-World Data from
|
| Protocol | Average Latency | Connection Overhead | Parallelism | Transport | Relative Performance |
|---|---|---|---|---|---|
| DNSCrypt | Lowest | None (UDP) | Native | UDP/TCP | ⚡ |
| DoT | Moderate | 1-RTT (TLS) | Limited | TCP | ⚙️ |
| DoH (HTTP/3) | Highest | 1–2-RTT (QUIC) | HTTP multiplexed | QUIC | 🐢 |
✅ Result:
In the real world, DNSCrypt outperforms both DoT and DoH—including over QUIC.
8. Summary Comparison
| Feature | DNSCrypt | DoT | DoH |
|---|---|---|---|
| Standardization | IETF Draft (2025) | RFC 7858 | RFC 8484 |
| Bootstrap Required | ❌ No | ✅ Yes | ✅ Yes |
| Transport | UDP/TCP | TCP | HTTP/TLS/QUIC |
| PKI Dependency | ❌ None | ✅ Yes | ✅ Yes |
| Blocking Resistance | ✅ Strong | ❌ Weak | |
| Authenticity | ✅ Signed keys | ||
| Extensibility | ✅ Modular | ❌ Rigid | |
| Parallelism | ✅ Native | ❌ Serial | |
| Centralization Risk | ❌ Low | ⚙️ Medium | 🔥 High (CDNs) |
| Real-World Latency | ⚡ Lowest | ⚙️ Medium | 🐢 Highest |
9. Conclusion
Despite the IETF’s later standardization of DoT and DoH, DNSCrypt remains the most technically robust encrypted DNS protocol.
It offers:
- Encryption and authenticity from the first packet,
- Lower latency and simpler transport,
- Freedom from the TLS/CA ecosystem,
- True decentralization and resistance to corporate control,
- Real privacy and real-world efficiency.
DoT is rigid and easily blocked.
DoH is bloated, centralized, and falsely marketed as censorship-resistant.
DNSCrypt, by contrast, is lean and open.
Beta Was this translation helpful? Give feedback.
Abstract
This document provides a technical comparison between DNSCrypt, DNS over TLS (DoT), and DNS over HTTPS (DoH).
While DoT and DoH are standardized by the IETF, DNSCrypt—now also formalized as an IETF draft—continues to demonstrate superior technical properties:
This paper argues that DNSCrypt remains the most secure, efficient, and independent approach to encrypted DNS, while DoH and DoT suff…