@@ -881,7 +881,7 @@ similar proposals to achieve this outcome, with the IETF having
881881standardized both DNS over TLS (DoT) in RFC 7858, and DNS over HTTPS
882882(DoH) in RFC 8484. There is some debate about the merits of each but
883883for the purposes of our discussion the differences are not terribly
884- significant.
884+ significant.
885885
886886The basic idea behind both approaches is simple enough. Rather than sending DNS
887887queries and responses as plaintext UDP datagrams, the DNS client
@@ -910,7 +910,7 @@ making the queries. The resolver has access to all the client requests
910910in unencrypted form, which would seem to be a requirement for those
911911requests to be served. However, there have been efforts to improve the
912912privacy of client requests using a technique known as *Oblivious
913- DNS *.
913+ DNS *.
914914
915915.. _fig-odns :
916916.. figure :: figures/odns.png
@@ -937,14 +937,14 @@ deployments already available of both the proxy and target
937937behavior. Notably, Apple has built a privacy-focused service that
938938combines oblivious DNS with several other technologies to support
939939private browsing. Large CDN operators such as Cloudflare have support
940- for the target function.
940+ for the target function.
941941
942942.. _reading_doh :
943943.. admonition :: Further Reading
944944
945945 Hu, Z., et al. `Specification for DNS over Transport Layer
946946 Security (TLS) <https://www.rfc-editor.org/info/rfc7858> `__. RFC 7858, May 2016.
947-
947+
948948 Hoffman, P. and P. McManus. `DNS Queries over HTTPS (DoH)
949949 <https://www.rfc-editor.org/info/rfc8484> `__. RFC 8484,
950950 October 2018.
0 commit comments