Skip to content

Commit 564bb4e

Browse files
Create placeholder page, reorder, and adjust Encryption index
1 parent ec95254 commit 564bb4e

File tree

5 files changed

+21
-3
lines changed

5 files changed

+21
-3
lines changed

src/content/docs/1.1.1.1/encryption/dns-over-https/index.mdx

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ title: DNS over HTTPS
44
slug: 1.1.1.1/encryption/dns-over-https
55
sidebar:
66
label: About DoH
7+
order: 5
78
---
89

910
import { DirectoryListing } from "~/components"

src/content/docs/1.1.1.1/encryption/dns-over-tls.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,8 @@
22
pcx_content_type: concept
33
title: DNS over TLS
44
slug: 1.1.1.1/encryption/dns-over-tls
5+
sidebar:
6+
order: 4
57
---
68

79
By default, DNS is sent over a plaintext connection. DNS over TLS (DoT) is one way to send DNS queries over an encrypted connection. Cloudflare supports DNS over TLS on standard port 853 and is compliant with [RFC 7858](https://tools.ietf.org/html/rfc7858). With DoT, the encryption happens at the transport layer, where it adds TLS encryption on top of a TCP connection.

src/content/docs/1.1.1.1/encryption/dnskey.mdx

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,8 @@ head:
55
- tag: title
66
content: Supported DNSKEY signature algorithms
77
slug: 1.1.1.1/encryption/dnskey
8-
8+
sidebar:
9+
order: 7
910
---
1011

1112
[DNSSEC is a protocol](https://www.cloudflare.com/learning/dns/dns-records/dnskey-ds-records/) that adds a layer of security to the domain name system (DNS). DNSSEC does this by providing authentication through public signing keys using two DNS records: DNSKEY and DS. They can be used to verify DNSSEC signatures in [RRSIG records](https://www.cloudflare.com/dns/dnssec/how-dnssec-works/).

src/content/docs/1.1.1.1/encryption/index.mdx

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,8 +12,12 @@ slug: 1.1.1.1/encryption
1212

1313
Traditionally, DNS queries and replies are performed over plaintext. They are sent over the Internet without any kind of encryption or protection, even when you are accessing a secured website. This has a great impact on security and privacy, as these queries might be subject to surveillance, spoofing and tracking by malicious actors, advertisers, ISPs, and others.
1414

15-
To prevent this and secure your connections, 1.1.1.1 supports [DNS over TLS (DoT)](/1.1.1.1/encryption/dns-over-tls/) and [DNS over HTTPS (DoH)](/1.1.1.1/encryption/dns-over-https/), two standards developed for encrypting plaintext DNS traffic. This prevents untrustworthy entities from interpreting and manipulating your queries.
15+
To prevent untrustworthy entities from interpreting and manipulating your queries, 1.1.1.1 supports different standards to encrypt plaintext DNS traffic and improve DNS privacy:
16+
17+
- [DNS over TLS (DoT)](/1.1.1.1/encryption/dns-over-tls/)
18+
- [DNS over HTTPS (DoH)](/1.1.1.1/encryption/dns-over-https/)
19+
- [Oblivious DNS over HTTPS (ODoH)](/1.1.1.1/encryption/oblivious-dns-over-https/)
1620

1721
You can also [configure your browser](/1.1.1.1/encryption/dns-over-https/encrypted-dns-browsers/) to secure your DNS queries.
1822

19-
If you need to secure connections in your smartphone, refer to 1.1.1.1's [iOS](/1.1.1.1/setup/ios/) or [Android](/1.1.1.1/setup/android/) apps.
23+
If you need to secure connections in your smartphone, refer to 1.1.1.1 [iOS](/1.1.1.1/setup/ios/) or [Android](/1.1.1.1/setup/android/) apps.
Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
---
2+
pcx_content_type: concept
3+
title: Oblivious DNS over HTTPS
4+
slug: 1.1.1.1/encryption/oblivious-dns-over-https
5+
sidebar:
6+
order: 6
7+
label: Oblivious DoH
8+
---
9+
10+
As announced on [our blog](https://blog.cloudflare.com/oblivious-dns/), since late 2020, Cloudflare supports Oblivious DNS over HTTPS (ODoH).

0 commit comments

Comments
 (0)