What is DNS over HTTPS (DoH)?
Traditional DNS sends your queries in plain text, which means your ISP and anyone on the network can see every website you look up. DNS over HTTPS encrypts those queries so they stay private.
Quick Answer
DNS over HTTPS (DoH) encrypts DNS queries by sending them through HTTPS connections on port 443, the same port used by regular secure web traffic. This prevents ISPs, network operators, and attackers from seeing or tampering with your DNS lookups. Most modern browsers including Chrome, Firefox, and Edge support DoH. You can enable it in your browser settings under Privacy or Security. Popular DoH providers include Quad9 (9.9.9.9), Cloudflare (1.1.1.1), and Google (8.8.8.8).
The Problem with Traditional DNS
Standard DNS sends every query as plain text over UDP. When you type a URL into your browser, the DNS request travels unencrypted across your network, through your ISP, and to the DNS resolver. Anyone with access to that path can read it.
This creates several problems. Your ISP can log every domain you visit and sell that data to advertisers. Public Wi-Fi operators can monitor your browsing habits. Attackers on the same network can intercept and modify DNS responses, redirecting you to malicious sites (this is DNS cache poisoning). In some countries, governments use DNS monitoring to censor websites.
DNS over HTTPS solves this by wrapping DNS queries inside encrypted HTTPS connections. The query still reaches a DNS resolver, but nobody between you and the resolver can see what you asked.
How DNS over HTTPS Works
With traditional DNS, your browser sends a plain text UDP packet to a DNS resolver on port 53. With DoH, the browser instead sends the DNS query as an HTTPS request to a DoH-compatible resolver on port 443.
Because port 443 is the same port used by every HTTPS website, DoH traffic is indistinguishable from normal web browsing. A network observer can see that you connected to Cloudflare's server, but they cannot tell whether you loaded a webpage or made a DNS query.
DoH vs DoT: What is the Difference?
DNS over TLS (DoT) is another protocol that encrypts DNS queries. Both protect your queries from being read in transit, but they work differently.
| DNS over HTTPS (DoH) | DNS over TLS (DoT) | |
|---|---|---|
| Port | 443 (shared with HTTPS) | 853 (dedicated) |
| Protocol | HTTPS (HTTP/2 or HTTP/3) | TLS |
| Visibility | Blends with web traffic, hard to block | Uses a unique port, easy to identify and block |
| Browser support | Chrome, Firefox, Edge, Brave, Safari | Android 9+, some Linux resolvers |
| Best for | Personal privacy, bypassing censorship | Enterprise networks, system-wide encryption |
For most users, DoH is the easier option since it works directly in your browser without any system-level configuration. DoT is more common in enterprise and mobile device deployments where administrators manage DNS settings centrally.
How to Enable DNS over HTTPS
Chrome
Go to Settings > Privacy and Security > Security > scroll to "Use secure DNS". Toggle it on and select a provider (Cloudflare, Google, or custom).
Firefox
Go to Settings > Privacy & Security > scroll to "DNS over HTTPS". Select "Max Protection" or "Increased Protection" and choose a provider. Firefox uses Cloudflare by default for US users.
Edge
Go to Settings > Privacy, search, and services > Security > "Use secure DNS". Toggle it on and select a provider.
Windows 11
Go to Settings > Network & Internet > your connection > DNS server assignment > Edit. Enter a DoH-compatible DNS address (like 1.1.1.1) and set encryption to "Encrypted only (DNS over HTTPS)".
Android
Go to Settings > Network & Internet > Private DNS. Select "Private DNS provider hostname" and enter dns.google or one.one.one.one. Note: Android uses DoT, not DoH, but the privacy benefit is the same.
Note: Windows 10 does not support DoH natively. You need Windows 11 or a browser-level setting to use encrypted DNS on Windows 10.
Popular DoH Providers
| Provider | DoH URL | Focus |
|---|---|---|
| Cloudflare | https://cloudflare-dns.com/dns-query | Speed + privacy |
| https://dns.google/dns-query | Reliability | |
| Quad9 | https://dns.quad9.net/dns-query | Security + malware blocking |
| NextDNS | https://dns.nextdns.io | Customizable filtering |
For a comparison of these providers and others, see our guide on best public DNS servers.
What DoH Does Not Protect
DoH is an important privacy improvement, but it is not a complete solution. Understanding its limits helps you make informed decisions about your security setup.
Your DoH provider can still see your queries
DoH encrypts the connection between you and the resolver, but the resolver itself sees every query. If you use Google's DoH, Google knows which domains you look up. Choose a provider whose privacy policy you trust.
IP addresses are still visible
After DNS resolves a domain to an IP address, your device connects to that IP. Network observers can see the destination IP in packet headers even with DoH enabled. They may not know the exact URL, but they can often infer the website from the IP.
Does not replace DNSSEC
DoH encrypts the transport but does not verify the authenticity of DNS data. DNSSEC is still needed to ensure that DNS records have not been tampered with at the source.
Can break enterprise security tools
Organizations that monitor DNS traffic for security (blocking malware domains, enforcing access policies) lose visibility when DoH is enabled. This is why some corporate networks disable DoH on managed devices.
How to Verify DoH is Working
After enabling DoH, verify that it is active:
Cloudflare test
Visit https://1.1.1.1/help in your browser. It shows whether your DNS queries are using DoH, DoT, or plain DNS.
Browsing Leak test
Visit https://browserleaks.com/dns to see which DNS resolver your browser is using. If it shows your DoH provider instead of your ISP, DoH is working.
You can also use DNSFly's DNS Propagation Checker to verify that your domain resolves consistently across global DNS servers, regardless of whether individual users have DoH enabled or not.
Check Your DNS Configuration
Verify your domain's DNS records are resolving correctly across 21 global servers.