What Are DoT and DoH, and How Do They Impact Your DNS?

The Domain Name System (DNS) is a foundational element of the internet. It translates human-readable domain names into IP addresses so users can access websites and online services. Traditionally, DNS queries are sent in plaintext, leaving them vulnerable to interception, manipulation, and surveillance. To address these concerns, two protocols have been introduced: DNS over TLS (DoT) and DNS over HTTPS (DoH). Both aim to encrypt DNS traffic and improve privacy and security, but they differ significantly in implementation and impact.

Understanding Traditional DNS Vulnerabilities

DNS queries are typically transmitted using the User Datagram Protocol (UDP) over port 53. These queries are unencrypted, meaning that any intermediary between the client and the DNS resolver—such as internet service providers (ISPs), network administrators, or malicious actors—can observe and even manipulate the traffic. This creates several risks, including:

  • Monitoring user behavior and web activity
  • DNS spoofing or cache poisoning
  • Redirection to malicious domains
  • Targeted censorship or filtering

DoT and DoH were developed to mitigate these risks by securing the DNS transport layer.

What Is DNS over TLS (DoT)?

DNS over TLS is a security protocol that encrypts DNS queries using Transport Layer Security (TLS). It establishes a secure communication channel between the DNS client (resolver) and server, thereby ensuring confidentiality and integrity.

DoT operates over TCP port 853. The process involves a TLS handshake between the client and the resolver, after which encrypted DNS queries are exchanged.

Key Characteristics of DoT

  • Uses a dedicated port (853), making it distinguishable from other traffic
  • Encrypts DNS queries and responses using standard TLS
  • Generally implemented at the system or network level (e.g., on routers, operating systems)

Benefits of DoT

  • Ensures that DNS queries cannot be read or modified in transit
  • Provides better integration with enterprise network security policies
  • Allows network-level control and monitoring of DNS traffic

Limitations of DoT

  • May be blocked in environments where port 853 is restricted
  • Requires TCP and TLS handshakes, introducing minimal additional latency
  • Less effective at bypassing censorship compared to DoH

What Is DNS over HTTPS (DoH)?

DNS over HTTPS performs the same function as DoT—encrypting DNS traffic—but encapsulates DNS queries within HTTPS packets. This allows DNS requests to be transmitted over TCP port 443, the same port used for standard secure web traffic.

DoH uses the same HTTP/2 or HTTP/3 protocol stack and integrates directly with web browsers and applications.

Key Characteristics of DoH

  • Uses port 443, making DNS traffic indistinguishable from regular HTTPS traffic
  • Typically operates at the application level (e.g., browsers such as Firefox, Chrome)
  • Enables DNS resolution even in restrictive network environments

Benefits of DoH

  • Harder to block or filter due to its use of HTTPS
  • Provides a high level of privacy for end-users
  • Helps bypass restrictive DNS-based content filtering

Limitations of DoH

  • Can override local DNS settings, reducing administrative control
  • Complicates enterprise DNS filtering, monitoring, and logging
  • May introduce additional processing overhead due to the HTTP layer

Comparing DoT and DoH

FeatureDNS over TLS (DoT)DNS over HTTPS (DoH)
Port853443
TransportTLS over TCPHTTPS over HTTP/2 or HTTP/3
VisibilityEasily identifiableObfuscated in HTTPS traffic
Use CaseSystem or network-levelApplication-level
ControlSupports DNS policyCan bypass DNS policies
PrivacyHighVery high

Performance Considerations

Both DoT and DoH introduce additional latency due to the overhead of establishing a secure connection. The extent of this latency depends on several factors, including resolver performance, network conditions, and implementation efficiency. DoH may add slightly more overhead because of the HTTP layer, but the difference is typically negligible for most users.

Additionally, modern implementations support session reuse, multiplexing, and optimized TLS configurations, helping reduce performance impact.

Operating System and Browser Support

Support for DoT and DoH varies across platforms:

  • Android 9 and newer include native DoT support under “Private DNS” settings.
  • Windows 11, macOS, and Linux distributions have begun integrating native support for DoH and DoT.
  • Firefox and Chrome include built-in DoH resolvers (e.g., Cloudflare, Google) that operate independently of system settings.

This variability can lead to conflicting configurations, especially in enterprise environments where central DNS policy enforcement is important.

Security and Privacy Implications

DoT and DoH significantly improve the security of DNS by preventing eavesdropping and tampering. However, they also introduce new challenges:

  • Enterprises may lose visibility into DNS traffic unless DoT/DoH is managed at the gateway level.
  • Malware can leverage encrypted DNS to communicate with command-and-control servers undetected.
  • Centralized DoH resolvers may become single points of surveillance if privacy policies are not transparent.

Therefore, while these protocols enhance privacy, proper configuration and resolver trust are critical.

Deployment and Implementation

Organizations looking to adopt encrypted DNS should evaluate their specific needs and infrastructure. Available options include:

  • Using public DoT/DoH resolvers such
  • Deploying local resolvers (e.g., Unbound, BIND) that support DoT/DoH upstream
  • Configuring secure DNS at the network perimeter (e.g., firewalls, routers)
  • Monitoring encrypted DNS traffic with specialized tools or SIEM integrations

Conclusion

DoT and DoH represent a major advancement in DNS privacy and security. By encrypting DNS queries, they protect user activity from surveillance and tampering. While both protocols offer strong protections, they differ in terms of visibility, control, and deployment complexity.

Organizations must weigh the trade-offs between privacy, performance, and policy enforcement when choosing to implement DoT, DoH, or a combination of both. Ultimately, adopting encrypted DNS is a necessary step toward a more secure and private internet.

A Quick Guide to TCP Monitoring vs. UDP Monitoring

In the world of networking, understanding the differences between TCP and UDP is crucial for network performance, security, and troubleshooting. Two of the most widely used transport protocols in network communications, Transmission Control Protocol (TCP) and User Datagram Protocol (UDP), function very differently and require distinct approaches to monitoring. In this blog post, we’ll compare TCP monitoring vs. UDP monitoring, exploring their key differences, why monitoring both is essential, and best practices for each type of protocol monitoring.

What is TCP Monitoring?

So in our detailed guide about Transmission Control Protocol Monitoring vs. User Datagram Protocol Monitoring, we will start fir about explaining what is TCP protocol. TCP (Transmission Control Protocol) is a connection-oriented protocol, meaning that before any data is sent, a connection between the sender and receiver is established. TCP ensures reliable communication by tracking packets, retransmitting lost packets, and managing flow control. As such, TCP monitoring focuses on analyzing this connection process, checking for packet loss, network congestion, connection delays, and ensuring reliable data transmission.

Key aspects to monitor when dealing with TCP traffic include:

  • Connection establishment: Monitoring the process of setting up and tearing down TCP connections (i.e., the handshake process).
  • Packet retransmissions: TCP’s reliability comes from retransmitting lost or corrupted packets, and excessive retransmissions can indicate network issues.
  • Round-trip time (RTT): Measuring the time it takes for a packet to travel to the destination and back.
  • Throughput: Monitoring the amount of data being transferred and ensuring it matches expected bandwidth levels.
  • Timeouts and resets: Detecting failed or prematurely closed connections, which can be indicative of performance or security issues.

What is UDP Monitoring?

UDP (User Datagram Protocol), in contrast to TCP, is a connectionless protocol. This means there’s no formal connection established before data is transmitted, and no guarantees of delivery, ordering, or error checking. UDP is typically used in applications where speed is prioritized over reliability, such as live streaming, gaming, and voice communications. UDP monitoring focuses on performance metrics that assess the health of real-time communications, including packet loss, jitter, and delays.

When monitoring UDP traffic, the key aspects to watch out for include:

  • Packet loss: Since UDP doesn’t have built-in retransmission, packet loss can significantly affect performance in real-time applications.
  • Latency: The time it takes for a UDP packet to travel from the sender to the receiver. High latency can cause delays in voice or video calls, making it crucial to monitor.
  • Jitter: The variation in delay between packets. High jitter can result in poor quality in streaming or voice calls.
  • Throughput: Measuring the volume of data transmitted and ensuring it meets performance expectations for applications such as VoIP or video conferencing.

Key Differences Between TCP Monitoring vs. UDP Monitoring

While both TCP and UDP traffic are integral to modern networking, the monitoring approaches for each protocol differ significantly due to their distinct characteristics:

1. Connection and Reliability

  • TCP Monitoring:
    • TCP is connection-oriented and guarantees data delivery. Therefore, TCP monitoring focuses on monitoring the connection’s state, ensuring that the handshake process completes successfully, and that there is no packet loss or corruption. If packets are dropped, TCP will attempt to retransmit them, and this behavior must be tracked during monitoring.
  • UDP Monitoring:
    • UDP is connectionless and does not guarantee delivery. UDP monitoring is concerned with identifying dropped packets, as there is no retransmission of lost data. This is particularly important for real-time applications, where packet loss can severely impact quality.

2. Error Handling and Performance Metrics

  • TCP Monitoring:
    • TCP is robust in error detection and correction, making it possible to track packet retransmissions, connection resets, and overall data integrity. TCP monitoring can also detect network congestion, bandwidth issues, and potential timeouts, helping to identify problems before they affect application performance.
  • UDP Monitoring:
    • UDP does not handle errors, so UDP monitoring focuses on measuring packet loss, jitter, and latency, which are crucial for real-time applications. For instance, excessive packet loss in a video conference or online game can cause lag, delays, or dropped frames, and monitoring UDP traffic helps identify these issues.

3. Traffic Behavior

  • TCP Monitoring:
    • TCP traffic tends to be more predictable and reliable due to the connection-based nature of the protocol. Monitoring TCP traffic focuses on verifying that data is delivered in order and on time, checking for retransmissions and connection issues that may affect overall performance.
  • UDP Monitoring:
    • UDP traffic is generally less predictable due to the lack of connection management. Since UDP doesn’t establish a formal connection, there’s a higher risk of packet loss, latency, and jitter. UDP monitoring is essential for tracking the impact of these issues on time-sensitive applications like VoIP or live video streaming.

4. Use Cases

  • TCP Monitoring:
    • TCP is used in applications that require reliable data transfer, such as HTTP, FTP, and email protocols (SMTP, IMAP). TCP monitoring is vital in environments where data integrity and reliability are essential, ensuring that users can rely on uninterrupted, high-quality service.
  • UDP Monitoring:
    • UDP is commonly used for real-time applications such as VoIP, online gaming, video streaming, and DNS queries. UDP monitoring focuses on ensuring that these applications perform optimally, with minimal packet loss and latency, and with acceptable levels of jitter.

Why is Monitoring TCP vs. UDP Traffic Important?

Both TCP monitoring vs. UDP monitoring serve unique roles in ensuring network performance and reliability. Monitoring both protocols is crucial for several reasons:

  • Performance Optimization: By monitoring both types of traffic, network administrators can ensure that applications are performing at their best. TCP monitoring can identify bottlenecks and delays in connection setup, while UDP monitoring ensures that real-time applications experience minimal disruption.
  • Security: Malicious attacks, such as Distributed Denial-of-Service (DDoS) or network infiltration, often manifest in abnormal traffic patterns. By monitoring both TCP and UDP traffic, administrators can spot unusual spikes in activity, unexpected packet loss, or unauthorized access attempts.
  • Troubleshooting: Issues like slow website loading, packet loss, and connection timeouts can often be traced back to specific protocols. TCP monitoring can help detect retransmissions and slow connection issues, while UDP monitoring can pinpoint packet loss or jitter problems in time-sensitive applications.

Best Practices for TCP and UDP Monitoring

  1. Establish Baselines: Understanding what normal traffic looks like for both TCP and UDP is essential. Baseline performance metrics help identify unusual behavior and potential issues.
  2. Use Specialized Monitoring Tools: Some tools offer specialized features for monitoring both TCP and UDP traffic, giving network administrators insights into performance, connection health, and error rates.
  3. Focus on Key Metrics: For TCP monitoring, focus on connection performance, retransmissions, and round-trip times. For UDP monitoring, prioritize packet loss, latency, and jitter.
  4. Set Alerts for Anomalies: Setting up alerts for high retransmission rates (TCP) or excessive packet loss (UDP) will help identify problems before they affect users.
  5. Monitor Real-Time Applications: For UDP traffic, real-time monitoring is crucial. Track metrics that impact streaming or VoIP applications and ensure minimal disruptions.

Conclusion

In the debate of TCP monitoring vs. UDP monitoring, both protocols require careful and distinct monitoring approaches to maintain a healthy network. TCP monitoring focuses on ensuring reliable, ordered data delivery, while UDP monitoring is concerned with ensuring optimal performance for real-time applications, where speed is critical and minor packet loss is tolerated.

By understanding the differences between TCP and UDP, and knowing when and how to monitor each, you can ensure your network runs smoothly, identify performance issues quickly, and optimize your systems for security and reliability. Whether you’re supporting web traffic, email servers, VoIP calls, or live streaming, TCP monitoring vs. UDP monitoring plays a critical role in keeping your network secure and efficient.