
The DNS Operations, Analysis, and Research Center (DNS-OARC) met for two days in Edinburgh in May 2026. The topic of using encrypted DNS transports for communication between recursive resolvers and authoritative services in the DNS was discussed at this meeting, and I’d like to share my impressions of this work.
Much has been said about the use of the DNS to track the online behaviour of individual users, and for online censorship and control. Almost every online transaction starts with a DNS query, and with the complete set of DNS queries generated by an individual user, it would be possible to assemble a relatively complete profile of their online activity.
For many years, the use of DNS to observe the activities of others received little attention. The release of the Snowden papers in 2013 raised the prominence of sensitivities over state and private digital mass surveillance. This episode brought significant attention to the topic of DNS privacy, as the DNS name resolution protocol has been sadly lacking in some basic protections. By default, DNS queries and responses are in the clear, which makes the DNS prone to hostile man-in-the-middle manipulation and eavesdropping.
Stub to recursive
There have been some responses to try to mitigate these DNS privacy issues. One is to make eavesdropping and manipulation harder by using encryption for DNS transactions. The DNS Privacy Working Group of the IETF (DRPIVE) generated several specifications that introduced channel encryption and remote server authentication through DNS over Transport Layer Security (DoT), DNS over QUIC (DoQ) and DNS over HTTPS (DoH), collectively referred to as ‘DoX’.
Compared to a simple UDP transaction, the overheads of setting up a TCP session and then establishing an encrypted session context are high, even if you combine these two tasks with QUIC. This would be an unsustainable overhead if the stub resolver was not able to reuse this session for all of its queries to the recursive resolver. Because it can, the cost of the initial session establishment can be amortised over all subsequent queries. What remains is the tradeoff between:
- Encryption and decryption
- The avoidance of UDP fragmentation, DNS truncation, and TCP follow-up
These DoX tools apply to the connection between the ‘stub’ resolver operated in the user’s environment and the recursive resolver. They can be applied when the recursive resolver is operated by the user’s Internet Service Provider (ISP) (though the net change in the security stance is minimal, as the ISP is already in a privileged position with respect to the user’s traffic). They make much more sense when the user uses a remote open resolver, passing DNS traffic across open Internet segments. In the traffic profile of a large open DNS recursive resolver, the use of DoH and DoT is significant, at 15% and 10% of the query load as seen by Cloudflare’s 1.1.1.1 service. While I do not have access to data from large-scale retail ISPs’ recursive resolvers, I suspect that the DoX query levels are much smaller in that localized context.
Recursive to authoritative
However, this is just one part of the DNS privacy story. The second part is the DNS traffic between the recursive resolver and DNS authoritative servers.
Arguably, this second part is less of an individual privacy concern, as the end user’s identity (in the form of the user’s current IP address) is not carried in these queries. However, there is still some information exposure, both in the queries themselves and in the possibility of response interception or response substitution. It’s still a privacy and resilience problem, but different to the stub-to-recursive step. If an attacker can successfully alter a response from an authoritative server, it will be loaded into the recursive resolver’s cache, and then will be used to answer subsequent stub queries for the ensuing cache lifetime (commonly termed ‘cache poisoning’).
An approach to reducing the information exposure risk in the recursive-to-authoritative path is to perform DNS Query Name Minimisation (RFC 9516, ‘DNS Query Name Minimisation to Improve Privacy’, November 2021). Here, during the process of nameserver discovery, each authoritative nameserver is presented with a query name that is stripped to just one label more than the longest matching domain name for which the nameserver is known to be authoritative. A QTYPE is selected by the resolver to possibly obscure the original query’s QTYPE. This has proved to be quite popular in DNS recursive resolvers, and a measurement study performed in 2020 indicated that 18% of the Internet user population passed their queries through recursive resolvers that performed Query Name Minimisation.
Another approach is described in RFC 9539, ‘Unilateral Opportunistic Deployment of Encrypted Recursive-to-Authoritative DNS’. This opportunistic form of Authoritative DNS over encrypted transport (ADoX) uses encryption without authentication (RFC 7435, ‘Opportunistic Security: Some Protection Most of the Time’, December 2014).
A recent study, presented at OARC 46, looked at the support of ADoX in authoritative nameservers. This study found that the authoritative servers for 3,074,281 (0.93%) registered domains support some form of ADoX, and if you look at the IP addresses of these nameservers, then 2,585 (0.32%) unique nameservers support ADoX.
A comparable study of resolver behaviour using Atlas probes found no recursive resolvers used ADoQ, and just 44 probes were behind recursive resolvers that used ADoT, mostly operated by the Quad9 open resolver service. For all practical purposes, deployment of ADoX has stalled. Authoritative servers see little benefit in supporting ADoX if no recursive resolver will use it, and the incremental support costs on the server are far higher than stateless UDP transactions. Recursive resolvers see no point in supporting ADoX queries if no authoritative servers support them as well.
This opportunistic approach to ADoX has downsides. It takes several round-trip intervals to attempt a TLS/TCP or QUIC connection with the authoritative nameserver. For a single query, the encrypted transport overhead is higher than a simple UDP transaction. Unlike encryption on the stub-to-resolver path, there is no certainty of session reuse. While subsequent queries can be almost as efficient as UDP, there is no assurance that there will be a subsequent query to this authoritative nameserver from the recursive resolver. While the channel is encrypted, the server is not authenticated in this opportunistic encryption framework. It would be safer to also perform DNS Security Extensions (DNSSEC) validation for signed domains to provide assurance of the authenticity of the response.
The upside to using ADoX transport is that large responses can be handled, and experimental approaches to DNSSEC Validation, such as CHAIN Query Requests (RFC 7901, ‘CHAIN Query Requests in DNS’, June 2016).
Another approach is to signal the capabilities of the nameserver using the same DNS resource record that denotes a label as a delegation point. This is essentially the DELEG record, which builds upon the Service Binding (SVCB) construct that places several information fields in a single DNS response.
DELEG is not a minor tweak to the NS record, but represents a major change to the DNS architecture. It alters the DNS framework by loading parent zones with information that the label is a delegation point with the delegated zone’s nameservers, and may add the nameserver’s cryptographic keys, IP addresses, and protocol capabilities into this single record. The label is also part of the parent zone, which implies that for DNSSEC-signed zones, these DELEG records are signed by the parent’s signing key.
In this context, the role of DELEG is very straightforward: To communicate the ADoX capabilities of a delegated zone’s servers to a recursive resolver, and do so in a ‘strict’ manner so that if the resolver does not support the matching ADoX channel, then no resolution may be performed. In DELEG there is no need for opportunistic probing, as the capabilities of the authoritative servers for the delegated domain are enumerated in the DELEG record.
The role of DNSSEC validation in the DNS is to provide assurance about the DNS response. DNSSEC does not provide assurance about the resolver’s traversal within the DNS namespace from parent to child when resolving a name, if such a traversal has even occurred (the response may have been generated from the resolver’s cache). Unlike the parent-size NS record, the DELEG record is DNSSEC-signed in the parent zone, but the DNSSEC model does not necessarily make resolution any more robust if each DELEG delegation is independently validated before use.
Is this ADoX work little more than an academic exercise? Shifting the entire DNS from a set of lightweight UDP transactions to a sequence of encrypted sessions is not a step to be taken lightly. Warnings about ‘catastrophic consequences’ were part of the discussion on this topic at the OARC workshop.
Right now, the specifications of opportunistic ADoX and DELEG are indeed mostly ‘paper exercises’. It’s still the case that the Internet’s framework to protect the authenticity of online transactions is based on X.509 domain name certificates, and this approach does not rely on assurance of the DNS name resolution outcomes.
It is certainly feasible to inject false information into the DNS in many ways, and the consequence is that end users may be misled into contacting a false service endpoint. Channel encryption in ADoX does make some potential attack vectors far harder, but other attack vectors remain, and the overall problem of assurance in the DNS resolution process remains.
If the application service is using TLS (such as HTTPS), then the server is forced to demonstrate its knowledge of the private key associated with the domain name, and if it cannot do so then the transaction should be abandoned. Does ADoX or DELEG alter this picture in any way? Absolutely not!
In a weaker formulation of the same question, could ADoX be used as a substitute for DNSSEC-signing of resource records? Again, the answer is absolutely not! ADoX is about how a recursive resolver resolves a name, whereas DNSSEC is about how a user can be assured of the authenticity of the result, no matter how it was obtained! They are complementary approaches and mutually substitutable.
A security purist stance would apply strict controls over every step in the process of resolving a DNS name, from validating the authenticity of signed DELEG records, to opening up an encrypted and endpoint-validated transport session with each authoritative nameserver, and DNSSEC-validating the result of the resolution operation. But the pragmatic question is whether service providers, and ultimately users, are willing to pay the incremental time and transaction cost penalties associated with the application of such stringent controls.
So far, what we observe is that fast and low-cost options are heavily favoured by users and service providers alike. Rather than attempting to validate every step in the DNS name resolution process, we favour a fast and cheap DNS resolution process in the clear (with its attendant risks). The authentication function is pushed back to the application layer in the form of the TLS handshake. The DNS provider and DNS resolution operators bear none of the incremental costs of assuring authenticity.
Attempting to push the cost of assurance back to the name resolution infrastructure seems to me to be a regressive step that will see considerable resistance from the name infrastructure operators. To put it in different words, the DPRIVE agenda stopped at the hurdle of recursive-to-authoritative queries simply because there was insufficient interest in running with this infrastructure model in the public Internet.
Is this work going anywhere useful?
What’s the future for encrypting the recursive-to-authoritative hop in the DNS? I’m not sure that I can point to any assured future here for this work. The underlying issue is that the economics of this space are working against DNS infrastructure operators. Having to absorb the additional costs of running encrypted sessions in the absence of any prospect of incremental revenue is not a sensible business decision!
For the user, the use of the DNS remains largely free of incremental query cost. We’ve been able to preserve this property by ensuring that service authenticity assurance is largely provided by TLS as an application service, rather than as an attribute of DNS resolution. I’m not sure that this picture will change in the foreseeable future.
The presentations at OARC 46 can be found online.
The views expressed by the authors of this blog are their own and do not necessarily reflect the views of APNIC. Please note a Code of Conduct applies to this blog.