The following are services that have been announced by large organisations -  they support DNS Privacy on anycast networks. 

A list of experimental DOT test servers (including those run by the Stubby developers) is available on the Test Servers page.


DNS-over-TLS (DOT)

Details are provided in the  Stubby config file for users who want to enable them.

Hosted byIP addressesTLS PortsHostname for TLS
authentication
Base 64 encoded form of SPKI pin(s) for TLS
authentication (RFC7858)
Notes
Quad9 'secure'

9.9.9.9
2620:fe::fe

853dns.quad9.netQuad9 do NOT publish or recommend use of SPKI pins with their servers.
See https://quad9.net and their FAQ for details of privacy, logging and filtering policies on the main and alternative addresses(1).
UDP and TCP service are also available on these addresses.

Quad9 'insecure'

9.9.9.10
2620:fe::10

853dns.quad9.net
Cloudflare

1.1.1.1 or 1.0.0.1
2606:4700:4700::1111 or 2606:4700:4700::1001

853cloudflare-dns.comCloudflare do NOT publish or recommend use of SPKI pins with their servers.

https://blog.cloudflare.com/announcing-1111/
https://blog.cloudflare.com/dns-resolver-1-1-1-1/
PRIVACY POLICY: https://developers.cloudflare.com/1.1.1.1/commitment-to-privacy/privacy-policy/privacy-policy/

And also see https://labs.apnic.net/?p=1127 for details of the APNIC/Cloudflare agreement as mentioned on the Register.

UDP and TCP service are also available on these addresses. DNS-over-HTTPS is also available!

NOTE: To use this service by name only (i.e resolve the IP from the name) use 1dot1dot1dot1.cloudflare-dns.com.

CleanBrowsingVarious, see the CleanBrowsing website853Various, see the CleanBrowsing websiteNot published

https://cleanbrowsing.org/privacy

This service provides different end points with different filters (security, family, adult) so visit the website to select the end point with the filter you prefer. NOTE: also does DoH.


DNS-over-HTTPS (DOH)

This list seems to be the most up to date list available of DoH severs https://github.com/curl/curl/wiki/DNS-over-HTTPS#publicly-available-servers

Details of Cloudflare service and privacy policies:

Hosted byURLNotes
Cloudflare

https://cloudflare-dns.com/dns-query

https://developers.cloudflare.com/1.1.1.1/dns-over-https/


PRIVACY POLICY: https://developers.cloudflare.com/1.1.1.1/commitment-to-privacy/privacy-policy/privacy-policy/
And also see https://labs.apnic.net/?p=1127 for details of the APNIC/Cloudflare agreement as mentioned on the Register.

Cloudflarehttps://mozilla.cloudflare-dns.com/dns-query

This server is announced as part of the Firefox Nightly shield study.
It has a different (stronger) privacy policy than the general Cloudflare DoH server above:
https://developers.cloudflare.com/1.1.1.1/commitment-to-privacy/privacy-policy/firefox/

CleanBrowsingVarious, see the CleanBrowsing websiteThis service provides different end points with different filters (security, family, adult) so visit the website to select the end point with the filter you prefer.

Google also support DNS-over-HTTPS in two ways

  • No labels

1 Comment

  1. Here is another DOH server with a stronger privacy agreement:

    Hosted by:
    Cloudflare

    URL
    https://mozilla.cloudflare-dns.com/dns-query

    Notes:

    Firefox contracted Cloudflare to set up this DOH server with a strong privacy agreement. This makes it different to the other DOH server of Cloudflare that does not have "mozilla" in its URL.

    Privacy agreement at https://developers.cloudflare.com/1.1.1.1/commitment-to-privacy/privacy-policy/firefox/

    More information at https://blog.nightly.mozilla.org/2018/06/01/improving-dns-privacy-in-firefox/