What, if any, Public DNS is preferred?
-
NextDNS is the move, the clients are open sourced and they encrypt everything. Plus their free option covers all my devices, no problem. High recommended!
-
Regular DNS can be monitored, intercepted, and modified however your ISP decides, even with you specifying custom DNS servers.
I run pihole on my LAN, with cloudflared as its upstream DNS. Cloudflared translates regular DNS into DOH using cloudflare and quad9 as the upstream DOH providers (configurable).
Finally I block all port 53 (dns) traffic at the router so it cannot leave my LAN. All LAN devices that want regular DNS are forced to use the LAN DNS server which wraps their requests in DOH for them. (as well as blocking ads, tracking/telemetry, and known malware sites)
-
A simple solution is Quad9 aka 9.9.9.9. NextDNS is fairly simple but allows customization.
-
Cloudflare 1.1.1.1
Google 8.8.8.8 or 8.8.4.4 -
Controld.com. I use their free version that blocks ads and online tracking and malware.
-
Adguard DNS, so I can block ads in my entire house without having to invest in a PiHole. dns.adguard-dns.com More IPs
-
Check out PrivacyGuides. They have recommendations for DNS including what others have commented
-
I've been using Adguard public DNS for over a year across my LAN and it works great, with much less hassle than a pihole, which I previously used for years.
I miss the ability to add random hosts to either black or white lists, but in reality only used it sporadically.
-
Adguard Home supports TLS, HTTPs, QUIC and other stuff natively, in case anyone reading wants to set up a pihole equivalent with less work for encrypted DNS.
https://github.com/AdguardTeam/AdGuardHome/wiki/Configuration#upstreams
-
I use a local unbound DNS server on my router with Quad9 as upstream. I actually have google DNS entirely blocked/rerouted on my router because google uses it for advertising tracking, but I get creepers out by targeted ads showing up in random places when I do do something on a totally unrelated site. Most important thing, though, is to use DNSSEC or DNS over HTTPS to reduce middlemen from using your DNS info to track what sites you visit and sell that data. Of course ISPs still see the destination of all of your data for tracking what sites you visit unless you use a VPN or similar tools, so you can't hide it from them that way.
-
What ISP do you use that makes you trust Cloudflare more than your ISP? You must really be between a rock and a hard place.
-
In regards to all the answers in this thread, consider: If you're not paying for it with money, then what are you paying for it with?
The most private DNS is a recursive resolver.
-
If you need a traditional, unencrypted DNS service, check out Quad9 and AdGuard's Public DNS. If you can use DoT or DoH, use LibreDNS or Mullvad DNS. If you want more customization, check out NextDNS.
-
Do you have the local unbound server respond to DoH so that the browser also uses encrypted client hello?
-
nextdns or mullvad?
-
-
Even DNSCrypt, but I think nobody really uses that.
-
DNSSEC is a means of authenticating the data receives was not tampered with, such as MITM attacks, thus ensuring data integrity. It uses PKI but it's not an alternative to DoH or DoT which encrypts the DNS traffic, either over HTTPS or TLS, providing confidentiality.
DNSSEC can be used in conjunction with DoH or DoT to achieve the Security CIA triad - Confidentiality, Integrity, Authenticity.
-
Why would you need cloudflared? Can't you justbset DoH/DoT servers as a backend in Pi-Hole?
-
Pihole doesn't directly support DOH, linked is their official guide for implementing it: using cloudflared.