DNSCrypt
E835285
DNSCrypt is a security protocol that authenticates and encrypts DNS traffic between a user’s device and a DNS resolver to prevent spying, spoofing, and tampering.
Statements (50)
| Predicate | Object |
|---|---|
| instanceOf |
DNS privacy technology
ⓘ
security protocol ⓘ |
| authenticates | communication between client and DNS resolver ⓘ |
| canBeCombinedWith |
Tor
NERFINISHED
ⓘ
VPNs ⓘ |
| category |
DNS security extension
ⓘ
Internet security protocol ⓘ |
| competesWith |
DNS over HTTPS
NERFINISHED
ⓘ
DNS over QUIC NERFINISHED ⓘ DNS over TLS NERFINISHED ⓘ |
| designedFor |
end-user privacy
ⓘ
integrity of DNS responses ⓘ |
| developedBy |
Frank Denis
NERFINISHED
ⓘ
OpenDNS NERFINISHED ⓘ |
| doesNotProvide |
anonymity by itself
ⓘ
content encryption beyond DNS layer ⓘ |
| encrypts |
DNS queries
ⓘ
DNS responses ⓘ |
| hasComponent |
DNSCrypt client
ⓘ
DNSCrypt resolver NERFINISHED ⓘ |
| hasVersion |
DNSCrypt v1
NERFINISHED
ⓘ
DNSCrypt v2 NERFINISHED ⓘ |
| implementedIn |
dnscrypt-proxy
NERFINISHED
ⓘ
dnscrypt-wrapper ⓘ dnsdist ⓘ various router firmware distributions ⓘ |
| improvesOver | unencrypted DNS ⓘ |
| initialReleaseYear | 2011 ⓘ |
| isBackwardCompatibleWith | traditional DNS at resolver side ⓘ |
| isOpenStandard | false ⓘ |
| license | varies by implementation (dnscrypt-proxy is ISC-licensed) ⓘ |
| operatesOn |
port 443 (often, via DNSCrypt-over-HTTPS-like setups or tunneling)
ⓘ
port 53 (in some configurations) ⓘ |
| prevents |
DNS eavesdropping
ⓘ
DNS man-in-the-middle attacks ⓘ DNS spoofing ⓘ DNS tampering ⓘ |
| protects | DNS traffic ⓘ |
| requires |
client-side DNSCrypt software
ⓘ
supporting DNSCrypt resolver ⓘ |
| standardizedBy | none (not an IETF standard) ⓘ |
| supports |
TCP transport
ⓘ
UDP transport ⓘ |
| supportsFeature |
forward secrecy (in newer versions / configurations)
ⓘ
multiple encryption algorithms (depending on version) ⓘ resolver public key discovery via DNS stamps ⓘ |
| usedFor |
bypassing DNS-level censorship (depending on resolver)
ⓘ
protecting DNS traffic on untrusted networks ⓘ |
| uses |
asymmetric cryptography
ⓘ
public-key cryptography ⓘ |
Referenced by (1)
Full triples — surface form annotated when it differs from this entity's canonical label.