[GH-ISSUE #38] Feature request: RFC 7858, DNS over TLS #26

Closed
opened 2026-03-07 22:18:05 +03:00 by kerem · 8 comments
Owner

Originally created by @farrokhi on GitHub (Aug 22, 2016).
Original GitHub issue: https://github.com/hickory-dns/hickory-dns/issues/38

I just finished reading your article about this implementation and noticed that you are working on DNSCrypt integration. I thought maybe it would be a better idea to be the first project to put support for RFC 7858 (DNS over TLS) in a production grade client/server.

Originally created by @farrokhi on GitHub (Aug 22, 2016). Original GitHub issue: https://github.com/hickory-dns/hickory-dns/issues/38 I just finished reading your article about this implementation and noticed that you are working on DNSCrypt integration. I thought maybe it would be a better idea to be the first project to put support for [RFC 7858](https://tools.ietf.org/html/rfc7858) (DNS over TLS) in a production grade client/server.
kerem 2026-03-07 22:18:05 +03:00
Author
Owner

@bluejekyll commented on GitHub (Aug 22, 2016):

I was looking at that. It looks like it would definitely be capable of covering the same use case. I definitely have some issues with DNSCrypt, what I like about this is I can make use of more off-the-shelf tools.

One advantage of DNSCrypt is that it supports UDP. It looks like the UDP portion of DNSoD is still in draft form, but making progress.

Maybe this would be a good thing to target. I'll look into it.

<!-- gh-comment-id:241470694 --> @bluejekyll commented on GitHub (Aug 22, 2016): I was looking at that. It looks like it would definitely be capable of covering the same use case. I definitely have some issues with DNSCrypt, what I like about this is I can make use of more off-the-shelf tools. One advantage of DNSCrypt is that it supports UDP. It looks like the UDP portion of DNSoD is still in draft form, but making progress. Maybe this would be a good thing to target. I'll look into it.
Author
Owner

@bluejekyll commented on GitHub (Jan 17, 2017):

FYI, working on this now. It shouldn't be difficult to get this done client side, server side will take longer to get proper configs ready.

<!-- gh-comment-id:273046431 --> @bluejekyll commented on GitHub (Jan 17, 2017): FYI, working on this now. It shouldn't be difficult to get this done client side, server side will take longer to get proper configs ready.
Author
Owner

@bluejekyll commented on GitHub (Jan 23, 2017):

End-to-end TLS done. I added some ease of use stuff to the rust-openssl library, going to wait to see if that is accepted. I can continue on with integrating into the server configuration. Progress can be tracked in https://github.com/bluejekyll/trust-dns/tree/dns_over_tls

There will probably need to be some updates made to native-tis for the server side, so this change may be dependent on multiple upstream libraries, which means merging into master is still a little off.

<!-- gh-comment-id:274422991 --> @bluejekyll commented on GitHub (Jan 23, 2017): End-to-end TLS done. I added some ease of use stuff to the `rust-openssl` library, going to wait to see if that is accepted. I can continue on with integrating into the server configuration. Progress can be tracked in https://github.com/bluejekyll/trust-dns/tree/dns_over_tls There will probably need to be some updates made to `native-tis` for the server side, so this change may be dependent on multiple upstream libraries, which means merging into master is still a little off.
Author
Owner

@bluejekyll commented on GitHub (Feb 5, 2017):

Just pushed server side implementations. Tests are forth-coming.

If anyone would care to review, I'd definitely appreciate it.

<!-- gh-comment-id:277503026 --> @bluejekyll commented on GitHub (Feb 5, 2017): Just pushed server side implementations. Tests are forth-coming. If anyone would care to review, I'd definitely appreciate it.
Author
Owner

@bluejekyll commented on GitHub (Feb 7, 2017):

macOS support is done through the use of native-tls, and security-framework. I still need to get Linux support done, which requires an abstraction over some of the certificates on the client and server side.

<!-- gh-comment-id:277921517 --> @bluejekyll commented on GitHub (Feb 7, 2017): macOS support is done through the use of native-tls, and security-framework. I still need to get Linux support done, which requires an abstraction over some of the certificates on the client and server side.
Author
Owner

@bluejekyll commented on GitHub (Feb 12, 2017):

I've run into some issues on the Linux side. If anyone is interested in helping me figure this out, that would be awesome:

https://github.com/sfackler/rust-native-tls/issues/20

<!-- gh-comment-id:279240039 --> @bluejekyll commented on GitHub (Feb 12, 2017): I've run into some issues on the Linux side. If anyone is interested in helping me figure this out, that would be awesome: https://github.com/sfackler/rust-native-tls/issues/20
Author
Owner

@bluejekyll commented on GitHub (Feb 15, 2017):

Ok, fixed in the rust-openssl library: https://github.com/sfackler/rust-openssl/pull/582

<!-- gh-comment-id:279936334 --> @bluejekyll commented on GitHub (Feb 15, 2017): Ok, fixed in the rust-openssl library: https://github.com/sfackler/rust-openssl/pull/582
Author
Owner

@bluejekyll commented on GitHub (Feb 25, 2017):

landed in master... I'll be working on a 0.10.0 release.

<!-- gh-comment-id:282469652 --> @bluejekyll commented on GitHub (Feb 25, 2017): landed in master... I'll be working on a 0.10.0 release.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/hickory-dns#26
No description provided.