How to enable DNS-over-HTTPS (DoH) support in Google Chrome to the DNS server with encryption and transmission over a secure channel
How DNS-over-HTTPS works
By default, DNS queries are sent unencrypted, which opens up opportunities for unauthorized parties to track network preferences and manipulate DNS traffic, for example, when organizing phishing attacks.
DNS over HTTPS technology solves this problem by encrypting DNS requests. The secure HTTPS protocol is used to enhance security and privacy. When you use DoH, your DNS requests can no longer be tracked by third parties, and cannot be modified by attackers.
Google has made the decision to implement public DNS over HTTPS support starting with Chrome 83 . The developers felt that this change would not interfere with the existing system DNS configuration. By default, the browser will use DNS over HTTPS for the DNS provider installed on the system, provided that it supports this protocol.
In other words, the system DNS settings will not change. Another advantage of this approach is that DNS-level filtering of adult content or malware remains active.
Chrome will switch to regular (unencrypted) DNS if problems are encountered during the search. The browser will not use secure DNS at all if parental controls are active on Windows systems or if certain corporate policies are set.
How to enable DNS-over-HTTPS support in Chrome
Use a secure DNS server
Enabling DNS-over-HTTPS support is available in the security settings of the Chrome browser:
- Type in the address bar
chrome://settings/security
(or go to Settings> Privacy & Security> Security ). There you will find a new option Use secure DNS server that you need to enable. - By default, the option Use current service provider is offered . The browser will use DNS over HTTPS for the DNS provider installed on the system , provided that it supports this protocol. Google Public DNS , Cisco OpenDNS , Cloudflare , Quad9, and Comss.one DNS support DNS over HTTPS.
- In the menu Use> Personalized you can specify any other secure DNS server with DNS-over-HTTPS support - for example, Comss.one DNS :
https://dns.comss.one/dns-query
How to check if DNS-over-HTTPS is working
You can test DNS operation using the DNS Leak Test service (click the Extended test button ). Make sure that all DNS servers found are for the service specified in the settings, for example Cisco OpenDNS: