When using DoH, custom DNS requests are sent to a DNS resolver that supports this protocol. Resolver is a computer that the provider uses to search the database for a specific node requested by the user.
The resolver then encrypts the request and sends it over HTTPS to an authoritative DNS server. It responds with an encrypted response, which is sent back to the converter and decrypted, after which it is returned to the user.
DoH Protocol Functions
DoH increases the level of confidentiality of DNS requests that can be intercepted by third parties, which can lead to the disclosure of private information. This takes place by encrypting DNS requests and user responses — third parties, such as Internet service providers, cannot see the content of DNS requests and responses, which makes it difficult to track user activity on the network.
DoH also increases the security of DNS requests by using HTTPS encryption. DoH can help prevent DNS spoofing attacks, in which an attacker intercepts a DNS request and returns a malicious IP address instead of a legitimate one. DoH helps prevent such attacks because an attacker cannot imperceptibly change an encrypted request. In addition, requests involving DoH are less likely to be blocked or modified by gate-keepers.