DNS over HTTPS (DoH) activation in Chrome

Below we will show you how to enable support for DNS over HTTPS (or simply DoH) protocol protection in Google Chrome.

We will use a setting that runs from the command line.

The process is not that complicated, and the following guide will show you all the steps you need to add DoH support to the Chrome you are using.

DNS over HTTPS

What is DNS over HTTPS and how does it work?

DNS over HTTPS is a relatively new protocol, having been around for about two years.

It works just like the DNS protocol, which means that its main purpose is to get the domain name (eg iguru.gr) that a user enters in a browser, to send a query to a DNS server to learn the numeric IP address of the web server hosted by iGuRu.gr.

But the classic DNS protocol sends this request in plain text, which anyone can see, while DoH packs its DNS queries with HTTPS encrypted traffic.

The main advantage of DoH is that the protocol not only hides the requests sent to the DNS and the responses between a huge HTTPS traffic stream that moves through the Internet every second. This means that third-party observers will not be able to process DNS requests to guess what the user may be trying to access.

This design makes the DoH protocol very useful for bypassing end-user security.

Mozilla already supports the DoH protocol. DoH support in Firefox can be activated very easily.

But what about Chrome?

DoH works very well in Chrome, but there is no user interface to enable or configure it.

You need to use a command line setting to enable DoH support in Chrome. This is a set of additional instructions that are passed to executable Chrome at startup.

Let's see how it works:

Find the Chrome shortcut. It may be on your taskbar, desktop, start menu, or elsewhere in your file system.

Then right-click the Chrome shortcut and select Properties.

DNS over HTTPS

In the Target field, add the following text at the end of the shortcut path and click Save.

--enable-features="dns-over-https<DoHTrial" --force-fieldtrials="DoHTrial/Group1" --force-fieldtrial-params="DoHTrial.Group1:server/https%3A%2F%2F1.1.1.1%2Fdns-query/method/POST

The text above will configure Chrome to use the Cloudflare DoH server. You can choose anyone other DoH server you want.

The entire command is as follows (including chrome.exe).

chrome.exe --enable-features="dns-over-https<DoHTrial" --force-fieldtrials="DoHTrial/Group1" --force-fieldtrial-params="DoHTrial.Group1:server/https%3A%2F%2Fcloudflare-dns%2Ecom%2Fdns-query/method/POST

If Chrome is already running, restart it. Otherwise, start Chrome.
To check if Chrome supports the DoH protocol, open the address https://1.1.1.1/help.

On the right where it says "Using DNS over HTTPS (DoH)", the page should say "Yes."

iGuRu.gr The Best Technology Site in Greeceggns

Get the best viral stories straight into your inbox!















Written by giorgos

George still wonders what he's doing here ...

4 Comments

Leave a Reply
  1. I don't think-except for 3's luck in any case
    Now that we are all increasingly using Vpn
    why deliberately make a DNS leak? B.C
    I adjusted the DOH (checkers and DOTs) - worse even at speed (in ping / province) so probably dnscrypt / tordns better.
    Useful for simple things - bypass isp if piratebay is cut ..
    By default it will monitor half of the planet directly. They are backed by the secret services anyway.

    + Last time I posted a comment .. iGuru also popped up
    I hope we don't have the same thing with Secnews ..

    Nicolas

  2. Okay - thanks for the articles and update, and congratulations
    but..
    That way you don't even put one on watch and record you, and sell you?
    whether it is cloudflare or google or a more "private" dns provider.
    Anyway your ISP will download that page you requested eg. so ..
    can still track and record you.
    and any third party

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).