DNS over TLS encrypts your DNS queries using a dedicated TLS connection on port 853, providing device-wide DNS privacy. Learn how DoT works, how it compares to DoH, and how to set it up.
DNS over TLS (DoT) is a protocol that encrypts DNS queries by establishing a TLS (Transport Layer Security) connection between your device and a DNS resolver. Standardized in RFC 7858 (May 2016), DoT uses a dedicated port (853) to transport encrypted DNS traffic.
Without encryption, traditional DNS queries are sent in plaintext over port 53. Anyone on the network path — your ISP, a Wi-Fi operator, or a malicious actor — can see which domains you resolve. DoT encrypts this communication using the same TLS protocol that secures HTTPS websites.
Unlike DNS over HTTPS (DoH), which wraps DNS inside HTTPS traffic, DoT uses its own dedicated port. This makes DoT easier for network administrators to identify and manage, which is why it's the preferred choice for enterprise and device-wide deployments.
When your device needs to resolve a domain name, DoT encrypts the query before sending it:
example.com) is sent through the encrypted TLS tunnel.The TLS connection can be reused for multiple queries, reducing the overhead of repeated handshakes. This makes DoT efficient for sustained use across many DNS lookups.
Both DoT and DoH encrypt DNS queries, but they serve different use cases:
| DNS over TLS (DoT) | DNS over HTTPS (DoH) | |
|---|---|---|
| Port | 853 (dedicated port) | 443 (same as HTTPS) |
| Protocol | TLS over TCP | HTTPS / HTTP/2 |
| Scope | Device-wide (OS-level) | Per-browser or per-app |
| Visibility | Identifiable on the network (port 853) | Blends with regular web traffic |
| Best for | Mobile devices, routers, enterprise/MDM | Individual browsers, privacy-focused users |
| Native support | Android 9+ (Private DNS), many routers | Chrome, Firefox, Edge, Safari, Brave |
Which should you use? For mobile devices and managed fleets, DoT is generally the better choice because it works at the OS level. For browser-specific protection, DoH is simpler to configure. Many organizations use both. See our Encrypted DNS overview for a complete comparison.
DoT works well with DNS-based content filtering when configured to use a filtering-aware resolver. When you point DoT at CleanBrowsing, your DNS queries are encrypted in transit but still filtered at the resolver.
This is especially effective for mobile devices. On Android 9+, the built-in Private DNS setting supports DoT natively — once configured, all DNS traffic from every app is encrypted and filtered through CleanBrowsing.
For managed device fleets, DoT can be pushed via MDM platforms:
CleanBrowsing supports DoT across all filters with a global anycast network.
family-filter-dns.cleanbrowsing.orgadult-filter-dns.cleanbrowsing.orgsecurity-filter-dns.cleanbrowsing.orgPaid customers get a private DoT hostname unique to their filtering configuration:
Custom DoT hostname: custom[code].dot.cleanbrowsing.org
Replace [code] with the unique key from your CleanBrowsing dashboard.
For a full walkthrough of all encrypted DNS protocols we support (DoH, DoT, and DNSCrypt), see our Encrypted DNS setup guide.
DoT is supported natively on Android 9+ and many routers. Here are our setup guides:
You can verify your DoT configuration is working by visiting our DNS Leak Test — the results should show CleanBrowsing as your DNS provider.
For advanced verification, use kdig to test the TLS connection directly:
kdig @family-filter-dns.cleanbrowsing.org +tls-ca +tls-host=family-filter-dns.cleanbrowsing.org example.com