{"id":6129,"date":"2021-03-18T09:56:07","date_gmt":"2021-03-18T16:56:07","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=6129"},"modified":"2022-10-19T16:26:34","modified_gmt":"2022-10-19T23:26:34","slug":"dot-and-doh-impacts-for-service-providers-and-how-to-overcome-them","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/dot-and-doh-impacts-for-service-providers-and-how-to-overcome-them\/","title":{"rendered":"DoT and DoH Impacts for Service Providers \u2013 And How to Overcome Them"},"content":{"rendered":"<p>DNS over TLS (DoT) and DNS over HTTPS (DoH) are two new versions of DNS designed to encrypt the communication between DNS clients and recursive DNS servers. These are both good things by solving a longstanding &#8220;gap&#8221; where DNS queries were transmitted unencrypted. The unfortunate part of these things is how it has been implemented. Apple&#8217;s implementation, in particular, effectively changes the way DNS works at the operating system level.<\/p>\n<h3><strong>New Changes Bring New Problems<\/strong><\/h3>\n<p>So why do these new DNS privacy standards create problems? Let&#8217;s first talk briefly about one of the two protocols: DoT. DoT traffic is encrypted, but its use of a well-understood port (TCP port 853) makes it easier for network administrators to monitor and control encrypted DNS when it appears. Similar to standard DNS, it&#8217;s also used by a single stub resolver, making it easier to manage on a client-by-client basis. That makes it easy to control and monitor.<\/p>\n<p>DoH is the real troublemaker here. It leverages HTTPS to provide encryption and authentication between a DNS client and server. Still, since it uses the same TCP port (443) that all HTTPS traffic uses, it becomes a real challenge to troubleshoot DoH-related DNS issues because of the inability to distinguish DoH-based DNS requests from regular HTTPS requests. DoH relies on a handful of centralized and external cloud DNS providers. Users will essentially bypass existing corporate DNS services since DoH DNS requests are encrypted and invisible to third parties, including cybersecurity software that may rely on passive DNS monitoring to block requests to known malicious domains.<\/p>\n<p>But that&#8217;s not all. Apple&#8217;s recently released versions of iOS and macOS now support both DoT and DoH protocols. That\u2019s an important development as it affects a greater number of devices. For example, as users upgrade to newer versions of Apple&#8217;s operating systems, be it on their handhelds, tablets, desktops, and laptops, these changes are automatically deployed without user interaction.<\/p>\n<p>From an implementation standpoint, these settings can be applied selectively, ranging from the entire operating system through MDM profiles or network extension to individual applications or selected network requests of applications. The latter is the most interesting, where developers can create applications that use DoT and DoH directly from individual apps \u2013 and potentially introduces the potential for a proliferation of resolvers maintained by various entities. Beyond Apple, we expect future Microsoft operating systems to leverage similar implementations.<\/p>\n<h3><strong>Communications Service Providers Are Not Immune<\/strong><\/h3>\n<p>Communications service providers (CSPs) have invested heavily in their networks to provide a safe, reliable and fast network experience for their subscribers. We all are depending on the Internet more than ever. Beyond providing entertainment at home, for many, it is now their primary means for work, education and, for some people, their healthcare. CSPs rely on their DNS investment as a significant element of their network control plane to ensure fast network experiences and keep users safe from malware and other Internet-borne threats.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6130\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/DoT-DoH-impacts-1.png\" alt=\"\" width=\"755\" height=\"537\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DoT-DoH-impacts-1.png 755w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DoT-DoH-impacts-1-300x213.png 300w\" sizes=\"auto, (max-width: 755px) 100vw, 755px\" \/><\/p>\n<p>If CSP DNS infrastructure is no longer be in the path of subscriber DNS requests, they can&#8217;t offer DNS-based network-level content filtering and protection. That means that parental controls won&#8217;t work, and households with children will need to set up and manage parental controls on a per-device and even a per-application basis. And as I mentioned in a previous blog, parents are not keen on being sysadmins.<\/p>\n<p>Let&#8217;s not forget about security. With CSP infrastructure bypassed, DNS-based security controls that protect subscribers from common threats such as lookalike domains and malware sites are also bypassed, increasing exposure to data exfiltration and malware proliferation on the provider network. It&#8217;s one of the reasons why the United States National Security Agency (NSA) recently posted guidance that organizations host their own DoH resolvers and avoid sending internal DNS traffic to external third-party resolvers. Within months of being released, we saw malware that used DoH to encrypt malicious communications allowing it to hide in regular HTTPS traffic and install malware that can steal data or add a victim to a botnet.<\/p>\n<p>From a regulatory perspective, implementing regional or in-country obligations will be a significant challenge when there is no business relationship or legal authority over a company outside of the CSP&#8217;s network or country. Consider that CSPs must block access to pornography for children or block access to terrorist websites in many countries. How can providers meet these obligations if their content controls no longer reside on their network?<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6131\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/Dot-DoH-impacts-2.png\" alt=\"\" width=\"320\" height=\"312\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Dot-DoH-impacts-2.png 320w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Dot-DoH-impacts-2-300x293.png 300w\" sizes=\"auto, (max-width: 320px) 100vw, 320px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Last but not least: speed and performance. I stream\u2014a lot. And I can&#8217;t stand buffering. DNS is the first message to initiate most IP conversations, and low latency is critical to get the best performance and experience. That&#8217;s why many CSPs have invested in on-net content caching to provide subscribers with the best content experiences. DoT and DoH DNS requests will travel off-network, effectively bypassing this local on-net content. That means that some subscribers can receive less localized content or be directed to non-geographically optimal CDN caching locations.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6132\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/DoT-DoH-impacts-3.png\" alt=\"\" width=\"286\" height=\"290\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DoT-DoH-impacts-3.png 286w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DoT-DoH-impacts-3-75x75.png 75w\" sizes=\"auto, (max-width: 286px) 100vw, 286px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>And DNS is used to optimize connectivity to streaming video caches and other content based on the client computer&#8217;s IP address. With DoT and DoH, how CDNs localize clients (meaning, the ability to direct traffic to the most geographically optimal CDN caching node) is affected. If CSPs cannot view subscriber DNS queries, they may not be able to route subscribers to the geographically closest or most efficient CDN node.<\/p>\n<h3><strong>The Solution: Provide On-Network DoT and DoH Services<\/strong><\/h3>\n<p>Using DoT and DoH to encrypt traffic between DNS clients and recursive DNS servers is not going away (with the adoption of DoH taking the lead), and this adoption will only increase. The only way for CSPs to tame the beast is to deploy encrypted DNS servers on their networks. The solution? Offer on-premise DoT\/DoH capabilities to the subscriber base.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6133\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/DoT-DoH-impacts-4.png\" alt=\"\" width=\"760\" height=\"544\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DoT-DoH-impacts-4.png 760w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DoT-DoH-impacts-4-300x215.png 300w\" sizes=\"auto, (max-width: 760px) 100vw, 760px\" \/><\/p>\n<p>Luckily, Infoblox Encrypted DNS for CSPs provides efficient encryption while delivering Infoblox best-in-class DNS. Infoblox Encrypted DNS enables Infoblox to encrypt last-mile DNS communications between their endpoints and DNS servers regardless of which protocol the endpoint supports while solving performance concerns associated with the additional overhead related to encrypted DNS communications. The ability to accommodate encrypted DNS allows CSPs to maintain control over their DNS investment and continue to offer the safest and fastest experience possible with microsecond latency.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>DNS over TLS (DoT) and DNS over HTTPS (DoH) are two new versions of DNS designed to encrypt the communication between DNS clients and recursive DNS servers. These are both good things by solving a longstanding &#8220;gap&#8221; where DNS queries were transmitted unencrypted. The unfortunate part of these things is how it has been implemented. [&hellip;]<\/p>\n","protected":false},"author":296,"featured_media":4882,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[413,252,372],"class_list":{"0":"post-6129","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"tag-dot","9":"tag-doh","10":"tag-service-providers","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>DoT and DoH Impacts for Service Providers \u2013 And How to Overcome Them<\/title>\n<meta name=\"description\" content=\"DNS over TLS and DNS over HTTPS are versions of DNS encryption between DNS clients and servers. Lean how they can overcome service provider limitations here.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/dot-and-doh-impacts-for-service-providers-and-how-to-overcome-them\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DoT and DoH Impacts for Service Providers \u2013 And How to Overcome Them\" \/>\n<meta property=\"og:description\" content=\"DNS over TLS and DNS over HTTPS are versions of DNS encryption between DNS clients and servers. Lean how they can overcome service provider limitations here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/dot-and-doh-impacts-for-service-providers-and-how-to-overcome-them\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-18T16:56:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-19T23:26:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-higher-ed-optimize-automate-cybersecurity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"383\" \/>\n\t<meta property=\"og:image:height\" content=\"254\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"David Ayers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Ayers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dot-and-doh-impacts-for-service-providers-and-how-to-overcome-them\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dot-and-doh-impacts-for-service-providers-and-how-to-overcome-them\\\/\"},\"author\":{\"name\":\"David Ayers\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/35487e85615d4c73513a6cb6a1b30930\"},\"headline\":\"DoT and DoH Impacts for Service Providers \u2013 And How to Overcome Them\",\"datePublished\":\"2021-03-18T16:56:07+00:00\",\"dateModified\":\"2022-10-19T23:26:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dot-and-doh-impacts-for-service-providers-and-how-to-overcome-them\\\/\"},\"wordCount\":1064,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dot-and-doh-impacts-for-service-providers-and-how-to-overcome-them\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-higher-ed-optimize-automate-cybersecurity.jpg\",\"keywords\":[\"DoT\",\"DoH\",\"Service providers\"],\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dot-and-doh-impacts-for-service-providers-and-how-to-overcome-them\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dot-and-doh-impacts-for-service-providers-and-how-to-overcome-them\\\/\",\"name\":\"DoT and DoH Impacts for Service Providers \u2013 And How to Overcome Them\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dot-and-doh-impacts-for-service-providers-and-how-to-overcome-them\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dot-and-doh-impacts-for-service-providers-and-how-to-overcome-them\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-higher-ed-optimize-automate-cybersecurity.jpg\",\"datePublished\":\"2021-03-18T16:56:07+00:00\",\"dateModified\":\"2022-10-19T23:26:34+00:00\",\"description\":\"DNS over TLS and DNS over HTTPS are versions of DNS encryption between DNS clients and servers. Lean how they can overcome service provider limitations here.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dot-and-doh-impacts-for-service-providers-and-how-to-overcome-them\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dot-and-doh-impacts-for-service-providers-and-how-to-overcome-them\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dot-and-doh-impacts-for-service-providers-and-how-to-overcome-them\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-higher-ed-optimize-automate-cybersecurity.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-higher-ed-optimize-automate-cybersecurity.jpg\",\"width\":383,\"height\":254},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/dot-and-doh-impacts-for-service-providers-and-how-to-overcome-them\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"DoT and DoH Impacts for Service Providers \u2013 And How to Overcome Them\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/35487e85615d4c73513a6cb6a1b30930\",\"name\":\"David Ayers\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/david-ayers-image-96x96.png\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/david-ayers-image-96x96.png\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/david-ayers-image-96x96.png\",\"caption\":\"David Ayers\"},\"description\":\"David Ayers is a Senior Product Marketing Manager at Infoblox. He leads product marketing for the company's cloud partnerships, SASE and SD-WAN ecosystem, industry verticals, and MSSP segment. David's background covers pre-sales engineering, product management, and product marketing in demanding enterprise technology segments, including cloud infrastructure, managed services, network security, and critical networking services (DDI). He has worked at Verizon, Dell Technologies (Virtustream), Sun Microsystems, and Symantec. David has experience in North America and EMEA and is based in Frankfurt, Germany. He brings a global perspective, engaging directly with customers, partners, and field teams on both sides of the Atlantic.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/david-ayers\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DoT and DoH Impacts for Service Providers \u2013 And How to Overcome Them","description":"DNS over TLS and DNS over HTTPS are versions of DNS encryption between DNS clients and servers. Lean how they can overcome service provider limitations here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/dot-and-doh-impacts-for-service-providers-and-how-to-overcome-them\/","og_locale":"en_US","og_type":"article","og_title":"DoT and DoH Impacts for Service Providers \u2013 And How to Overcome Them","og_description":"DNS over TLS and DNS over HTTPS are versions of DNS encryption between DNS clients and servers. Lean how they can overcome service provider limitations here.","og_url":"https:\/\/www.infoblox.com\/blog\/community\/dot-and-doh-impacts-for-service-providers-and-how-to-overcome-them\/","og_site_name":"Infoblox Blog","article_published_time":"2021-03-18T16:56:07+00:00","article_modified_time":"2022-10-19T23:26:34+00:00","og_image":[{"width":383,"height":254,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-higher-ed-optimize-automate-cybersecurity.jpg","type":"image\/jpeg"}],"author":"David Ayers","twitter_card":"summary_large_image","twitter_misc":{"Written by":"David Ayers","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/dot-and-doh-impacts-for-service-providers-and-how-to-overcome-them\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/dot-and-doh-impacts-for-service-providers-and-how-to-overcome-them\/"},"author":{"name":"David Ayers","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/35487e85615d4c73513a6cb6a1b30930"},"headline":"DoT and DoH Impacts for Service Providers \u2013 And How to Overcome Them","datePublished":"2021-03-18T16:56:07+00:00","dateModified":"2022-10-19T23:26:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/dot-and-doh-impacts-for-service-providers-and-how-to-overcome-them\/"},"wordCount":1064,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/dot-and-doh-impacts-for-service-providers-and-how-to-overcome-them\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-higher-ed-optimize-automate-cybersecurity.jpg","keywords":["DoT","DoH","Service providers"],"articleSection":["Community"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/dot-and-doh-impacts-for-service-providers-and-how-to-overcome-them\/","url":"https:\/\/www.infoblox.com\/blog\/community\/dot-and-doh-impacts-for-service-providers-and-how-to-overcome-them\/","name":"DoT and DoH Impacts for Service Providers \u2013 And How to Overcome Them","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/dot-and-doh-impacts-for-service-providers-and-how-to-overcome-them\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/dot-and-doh-impacts-for-service-providers-and-how-to-overcome-them\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-higher-ed-optimize-automate-cybersecurity.jpg","datePublished":"2021-03-18T16:56:07+00:00","dateModified":"2022-10-19T23:26:34+00:00","description":"DNS over TLS and DNS over HTTPS are versions of DNS encryption between DNS clients and servers. Lean how they can overcome service provider limitations here.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/dot-and-doh-impacts-for-service-providers-and-how-to-overcome-them\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/dot-and-doh-impacts-for-service-providers-and-how-to-overcome-them\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/dot-and-doh-impacts-for-service-providers-and-how-to-overcome-them\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-higher-ed-optimize-automate-cybersecurity.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-higher-ed-optimize-automate-cybersecurity.jpg","width":383,"height":254},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/dot-and-doh-impacts-for-service-providers-and-how-to-overcome-them\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"DoT and DoH Impacts for Service Providers \u2013 And How to Overcome Them"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/35487e85615d4c73513a6cb6a1b30930","name":"David Ayers","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/david-ayers-image-96x96.png","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/david-ayers-image-96x96.png","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/david-ayers-image-96x96.png","caption":"David Ayers"},"description":"David Ayers is a Senior Product Marketing Manager at Infoblox. He leads product marketing for the company's cloud partnerships, SASE and SD-WAN ecosystem, industry verticals, and MSSP segment. David's background covers pre-sales engineering, product management, and product marketing in demanding enterprise technology segments, including cloud infrastructure, managed services, network security, and critical networking services (DDI). He has worked at Verizon, Dell Technologies (Virtustream), Sun Microsystems, and Symantec. David has experience in North America and EMEA and is based in Frankfurt, Germany. He brings a global perspective, engaging directly with customers, partners, and field teams on both sides of the Atlantic.","url":"https:\/\/www.infoblox.com\/blog\/author\/david-ayers\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6129","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/296"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=6129"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6129\/revisions"}],"predecessor-version":[{"id":8125,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6129\/revisions\/8125"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/4882"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=6129"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=6129"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=6129"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}