Skip to main content
Redhat Developers  Logo
  • Products

    Platforms

    • Red Hat Enterprise Linux
      Red Hat Enterprise Linux Icon
    • Red Hat AI
      Red Hat AI
    • Red Hat OpenShift
      Openshift icon
    • Red Hat Ansible Automation Platform
      Ansible icon
    • View All Red Hat Products

    Featured

    • Red Hat build of OpenJDK
    • Red Hat Developer Hub
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenShift Dev Spaces
    • Red Hat OpenShift Local
    • Red Hat Developer Sandbox

      Try Red Hat products and technologies without setup or configuration fees for 30 days with this shared Openshift and Kubernetes cluster.
    • Try at no cost
  • Technologies

    Featured

    • AI/ML
      AI/ML Icon
    • Linux
      Linux Icon
    • Kubernetes
      Cloud icon
    • Automation
      Automation Icon showing arrows moving in a circle around a gear
    • View All Technologies
    • Programming Languages & Frameworks

      • Java
      • Python
      • JavaScript
    • System Design & Architecture

      • Red Hat architecture and design patterns
      • Microservices
      • Event-Driven Architecture
      • Databases
    • Developer Productivity

      • Developer productivity
      • Developer Tools
      • GitOps
    • Automated Data Processing

      • AI/ML
      • Data Science
      • Apache Kafka on Kubernetes
    • Platform Engineering

      • DevOps
      • DevSecOps
      • Ansible automation for applications and services
    • Secure Development & Architectures

      • Security
      • Secure coding
  • Learn

    Featured

    • Kubernetes & Cloud Native
      Openshift icon
    • Linux
      Rhel icon
    • Automation
      Ansible cloud icon
    • AI/ML
      AI/ML Icon
    • View All Learning Resources

    E-Books

    • GitOps Cookbook
    • Podman in Action
    • Kubernetes Operators
    • The Path to GitOps
    • View All E-books

    Cheat Sheets

    • Linux Commands
    • Bash Commands
    • Git
    • systemd Commands
    • View All Cheat Sheets

    Documentation

    • Product Documentation
    • API Catalog
    • Legacy Documentation
  • Developer Sandbox

    Developer Sandbox

    • Access Red Hat’s products and technologies without setup or configuration, and start developing quicker than ever before with our new, no-cost sandbox environments.
    • Explore Developer Sandbox

    Featured Developer Sandbox activities

    • Get started with your Developer Sandbox
    • OpenShift virtualization and application modernization using the Developer Sandbox
    • Explore all Developer Sandbox activities

    Ready to start developing apps?

    • Try at no cost
  • Blog
  • Events
  • Videos

Strengthen privacy and security with encrypted DNS in RHEL

How to enable DNS over TLS on Red Hat Enterprise Linux

September 17, 2025
Dominika Borges Pavel Březina Francisco Trivino Garcia
Related topics:
Security
Related products:
Red Hat Enterprise Linux

Share:

    In today's digital landscape, security is a top priority. You're likely already using encryption at the application layer, but is your DNS traffic as secure? Your applications can leak valuable information to your internet service provider (ISP) and other network observers through unencrypted DNS queries. 

    Your computer constantly sends out DNS queries, quietly translating human-friendly names like company-server.redhat.com into IP addresses. These essential requests often travel over the network in plain, unencrypted text. This isn’t a minor detail; it’s an exploitable vulnerability.

    An unencrypted DNS query is like sending a postcard through the mail; anyone can read what's on it. An encrypted DNS query, on the other hand, is like sending a sealed letter; only the intended recipient can read it.

    Eavesdroppers on the same network, such as a malicious actor, an internet service provider, or a state-sponsored entity, can see a complete log of every domain you access. This exposes sensitive information about your organization's operations, users, and even potential intellectual property. Even worse, these plaintext queries are vulnerable to DNS spoofing, which is when an attacker can trick your system into connecting to a fake website or server. This can lead to data theft, malware infections, or critical security breaches.

    Traditional DNS simply doesn't meet modern security demands.

    From plaintext DNS to zero trust

    This is where encrypted DNS becomes a fundamental building block for modern enterprise security. In a zero trust model, no user or device is trusted by default, regardless of its location on the network. Every connection and every access request must be verified. Plaintext DNS, which openly reveals communication patterns and potential targets, stands in direct opposition to this principle.

    By encrypting your DNS queries, you eliminate a significant blind spot and achieve secure, verifiable name resolution. This strengthens your entire network infrastructure against internal and external threats. This crucial step directly aligns with mandates like the Moving the U.S. Government Toward Zero Trust Cybersecurity Principles (M-22-09) memorandum and demonstrates a commitment to end-to-end data protection. It's not just about a single feature; it's about building a more resilient, modern, and trustworthy infrastructure.

    Introducing DNS over TLS for Red Hat Enterprise Linux

    DNS over TLS (DoT) is a new capability on Red Hat Enterprise Linux 10 and 9.6, available as a Technology Preview. This is the first time an enterprise Linux distribution has offered this capability, and it's a testament to our ongoing commitment to security innovation.

    Experience the security and privacy of encrypted DNS during and after the installation process. You no longer have to worry about the period between installation and security hardening. This is a significant improvement for secure system provisioning and automated deployments. 

    How to encrypt your DNS

    Here are the step-by-step instructions for creating a simple setup designed for testing and experimentation.

    1. Prepare a local RHEL installation media, such as a USB drive or a local ISO, to perform the installation. Remote installation methods that rely on DNS for resolution will not work with the strict security policy you will set.
    2. If you're using a DNS server with a custom Certificate Authority (CA), you must include the certificate bundle in the Kickstart file. This ensures the installer can securely communicate with your DoT server.
    3. Ensure the certificate is saved in a file named tls-ca-bundle.pem:

      %certificate --dir /etc/pki/dns/extracted/pem/ --filename tls-ca-bundle.pem
      -----BEGIN CERTIFICATE-----
      <Base64-encoded_certificate_content>
      -----END CERTIFICATE-----
      %end
    4. Boot the installation media. During the boot process, provide specific kernel arguments to configure eDNS. This tells the installer to use a DoT server and to enforce an exclusive policy, which prevents any fallback to unencrypted DNS.

      linux ($root)/vmlinuz-6.12.0-0.el10_0.x86_64 root=/dev/mapper/rhel-root ro crashkernel=2G-64G:256M,64G-:512M resume=/dev/mapper/rhel-swap rd.lvm.lv=rhel/root rd.lvm.lv=rhel/swap rhgb quiet emergency ip=dhcp
      rd.net.dns=dns+tls://<server_ip_1>#<dns_server_hostname_1> rd.net.dns=dns+tls://<server_ip_2>#<dns_server_hostname_2>
      rd.net.dns-resolve-mode=exclusive rd.net.dns-backend=dnsconfd inst.ks=hd:/dev/sdb1/mykickstart.ks
    5. Verify your eDNS configuration:

      dnsconfd status

    With these five steps, you have implemented encrypted DNS (DoT) on your RHEL system.

    The Red Hat security vision and future roadmap

    We're dedicated to building a more resilient and modern infrastructure. Our security vision and future roadmap are all about providing you with more powerful tools. This includes support for DNS over HTTPS (DoH), which gives you more options for securing your DNS traffic. 

    We're also integrating high-level support directly into Red Hat Enterprise Linux image builder. You can easily build customized ISOs with these security features preconfigured, making deployment easier and ensuring your systems are secure from the start.

    Continue your security journey

    With a working encrypted DNS setup, you're ready to explore its full capabilities. As a Technology Preview, this encrypted DNS functionality is still under active development. We encourage you to experiment with it and provide feedback.

    To dive deeper into the technical details and explore other security resources, here are some paths you can take:

    • Securing DNS Traffic with Encrypted DNS on Red Hat Enterprise Linux
    • Encrypted DNS from Boot to Runtime: A Zero Trust Milestone in RHEL DevConf.CZ 2025 talk
    • System-wide encrypted DNS in LWN

    Related Posts

    • How to manually copy SSH public keys to servers on Red Hat Enterprise Linux

    • Red Hat Enterprise Linux 9.5: What are the top features for developers?

    • My advice on SELinux container labeling

    • How to run SQL Server with SELinux enabled on RHEL 9

    • How custom SELinux policies secure servers and containers

    • How SELinux deny rules improve system security

    Recent Posts

    • Autoscaling vLLM with OpenShift AI

    • Filtering packets from anywhere in the networking stack

    • PostGIS: A powerful geospatial extension for PostgreSQL

    • Kafka Monthly Digest: September 2025

    • A more secure way to handle secrets in OpenShift

    What’s up next?

    Download the Red Hat Enterprise Linux 10 cheat sheet. Whether you're deploying to the cloud, managing systems, or working with containers, this guide provides the key information you need for executing essential commands, image building, and system management.

    Get the cheat sheet
    Red Hat Developers logo LinkedIn YouTube Twitter Facebook

    Platforms

    • Red Hat AI
    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    • See all products

    Build

    • Developer Sandbox
    • Developer Tools
    • Interactive Tutorials
    • API Catalog

    Quicklinks

    • Learning Resources
    • E-books
    • Cheat Sheets
    • Blog
    • Events
    • Newsletter

    Communicate

    • About us
    • Contact sales
    • Find a partner
    • Report a website issue
    • Site Status Dashboard
    • Report a security problem

    RED HAT DEVELOPER

    Build here. Go anywhere.

    We serve the builders. The problem solvers who create careers with code.

    Join us if you’re a developer, software engineer, web designer, front-end designer, UX designer, computer scientist, architect, tester, product manager, project manager or team lead.

    Sign me up

    Red Hat legal and privacy links

    • About Red Hat
    • Jobs
    • Events
    • Locations
    • Contact Red Hat
    • Red Hat Blog
    • Inclusion at Red Hat
    • Cool Stuff Store
    • Red Hat Summit
    © 2025 Red Hat

    Red Hat legal and privacy links

    • Privacy statement
    • Terms of use
    • All policies and guidelines
    • Digital accessibility

    Report a website issue