Every time you type a website name, your device asks a question: "Where is this?" That question travels across the Internet as a DNS query. For three decades, those questions traveled naked, readable by anyone who cared to look: your ISP, your government, the coffee shop's router, intelligence agencies with programs called things like MORECOWBELL.
Port 853 exists because someone finally decided your questions deserve privacy.
What Port 853 Does
Port 853 carries DNS over TLS (DoT), which wraps your DNS queries in encryption before sending them to a resolver. When your device connects to port 853, it first establishes a TLS handshake with the DNS server. Only after that encrypted tunnel is established do your queries flow through it.1
The rule is absolute: port 853 must never carry cleartext DNS. If encryption fails, the connection fails. There is no fallback to sending your queries in the open.2
This is DNS with a locked door.
How It Works
Traditional DNS operates like shouting a question in a crowded room. You ask "Where is example.com?" and everyone in the room hears you, including the answer you receive.
DNS over TLS works like this:
- Your device opens a TCP connection to the resolver's port 853
- Both sides negotiate a TLS session, exchanging cryptographic keys
- Once the tunnel is established, your DNS query travels encrypted
- The response returns through the same encrypted channel3
The protocol adds overhead: one round-trip for TCP, two more for TLS negotiation. But the specification includes optimizations. Connection reuse means subsequent queries skip the handshake. TLS session resumption shortens the negotiation. Multiple queries can pipeline through a single connection.4
The latency penalty is real but modest. The privacy gain is significant.
The Story Behind Port 853
The Problem: An Open Book
DNS was designed in 1983 when the Internet was a research network of a few hundred hosts, all of whom trusted each other. Privacy wasn't a consideration because surveillance wasn't a threat.5
By 2013, that assumption had shattered.
Edward Snowden's disclosures revealed the NSA's MORECOWBELL program, which monitored DNS as a rich source of intelligence. The agency rented servers in Malaysia, Germany, and Denmark to perform thousands of covert DNS lookups every hour, building profiles of targets based on what they searched for.6 The companion program QUANTUMDNS went further, actively injecting false DNS responses to redirect targets to NSA-controlled infrastructure.7
DNS had become what researchers called "an open book." Your queries revealed not just what websites you visited, but metadata about your email contacts, your chat services, your interests, your schedule, your fears.
The Response: DPRIVE
In September 2014, the IETF established the DPRIVE working group (DNS PRIVate Exchange). The charter was direct: "The set of DNS requests that an individual makes can provide an attacker with a large amount of information about that individual. DPRIVE aims to deprive the attacker of this information."8
The foundational research came from USC's Information Sciences Institute. Liang Zhu, Zi Hu, and John Heidemann had been working on what they called T-DNS: DNS over TCP with TLS encryption. Their 2014 technical report and subsequent 2015 paper at the IEEE Symposium on Security and Privacy demonstrated that encrypted DNS was practical without crippling performance.9
In May 2016, RFC 7858 was published, standardizing DNS over TLS and assigning it port 853. The authors included the USC researchers alongside Allison Mankin, Duane Wessels from Verisign Labs, and Paul Hoffman from ICANN.10
The work was partially funded by the Department of Homeland Security, an irony given that it was designed to protect against government surveillance.11
Going Mainstream
For two years, DoT remained a tool for the privacy-conscious few. That changed in August 2018 when Google announced that Android 9 Pie would include native support for DNS over TLS. The feature, called "Private DNS," was enabled by default in opportunistic mode: phones would automatically use port 853 if their DNS resolver supported it.12
Android became the first major mobile operating system to support encrypted DNS natively. Billions of devices suddenly had the capability to keep their queries private.
Major DNS providers followed. Cloudflare's 1.1.1.1, Google's 8.8.8.8, and Quad9's 9.9.9.9 all began accepting connections on port 853.13
The Two Faces of DoT
RFC 7858 defines two usage profiles, reflecting a fundamental tension between privacy and security.14
Opportunistic Privacy attempts encryption without requiring server authentication. If the resolver supports TLS, use it. If authentication fails, proceed anyway. This protects against passive eavesdroppers but not active attackers who might impersonate the resolver.
Strict Privacy requires the client to verify the server's identity through pre-configured authentication credentials. If verification fails, no DNS service occurs. This provides genuine security but requires advance configuration.
The difference matters. Opportunistic mode is better than nothing. Strict mode is actually secure.
The Port 853 Tradeoff
Port 853's dedicated assignment is both its strength and its weakness.
The strength: network administrators can monitor DoT traffic, apply policies, and ensure organizational DNS filtering continues to work. Schools can block students from bypassing content filters. Enterprises can maintain security visibility.15
The weakness: anyone can see that you're using encrypted DNS, even if they can't see what you're querying. Authoritarian governments can block port 853 entirely, forcing users back to unencrypted DNS or cutting off their Internet access.
This is why DNS over HTTPS (DoH) was developed as an alternative. DoH uses port 443, blending into normal web traffic, making it nearly impossible to block without blocking the web itself. The tradeoff is that DoH is harder for legitimate network administrators to manage.16
DoT is the honest approach: "I'm encrypting my DNS, and you can see that I'm doing it." DoH is the covert approach: "I'm encrypting my DNS, and you can't even tell."
Different threats require different tools.
Security Considerations
DNS over TLS protects the hop between you and your recursive resolver. It does not encrypt the entire DNS resolution chain. Your resolver may still query authoritative servers over unencrypted connections.17
The protocol also doesn't hide the IP addresses you connect to after DNS resolution. Your ISP can still see that you connected to a particular server, even if they couldn't see the DNS query that led you there.
TLS Server Name Indication (SNI) historically leaked the hostname you were connecting to, though Encrypted Client Hello (ECH) addresses this gap.
DoT is one layer of privacy, not total anonymity. But one layer is infinitely more than zero.
Current Adoption
The DNS over TLS Security market reached $1.28 billion in 2024 and is projected to grow to $6.14 billion by 2033.18
Mobile adoption has been particularly significant. Research shows that encrypted DNS protocols (primarily DoT on Android) now account for a substantial portion of mobile DNS traffic, up from near zero in 2018.19
Major providers supporting port 853 include:
- Cloudflare (1.1.1.1)
- Google Public DNS (8.8.8.8)
- Quad9 (9.9.9.9)
- NextDNS
- AdGuard DNS
The DPRIVE working group that created DoT was disbanded in July 2025, not because it failed but because its core work was complete. Encrypted DNS had gone from proposal to global infrastructure in under a decade.20
Related Ports
| Port | Protocol | Relationship |
|---|---|---|
| 53 | DNS (UDP/TCP) | The original DNS port, unencrypted |
| 443 | DNS over HTTPS | DoH runs over standard HTTPS port |
| 8853 | DNS over QUIC | Experimental encrypted DNS using QUIC |
Frequently Asked Questions
Was this page helpful?