Back to graph

Topic analysis

Show HN: Running the second public ODoH relay

If you run Pi-hole, AdGuard Home, or any forwarding resolver, every one of your queries goes through one operator who sees both your IP address and the question. If you switch to a recursive resolver like Unbound, your IP gets exposed to every authoritative nameserver instead - .com learns you exist, google.com learns you exist, and so does every CDN edge in the chain. DoH and DoT encrypt the transport ; they don’t change who learns what . Apple’s iCloud Private Relay solved this for Apple users by splitting the path: an ingress proxy sees your IP but not the request, an egress proxy sees the request but not your IP. DNS gets anonymized system-wide, but only with iCloud+ ($0.99/mo), only on iOS/macOS, and only through Apple-curated egress partners. NextDNS, Cloudflare for Families, Quad9 - all the privacy-focused DNS services - require accounts, telemetry, or both. The self-hosted audience effectively had no anonymous-DNS option without an account or a platform lock-in. ODoH (RFC 9230, “Oblivious DNS over HTTPS”) is the IETF protocol that does this for DNS. Numa v0.14 ships a client, a relay, and a public deployment in one binary. This post is what it does, what it doesn’t fix, and what it took to deploy the second public relay in the ecosystem. Encryption uses HPKE (RFC 9180) - the same primitive as TLS Encrypted ClientHello. Cloudflare publishes odoh-rs for the seal/open operations and I used it. Numa’s hand-rolling principle is no DNS libraries ; HPKE is a different thing, and hand-rolling crypto is the kind of decision where every hour of “I want full control” buys ten of audit anxiety. ODoH client mode plugs into Numa’s existing forwarding pipeline as a fourth transport (alongside UDP, DoH, DoT). The relay is a separate mode ( numa relay [PORT] ) - same binary, different entry point, only POST /relay and GET /health exposed. Two things in the relay needed more attention than expected: SSRF-hardened hostname validator. The relay opens an outbound connection to a target named in the request URL. Without validation that’s textbook SSRF - a malicious client could ask it to “forward” to 169.254.169.254 and exfiltrate cloud metadata. The validator is regex-strict (RFC 1035 ASCII labels, no IDN, no IP literals, no non-443 port). eTLD+1 same-operator check. ODoH’s guarantee depends on relay and target being run by different organizations. If they share an eTLD+1, one operator can join IP and question across both legs and the whole construction is theatre. Numa rejects same-operator configs by default (intentional same-operator setups still possible) odoh-relay.numa.rs runs as a systemd unit on a Hetzner VPS, Caddy in front for TLS. Default Numa config pairs it with odoh.cloudflare-dns.com - two independent operators in the path out of the box, no shared eTLD+1. The probe script tests/probe-odoh-ecosystem.sh checks the whole public ecosystem in one run. DNSCrypt’s curated list ( v3/odoh-relays.md , last updated September 2025) carries one relay entry, with the upstream README noting “odohrelay-crypto-sx seems to be the only ODoH relay left.” Frank Denis runs the well-known public relay at odoh-relay.edgecompute.app on Fastly Compute - it’s the default in dnscrypt-proxy , the only widely-used open-source ODoH client. Numa adds the second well-known operator at odoh-relay.numa.rs and ships a client that can speak to either. This isn’t a product - it’s infrastructure I maintain because Numa needed it and the existing ecosystem was thin. I’d love to see other people stand up relays. Same binary Numa users already run; flip the mode to relay , point Caddy at it, done in a Sunday afternoon ( docker-compose receipt ). The protocol’s privacy properties scale with operator diversity. For anonymous DNS today: cargo install numa , set mode = "odoh" in numa.toml , your queries route through two independent organizations - both open source, both inspectable. Docker users: there’s a turnkey compose recipe preconfigured with ODoH mode. Numa is a DNS resolver that runs on your laptop or phone. ODoH client + self-hosted relay, recursive resolution from root with DNSSEC, ad blocking, .numa local domains with auto-TLS, a REST API, and a live dashboard. github.com/razvandimescu/numa . Discussion: GitHub Issues · Hacker News .

Heat score

1

Sources

1

Platforms

1

Relations

0
First seen
May 14, 2026, 6:44 PM
Last updated
May 14, 2026, 8:02 PM

Why this topic matters

Show HN: Running the second public ODoH relay is currently shaped by signals from 1 source platforms. This page organizes AI analysis summaries, 1 timeline events, and 0 relationship edges so search engines and AI systems can understand the topic's factual basis and propagation arc.

News

Keywords

10 tags
secondpublicrelayyourunholeanyforwardingresolverevery

Source evidence

1 evidence items

Timeline

Show HN: Running the second public ODoH relay

May 14, 2026, 6:44 PM

Related topics

No related topics have been aggregated yet, but this page still preserves the AI summary, source links, and timeline.