Back Original

Show HN: Running the second public ODoH relay

If you run Pi-hole, AdGuard Home, or any forwarding resolver, every one of your queries goes through one operator who sees both your IP address and the question. If you switch to a recursive resolver like Unbound, your IP gets exposed to every authoritative nameserver instead - .com learns you exist, google.com learns you exist, and so does every CDN edge in the chain. DoH and DoT encrypt the transport; they don’t change who learns what.

Apple’s iCloud Private Relay solved this for Apple users by splitting the path: an ingress proxy sees your IP but not the request, an egress proxy sees the request but not your IP. DNS gets anonymized system-wide, but only with iCloud+ ($0.99/mo), only on iOS/macOS, and only through Apple-curated egress partners. NextDNS, Cloudflare for Families, Quad9 - all the privacy-focused DNS services - require accounts, telemetry, or both. The self-hosted audience effectively had no anonymous-DNS option without an account or a platform lock-in.

Hops that see {your IP, your question}

{1, 1} → {disjoint}

relay sees IP, target sees question

Crypto primitives

all audited

odoh-rs (HPKE) · rustls (TLS) — zero custom

Account required

none

single binary, MIT, default config works

ODoH (RFC 9230, “Oblivious DNS over HTTPS”) is the IETF protocol that does this for DNS. Numa v0.14 ships a client, a relay, and a public deployment in one binary. This post is what it does, what it doesn’t fix, and what it took to deploy the second public relay in the ecosystem.


How it works

INDEPENDENT OPERATORS - MUST NOT COLLUDE[encrypted]A example.com?93.184.216.34[encrypted]YOUNUMA RELAYCLOUDFLAREAUTHORITATIVE

YouEncrypts the query under target’s HPKE pubkey. Includes a symmetric key for the response.

Numa relaySees your IP. Sees only ciphertext, in both directions.

Cloudflare targetDecrypts the question. Sees no IP - just relay’s.

AuthoritativeStandard DNS recursion. Cloudflare’s job, not yours.

ReturnCloudflare encrypts the answer with the symmetric key you supplied and sends it back along the same path. Relay still sees only ciphertext. Same privacy property, opposite direction.

Encryption uses HPKE (RFC 9180) - the same primitive as TLS Encrypted ClientHello. Cloudflare publishes odoh-rs for the seal/open operations and I used it. Numa’s hand-rolling principle is no DNS libraries; HPKE is a different thing, and hand-rolling crypto is the kind of decision where every hour of “I want full control” buys ten of audit anxiety.

What it took to build

ODoH client mode plugs into Numa’s existing forwarding pipeline as a fourth transport (alongside UDP, DoH, DoT). The relay is a separate mode (numa relay [PORT]) - same binary, different entry point, only POST /relay and GET /health exposed. Two things in the relay needed more attention than expected:

SSRF-hardened hostname validator. The relay opens an outbound connection to a target named in the request URL. Without validation that’s textbook SSRF - a malicious client could ask it to “forward” to 169.254.169.254 and exfiltrate cloud metadata. The validator is regex-strict (RFC 1035 ASCII labels, no IDN, no IP literals, no non-443 port).

eTLD+1 same-operator check. ODoH’s guarantee depends on relay and target being run by different organizations. If they share an eTLD+1, one operator can join IP and question across both legs and the whole construction is theatre. Numa rejects same-operator configs by default (intentional same-operator setups still possible)

odoh-relay.numa.rs runs in docker-compose on a Hetzner VPS with Caddy in front for TLS. Default Numa config pairs it with odoh.cloudflare-dns.com - two independent operators in the path out of the box, no shared eTLD+1. The probe script tests/probe-odoh-ecosystem.sh checks the whole public ecosystem in one run.

What it doesn’t fix

The public ecosystem

DNSCrypt’s curated list (v3/odoh-relays.md, last updated September 2025) carries one relay entry, with the upstream README noting “odohrelay-crypto-sx seems to be the only ODoH relay left.” Frank Denis runs the well-known public relay at odoh-relay.edgecompute.app on Fastly Compute - it’s the default in dnscrypt-proxy, the only widely-used open-source ODoH client. Numa adds the second well-known operator at odoh-relay.numa.rs and ships a client that can speak to either.

This isn’t a product - it’s infrastructure I maintain because Numa needed it and the existing ecosystem was thin. I’d love to see other people stand up relays. Same binary Numa users already run; flip the mode to relay, point Caddy at it, done in a Sunday afternoon (docker-compose receipt). The protocol’s privacy properties scale with operator diversity.

What’s next

For anonymous DNS today: cargo install numa, set mode = "odoh" in numa.toml, your queries route through two independent organizations - both open source, both inspectable. Docker users: there’s a turnkey compose recipe preconfigured with ODoH mode.


Numa is a DNS resolver that runs on your laptop or phone. ODoH client + self-hosted relay, recursive resolution from root with DNSSEC, ad blocking, .numa local domains with auto-TLS, a REST API, and a live dashboard. github.com/razvandimescu/numa.

Discussion: GitHub Issues · Hacker News.