Privacy Statement RPS

🇩🇪
← Back to main page

Recursive Resolver Privacy Statement per RFC 8932 (BCP 232).

This document describes how dns.kernel-error.de handles DNS queries and associated data. The structure follows the outline recommended by RFC 8932.

1. Data Collection and Retention

IP Addresses

IP addresses are treated as personal data. No DNS query logging is performed — neither queried domain names nor client IP addresses are stored. Query logging is disabled in the BIND configuration and only temporarily enabled for diagnostics (a few minutes at most).

DoH Requests

The nginx reverse proxy for DoH (/dns-query) has access logging completely disabled. Neither HTTP headers nor client IPs are recorded.

Landing Page

The landing page (/, /en, /privacy, /privacy-en) has access logging disabled. No visits, IP addresses, or HTTP headers are recorded.

Transient Data

BIND maintains internal caches (DNS cache, connection tracking) that reside exclusively in memory and are discarded on restart. This data is not exported or persisted to disk.

Retention Periods

Data TypeStorageDuration
DNS queries (DoT/DoH)Not stored
Client IP addressesNot stored
Landing page visitsNot stored
DNS cacheRAM onlyUntil TTL expiry or restart

2. Data Sharing

3. Exceptions

During exceptional disruptions or attacks, query logging may be temporarily enabled (rndc querylog on). This is done manually, lasts a few minutes at most, and logs are deleted afterwards. There is no automated permanent data collection.

Rate-limiting events (IPs generating >300 queries/second) are logged. This serves exclusively to protect the service from abuse.

4. Operator and Funding

5. Result Filtering

None. Authoritative responses are delivered to clients unaltered. No filtering, redirection, or manipulation of DNS responses takes place — neither for commercial, legal, nor malware-prevention reasons. DNSSEC validation may cause domains with broken signatures to return SERVFAIL — this is correct validation behavior, not filtering.

6. Client-Facing Capabilities

PropertyDetail
Transport protocolsDoT (port 853), DoH (port 443 via HTTPS)
AuthenticationX.509 certificate for dns.kernel-error.de (ECC/ECDSA, DigiCert)
DANE/TLSATLSA records published for _853._tcp.dns and _443._tcp.dns
SVCB/HTTPS RRsService discovery via _dns.dns.kernel-error.de (RFC 9461)
TLS versionsTLS 1.2, TLS 1.3
PQC key exchangeX25519MLKEM768 (preferred), fallback X25519, secp256r1, secp384r1
Preferred cipherCHACHA20-POLY1305 (TLS 1.3), ECDHE-ECDSA-CHACHA20-POLY1305 (TLS 1.2)
HTTP protocolsHTTP/2, HTTP/3 (QUIC)
DoH formatRFC 8484 wire format (no JSON)
DNSSEC validationYes, for all responses
EDNS(0) paddingAccepted from clients. Server-side response padding is not available in BIND 9.20.
Session ticketsDisabled (no session tracking)
HTTP cookiesNot required, not set

7. Upstream Behavior (Resolver → Authoritative Servers)

PropertyDetail
QNAME minimizationYes, relaxed (RFC 9156)
EDNS Client Subnet (ECS)Not enabled — your IP is not forwarded
Aggressive DNSSEC cacheYes (RFC 8198)
NXDOMAIN synthesisYes (RFC 8020)
Upstream encryptionNo (queries to authoritative servers are unencrypted — this is standard, as authoritative servers rarely offer DoT/DoH)

8. Known Limitations

9. Contact

For questions about this statement or the service: security.txt or via kernel-error.de.