TitaniumGuard
DNS | TitaniumGuard

Lab testing

DNS

Authoritative + recursive DNS with secure transport endpoints

Rust DNS service supporting authoritative internal zones, recursive resolution fallback, secure DNS transports, and live config reload.

What ships on day one

  • Authoritative zone serving with SOA/NS/A/AAAA/TXT/SRV record support
  • Recursive forwarding using configured resolvers or built-in root hints
  • UDP/TCP, DoT, DoH (HTTP/2), DoQ, and DoH3 listener support

Deployment choices

Deploy as a single service with flexible connection modes and simple JSON configuration.

  • Self Hosted

Engineering blueprint

Built for reliable internal and external DNS flows.

How requests are handled

  • Known internal domains are answered directly by your DNS service
  • Everything else is forwarded to upstream resolvers
  • Sensible defaults are used when no custom upstream list is provided

Connection options

  • Standard UDP/TCP DNS support
  • Encrypted DNS options are available for stricter environments
  • Each secure endpoint is configured with its own certificate and key

Operational safety

  • Config updates can be applied without restarting the service
  • Bad updates are rejected so the running service stays healthy
  • Logging and retention behavior can be tuned per environment

Request logs

Query logs support strict and high-detail modes depending on your needs

Retention controls

Retention windows and cleanup schedules can be configured

Reload signals

You get clear feedback when a config update is accepted or rejected

Operational readiness

Launch plans we stand behind.

  • Works for internal zones and external recursive lookups
  • Supports both standard and encrypted DNS transports
  • Ships as Linux binaries and container images

Next step

Ready to plan your DNS rollout?

Email labs@titaniumguard.in to review zone design, transport configuration, and logging defaults.