Lab testing
DNS
Authoritative + recursive DNS with secure transport endpoints
Rust DNS service supporting authoritative internal zones, recursive resolution fallback, secure DNS transports, and live config reload.
What ships on day one
- Authoritative zone serving with SOA/NS/A/AAAA/TXT/SRV record support
- Recursive forwarding using configured resolvers or built-in root hints
- UDP/TCP, DoT, DoH (HTTP/2), DoQ, and DoH3 listener support
Deployment choices
Deploy as a single service with flexible connection modes and simple JSON configuration.
- Self Hosted
Engineering blueprint
Built for reliable internal and external DNS flows.
How requests are handled
- Known internal domains are answered directly by your DNS service
- Everything else is forwarded to upstream resolvers
- Sensible defaults are used when no custom upstream list is provided
Connection options
- Standard UDP/TCP DNS support
- Encrypted DNS options are available for stricter environments
- Each secure endpoint is configured with its own certificate and key
Operational safety
- Config updates can be applied without restarting the service
- Bad updates are rejected so the running service stays healthy
- Logging and retention behavior can be tuned per environment
Request logs
Query logs support strict and high-detail modes depending on your needs
Retention controls
Retention windows and cleanup schedules can be configured
Reload signals
You get clear feedback when a config update is accepted or rejected
Operational readiness
Launch plans we stand behind.
- Works for internal zones and external recursive lookups
- Supports both standard and encrypted DNS transports
- Ships as Linux binaries and container images
Next step
Ready to plan your DNS rollout?
Email labs@titaniumguard.in to review zone design, transport configuration, and logging defaults.