![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.world/pictrs/image/8286e071-7449-4413-a084-1eb5242e2cf4.png)
1·
3 months agoAfter looking through it a little bit, it sounds like HIP is mainly used for verifying hosts’ identities. It sounds like you’ll still need firewall rules in order to create the scenario in your example, right?
After looking through it a little bit, it sounds like HIP is mainly used for verifying hosts’ identities. It sounds like you’ll still need firewall rules in order to create the scenario in your example, right?
It looks like Quad9 supports DoH: quad9