I am seeing some strange traffic when I use official signed AdGuard DNS MobileConfig profile - https://cdn.adtidy.org/public/dns/adguard-dns.mobileconfig . The profile itself specifies DNS-over-HTTPS, not DNS-over-TLS, but when using that profile, I see Apple TV:
1. Sending only 0-length packets to AdGuard DNS address over TCP port 853 (DNS-over-TLS)
2. Sending non-0-length packets to AdGuard DNS address over TCP port 443 (DNS-over-HTTPS)
I assume that 0-length packets over TCP port 853 indicate that DNS-over-TLS is actually not active because 0-length packets do not carry any payload and as such cannot contain any domain queries.
Can someone wth AdGuard DNS-over-HTTPS profile and/or NextDNS DNS-over-HTTPS profile see if either profile makes Apple TV send 0-length packets over TCP port 853 (DNS-over-TLS)?
1. Sending only 0-length packets to AdGuard DNS address over TCP port 853 (DNS-over-TLS)
2. Sending non-0-length packets to AdGuard DNS address over TCP port 443 (DNS-over-HTTPS)
I assume that 0-length packets over TCP port 853 indicate that DNS-over-TLS is actually not active because 0-length packets do not carry any payload and as such cannot contain any domain queries.
Can someone wth AdGuard DNS-over-HTTPS profile and/or NextDNS DNS-over-HTTPS profile see if either profile makes Apple TV send 0-length packets over TCP port 853 (DNS-over-TLS)?