"speed" claims should be backed by link to a result of https://www.waveform.com/tools/bufferbloat
directly to internet, wired via openwrt and wifi of openwrt.
Many things feel slow but we have to start somewhere.
Please connect to your OpenWrt device using ssh and copy the output of the following commands and post it here using the "Preformatted text </> " button:
Remember to redact passwords, MAC addresses and any public IP addresses you may have:
ubus call system board
cat /etc/config/network
cat /etc/config/wireless
cat /etc/config/firewall
You jumped from DoT to DoH hastily without understanding how both work. Stubby provides its service on port 5453 (hence the lines 127.0.0.1@5453 for IPv4 and 0::1@5453 for IPv6). In order to test it you have to use it by running from router's console (login via ssh root@192.168.1.1) line like this nslookup -debug -type=A openwrt.org 127.0.0.1:5453. If it works then point dnsmasq and system's DNS to these addresses. How to make it? Check the link from my first post in this thread: https://github.com/openwrt/packages/blob/master/net/stubby/files/README.md
If you make everything the way I explained you should see network status like this (maybe IPv6 will be missing if your ISP does provide it). DNS on local ports is highlighted with red (before there were addresses from ISP):
Never tried it. I'm pretty happy with DoT via stubby. I also tested dnscrypt (v2) and DoH-proxy with luci interface. Even more I'd be happy with regular DNS over port 53 but some websites use EDNS Client Subnet to sanction users from my country (for example www.themoviedb.org uses this mechanism).
I chose DoT because stubby is lean and has little functionality which I don't need (e.g. dnscypt v2 also comes with DoH server, DoH client). I don't like DoH for its reliance on HTML. HTML parser is a complex thing and provides some space for bugs and has certain processing cost. But I accept the fact that it's harder to block service on port 443 than port 853.
@brada4 and @timur.davletshin I have tested dnsproxy package together with the DNS provider NextDNS, because NextDNS supports all encryption protocols (except DNSCrypt) and they all work without problems, this is the page to test which protocol I'm using:
DNSCrypt and DoT have most compact queries. Probably I would prefer using DNSCrypt but it has very limited support among providers and dnscrypt-proxy2 is far from being a compact implementation. Ideally I would recommend everyone to make primitive test before making decision. DNS should be fast, as fast as possible.