diff --git a/how-to-setup-system-wide-mullvad-dns-over-https-on-ios-and-macos/README.md b/how-to-setup-system-wide-mullvad-dns-over-https-on-ios-and-macos/README.md new file mode 100644 index 0000000..0416e97 --- /dev/null +++ b/how-to-setup-system-wide-mullvad-dns-over-https-on-ios-and-macos/README.md @@ -0,0 +1,76 @@ + + +# How to setup system-wide [Mullvad DNS over HTTPS](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls/) on iOS and macOS + +## Requirements + +- iPhone running iOS 14 and up +- Mac running Big Sur and up + +## iOS guide + +> Heads-up: some apps bypass system-wide Mullvad DNS over HTTPS, see https://github.com/paulmillr/encrypted-dns. + +### Step 1 (if applicable): disable [Lockdown Mode](https://support.apple.com/en-us/HT212650) + +### Step 2: open “Safari” and download [mullvad-doh.mobileconfig](./mullvad-doh.mobileconfig) configuration profile + +### Step 3: install “mullvad-doh.mobileconfig” configuration profile + +Open “Settings”, click “Profile Downloaded” and, finally, click “Install” + +### Step 4 (if applicable): enable Lockdown Mode + +### Step 5: check for DNS leaks + +Go to [https://mullvad.net/en/check](https://mullvad.net/en/check). + +![Connection check](connection-check-ios.png?width=375) + +👍 + +--- + +## macOS guide + +> Heads-up: some apps bypass system-wide Mullvad DNS over HTTPS, see [https://github.com/paulmillr/encrypted-dns](https://github.com/paulmillr/encrypted-dns). + +> Heads-up: when using [Little Snitch](https://www.obdev.at/products/littlesnitch/index.html) or [Lulu](https://objective-see.org/products/lulu.html), system-wide Mullvad DNS over HTTPS is disabled given a single network filter can be enabled at a time (restriction imposed by iOS/macOS). + +> Heads-up: given above, one should [configure](../how-to-configure-firefox-for-privacy-and-security) Firefox to use DNS over HTTPS as a failsafe. + +> Heads-up: for sensitive use cases, use [Tor](https://www.torproject.org/). + +### Step 1 (if applicable): disable [Lockdown Mode](https://support.apple.com/en-us/HT212650) + +### Step 2: download [mullvad-doh.mobileconfig](./mullvad-doh.mobileconfig) configuration profile + +### Step 3: install “mullvad-doh.mobileconfig” configuration profile + +Open “System Settings”, search for “Profiles”, click “Profiles”, click “+”, open “mullvad-doh.mobileconfig”, click “Continue” and, finally, click “Install”. + +### Step 4 (if applicable): enable Lockdown Mode + +### Step 5: check for DNS leaks + +Go to [https://mullvad.net/en/check](https://mullvad.net/en/check). + +![Connection check](connection-check-macos.png) + +👍 + +--- + +## Want things back the way they were before following this guide? No problem! + +### Delete configuration profile. + +👍 diff --git a/how-to-setup-system-wide-mullvad-dns-over-https-on-ios-and-macos/connection-check-ios.png b/how-to-setup-system-wide-mullvad-dns-over-https-on-ios-and-macos/connection-check-ios.png new file mode 100644 index 0000000..779a423 Binary files /dev/null and b/how-to-setup-system-wide-mullvad-dns-over-https-on-ios-and-macos/connection-check-ios.png differ diff --git a/how-to-setup-system-wide-mullvad-dns-over-https-on-ios-and-macos/connection-check-macos.png b/how-to-setup-system-wide-mullvad-dns-over-https-on-ios-and-macos/connection-check-macos.png new file mode 100644 index 0000000..3652ac0 Binary files /dev/null and b/how-to-setup-system-wide-mullvad-dns-over-https-on-ios-and-macos/connection-check-macos.png differ diff --git a/how-to-setup-system-wide-mullvad-dns-over-https-on-ios-and-macos/mullvad-doh.mobileconfig b/how-to-setup-system-wide-mullvad-dns-over-https-on-ios-and-macos/mullvad-doh.mobileconfig new file mode 100644 index 0000000..03ae7f9 --- /dev/null +++ b/how-to-setup-system-wide-mullvad-dns-over-https-on-ios-and-macos/mullvad-doh.mobileconfig @@ -0,0 +1,51 @@ + + + + + PayloadContent + + + DNSSettings + + DNSProtocol + HTTPS + ServerAddresses + + 2a07:e340::2 + 194.242.2.2 + + ServerURL + https://doh.mullvad.net/dns-query + + PayloadDescription + Configures device to use Mullvad DNS over HTTPS + PayloadDisplayName + Mullvad DNS over HTTPS + PayloadIdentifier + com.apple.dnsSettings.managed.C846E5BF-D246-45FB-A9E2-A9B30A153A8B + PayloadType + com.apple.dnsSettings.managed + PayloadUUID + C846E5BF-D246-45FB-A9E2-A9B30A153A8B + PayloadVersion + 1 + ProhibitDisablement + + + + PayloadDescription + Configures device to use Mullvad DNS over HTTPS + PayloadDisplayName + Mullvad DNS over HTTPS + PayloadIdentifier + com.sunknudsen.mullvad-dns-over-https + PayloadRemovalDisallowed + + PayloadType + Configuration + PayloadUUID + 13001589-3D36-4CC9-B16B-622C8E744FF4 + PayloadVersion + 1 + +