Use DNS-over-HTTPS/TLS configuration profiles (iOS, iPadOS, macOS) #9136
Replies: 5 comments 1 reply
-
|
Really want this, have been using the WireGuard app to accomplish this but now that quantum tunnels and obfuscation are available in the Mullvad App it is tempting to switch. Occasionally I have need to join networks that are hostile to VPNs but work with obfuscation. Please let me control the allowed/disallowed IP ranges! Even if it’s buried as an advanced feature, it is extremely useful! |
Beta Was this translation helpful? Give feedback.
-
would like to +1 this as well. sometimes in airplanes you have to disable to disable mullvad entirely in order to allow the captive portal to load. would be awesome to see if we can whitelist a domain/ip range in the app for both ios/macos love the mullvad app thou. wouldnt even mind if its buried in advanced features |
Beta Was this translation helpful? Give feedback.
-
|
Just wanted to follow and see if this feature is planned? Given issues with using local DNS in app, this could be also a solution for that, while enabling use of custom DoH/DoT. Thanks. |
Beta Was this translation helpful? Give feedback.
-
|
Just doing some chores here, we've moved to discussions. I'm going to close this issue and consolidate it into the very similar one for DoH & DoT #9121 |
Beta Was this translation helpful? Give feedback.
-
|
@Rawa regardless of the move to discussions, I would once again point out that this is in fact a separate feature request than the linked discussion. We are asking for the ability to choose the allowed ips for routing. Typically this is for excluding 0.0.0.0 and ::1 from the allowed ip range so that these special ips can be configured to be used to allow local dns outside the tunnel which is very useful for users with complex dns needs. It also would allow users to have fine grained control for subnet routing where multiple subnets could be considered local and should be excluded from the tunnel. These are basic functionality of the WireGuard protocol and would be fantastic to see implemented in the app. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
I have checked if others have suggested this already
Feature description
This is similar to, but not quite, the same as #3689
While Mullvad offers its own ad and tracker blocking DNS, users may want greater customization of what to block and/or custom DNS resolution to use for private resources. In those cases, users may setup their own DNS using DNS-over-HTTPS or -TLS.
On macOS and iOS/iPadOS, one can use both a VPN and a DNS configuration profile for DNS-over-HTTPS (DoH) or DNS-over-TLS (DoT) if one configures the VPN application to use the OS DNS resolver, per the following:
0.0.0.0/32and::/128as the DNS server in the VPN applicationThis approach works using the stock Wireguard app on both macOS and iOS/iPadOS.
I have tried Step 1 in the Mullvad app, and it does not appear to work, since there is no way to do Step 2.
Alternative solutions
Naturally, since this works using the Wireguard application, one can manually configure Mullvad VPNs in the Wireguard using this approach. However, this makes things less user friendly. For example, one cannot change Mullvad servers and locations very easily. It also takes up one of the five clients that Mullvad allows, limiting the use of the official Mullvad app in other situations.
Type of feature
Operating System
Beta Was this translation helpful? Give feedback.
All reactions