[Guide] NextDNS + Mullvad (WireGuard) + DOH3 on iOS / iPadOS / macOS
Introduction
How to make NextDNS and Mullvad (WireGuard) work together, perfectly, is a question that has been asked hundreds of times and across many different forums. Today, the magic to make that happen comes together—with the added bonus of support for DoH3.
This guide has a difficulty level of Medium; and is bifurcated into two major sections, each with several steps. If you are unfamiliar with any of the steps below, please ask for help in the comments and someone will assist.
NextDNS steps:
Visit: https://apple.nextdns.io
Enter your "Configuration ID."
Enter your "Device Name."
Enter your "Device Model."
Do not "Trust NextDNS Root CA." (Unless you know what you are doing and are completely crazy.)
Do not enable "Bootstrap IPs." (Unless you know what you are doing and enjoy slow DNS resolution.)
Do not enable "Sign Configuration Profile." (As we will be editing it in a moment.)
"Download" your shiny new Configuration Profile, which will be in your
Downloads
folder, as a file ending with.mobileconfig
.Inside that file, there will be one occurrence of the string
apple.dns.nextdns.io
. Replace that string withdoh3.dns.nextdns.io
Install the edited Configuration Profile.
The above steps will make it such that your iOS, iPadOS or macOS device will use NextDNS's Device Identification for Analytics and Logs; in addition to Apple's system-wide Encrypted DNS, specifically, DNS-over-HTTP/3. (This works for both iOS/iPadOS 15/16 & macOS 12/13.)
Mullvad (WireGuard) steps:
Generate and download a WireGuard Configuration File.
Edit the WireGuard Configuration File.
For "DNS servers," specify:
0.0.0.0/32, ::/128
For "Allowed IPs," specify:
0.0.0.1/32, 0.0.0.2/31, 0.0.0.4/30, 0.0.0.8/29, 0.0.0.16/28, 0.0.0.32/27, 0.0.0.64/26, 0.0.0.128/25, 0.0.1.0/24, 0.0.2.0/23, 0.0.4.0/22, 0.0.8.0/21, 0.0.16.0/20, 0.0.32.0/19, 0.0.64.0/18, 0.0.128.0/17, 0.1.0.0/16, 0.2.0.0/15, 0.4.0.0/14, 0.8.0.0/13, 0.16.0.0/12, 0.32.0.0/11, 0.64.0.0/10, 0.128.0.0/9, 1.0.0.0/8, 2.0.0.0/7, 4.0.0.0/6, 8.0.0.0/5, 16.0.0.0/4, 32.0.0.0/3, 64.0.0.0/2, 128.0.0.0/1, ::1/128, ::2/127, ::4/126, ::8/125, ::10/124, ::20/123, ::40/122, ::80/121, ::100/120, ::200/119, ::400/118, ::800/117, ::1000/116, ::2000/115, ::4000/114, ::8000/113, ::1:0/112, ::2:0/111, ::4:0/110, ::8:0/109, ::10:0/108, ::20:0/107, ::40:0/106, ::80:0/105, ::100:0/104, ::200:0/103, ::400:0/102, ::800:0/101, ::1000:0/100, ::2000:0/99, ::4000:0/98, ::8000:0/97, ::1:0:0/96, ::2:0:0/95, ::4:0:0/94, ::8:0:0/93, ::10:0:0/92, ::20:0:0/91, ::40:0:0/90, ::80:0:0/89, ::100:0:0/88, ::200:0:0/87, ::400:0:0/86, ::800:0:0/85, ::1000:0:0/84, ::2000:0:0/83, ::4000:0:0/82, ::8000:0:0/81, ::1:0:0:0/80, ::2:0:0:0/79, ::4:0:0:0/78, ::8:0:0:0/77, ::10:0:0:0/76, ::20:0:0:0/75, ::40:0:0:0/74, ::80:0:0:0/73, ::100:0:0:0/72, ::200:0:0:0/71, ::400:0:0:0/70, ::800:0:0:0/69, ::1000:0:0:0/68, ::2000:0:0:0/67, ::4000:0:0:0/66, ::8000:0:0:0/65, 0:0:0:1::/64, 0:0:0:2::/63, 0:0:0:4::/62, 0:0:0:8::/61, 0:0:0:10::/60, 0:0:0:20::/59, 0:0:0:40::/58, 0:0:0:80::/57, 0:0:0:100::/56, 0:0:0:200::/55, 0:0:0:400::/54, 0:0:0:800::/53, 0:0:0:1000::/52, 0:0:0:2000::/51, 0:0:0:4000::/50, 0:0:0:8000::/49, 0:0:1::/48, 0:0:2::/47, 0:0:4::/46, 0:0:8::/45, 0:0:10::/44, 0:0:20::/43, 0:0:40::/42, 0:0:80::/41, 0:0:100::/40, 0:0:200::/39, 0:0:400::/38, 0:0:800::/37, 0:0:1000::/36, 0:0:2000::/35, 0:0:4000::/34, 0:0:8000::/33, 0:1::/32, 0:2::/31, 0:4::/30, 0:8::/29, 0:10::/28, 0:20::/27, 0:40::/26, 0:80::/25, 0:100::/24, 0:200::/23, 0:400::/22, 0:800::/21, 0:1000::/20, 0:2000::/19, 0:4000::/18, 0:8000::/17, 1::/16, 2::/15, 4::/14, 8::/13, 10::/12, 20::/11, 40::/10, 80::/9, 100::/8, 200::/7, 400::/6, 800::/5, 1000::/4, 2000::/3, 4000::/2, 8000::/1
In the WireGuard app, create a new WireGuard tunnel from your WireGuard Configuration File.
Enable On-Demand (Wi-Fi or cellular; Any SSID) and activate your new WireGuard tunnel.
Restart your device.
Visit: https://test.nextdns.io
status
should be:ok
protocol
should be:DOH3
The above steps will make it such that your new WireGuard tunnel uses the NextDNS Configuration Profile that you installed. It achieves this by explicitly setting the DNS servers to
0.0.0.0/32
(which is not the same as127.0.0.1/32
) for IPv4, and to::/128
for IPv6. Then, we allow the entire IPv4 and IPv6 address spaces to transit the tunnel, except for the two aforementioned device-local IPs.
Congratulations on your leak-free, kill-switched, system-wide, NextDNS DoH3, Mullvad (WireGuard) VPN!
Note: This guide has been cross-posted to r/nextdns and r/mullvad.
5 replies
-
Thanks for sharing.
I was using Mullvad VPN (Wireguard) with NextDNS for a few months without issues because Mullvad has a custom DNS option, which works with the NextDNS IPv6 endpoints. So, no linking of IP was necessary and it all worked great. But your solution would obviously elevate the DNS to DoH instead of UDP.
-
For the updated guide, please visit:
[Guide] NextDNS + Mullvad (WireGuard) + DOH3 on iOS / iPadOS / macOS on r/mullvadvpn
-
I tried QUIC protocol but it seems it not work. I can't even install the configuration file.
quic://macOS-NextDNSID.dns.nextdns.io:853
Does it mean it will work only with DoH?
Content aside
-
2
Likes
- 2 yrs agoLast active
- 5Replies
- 7544Views
-
4
Following