Overview
macOS can use HostuxDNS in two different ways. The most universal method is a configuration profile, which also works on iPhone and iPad. On macOS Ventura and later, you can also configure encrypted DNS directly in System Settings without installing a profile.
This guide covers both methods and explains when to use DoH or DoT.
Option 1: install a configuration profile
A configuration profile is the easiest option if you want a simple setup or if your macOS version does not expose encrypted DNS directly in the interface.
- HostuxDNS DoH: DNS over HTTPS, no filtering
- HostuxDNS DoH no ads: DoH with ad and tracker blocking
- HostuxDNS DoT: DNS over TLS, no filtering
- HostuxDNS DoT no ads: DoT with ad and tracker blocking
- Download the profile with Safari.
- Open the downloaded file and review the profile details.
- Approve the installation when macOS asks for confirmation.
- Once installed, the encrypted DNS resolver is applied system-wide.
Option 2: configure DoH or DoT in System Settings
On macOS 13 Ventura and later, you can enter the encrypted resolver directly:
- Open System Settings > Network.
- Select your active interface, then click Details.
- Open the DNS tab.
- Add one of the following:
https://dns.hostux.net/dns-queryfor DoHdns.hostux.netfor DoT
- Apply the change and close the panel.
Ad and tracker blocking
If you configure DoH manually, you can use the filtering endpoint:
https://dns.hostux.net/adsfor DoH with ad and tracker blocking
Manual DoT setup only accepts the hostname, so there is no path-based filtering in that mode. If you want filtering with DoT, use the dedicated configuration profile instead.
Notes
- Which method should you choose?
- Use a profile if you want the simplest setup or if you also manage Apple mobile devices. Use the built-in settings if you prefer a manual macOS-only configuration.
- DoH or DoT?
- DoH is more flexible because it supports the
/adsfiltering endpoint. DoT is simpler if you want to configure only a hostname. - System-wide coverage
- Both methods apply at the operating system level, so browsers and most applications use the same encrypted resolver.