AdGuard for iOS 4.1.0 and 4.1.0 Pro

Not open for further replies.


Quality Assurance
Long time ago scientists discovered an interesting phenomenon. While we typically think that what we most want is to actually get what we want, the most intense source of pleasure is in *looking forward to* getting what we want. That's the dopamine system, also known as the wanting system.

It's been months since Apple added native DNS encryption support to iOS and you might've thought that we at AdGuard just have been lazy not adding support too? Not at all! We've just been trying to follow science and provide you with as much pleasure as possible. Finally, the intensification period ends and catharsis begins!

Native support for encrypted DNS ☑ #1589

So in 2020 Apple platforms started natively supporting encrypted DNS. Namely, two protocols were supported — DNS-over-TLS and DNS-over-HTTPS (DoT and DoH). Earlier you could set up and manage DNS profiles in AdGuard. Yet, the solution wasn’t so snorky. Now we've made things simple: there is no need to download and install DNS profiles, just enable Native implementation in AdGuard for iOS settings:

Convenient + efficient = conficient! That's what Native DNS is. And what's really good? It's compatible with more VPNs.

But there is a disad — can’t filter traffic locally. Plus, you’ll be limited with DoH and DoT and won’t be able to use DNSCrypt or the brand new DoQ.

Social login #1507

Now the Google login widget is present in the app (AdGuard > Settings > License > Login). A single click on a Google Sign-in button, and you're there!

For a successful login, you should have an AdGuard account registered to your Google email address. Otherwise, there will be an error.

Don't have an AdGuard account? Create one at first, then you'll be able to bind it to your Google account.

Low-level stuff. ☢ For geeks only!!

Blocking mode, Block IPv6, Blocked response TTL, Bootstrap and Fallback servers — all settings on this screen are new, except for the Tunnel mode.

Bootstrap and Fallback

Fallback is simply a backup DNS server. If you chose a DNS server and something happened to it (whatever the reason), a fallback is needed to set the backup DNS server until the main server responds.

With Bootstrap, it’s a little more complicated. For AdGuard for iOS to use a custom secure DNS server, our app needs to get its IP address first. For this purpose, the system DNS is used by default, but sometimes this is not possible for various reasons. In such cases, Bootstrap could be used to get the IP address of the selected secure DNS server. Here are two examples to illustrate when a custom Bootstrap server might help:
1. When a system default DNS server does not return the IP address of a secure DNS server and it is not possible to use a secure one.
2. When our app and third-party VPN are used simultaneously and it is not possible to use System DNS as a Bootstrap.

Block IPv6 #1289

For any DNS query sent to get an IPv6 address, our app returns an empty response (as if this IPv6 address does not exist). Now there is an option not to return IPv6 addresses.

Does anybody actually read these? ┬──┬ ノ( ゜-゜ノ)

* [Fixed] AdGuard shows DNS requests although disabled #1667
* [Fixed] VPN restarts when entering the app #1709
* [Enhancement] Intercept abp:subscribe and URLs #27
* [Other] Updated DnsLibs to 1.4.33


Beta Tester
@Aydin и @Chinaski, в полях bootstrap и foolback IP-адресов как правильно разделять адреса? При помощи запятой, запятой + пробела?
Not open for further replies.