Back to Knowledge Base

Quick Configuration Endpoints

DNS over HTTPS

https://xyz01-srv.unrulycitizen.com/dns-query

DNS over TLS (Private DNS)

xyz01-srv.unrulycitizen.com

Android Private DNS Configuration Methods

Method 1: Standard Settings (Android 9+ Pie)

1
Open Android Settings

Open the Settings app from your app drawer or notification panel

2
Navigate to Network Settings

Tap "Network & internet" → "Advanced" → "Private DNS"

Note: Some manufacturers may have this under "Connections" or "Wi-Fi & Internet"

3
Select Private DNS Provider

Tap "Private DNS provider hostname" (not "Automatic")

4
Enter Provider Hostname

Enter the following hostname:

xyz01-srv.unrulycitizen.com
5
Save Configuration

Tap "Save" or checkmark to apply the settings

6
Verify Connection

Wait for "Connected" status. If it shows "Couldn't connect", check your network connection

Method 2: Manufacturer-Specific Locations

Private DNS settings may be located differently depending on your device manufacturer:

Samsung One UI
Settings → Connections → More connection settings → Private DNS
Google Pixel/Stock Android
Settings → Network & internet → Advanced → Private DNS
OnePlus OxygenOS
Settings → Wi-Fi & internet → Private DNS
Xiaomi MIUI
Settings → Connection & sharing → Private DNS
Alternative Search Method
# Use Settings search: 1. Open Settings 2. Tap Search (magnifying glass) 3. Type "Private DNS" 4. Tap the result to go directly to settings

Method 3: ADB Command Line (Advanced)

Configure Private DNS via ADB for automation or bulk deployment:

# Enable ADB debugging on your Android device first # Connect device via USB or WiFi debugging # Set Private DNS via ADB shell adb shell settings put global private_dns_mode hostname adb shell settings put global private_dns_specifier xyz01-srv.unrulycitizen.com # Verify current settings adb shell settings get global private_dns_mode adb shell settings get global private_dns_specifier # Alternative: Use root access (if available) su -c 'settings put global private_dns_mode hostname' su -c 'settings put global private_dns_specifier xyz01-srv.unrulycitizen.com' # Reset to automatic (disable custom Private DNS) adb shell settings put global private_dns_mode opportunistic

Private DNS Modes: off, automatic (opportunistic), hostname (manual)

Method 4: Tasker Automation

Automate Private DNS configuration using Tasker for different networks:

// Tasker Profile: Auto-enable Private DNS on trusted networks Profile: Trusted WiFi State: Wifi Connected [ SSID:YourTrustedNetwork MAC:* IP:* ] Enter Task: Enable Private DNS A1: Custom Setting Type: Global Name: private_dns_mode Value: hostname A2: Custom Setting Type: Global Name: private_dns_specifier Value: xyz01-srv.unrulycitizen.com // Profile: Disable on untrusted networks Profile: Mobile Data State: Cellular Network Enter Task: Disable Private DNS A1: Custom Setting Type: Global Name: private_dns_mode Value: opportunistic // Alternative: Use SecureTask plugin for better compatibility A1: SecureTask Configuration: Setting: global:private_dns_mode Value: hostname A2: SecureTask Configuration: Setting: global:private_dns_specifier Value: xyz01-srv.unrulycitizen.com

Method 5: Enterprise Management (MDM)

Deploy Private DNS settings across enterprise devices using Mobile Device Management:

Android Enterprise API
// JSON configuration for MDM systems { "privateDnsMode": "hostname", "privateDnsHostname": "xyz01-srv.unrulycitizen.com", "networkSettings": { "dnsOverTlsEnabled": true, "requireDnsOverTls": true } } // Microsoft Intune Configuration Device configuration → Profiles → Create profile → Platform: Android Enterprise → Profile type: Device restrictions → Connectivity: Private DNS → "Use custom" → Hostname: xyz01-srv.unrulycitizen.com // VMware Workspace ONE UEM Devices → Profiles & Resources → Profiles → Add → Android → Device Profile → Network → Private DNS → Custom Provider: xyz01-srv.unrulycitizen.com

Android Version Compatibility

Android 9+ (Pie)

Full Private DNS support. Native system-wide DoT.

Android 8.1 (Oreo)

Limited support. May require third-party apps.

Android 8.0 & Below

No native Private DNS. Use VPN-based solutions.

Custom ROMs

Enhanced support. May include additional features.

Verification

To verify Private DNS is working on your Android device:

Check Private DNS Status

# Method 1: Built-in Android verification 1. Go to Settings → Network & internet → Private DNS 2. Should show "Connected" status with provider hostname # Method 2: Use DNS lookup apps - Install "DNS Checker" or "Network Analyzer" from Play Store - Check that DNS queries show your Private DNS server # Method 3: Browser-based tests - Visit: https://dnsleaktest.com - Run extended test - Should show xyz01-srv.unrulycitizen.com as DNS server # Method 4: Command line (with Termux) pkg update && pkg install dnsutils nslookup google.com dig unrulycitizen.com # Method 5: Check network details Settings → About phone → Status → SIM status Look for DNS information (varies by manufacturer)

Test DoT Connection

# Using Termux (Android terminal emulator) pkg update pkg install curl dnsutils # Test DoT connection directly curl -H "accept: application/dns-json" \ "https://xyz01-srv.unrulycitizen.com/dns-query?name=unrulycitizen.com&type=A" # Alternative testing methods: # 1. Install "Private DNS Test" from Play Store # 2. Use "Network Connectivity" app from Android developers # 3. Check with "1.1.1.1" app's connection test # Monitor network traffic (requires root) tcpdump -i any -s 0 port 853 # Check system logs for DNS queries logcat | grep -i dns

Troubleshooting

Private DNS not working?

  • Ensure Android 9.0 or later
  • Check if your network allows port 853 (TLS)
  • Verify the hostname is correct (no https:// prefix)
  • Try switching between WiFi and mobile data
  • Restart your device after configuration
  • Check for VPN conflicts (disable VPN temporarily)

Common Android Issues

  • Corporate networks: May block external DNS servers
  • VPN apps: Often override Private DNS settings
  • Captive portals: Public WiFi may require disabling Private DNS
  • Manufacturer skins: Settings location may vary
  • Battery optimization: May affect DNS resolution
  • Certificate issues: Ensure device date/time is correct

Alternative Methods for Older Android

VPN-Based DNS Solutions

For Android versions below 9.0, use these alternative methods:

1.1.1.1 App (Cloudflare)
# Install from Play Store: "1.1.1.1: Faster & Safer Internet" # Enable WARP (VPN mode) for encrypted DNS # Or use DNS-only mode if available # Configuration: - Open 1.1.1.1 app - Tap "Set Up 1.1.1.1" - Choose between: • 1.1.1.1 with WARP (VPN) • 1.1.1.1 (DNS only) - Follow setup instructions
Intra App (by Google)
# Install from Play Store: "Intra" # Configure custom DNS server: - Open Intra app - Tap settings (gear icon) - Select "DNS over HTTPS" - Choose "Custom" - Enter: https://xyz01-srv.unrulycitizen.com/dns-query - Tap "Apply"
Personal DNS Filter Apps
# Apps like "DNS Changer" or "Private DNS" # Create local VPN to redirect DNS queries # Configure custom DNS server: 140.82.41.243 # May not support DoT/DoH directly

Enhanced Android Security

Recommended Privacy-Focused Security Settings

Combine Private DNS with these privacy-respecting Android security settings:

# Android Privacy & Security Recommendations: 1. Use Strong Passphrase (Not Biometrics) Settings → Security → Screen lock → Strong passphrase - Avoid biometrics (fingerprint/face unlock) - Use a memorable but strong passphrase - Minimum 12 characters with mixed characters 2. Disable Location Services When Not Needed Settings → Location → Turn off when not in use Settings → Apps → [App Name] → Permissions → Location → Deny 3. Review App Permissions Regularly Settings → Apps → [App Name] → Permissions - Revoke unnecessary permissions - Deny access to contacts, microphone, camera - Disable background data for non-essential apps 4. Disable Advertising ID Settings → Google → Ads → Delete advertising ID Settings → Privacy → Ads → Opt out of Ads Personalization 5. Use Encryption (Device Security) Settings → Security → Encryption & credentials - Ensure device encryption is enabled - Use secure startup when available 6. Disable Unknown Sources Settings → Security → Install unknown apps - Disable for all apps - Only install from F-Droid or trusted repositories 7. Regular System Updates Settings → System → System updates → Check for updates - Keep Android security patches current - Review changelogs for privacy implications 8. Use Open Source Alternatives - F-Droid instead of Google Play Store - OpenStreetMap instead of Google Maps - Signal instead of default messaging - Firefox instead of Chrome 9. Network Security Settings → Network & internet → Private DNS → Always on - Use encrypted DNS for all connections - Avoid public WiFi without VPN - Disable WiFi/Bluetooth scanning 10. App Isolation Settings → Apps → Special app access → Install unknown apps - Disable for all apps - Use shelter/work profile for untrusted apps - Consider custom ROM without Google services

Need More Help?

Join our community forums for personalized assistance and support

Join Community Forums Back to Knowledge Base