This article details configuring the WireGuard protocol on the Hide.me VPN service using an iOS device. It covers setup, configuration, and troubleshooting.
Active Hide.me subscription.
WireGuard iOS application installed.
Hide.me account credentials.
Download WireGuard Configuration:
Log into the Hide.me member area on their website.
Navigate to the WireGuard configuration generator.
Select "iOS" as the platform.
Choose a server location.
Download the generated .conf file.
Import Configuration to WireGuard App:
Open the WireGuard application on your iOS device.
Tap the "+" button to add a new tunnel.
Select "Import from file or archive".
Locate and select the downloaded .conf file.
Configure Tunnel Settings (if necessary):
Interface Section: The PrivateKey is automatically populated from the config file. Generate a new keypair only if the existing one is compromised.
Address: This field should be pre-populated with an IP address from the Hide.me configuration. Ensure it's a valid private IP within the VPN's subnet.
DNS Servers: The configuration file usually includes Hide.me's DNS servers. Verify their presence to prevent DNS leaks. Common values are 10.10.10.1 and 10.10.10.2.
Peer Section:
PublicKey: This is Hide.me's server public key, crucial for authentication.
AllowedIPs: Typically set to 0.0.0.0/0 to route all traffic through the tunnel.
Endpoint: The server's IP address and port (e.g., 192.168.1.1:51820).
PersistentKeepalive: Set to a value like 25 to keep the connection alive, especially on mobile networks.
Activate the Tunnel:
Toggle the switch next to the tunnel name in the WireGuard app to activate the connection.
IP Address Verification: After connecting, verify your public IP address has changed using a website like ifconfig.me.
DNS Leak Test: Perform a DNS leak test using a dedicated online tool to ensure your DNS requests are routed through Hide.me's servers.
Firewall Interference: Ensure your iOS device's firewall or any network-level firewalls aren't blocking UDP traffic on the WireGuard port (typically 51820).
Incorrect Configuration: Double-check the .conf file for errors, especially the PublicKey, Endpoint, and AllowedIPs.
MTU Issues: If experiencing connectivity problems, try lowering the MTU (Maximum Transmission Unit) in the WireGuard interface settings. A common starting point is 1420. However, MTU cannot be directly configured via the iOS WireGuard app. This issue needs to be resolved elsewhere.
Downloaded WireGuard configuration file from Hide.me.
Imported configuration into the WireGuard iOS app.
Verified IP address change upon connection.
Confirmed no DNS leaks.
Checked for firewall interference.