How to Install and Uninstall dnscrypt-proxy.x86_64 Package on Red Hat Enterprise Linux 8 (RHEL 8)

Last updated: November 15,2024

1. Install "dnscrypt-proxy.x86_64" package

This guide covers the steps necessary to install dnscrypt-proxy.x86_64 on Red Hat Enterprise Linux 8 (RHEL 8)

$ sudo dnf update $ sudo dnf install dnscrypt-proxy.x86_64

2. Uninstall "dnscrypt-proxy.x86_64" package

Please follow the instructions below to uninstall dnscrypt-proxy.x86_64 on Red Hat Enterprise Linux 8 (RHEL 8):

$ sudo dnf remove dnscrypt-proxy.x86_64 $ sudo dnf autoremove

3. Information about the dnscrypt-proxy.x86_64 package on Red Hat Enterprise Linux 8 (RHEL 8)

Last metadata expiration check: 0:00:58 ago on Mon Feb 26 15:59:38 2024.
Available Packages
Name : dnscrypt-proxy
Version : 2.1.1
Release : 1.el8
Architecture : x86_64
Size : 3.4 M
Source : dnscrypt-proxy-2.1.1-1.el8.src.rpm
Repository : epel
Summary : Flexible DNS proxy, with support for encrypted DNS protocols
URL : https://github.com/jedisct1/dnscrypt-proxy
License : ISC
Description :
: A flexible DNS proxy, with support for modern encrypted DNS protocols such as
: DNSCrypt v2 and DNS-over-HTTP/2.
:
: Features:
:
: - DNS traffic encryption and authentication. Supports DNS-over-HTTPS (DoH)
: and DNSCrypt.
: - DNSSEC compatible
: - DNS query monitoring, with separate log files for regular and suspicious
: queries
: - Pattern-based local blocking of DNS names and IP addresses
: - Time-based filtering, with a flexible weekly schedule
: - Transparent redirection of specific domains to specific resolvers
: - DNS caching, to reduce latency and improve privacy
: - Local IPv6 blocking to reduce latency on IPv4-only networks
: - Load balancing: pick a set of resolvers, dnscrypt-proxy will automatically
: measure and keep track of their speed, and balance the traffic across the
: fastest available ones.
: - Cloaking: like a HOSTS file on steroids, that can return preconfigured
: addresses for specific names, or resolve and return the IP address of other
: names. This can be used for local development as well as to enforce safe
: search results on Google, Yahoo and Bing.
: - Automatic background updates of resolvers lists
: - Can force outgoing connections to use TCP; useful with tunnels such as Tor.