First of all, you have to install the dnscrypt-proxy plugin (os-dnscrypt-proxy) from the plugins view reachable via System ‣ Firmware ‣ Plugins.

After a page reload you will get a new menu entry under Services for DNSCrypt-Proxy.

When you start the daemon, it looks for a list of public DNS server from here: https://dnscrypt.info/public-servers

Depending on all settings below the list can be shortened to your choice, like only IPv4, or logging disabled. The fastest two servers will be used for DNS queries.

General Settings

Enable DNSCrypt-Proxy

Enable and start DNSCrypt-Proxy.

Listen Address

Here you set the addresses and ports to listen on. Default is localhost and port 5353. If you want it to listen to port 53 you must enable Allow Privileged Ports, especially when the system itself should treat it as a resolver. required when using this service as a standalone core DNS server.

Allow Privileged Ports

This allows the service to listen on ports below 1024, like 53.

Max Client Connections

How many clients are allowed to contact the daemon.

Use IPv4 Servers

Use IPv4 enabled servers.

Use IPv6 Servers

Only use IPv6 enabled servers.

Use DNSCrypt Servers

Include resolvers supporting DNSCrypt protocol in the decision process.

Use DNS-over-HTTPS Servers

Include resolvers supporting DNS-over-HTTPS in the decision process.

Require DNSSEC

Only use resolvers supporting DNSSEC protocol.

Require NoLog

Only use resolvers with disabled loggong.

Require NoFilter

Only use resolvers without filtering. Otherwise requests would also filtered for adult content or ad’s.

Force TCP

Always use TCP to connect to upstream servers. This can be useful if you need to route everything through Tor, otherwise keep it disabled.


Use this to route all TCP connections to a local Tor node, format has to be like


How long a DNS query will wait for a response in milliseconds.


Keepalive for HTTP (HTTPS, HTTP/2) queries in seconds.

Cert Refresh Delay

Delay in minutes after which certificates are reloaded.

Ephemeral Keys

Create a new, unique key for every single DNS query. This may improve privacy but can also have a significant impact on CPU usage.

TLS Disable Session Tickets

Disable TLS session tickets - increases privacy but also latency.

Fallback Resolver

This is a normal, non-encrypted DNS resolver, that will be only used for one-shot queries when retrieving the initial resolvers list, and only if the system DNS configuration does not work.

Block IPv6

Immediately respond to IPv6-related queries with an empty response. This makes things faster when there is no IPv6 WAN connectivity.


Enable a DNS cache to reduce latency and outgoing traffic.

Cache Size

Set the cache size.

Cache Min TTL

Minimum TTL for cached entries.

Cache Max TTL

Maximum TTL for cached entries.

Cache Negative Min TTL

Minimum TTL for negatively cached entries.

Cache Negative Max TTL

Maximum TTL for negatively cached entries.

Example: Standalone DNS

You can use the DNSCrypt-Proxy as a full-featured standalone DNS instead of Unbound or Dnsmasq. This setup has the advantage that you do not need a forwarder solution for encrypting DNS requests or the usage of DNSBL.

To do so go to Services->Unbound DNS->General and uncheck Enable. If you are using Dnsmasq go to Services->Dnsmasq DNS->Settings and uncheck Enable. Now change to Services->DNSCrypt-Proxy->Configuration and add the Listen Address for the service to be considered as standalone by the core system.

Now you can go on with your configuration task, like choosing which servers to use, privacy policy or caching. Also cloaking (overrides) or DNSBL can be used without any workarounds.