-
Notifications
You must be signed in to change notification settings - Fork 120
/
Copy pathproxychains.conf
228 lines (200 loc) · 7.42 KB
/
proxychains.conf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
# proxychains.conf FOR PROXYCHAINS.EXE ALPHA
#
# SOCKS5 tunneling proxifier with Fake DNS.
#
# The option below identifies how the ProxyList is treated.
# only one option should be uncommented at time,
# otherwise the last appearing option will be accepted
#
#
# DYNAMIC_CHAIN IS NOT SUPPORTED AT PRESENT
#dynamic_chain
# DYNAMIC_CHAIN IS NOT SUPPORTED AT PRESENT
#
# Dynamic - Each connection will be done via chained proxies
# all proxies chained in the order as they appear in the list
# at least one proxy must be online to play in chain
# (dead proxies are skipped)
# otherwise EINTR is returned to the app
#
#
strict_chain
#
# Strict - Each connection will be done via chained proxies
# all proxies chained in the order as they appear in the list
# all proxies must be online to play in chain
# otherwise EINTR is returned to the app
#
# RANDOM_CHAIN IS NOT SUPPORTED AT PRESENT
#random_chain
# RANDOM_CHAIN IS NOT SUPPORTED AT PRESENT
#
# Random - Each connection will be done via random proxy
# (or proxy chain, see chain_len) from the list.
# this option is good to test your IDS :)
# Make sense only if random_chain
#chain_len = 2
# Quiet mode (no output from library)
#quiet_mode
# Proxy DNS requests using Fake IP - no leak for DNS data
proxy_dns
# Proxy DNS requests using UDP associate feature provided by SOCKS5 proxy
# NOT SUPPORTED AT PRESENT
#proxy_dns_udp_associate
# NOT SUPPORTED AT PRESENT
# set the class A subnet number to usefor use of the internal remote DNS mapping
# we use the reserved 224.x.x.x range by default,
# if the proxified app does a DNS request, we will return an IP from that range.
# on further accesses to this ip we will send the saved DNS name to the proxy.
# in case some control-freak app checks the returned ip, and denies to
# connect, you can use another subnet, e.g. 10.x.x.x or 127.x.x.x.
# of course you should make sure that the proxified app does not need
# *real* access to this subnet.
# i.e. dont use the same subnet then in the localnet section
#remote_dns_subnet 127
#remote_dns_subnet 10
remote_dns_subnet 224
# This enables you to set a CIDR block for the internal remote DNS mapping
# for example, remote_dns_subnet_cidr_v4 224.0.0.0/8 is equivalent to
# remote_dns_subnet 224.
# subnet mask format like 255.255.0.0 is not allowed here
# By default 224.0.0.0/8 and 250d::/16
#remote_dns_subnet_cidr_v4 224.0.0.0/8
#remote_dns_subnet_cidr_v6 250d::/16
# Some timeouts in milliseconds
# Defaults: tcp_read_time_out 5000, tcp_connect_time_out 3000
#tcp_read_time_out 15000
#tcp_connect_time_out 8000
# ==== Rules ====
# You can control which IP range not to be proxied.
# First matched rule decides the target (PROXIED, DIRECT or BLOCK) of a
# connection.
# localnet always has a "DIRECT" target, which means they will not be
# proxied.
# By default enable localnet for loopback address ranges
# RFC5735 Loopback address range
localnet 127.0.0.0/255.0.0.0
# RFC1918 Private Address Ranges
# localnet 10.0.0.0/255.0.0.0
# localnet 172.16.0.0/255.240.0.0
# localnet 192.168.0.0/255.255.0.0
# Example for localnet exclusion
## Exclude connections to 192.168.1.0/24 with port 80
# localnet 192.168.1.0:80/255.255.255.0
## Exclude connections to 192.168.100.0/24
# localnet 192.168.100.0/255.255.255.0
## Exclude connections to ANYwhere with port 80
# localnet 0.0.0.0:80/0.0.0.0
# === Additional routing rules ===
# These rules enables further control on websites/addresses which
# should be proxied or not.
# All rules can have an extra optional restriction of target port.
# However, if the proxied application uses gethostbyname() to do DNS
# query instead of getaddrinfo() series, this port part of the rule
# is invalidated.
# Three target is allowed: PROXY, DIRECT and BLOCK.
#
# - DOMAIN-KEYWORD rule, matching requests where the FQDN contains
# a specific string.
# e.g. DOMAIN-KEYWORD,google:80,DIRECT means any request to FQDN
# containing "google" with the target port 80 will NOT be proxied.
#
# - DOMAIN-SUFFIX rule, matching requests where the FQDN is suffixed
# with a specific string.
# e.g. DOMAIN-SUFFIX,.ru,PROXY means any FQDN that ends with ".ru"
# will be proxied.
#
# - DOMAIN-FULL rule, matching requests where the FQDN is exactly
# identical to a specific string.
# e.g. DOMAIN-FULL,duckduckgo.com,DIRECT means every request to
# "duckduckgo.com" (must entirely match) will NOT be proxied.
#
# - DOMAIN rule, the alias of DOMAIN-FULL rule.
#
# - IP-CIDR rule, matching requests to IP address in a CIDR block.
# Note if an FQDN is previously matched by a DOMAIN* rule, this rule
# is not applied to the resolved IPs. (Because fake IPs are used in
# this case)
# e.g. IP-CIDR,8.8.8.8/32,DIRECT
# IP-CIDR,250e::/16,PROXY
# IP-CIDR,[250c::]:443/16,PROXY
# IP-CIDR,10.0.0.0:80/8,DIRECT
# Note that "IP-CIDR,127.0.0.0/8,DIRECT" is equivalent to
# "localnet 127.0.0.0/255.0.0.0".
IP-CIDR,10.0.0.0/8,DIRECT
IP-CIDR,172.16.0.0/12,DIRECT
IP-CIDR,192.168.0.0/255.255.0.0,DIRECT
IP-CIDR,fe80::/8,DIRECT
# - PORT rule, matching requests to a target port.
# e.g. PORT,25,BLOCK
#
# - FINAL "rule", deciding the destiny of a request immediately.
# When this "rule" is used, it is not treated as a "match".
# If you want an unconditional match, try other rules instead, like
# IP-CIDR,0.0.0.0/0,PROXY or DOMAIN-KEYWORD,,PROXY.
#
# When no rules and no FINAL "rule" matched, a connection will be
# PROXIED by default, unless you specify option default_target.
# e.g. FINAL,PROXY
# Will fake IP entries created by a descendant process be removed if this
# process exited? 1 by default.
delete_fake_ip_after_child_exits 1
# When no rules and no FINAL "rule" matched, a connection's default
# target. PROXY by default.
default_target PROXY
# Will the rules apply to the resolved IP if corresponding hostname
# did not match any rules? (FINAL is not counted as a rule)
# IF SO, SET THIS OPTION'S VALUE TO 0. 1 by default.
use_fake_ip_when_hostname_not_matched 1
# ===== Keep them as-is =====
map_resolved_ip_to_host 0
search_for_host_by_resolved_ip 0
# or force_resolve_by_hosts_file 1
resolve_locally_if_match_hosts 1
# ===== Keep them as-is - end =====
# Generate fake ips by FQDN hash - 1 (better to get rid of SSH safe
# warnings)
# Generate fake ips sequentially - 0
# Default: 1
gen_fake_ip_using_hashed_hostname 1
# If your *first* proxy supports connecting to it by an IPv4 address
# (resolved by a hostname or specified manually), set its value to 1.
# This enables proxying IPv4 address.
# If disabled, fake IPv4 address is not returned.
# 1 by default
first_tunnel_uses_ipv4 1
# If your *first* proxy supports connecting to it by an IPv6 address
# (resolved by a hostname or specified manually), set its value to 1.
# This enables proxying IPv6 address.
# If disabled, fake IPv6 address is not returned.
# 0 by default
first_tunnel_uses_ipv6 0
# Custom hosts file path
#custom_hosts_file_path C:\Some Path\hosts
#custom_hosts_file_path /etc/alternative/hosts
# Custom log level.
# 600 - VERBOSE
# 500 - DEBUG
# 400 - INFO
# 300 - WARNING
# 200 - ERROR
# 100 - CRITICAL
# "log_level 200" is equivalent to "quiet_mode"
log_level 400
# ProxyList format
# type host port [user pass]
# (values separated by 'tab' or 'blank')
#
#
# Examples:
#
# socks5 localhost 1080
# socks5 localhost 1080 user password
# socks5 192.168.67.78 1080 lamer secret
#
#
# proxy types: socks5
# ( auth types supported: "user/pass"-socks5 )
#
[ProxyList]
socks5 localhost 1080