|
| 1 | +# proxychains.conf VER 4.x |
| 2 | +# |
| 3 | +# HTTP, SOCKS4a, SOCKS5 tunneling proxifier with DNS. |
| 4 | + |
| 5 | + |
| 6 | +# The option below identifies how the ProxyList is treated. |
| 7 | +# only one option should be uncommented at time, |
| 8 | +# otherwise the last appearing option will be accepted |
| 9 | +# |
| 10 | +#dynamic_chain |
| 11 | +# |
| 12 | +# Dynamic - Each connection will be done via chained proxies |
| 13 | +# all proxies chained in the order as they appear in the list |
| 14 | +# at least one proxy must be online to play in chain |
| 15 | +# (dead proxies are skipped) |
| 16 | +# otherwise EINTR is returned to the app |
| 17 | +# |
| 18 | +strict_chain |
| 19 | +# |
| 20 | +# Strict - Each connection will be done via chained proxies |
| 21 | +# all proxies chained in the order as they appear in the list |
| 22 | +# all proxies must be online to play in chain |
| 23 | +# otherwise EINTR is returned to the app |
| 24 | +# |
| 25 | +#round_robin_chain |
| 26 | +# |
| 27 | +# Round Robin - Each connection will be done via chained proxies |
| 28 | +# of chain_len length |
| 29 | +# all proxies chained in the order as they appear in the list |
| 30 | +# at least one proxy must be online to play in chain |
| 31 | +# (dead proxies are skipped). |
| 32 | +# the start of the current proxy chain is the proxy after the last |
| 33 | +# proxy in the previously invoked proxy chain. |
| 34 | +# if the end of the proxy chain is reached while looking for proxies |
| 35 | +# start at the beginning again. |
| 36 | +# otherwise EINTR is returned to the app |
| 37 | +# These semantics are not guaranteed in a multithreaded environment. |
| 38 | +# |
| 39 | +#random_chain |
| 40 | +# |
| 41 | +# Random - Each connection will be done via random proxy |
| 42 | +# (or proxy chain, see chain_len) from the list. |
| 43 | +# this option is good to test your IDS :) |
| 44 | + |
| 45 | +# Make sense only if random_chain or round_robin_chain |
| 46 | +#chain_len = 2 |
| 47 | + |
| 48 | +# Quiet mode (no output from library) |
| 49 | +#quiet_mode |
| 50 | + |
| 51 | +# Proxy DNS requests - no leak for DNS data |
| 52 | +proxy_dns |
| 53 | + |
| 54 | +# set the class A subnet number to use for the internal remote DNS mapping |
| 55 | +# we use the reserved 224.x.x.x range by default, |
| 56 | +# if the proxified app does a DNS request, we will return an IP from that range. |
| 57 | +# on further accesses to this ip we will send the saved DNS name to the proxy. |
| 58 | +# in case some control-freak app checks the returned ip, and denies to |
| 59 | +# connect, you can use another subnet, e.g. 10.x.x.x or 127.x.x.x. |
| 60 | +# of course you should make sure that the proxified app does not need |
| 61 | +# *real* access to this subnet. |
| 62 | +# i.e. dont use the same subnet then in the localnet section |
| 63 | +#remote_dns_subnet 127 |
| 64 | +#remote_dns_subnet 10 |
| 65 | +remote_dns_subnet 224 |
| 66 | + |
| 67 | +# Some timeouts in milliseconds |
| 68 | +tcp_read_time_out 15000 |
| 69 | +tcp_connect_time_out 8000 |
| 70 | + |
| 71 | +### Examples for localnet exclusion |
| 72 | +## localnet ranges will *not* use a proxy to connect. |
| 73 | +## Exclude connections to 192.168.1.0/24 with port 80 |
| 74 | +# localnet 192.168.1.0:80/255.255.255.0 |
| 75 | + |
| 76 | +## Exclude connections to 192.168.100.0/24 |
| 77 | +# localnet 192.168.100.0/255.255.255.0 |
| 78 | + |
| 79 | +## Exclude connections to ANYwhere with port 80 |
| 80 | +# localnet 0.0.0.0:80/0.0.0.0 |
| 81 | + |
| 82 | +## RFC5735 Loopback address range |
| 83 | +## if you enable this, you have to make sure remote_dns_subnet is not 127 |
| 84 | +## you'll need to enable it if you want to use an application that |
| 85 | +## connects to localhost. |
| 86 | +# localnet 127.0.0.0/255.0.0.0 |
| 87 | + |
| 88 | +## RFC1918 Private Address Ranges |
| 89 | +# localnet 10.0.0.0/255.0.0.0 |
| 90 | +# localnet 172.16.0.0/255.240.0.0 |
| 91 | +# localnet 192.168.0.0/255.255.0.0 |
| 92 | + |
| 93 | +# ProxyList format |
| 94 | +# type ip port [user pass] |
| 95 | +# (values separated by 'tab' or 'blank') |
| 96 | +# |
| 97 | +# only numeric ipv4 addresses are valid |
| 98 | +# |
| 99 | +# |
| 100 | +# Examples: |
| 101 | +# |
| 102 | +# socks5 192.168.67.78 1080 lamer secret |
| 103 | +# http 192.168.89.3 8080 justu hidden |
| 104 | +# socks4 192.168.1.49 1080 |
| 105 | +# http 192.168.39.93 8080 |
| 106 | +# |
| 107 | +# |
| 108 | +# proxy types: http, socks4, socks5 |
| 109 | +# ( auth types supported: "basic"-http "user/pass"-socks ) |
| 110 | +# |
| 111 | +[ProxyList] |
| 112 | +# add proxy here ... |
| 113 | +# meanwile |
| 114 | +# defaults set to "tor" |
| 115 | +#http 127.0.0.1 3128 |
| 116 | +http 10.236.1.189 3128 |
| 117 | + |
| 118 | + |
0 commit comments