proxychains.conf (3690B)
1# proxychains.conf VER 4.x 2# 3# HTTP, SOCKS4a, SOCKS5 tunneling proxifier with DNS. 4 5 6# The option below identifies how the ProxyList is treated. 7# only one option should be uncommented at time, 8# otherwise the last appearing option will be accepted 9# 10#dynamic_chain 11# 12# Dynamic - Each connection will be done via chained proxies 13# all proxies chained in the order as they appear in the list 14# at least one proxy must be online to play in chain 15# (dead proxies are skipped) 16# otherwise EINTR is returned to the app 17# 18strict_chain 19# 20# Strict - Each connection will be done via chained proxies 21# all proxies chained in the order as they appear in the list 22# all proxies must be online to play in chain 23# otherwise EINTR is returned to the app 24# 25#round_robin_chain 26# 27# Round Robin - Each connection will be done via chained proxies 28# of chain_len length 29# all proxies chained in the order as they appear in the list 30# at least one proxy must be online to play in chain 31# (dead proxies are skipped). 32# the start of the current proxy chain is the proxy after the last 33# proxy in the previously invoked proxy chain. 34# if the end of the proxy chain is reached while looking for proxies 35# start at the beginning again. 36# otherwise EINTR is returned to the app 37# These semantics are not guaranteed in a multithreaded environment. 38# 39#random_chain 40# 41# Random - Each connection will be done via random proxy 42# (or proxy chain, see chain_len) from the list. 43# this option is good to test your IDS :) 44 45# Make sense only if random_chain or round_robin_chain 46#chain_len = 2 47 48# Quiet mode (no output from library) 49quiet_mode 50 51# Proxy DNS requests - no leak for DNS data 52proxy_dns 53 54# set the class A subnet number to use for the internal remote DNS mapping 55# we use the reserved 224.x.x.x range by default, 56# if the proxified app does a DNS request, we will return an IP from that range. 57# on further accesses to this ip we will send the saved DNS name to the proxy. 58# in case some control-freak app checks the returned ip, and denies to 59# connect, you can use another subnet, e.g. 10.x.x.x or 127.x.x.x. 60# of course you should make sure that the proxified app does not need 61# *real* access to this subnet. 62# i.e. dont use the same subnet then in the localnet section 63#remote_dns_subnet 127 64#remote_dns_subnet 10 65remote_dns_subnet 224 66 67# Some timeouts in milliseconds 68tcp_read_time_out 15000 69tcp_connect_time_out 8000 70 71### Examples for localnet exclusion 72## localnet ranges will *not* use a proxy to connect. 73## Exclude connections to 192.168.1.0/24 with port 80 74# localnet 192.168.1.0:80/255.255.255.0 75 76## Exclude connections to 192.168.100.0/24 77# localnet 192.168.100.0/255.255.255.0 78 79## Exclude connections to ANYwhere with port 80 80# localnet 0.0.0.0:80/0.0.0.0 81 82## RFC5735 Loopback address range 83## if you enable this, you have to make sure remote_dns_subnet is not 127 84## you'll need to enable it if you want to use an application that 85## connects to localhost. 86# localnet 127.0.0.0/255.0.0.0 87 88## RFC1918 Private Address Ranges 89# localnet 10.0.0.0/255.0.0.0 90# localnet 172.16.0.0/255.240.0.0 91# localnet 192.168.0.0/255.255.0.0 92 93# ProxyList format 94# type ip port [user pass] 95# (values separated by 'tab' or 'blank') 96# 97# only numeric ipv4 addresses are valid 98# 99# 100# Examples: 101# 102# socks5 192.168.67.78 1080 lamer secret 103# http 192.168.89.3 8080 justu hidden 104# socks4 192.168.1.49 1080 105# http 192.168.39.93 8080 106# 107# 108# proxy types: http, socks4, socks5 109# ( auth types supported: "basic"-http "user/pass"-socks ) 110# 111[ProxyList] 112# add proxy here ... 113# meanwile 114# defaults set to "tor" 115# socks4 127.0.0.1 9050 116socks5 127.0.0.1 1080