proxychains-ng/src/proxychains.conf

135 lines
3.7 KiB
Plaintext

# proxychains.conf VER 4.x
#
# HTTP, SOCKS4a, SOCKS5 tunneling proxifier with DNS.
# The option below identifies how the ProxyList is treated.
# Only one option should be uncommented at time, otherwise the last
# appearing option will be accepted.
# Dynamic - Each connection will be done via chained proxies.
# All proxies chained in the order as they appear in the list.
# At least one proxy must be online to play in chain (dead proxies are
# skipped), otherwise EINTR is returned to the app.
#
#dynamic_chain
# Strict - Each connection will be done via chained proxies.
# All proxies chained in the order as they appear in the list.
# All proxies must be online to play in chain, otherwise EINTR is
# returned to the app.
#
strict_chain
# Round Robin - Each connection will be done via chained proxies of
# chain_len length.
# All proxies chained in the order as they appear in the list.
# At least one proxy must be online to play in chain (dead proxies are
# skipped).
# The start of the current proxy chain is the proxy after the last
# proxy in the previously invoked proxy chain.
# If the end of the proxy chain is reached while looking for proxies,
# start at the beginning again.
# Otherwise EINTR is returned to the app.
# These semantics are not guaranteed in a multithreaded environment.
#
#round_robin_chain
# Random - Each connection will be done via random proxy (or proxy
# chain, see chain_len) from the list.
# This option is good to test your IDS :)
#
#random_chain
# Make sense only if random_chain or round_robin_chain.
#
#chain_len = 2
# Quiet mode (no output from library).
#
#quiet_mode
# Proxy DNS requests - no leak for DNS data.
#
proxy_dns
# Set the class A subnet number to use for the internal remote DNS
# mapping.
# We use the reserved 224.x.x.x range by default, if the proxified app
# does a DNS request, we will return an IP from that range.
# On further accesses to this ip we will send the saved DNS name to
# the proxy.
# In case some control-freak app checks the returned ip, and denies to
# connect, you can use another subnet, e.g. 10.x.x.x or 127.x.x.x.
# Of course you should make sure that the proxified app does not need
# *real* access to this subnet, i.e. don't use the same subnet then in
# the localnet section.
#
#remote_dns_subnet 127
#remote_dns_subnet 10
remote_dns_subnet 224
# Some timeouts in milliseconds.
#
tcp_read_time_out 15000
tcp_connect_time_out 8000
# Examples for localnet exclusion.
# Localnet ranges will *not* use a proxy to connect.
# Exclude connections to 192.168.1.0/24 with port 80.
#
#localnet 192.168.1.0:80/255.255.255.0
# Exclude connections to 192.168.100.0/24.
#
#localnet 192.168.100.0/255.255.255.0
# Exclude connections to ANYwhere with port 80.
#
#localnet 0.0.0.0:80/0.0.0.0
# RFC5735 loopback address range.
# If you enable this, you have to make sure remote_dns_subnet is not
# 127.
# You'll need to enable it if you want to use an application that
# connects to localhost.
#
#localnet 127.0.0.0/255.0.0.0
# RFC1918 private address ranges.
#
#localnet 10.0.0.0/255.0.0.0
#localnet 172.16.0.0/255.240.0.0
#localnet 192.168.0.0/255.255.0.0
# ProxyList format.
# type ip port [user pass]
# (Values separated by 'tab' or 'blank')
#
# Only numeric ipv4 addresses are valid.
#
#
# Examples:
#
# socks5 192.168.67.78 1080 lamer secret
# http 192.168.89.3 8080 justu hidden
# socks4 192.168.1.49 1080
# http 192.168.39.93 8080
#
#
# Proxy types: http, socks4, socks5.
# (Auth types supported: "basic"-http, "user/pass"-socks)
#
[ProxyList]
# Add proxy here.
# Meanwile, defaults set to "tor".
socks4 127.0.0.1 9050