proxychains.conf 7.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228
  1. # proxychains.conf FOR PROXYCHAINS.EXE ALPHA
  2. #
  3. # SOCKS5 tunneling proxifier with Fake DNS.
  4. #
  5. # The option below identifies how the ProxyList is treated.
  6. # only one option should be uncommented at time,
  7. # otherwise the last appearing option will be accepted
  8. #
  9. #
  10. # DYNAMIC_CHAIN IS NOT SUPPORTED AT PRESENT
  11. #dynamic_chain
  12. # DYNAMIC_CHAIN IS NOT SUPPORTED AT PRESENT
  13. #
  14. # Dynamic - Each connection will be done via chained proxies
  15. # all proxies chained in the order as they appear in the list
  16. # at least one proxy must be online to play in chain
  17. # (dead proxies are skipped)
  18. # otherwise EINTR is returned to the app
  19. #
  20. #
  21. strict_chain
  22. #
  23. # Strict - Each connection will be done via chained proxies
  24. # all proxies chained in the order as they appear in the list
  25. # all proxies must be online to play in chain
  26. # otherwise EINTR is returned to the app
  27. #
  28. # RANDOM_CHAIN IS NOT SUPPORTED AT PRESENT
  29. #random_chain
  30. # RANDOM_CHAIN IS NOT SUPPORTED AT PRESENT
  31. #
  32. # Random - Each connection will be done via random proxy
  33. # (or proxy chain, see chain_len) from the list.
  34. # this option is good to test your IDS :)
  35. # Make sense only if random_chain
  36. #chain_len = 2
  37. # Quiet mode (no output from library)
  38. #quiet_mode
  39. # Proxy DNS requests using Fake IP - no leak for DNS data
  40. proxy_dns
  41. # Proxy DNS requests using UDP associate feature provided by SOCKS5 proxy
  42. # NOT SUPPORTED AT PRESENT
  43. #proxy_dns_udp_associate
  44. # NOT SUPPORTED AT PRESENT
  45. # set the class A subnet number to usefor use of the internal remote DNS mapping
  46. # we use the reserved 224.x.x.x range by default,
  47. # if the proxified app does a DNS request, we will return an IP from that range.
  48. # on further accesses to this ip we will send the saved DNS name to the proxy.
  49. # in case some control-freak app checks the returned ip, and denies to
  50. # connect, you can use another subnet, e.g. 10.x.x.x or 127.x.x.x.
  51. # of course you should make sure that the proxified app does not need
  52. # *real* access to this subnet.
  53. # i.e. dont use the same subnet then in the localnet section
  54. #remote_dns_subnet 127
  55. #remote_dns_subnet 10
  56. remote_dns_subnet 224
  57. # This enables you to set a CIDR block for the internal remote DNS mapping
  58. # for example, remote_dns_subnet_cidr_v4 224.0.0.0/8 is equivalent to
  59. # remote_dns_subnet 224.
  60. # subnet mask format like 255.255.0.0 is not allowed here
  61. # By default 224.0.0.0/8 and 250d::/16
  62. #remote_dns_subnet_cidr_v4 224.0.0.0/8
  63. #remote_dns_subnet_cidr_v6 250d::/16
  64. # Some timeouts in milliseconds
  65. # Defaults: tcp_read_time_out 5000, tcp_connect_time_out 3000
  66. #tcp_read_time_out 15000
  67. #tcp_connect_time_out 8000
  68. # ==== Rules ====
  69. # You can control which IP range not to be proxied.
  70. # First matched rule decides the target (PROXIED, DIRECT or BLOCK) of a
  71. # connection.
  72. # localnet always has a "DIRECT" target, which means they will not be
  73. # proxied.
  74. # By default enable localnet for loopback address ranges
  75. # RFC5735 Loopback address range
  76. localnet 127.0.0.0/255.0.0.0
  77. # RFC1918 Private Address Ranges
  78. # localnet 10.0.0.0/255.0.0.0
  79. # localnet 172.16.0.0/255.240.0.0
  80. # localnet 192.168.0.0/255.255.0.0
  81. # Example for localnet exclusion
  82. ## Exclude connections to 192.168.1.0/24 with port 80
  83. # localnet 192.168.1.0:80/255.255.255.0
  84. ## Exclude connections to 192.168.100.0/24
  85. # localnet 192.168.100.0/255.255.255.0
  86. ## Exclude connections to ANYwhere with port 80
  87. # localnet 0.0.0.0:80/0.0.0.0
  88. # === Additional routing rules ===
  89. # These rules enables further control on websites/addresses which
  90. # should be proxied or not.
  91. # All rules can have an extra optional restriction of target port.
  92. # However, if the proxied application uses gethostbyname() to do DNS
  93. # query instead of getaddrinfo() series, this port part of the rule
  94. # is invalidated.
  95. # Three target is allowed: PROXY, DIRECT and BLOCK.
  96. #
  97. # - DOMAIN-KEYWORD rule, matching requests where the FQDN contains
  98. # a specific string.
  99. # e.g. DOMAIN-KEYWORD,google:80,DIRECT means any request to FQDN
  100. # containing "google" with the target port 80 will NOT be proxied.
  101. #
  102. # - DOMAIN-SUFFIX rule, matching requests where the FQDN is suffixed
  103. # with a specific string.
  104. # e.g. DOMAIN-SUFFIX,.ru,PROXY means any FQDN that ends with ".ru"
  105. # will be proxied.
  106. #
  107. # - DOMAIN-FULL rule, matching requests where the FQDN is exactly
  108. # identical to a specific string.
  109. # e.g. DOMAIN-FULL,duckduckgo.com,DIRECT means every request to
  110. # "duckduckgo.com" (must entirely match) will NOT be proxied.
  111. #
  112. # - DOMAIN rule, the alias of DOMAIN-FULL rule.
  113. #
  114. # - IP-CIDR rule, matching requests to IP address in a CIDR block.
  115. # Note if an FQDN is previously matched by a DOMAIN* rule, this rule
  116. # is not applied to the resolved IPs. (Because fake IPs are used in
  117. # this case)
  118. # e.g. IP-CIDR,8.8.8.8/32,DIRECT
  119. # IP-CIDR,250e::/16,PROXY
  120. # IP-CIDR,[250c::]:443/16,PROXY
  121. # IP-CIDR,10.0.0.0:80/8,DIRECT
  122. # Note that "IP-CIDR,127.0.0.0/8,DIRECT" is equivalent to
  123. # "localnet 127.0.0.0/255.0.0.0".
  124. IP-CIDR,10.0.0.0/8,DIRECT
  125. IP-CIDR,172.16.0.0/12,DIRECT
  126. IP-CIDR,192.168.0.0/255.255.0.0,DIRECT
  127. IP-CIDR,fe80::/8,DIRECT
  128. # - PORT rule, matching requests to a target port.
  129. # e.g. PORT,25,BLOCK
  130. #
  131. # - FINAL "rule", deciding the destiny of a request immediately.
  132. # When this "rule" is used, it is not treated as a "match".
  133. # If you want an unconditional match, try other rules instead, like
  134. # IP-CIDR,0.0.0.0/0,PROXY or DOMAIN-KEYWORD,,PROXY.
  135. #
  136. # When no rules and no FINAL "rule" matched, a connection will be
  137. # PROXIED by default, unless you specify option default_target.
  138. # e.g. FINAL,PROXY
  139. # Will fake IP entries created by a descendant process be removed if this
  140. # process exited? 1 by default.
  141. delete_fake_ip_after_child_exits 1
  142. # When no rules and no FINAL "rule" matched, a connection's default
  143. # target. PROXY by default.
  144. default_target PROXY
  145. # Will the rules apply to the resolved IP if corresponding hostname
  146. # did not match any rules? (FINAL is not counted as a rule)
  147. # IF SO, SET THIS OPTION'S VALUE TO 0. 1 by default.
  148. use_fake_ip_when_hostname_not_matched 1
  149. # ===== Keep them as-is =====
  150. map_resolved_ip_to_host 0
  151. search_for_host_by_resolved_ip 0
  152. # or force_resolve_by_hosts_file 1
  153. resolve_locally_if_match_hosts 1
  154. # ===== Keep them as-is - end =====
  155. # Generate fake ips by FQDN hash - 1 (better to get rid of SSH safe
  156. # warnings)
  157. # Generate fake ips sequentially - 0
  158. # Default: 1
  159. gen_fake_ip_using_hashed_hostname 1
  160. # If your *first* proxy supports connecting to it by an IPv4 address
  161. # (resolved by a hostname or specified manually), set its value to 1.
  162. # This enables proxying IPv4 address.
  163. # If disabled, fake IPv4 address is not returned.
  164. # 1 by default
  165. first_tunnel_uses_ipv4 1
  166. # If your *first* proxy supports connecting to it by an IPv6 address
  167. # (resolved by a hostname or specified manually), set its value to 1.
  168. # This enables proxying IPv6 address.
  169. # If disabled, fake IPv6 address is not returned.
  170. # 0 by default
  171. first_tunnel_uses_ipv6 0
  172. # Custom hosts file path
  173. #custom_hosts_file_path C:\Some Path\hosts
  174. #custom_hosts_file_path /etc/alternative/hosts
  175. # Custom log level.
  176. # 600 - VERBOSE
  177. # 500 - DEBUG
  178. # 400 - INFO
  179. # 300 - WARNING
  180. # 200 - ERROR
  181. # 100 - CRITICAL
  182. # "log_level 200" is equivalent to "quiet_mode"
  183. log_level 400
  184. # ProxyList format
  185. # type host port [user pass]
  186. # (values separated by 'tab' or 'blank')
  187. #
  188. #
  189. # Examples:
  190. #
  191. # socks5 localhost 1080
  192. # socks5 localhost 1080 user password
  193. # socks5 192.168.67.78 1080 lamer secret
  194. #
  195. #
  196. # proxy types: socks5
  197. # ( auth types supported: "user/pass"-socks5 )
  198. #
  199. [ProxyList]
  200. socks5 localhost 7890