Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Reformat the default configure file #154

Open
wants to merge 1 commit into
base: master
Choose a base branch
from
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
172 changes: 95 additions & 77 deletions src/proxychains.conf
Original file line number Diff line number Diff line change
@@ -1,116 +1,134 @@
# proxychains.conf VER 4.x
#
# HTTP, SOCKS4a, SOCKS5 tunneling proxifier with DNS.
# HTTP, SOCKS4a, SOCKS5 tunneling proxifier with DNS.


# The option below identifies how the ProxyList is treated.
# only one option should be uncommented at time,
# otherwise the last appearing option will be accepted
# Only one option should be uncommented at time, otherwise the last
# appearing option will be accepted.

# Dynamic - Each connection will be done via chained proxies.
# All proxies chained in the order as they appear in the list.
# At least one proxy must be online to play in chain (dead proxies are
# skipped), otherwise EINTR is returned to the app.
#
#dynamic_chain
#
# Dynamic - Each connection will be done via chained proxies
# all proxies chained in the order as they appear in the list
# at least one proxy must be online to play in chain
# (dead proxies are skipped)
# otherwise EINTR is returned to the app

# Strict - Each connection will be done via chained proxies.
# All proxies chained in the order as they appear in the list.
# All proxies must be online to play in chain, otherwise EINTR is
# returned to the app.
#
strict_chain
#
# Strict - Each connection will be done via chained proxies
# all proxies chained in the order as they appear in the list
# all proxies must be online to play in chain
# otherwise EINTR is returned to the app
#
#round_robin_chain
#
# Round Robin - Each connection will be done via chained proxies
# of chain_len length
# all proxies chained in the order as they appear in the list
# at least one proxy must be online to play in chain
# (dead proxies are skipped).
# the start of the current proxy chain is the proxy after the last

# Round Robin - Each connection will be done via chained proxies of
# chain_len length.
# All proxies chained in the order as they appear in the list.
# At least one proxy must be online to play in chain (dead proxies are
# skipped).
# The start of the current proxy chain is the proxy after the last
# proxy in the previously invoked proxy chain.
# if the end of the proxy chain is reached while looking for proxies
# If the end of the proxy chain is reached while looking for proxies,
# start at the beginning again.
# otherwise EINTR is returned to the app
# Otherwise EINTR is returned to the app.
# These semantics are not guaranteed in a multithreaded environment.
#
#random_chain
#round_robin_chain

# Random - Each connection will be done via random proxy (or proxy
# chain, see chain_len) from the list.
# This option is good to test your IDS :)
#
# Random - Each connection will be done via random proxy
# (or proxy chain, see chain_len) from the list.
# this option is good to test your IDS :)
#random_chain

# Make sense only if random_chain or round_robin_chain

# Make sense only if random_chain or round_robin_chain.
#
#chain_len = 2

# Quiet mode (no output from library)

# Quiet mode (no output from library).
#
#quiet_mode

# Proxy DNS requests - no leak for DNS data
proxy_dns

# set the class A subnet number to use for the internal remote DNS mapping
# we use the reserved 224.x.x.x range by default,
# if the proxified app does a DNS request, we will return an IP from that range.
# on further accesses to this ip we will send the saved DNS name to the proxy.
# in case some control-freak app checks the returned ip, and denies to
# Proxy DNS requests - no leak for DNS data.
#
proxy_dns


# Set the class A subnet number to use for the internal remote DNS
# mapping.
# We use the reserved 224.x.x.x range by default, if the proxified app
# does a DNS request, we will return an IP from that range.
# On further accesses to this ip we will send the saved DNS name to
# the proxy.
# In case some control-freak app checks the returned ip, and denies to
# connect, you can use another subnet, e.g. 10.x.x.x or 127.x.x.x.
# of course you should make sure that the proxified app does not need
# *real* access to this subnet.
# i.e. dont use the same subnet then in the localnet section
#remote_dns_subnet 127
# Of course you should make sure that the proxified app does not need
# *real* access to this subnet, i.e. don't use the same subnet then in
# the localnet section.
#
#remote_dns_subnet 127
#remote_dns_subnet 10
remote_dns_subnet 224

# Some timeouts in milliseconds

# Some timeouts in milliseconds.
#
tcp_read_time_out 15000
tcp_connect_time_out 8000

### Examples for localnet exclusion
## localnet ranges will *not* use a proxy to connect.
## Exclude connections to 192.168.1.0/24 with port 80
# localnet 192.168.1.0:80/255.255.255.0

## Exclude connections to 192.168.100.0/24
# localnet 192.168.100.0/255.255.255.0
# Examples for localnet exclusion.
# Localnet ranges will *not* use a proxy to connect.

# Exclude connections to 192.168.1.0/24 with port 80.
#
#localnet 192.168.1.0:80/255.255.255.0

# Exclude connections to 192.168.100.0/24.
#
#localnet 192.168.100.0/255.255.255.0

# Exclude connections to ANYwhere with port 80.
#
#localnet 0.0.0.0:80/0.0.0.0

## Exclude connections to ANYwhere with port 80
# localnet 0.0.0.0:80/0.0.0.0
# RFC5735 loopback address range.
# If you enable this, you have to make sure remote_dns_subnet is not
# 127.
# You'll need to enable it if you want to use an application that
# connects to localhost.
#
#localnet 127.0.0.0/255.0.0.0

## RFC5735 Loopback address range
## if you enable this, you have to make sure remote_dns_subnet is not 127
## you'll need to enable it if you want to use an application that
## connects to localhost.
# localnet 127.0.0.0/255.0.0.0
# RFC1918 private address ranges.
#
#localnet 10.0.0.0/255.0.0.0
#localnet 172.16.0.0/255.240.0.0
#localnet 192.168.0.0/255.255.0.0

## RFC1918 Private Address Ranges
# localnet 10.0.0.0/255.0.0.0
# localnet 172.16.0.0/255.240.0.0
# localnet 192.168.0.0/255.255.0.0

# ProxyList format
# type ip port [user pass]
# (values separated by 'tab' or 'blank')
# ProxyList format.
# type ip port [user pass]
# (Values separated by 'tab' or 'blank')
#
# only numeric ipv4 addresses are valid
# Only numeric ipv4 addresses are valid.
#
#
# Examples:
# Examples:
#
# socks5 192.168.67.78 1080 lamer secret
# http 192.168.89.3 8080 justu hidden
# socks4 192.168.1.49 1080
# http 192.168.39.93 8080
#
# socks5 192.168.67.78 1080 lamer secret
# http 192.168.89.3 8080 justu hidden
# socks4 192.168.1.49 1080
# http 192.168.39.93 8080
#
# proxy types: http, socks4, socks5
# ( auth types supported: "basic"-http "user/pass"-socks )
#
# Proxy types: http, socks4, socks5.
# (Auth types supported: "basic"-http, "user/pass"-socks)
#
[ProxyList]
# add proxy here ...
# meanwile
# defaults set to "tor"
socks4 127.0.0.1 9050

# Add proxy here.
# Meanwile, defaults set to "tor".
socks4 127.0.0.1 9050