# proxychains.conf FOR PROXYCHAINS.EXE ALPHA # # SOCKS5 tunneling proxifier with Fake DNS. # # The option below identifies how the ProxyList is treated. # only one option should be uncommented at time, # otherwise the last appearing option will be accepted # # # DYNAMIC_CHAIN IS NOT SUPPORTED AT PRESENT #dynamic_chain # DYNAMIC_CHAIN IS NOT SUPPORTED AT PRESENT # # Dynamic - Each connection will be done via chained proxies # all proxies chained in the order as they appear in the list # at least one proxy must be online to play in chain # (dead proxies are skipped) # otherwise EINTR is returned to the app # # strict_chain # # Strict - Each connection will be done via chained proxies # all proxies chained in the order as they appear in the list # all proxies must be online to play in chain # otherwise EINTR is returned to the app # # RANDOM_CHAIN IS NOT SUPPORTED AT PRESENT #random_chain # RANDOM_CHAIN IS NOT SUPPORTED AT PRESENT # # Random - Each connection will be done via random proxy # (or proxy chain, see chain_len) from the list. # this option is good to test your IDS :) # Make sense only if random_chain #chain_len = 2 # Quiet mode (no output from library) #quiet_mode # Proxy DNS requests using Fake IP - no leak for DNS data proxy_dns # Proxy DNS requests using UDP associate feature provided by SOCKS5 proxy # NOT SUPPORTED AT PRESENT #proxy_dns_udp_associate # NOT SUPPORTED AT PRESENT # set the class A subnet number to usefor use of the internal remote DNS mapping # we use the reserved 224.x.x.x range by default, # if the proxified app does a DNS request, we will return an IP from that range. # on further accesses to this ip we will send the saved DNS name to the proxy. # in case some control-freak app checks the returned ip, and denies to # connect, you can use another subnet, e.g. 10.x.x.x or 127.x.x.x. # of course you should make sure that the proxified app does not need # *real* access to this subnet. # i.e. dont use the same subnet then in the localnet section #remote_dns_subnet 127 #remote_dns_subnet 10 remote_dns_subnet 224 # This enables you to set a CIDR block for the internal remote DNS mapping # for example, remote_dns_subnet_cidr_v4 224.0.0.0/8 is equivalent to # remote_dns_subnet 224. # subnet mask format like 255.255.0.0 is not allowed here # By default 224.0.0.0/8 and 250d::/16 #remote_dns_subnet_cidr_v4 224.0.0.0/8 #remote_dns_subnet_cidr_v6 250d::/16 # Some timeouts in milliseconds # Defaults: tcp_read_time_out 5000, tcp_connect_time_out 3000 #tcp_read_time_out 15000 #tcp_connect_time_out 8000 # ==== Rules ==== # You can control which IP range not to be proxied. # First matched rule decides the target (PROXIED, DIRECT or BLOCK) of a # connection. # localnet always has a "DIRECT" target, which means they will not be # proxied. # By default enable localnet for loopback address ranges # RFC5735 Loopback address range localnet 127.0.0.0/255.0.0.0 # RFC1918 Private Address Ranges # localnet 10.0.0.0/255.0.0.0 # localnet 172.16.0.0/255.240.0.0 # localnet 192.168.0.0/255.255.0.0 # Example for localnet exclusion ## Exclude connections to 192.168.1.0/24 with port 80 # localnet 192.168.1.0:80/255.255.255.0 ## Exclude connections to 192.168.100.0/24 # localnet 192.168.100.0/255.255.255.0 ## Exclude connections to ANYwhere with port 80 # localnet 0.0.0.0:80/0.0.0.0 # === Additional routing rules === # These rules enables further control on websites/addresses which # should be proxied or not. # All rules can have an extra optional restriction of target port. # However, if the proxied application uses gethostbyname() to do DNS # query instead of getaddrinfo() series, this port part of the rule # is invalidated. # Three target is allowed: PROXY, DIRECT and BLOCK. # # - DOMAIN-KEYWORD rule, matching requests where the FQDN contains # a specific string. # e.g. DOMAIN-KEYWORD,google:80,DIRECT means any request to FQDN # containing "google" with the target port 80 will NOT be proxied. # # - DOMAIN-SUFFIX rule, matching requests where the FQDN is suffixed # with a specific string. # e.g. DOMAIN-SUFFIX,.ru,PROXY means any FQDN that ends with ".ru" # will be proxied. # # - DOMAIN-FULL rule, matching requests where the FQDN is exactly # identical to a specific string. # e.g. DOMAIN-FULL,duckduckgo.com,DIRECT means every request to # "duckduckgo.com" (must entirely match) will NOT be proxied. # # - DOMAIN rule, the alias of DOMAIN-FULL rule. # # - IP-CIDR rule, matching requests to IP address in a CIDR block. # Note if an FQDN is previously matched by a DOMAIN* rule, this rule # is not applied to the resolved IPs. (Because fake IPs are used in # this case) # e.g. IP-CIDR,8.8.8.8/32,DIRECT # IP-CIDR,250e::/16,PROXY # IP-CIDR,[250c::]:443/16,PROXY # IP-CIDR,10.0.0.0:80/8,DIRECT # Note that "IP-CIDR,127.0.0.0/8,DIRECT" is equivalent to # "localnet 127.0.0.0/255.0.0.0". IP-CIDR,10.0.0.0/8,DIRECT IP-CIDR,172.16.0.0/12,DIRECT IP-CIDR,192.168.0.0/255.255.0.0,DIRECT IP-CIDR,fe80::/8,DIRECT # - PORT rule, matching requests to a target port. # e.g. PORT,25,BLOCK # # - FINAL "rule", deciding the destiny of a request immediately. # When this "rule" is used, it is not treated as a "match". # If you want an unconditional match, try other rules instead, like # IP-CIDR,0.0.0.0/0,PROXY or DOMAIN-KEYWORD,,PROXY. # # When no rules and no FINAL "rule" matched, a connection will be # PROXIED by default, unless you specify option default_target. # e.g. FINAL,PROXY # Will fake IP entries created by a descendant process be removed if this # process exited? 1 by default. delete_fake_ip_after_child_exits 1 # When no rules and no FINAL "rule" matched, a connection's default # target. PROXY by default. default_target PROXY # Will the rules apply to the resolved IP if corresponding hostname # did not match any rules? (FINAL is not counted as a rule) # IF SO, SET THIS OPTION'S VALUE TO 0. 1 by default. use_fake_ip_when_hostname_not_matched 1 # ===== Keep them as-is ===== map_resolved_ip_to_host 0 search_for_host_by_resolved_ip 0 # or force_resolve_by_hosts_file 1 resolve_locally_if_match_hosts 1 # ===== Keep them as-is - end ===== # Generate fake ips by FQDN hash - 1 (better to get rid of SSH safe # warnings) # Generate fake ips sequentially - 0 # Default: 1 gen_fake_ip_using_hashed_hostname 1 # If your *first* proxy supports connecting to it by an IPv4 address # (resolved by a hostname or specified manually), set its value to 1. # This enables proxying IPv4 address. # If disabled, fake IPv4 address is not returned. # 1 by default first_tunnel_uses_ipv4 1 # If your *first* proxy supports connecting to it by an IPv6 address # (resolved by a hostname or specified manually), set its value to 1. # This enables proxying IPv6 address. # If disabled, fake IPv6 address is not returned. # 0 by default first_tunnel_uses_ipv6 0 # Custom hosts file path #custom_hosts_file_path C:\Some Path\hosts #custom_hosts_file_path /etc/alternative/hosts # Custom log level. # 600 - VERBOSE # 500 - DEBUG # 400 - INFO # 300 - WARNING # 200 - ERROR # 100 - CRITICAL # "log_level 200" is equivalent to "quiet_mode" log_level 400 # ProxyList format # type host port [user pass] # (values separated by 'tab' or 'blank') # # # Examples: # # socks5 localhost 1080 # socks5 localhost 1080 user password # socks5 192.168.67.78 1080 lamer secret # # # proxy types: socks5 # ( auth types supported: "user/pass"-socks5 ) # [ProxyList] socks5 localhost 7890