|
# proxychains.conf VER 4 |
|
# |
|
# http, SOCKS4, SOCKS5 tunneling proxifier with DNS. |
|
# |
|
|
|
# The option below identifies how the ProxyList is treated. |
|
# only one option should be uncommented at time, |
|
# otherwise the last appearing option will be accepted |
|
|
|
#dynamic_chain |
|
# |
|
# Dynamic - Each connection will be done via chained proxies |
|
# all proxies chained in the order as they appear in the list |
|
# at least one proxy must be online to play in chain |
|
# (dead proxies are skipped) |
|
# otherwise EINTR is returned to the app |
|
# |
|
#strict_chain |
|
# |
|
# Strict - Each connection will be done via chained proxies |
|
# all proxies chained in the order as they appear in the list |
|
# all proxies must be online to play in chain |
|
# otherwise EINTR is returned to the app |
|
# |
|
random_chain |
|
# |
|
# Random - Each connection will be done via random proxy |
|
# (or proxy chain, see chain_len) from the list. |
|
# this option is good to test your IDS :) |
|
|
|
# Make sense only if random_chain |
|
chain_len = 5 |
|
|
|
# Quiet mode (no output from library) |
|
#quiet_mode |
|
|
|
# Proxy DNS requests - no leak for DNS data |
|
#proxy_dns |
|
|
|
# set the class A subnet number to usefor use of the internal remote DNS mapping |
|
# we use the reserved 224.x.x.x range by default, |
|
# if the proxified app does a DNS request, we will return an IP from that range. |
|
# on further accesses to this ip we will send the saved DNS name to the proxy. |
|
# in case some control-freak app checks the returned ip, and denies to |
|
# connect, you can use another subnet, e.g. 10.x.x.x or 127.x.x.x. |
|
# of course you should make sure that the proxified app does not need |
|
# *real* access to this subnet. |
|
# i.e. dont use the same subnet then in the localnet section |
|
#remote_dns_subnet 127 |
|
#remote_dns_subnet 10 |
|
remote_dns_subnet 224 |
|
|
|
# Some timeouts in milliseconds |
|
tcp_read_time_out 15000 |
|
tcp_connect_time_out 8000 |
|
|
|
# By default enable localnet for loopback address ranges |
|
# RFC5735 Loopback address range |
|
localnet 127.0.0.0/255.0.0.0 |
|
# RFC1918 Private Address Ranges |
|
# localnet 10.0.0.0/255.0.0.0 |
|
# localnet 172.16.0.0/255.240.0.0 |
|
# localnet 192.168.0.0/255.255.0.0 |
|
|
|
|
|
# Example for localnet exclusion |
|
## Exclude connections to 192.168.1.0/24 with port 80 |
|
# localnet 192.168.1.0:80/255.255.255.0 |
|
|
|
## Exclude connections to 192.168.100.0/24 |
|
# localnet 192.168.100.0/255.255.255.0 |
|
|
|
## Exclude connections to ANYwhere with port 80 |
|
# localnet 0.0.0.0:80/0.0.0.0 |
|
|
|
# ProxyList format (values separated by 'tab' or 'blank') |
|
# type host port [user pass] |
|
[ProxyList] |
|
http 118.171.217.46 3128 |
|
http 218.60.8.99 3129 |
|
http 206.189.45.191 80 |
not working