SHARE
TWEET

Untitled

a guest Oct 16th, 2015 72 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. # proxychains.conf  VER 4
  2. #
  3. #        HTTP, SOCKS4, SOCKS5 tunneling proxifier with DNS.
  4. #      
  5.  
  6. # The option below identifies how the ProxyList is treated.
  7. # only one option should be uncommented at time,
  8. # otherwise the last appearing option will be accepted
  9. #
  10. dynamic_chain
  11. #
  12. # Dynamic - Each connection will be done via chained proxies
  13. # all proxies chained in the order as they appear in the list
  14. # at least one proxy must be online to play in chain
  15. # (dead proxies are skipped)
  16. # otherwise EINTR is returned to the app
  17. #
  18. #strict_chain
  19. #
  20. # Strict - Each connection will be done via chained proxies
  21. # all proxies chained in the order as they appear in the list
  22. # all proxies must be online to play in chain
  23. # otherwise EINTR is returned to the app
  24. #
  25. #random_chain
  26. #
  27. # Random - Each connection will be done via random proxy
  28. # (or proxy chain, see  chain_len) from the list.
  29. # this option is good to test your IDS :)
  30.  
  31. # Make sense only if random_chain
  32. #chain_len = 2
  33.  
  34. # Quiet mode (no output from library)
  35. #quiet_mode
  36.  
  37. # Proxy DNS requests - no leak for DNS data
  38. proxy_dns
  39.  
  40. # set the class A subnet number to usefor use of the internal remote DNS mapping
  41. # we use the reserved 224.x.x.x range by default,
  42. # if the proxified app does a DNS request, we will return an IP from that range.
  43. # on further accesses to this ip we will send the saved DNS name to the proxy.
  44. # in case some control-freak app checks the returned ip, and denies to
  45. # connect, you can use another subnet, e.g. 10.x.x.x or 127.x.x.x.
  46. # of course you should make sure that the proxified app does not need
  47. # *real* access to this subnet.
  48. # i.e. dont use the same subnet then in the localnet section
  49. #remote_dns_subnet 127
  50. #remote_dns_subnet 10
  51. remote_dns_subnet 224
  52.  
  53. # Some timeouts in milliseconds
  54. tcp_read_time_out 15000
  55. tcp_connect_time_out 8000
  56.  
  57. # By default enable localnet for loopback address ranges
  58. # RFC5735 Loopback address range
  59. localnet 127.0.0.0/255.0.0.0
  60. # RFC1918 Private Address Ranges
  61. # localnet 10.0.0.0/255.0.0.0
  62. # localnet 172.16.0.0/255.240.0.0
  63. # localnet 192.168.0.0/255.255.0.0
  64.  
  65.  
  66. # Example for localnet exclusion
  67. ## Exclude connections to 192.168.1.0/24 with port 80
  68. # localnet 192.168.1.0:80/255.255.255.0
  69.  
  70. ## Exclude connections to 192.168.100.0/24
  71. # localnet 192.168.100.0/255.255.255.0
  72.  
  73. ## Exclude connections to ANYwhere with port 80
  74. # localnet 0.0.0.0:80/0.0.0.0
  75.  
  76. # ProxyList format
  77. #       type  host  port [user pass]
  78. #       (values separated by 'tab' or 'blank')
  79. #
  80. #
  81. #        Examples:
  82. #
  83. #               socks5  192.168.67.78   1080    lamer   secret
  84. #               http    192.168.89.3    8080    justu   hidden
  85. #               socks4  192.168.1.49    1080
  86. #               http    192.168.39.93   8080  
  87. #              
  88. #
  89. #       proxy types: http, socks4, socks5
  90. #        ( auth types supported: "basic"-http  "user/pass"-socks )
  91. #
  92. [ProxyList]
  93. socks4 68.178.230.73 8080
  94. socks5 112.74.104.226 1080
  95. socks4 221.214.208.226 1080
  96. socks5 221.178.230.30 1080
  97. socks4 212.69.3.213 1080
  98. # add proxy here ...
  99. # meanwile
  100. # defaults set to "tor"
  101. #socks4         127.0.0.1 9050
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
Top