Sample Header Ad - 728x90

How to configure proxychains the right way?

0 votes
1 answer
7290 views
I configured proxychains following a couple tutorials on the web which were pretty much all the same, as they showed the configuration using Tor service. The problem I'm having is that my DNS is being leaked as well as my real IP address. When I start Firefox with proxychains Google sometimes shows I'm on the other side of the globe but still shows my real IP address when prompted for captcha and other times it shows the city I live in. I did a [DNS leak test](https://dnsleaktest.com/) as well which didn't show my location or network provider at all, but on [WhatIsMyIpAddress](https://whatismyipaddress.com/) it showed all of my info. I use Firefox with no additional proxy settings in the browser. I tried using free proxies, but every single one of them, regardless if HTTP, SOCKS4-5 gets timed out. I don't really want to use free proxies, I'd rather use the Tor service but I can't get it to work properly. The distro I use is Mint 20.3 (Una). The proxychains.conf file: # proxychains.conf VER 3.1 # # HTTP, SOCKS4, SOCKS5 tunneling proxifier with DNS. # # The option below identifies how the ProxyList is treated. # only one option should be uncommented at time, # otherwise the last appearing option will be accepted # dynamic_chain # # Dynamic - Each connection will be done via chained proxies # all proxies chained in the order as they appear in the list # at least one proxy must be online to play in chain # (dead proxies are skipped) # otherwise EINTR is returned to the app # #strict_chain # # Strict - Each connection will be done via chained proxies # all proxies chained in the order as they appear in the list # all proxies must be online to play in chain # otherwise EINTR is returned to the app # #random_chain # # Random - Each connection will be done via random proxy # (or proxy chain, see chain_len) from the list. # this option is good to test your IDS :) # Make sense only if random_chain #chain_len = 2 # Quiet mode (no output from library) #quiet_mode Proxy DNS requests - no leak for DNS data proxy_dns # Some timeouts in milliseconds tcp_read_time_out 15000 tcp_connect_time_out 8000 # ProxyList format # type host port [user pass] # (values separated by 'tab' or 'blank') # # # Examples: # # socks5 192.168.67.78 1080 lamer secret # http 192.168.89.3 8080 justu hidden # socks4 192.168.1.49 1080 # http 192.168.39.93 8080 # # # proxy types: http, socks4, socks5 # ( auth types supported: "basic"-http "user/pass"-socks ) # # [ProxyList] # add proxy here ... # meanwile # defaults set to "tor" socks4 127.0.0.1 9050 socks5 127.0.0.1 9050
Asked by Uncle Woods
Jun 11, 2022, 10:11 AM
Last activity: Dec 1, 2023, 11:04 AM