Unix & Linux Stack Exchange
Q&A for users of Linux, FreeBSD and other Unix-like operating systems
Latest Questions
0
votes
1
answers
3350
views
Tunneling through proxy & SSH server
A SOCKS5 proxy is between my source and target servers. The source server can be accessed only from my local server. I tried connecting through proxy option and SSH tunneling option in Winscp but the problem is as below: The SOCKS5 proxy is used only for my source server(tunneled one) instead, I wou...
A SOCKS5 proxy is between my source and target servers. The source server can be accessed only from my local server.
I tried connecting through proxy option and SSH tunneling option in Winscp but the problem is as below:
The SOCKS5 proxy is used only for my source server(tunneled one) instead, I would like to use it for my target server. Please let me know how I can achieve this.
Flow:
Local system -> Source server -> SOCKS5 proxy -> Target server
Raavi
(1 rep)
Jul 19, 2019, 03:35 PM
• Last activity: Aug 1, 2025, 05:04 PM
1
votes
1
answers
2007
views
How to redirect a process(pid)'s traffic via a socks5 (or any) proxy?
Say if I have a process that I want to redirect all the traffic to a proxy while not affecting other processes (let's say if I run multiple `node` applications and I only want one of them to go through a proxy). Is it possible? How?
Say if I have a process that I want to redirect all the traffic to a proxy while not affecting other processes (let's say if I run multiple
node
applications and I only want one of them to go through a proxy). Is it possible? How?
Aero Wang
(161 rep)
Feb 5, 2018, 11:40 AM
• Last activity: Jul 9, 2025, 10:29 PM
3
votes
2
answers
3526
views
How to configure device to trust root certificate when using a SOCKS5 proxy?
I am routing a Linux machine through a SOCKS5 proxy. The internet works as expected and I am presented with the proxy's IP when viewing http://whatismyip.com. However, some sites are reporting that I am experiencing a MITM attack: > Software is Preventing Firefox From Safely Connecting to This Site...
I am routing a Linux machine through a SOCKS5 proxy. The internet works as expected and I am presented with the proxy's IP when viewing http://whatismyip.com .
However, some sites are reporting that I am experiencing a MITM attack:
> Software is Preventing Firefox From Safely Connecting to This Site
>
> www.mozilla.org is most likely a safe site, but a secure connection
> could not be established. This issue is caused by DigiCert Global Root
> CA, which is either software on your computer or your network.
>
> What can you do about it?
>
> www.mozilla.org has a security policy called HTTP Strict Transport
> Security (HSTS), which means that Firefox can only connect to it
> securely. You can’t add an exception to visit this site.
>
> If your antivirus software includes a feature that scans encrypted connections (often called “web scanning” or “https scanning”), you can
> disable that feature. If that doesn’t work, you can remove and
> reinstall the antivirus software.
> * If you are on a corporate network, you can contact your IT department.
> * If you are not familiar with DigiCert Global Root CA, then this could be an attack, and there is nothing you can do to access the
> site.
https://www.mozilla.org/firefox/new/?utm_medium=referral&utm_source=support.mozilla.org
Your connection is being intercepted by a TLS proxy. Uninstall it if possible or configure your device to trust its root certificate.
HTTP Strict Transport Security: true
HTTP Public Key Pinning: false
Certificate chain:
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
How do I alleviate this error so that I can access these sites? Do I need to accept some certificate on my local machine or on the proxy?
Zhro
(2821 rep)
Oct 29, 2019, 04:18 PM
• Last activity: May 4, 2025, 10:08 PM
0
votes
1
answers
94
views
route traffic to 127.0.0.1
My scenario: I have two machines: 1. 192.168.1.1 2. 192.168.1.2 Machine 2 has a ssh server and I created a tunnel in machine 1 such as: `ssh -CfND 7777 mohsen@192.168.1.2 -4` I ran above command in machine 1 It works fine.I tested via `firefox` Now I want to send any traffic to 127.0.0.1:7777 Not a...
My scenario:
I have two machines:
1. 192.168.1.1
2. 192.168.1.2
Machine 2 has a ssh server and I created a tunnel in machine 1 such as:
It works fine.I tested via
Now I want to send any traffic to 127.0.0.1:7777 Not a one application, All of my traffic.
Then my tunnel send my packets to 192.168.1.1 My algorithm is: IF DST PORT IS NOT 7777 THEN ROUTE MY TRAFFIC TO 127.0.0.1:7777 ELSE DO NOT ROUTE TO 127.0.0.1:7777 I used the following rule, but it didn't work: iptables -t nat -A PREROUTING -i enp0s31f6 -p udp ! --dport 7777 -j REDIRECT --to-ports 7777 How can I implement it?
ssh -CfND 7777 mohsen@192.168.1.2 -4
I ran above command in machine 1 It works fine.I tested via
firefox
Now I want to send any traffic to 127.0.0.1:7777 Not a one application, All of my traffic.
Then my tunnel send my packets to 192.168.1.1 My algorithm is: IF DST PORT IS NOT 7777 THEN ROUTE MY TRAFFIC TO 127.0.0.1:7777 ELSE DO NOT ROUTE TO 127.0.0.1:7777 I used the following rule, but it didn't work: iptables -t nat -A PREROUTING -i enp0s31f6 -p udp ! --dport 7777 -j REDIRECT --to-ports 7777 How can I implement it?
PersianGulf
(11308 rep)
Apr 15, 2025, 03:47 AM
• Last activity: Apr 15, 2025, 01:16 PM
1
votes
1
answers
377
views
curl using socks5 proxy and IPv4
When using `curl` with socks5 proxy, seems that my IPv4 addressing is gone: $ env ALL_PROXY=socks5h://localhost:8001 curl -4 ipconfig.io 2607:xxxxxxxx:681f $ curl -4 ipconfig.io 97.xx.xx.116 What is the problem and how to ensure `curl` still uses IPv4 when using socks5 proxy?
When using
curl
with socks5 proxy, seems that my IPv4 addressing is gone:
$ env ALL_PROXY=socks5h://localhost:8001 curl -4 ipconfig.io
2607:xxxxxxxx:681f
$ curl -4 ipconfig.io
97.xx.xx.116
What is the problem and how to ensure curl
still uses IPv4 when using socks5 proxy?
xpt
(1858 rep)
Nov 9, 2022, 03:23 PM
• Last activity: Mar 28, 2025, 04:28 AM
2
votes
1
answers
2491
views
Multiple ssh port forwarding for socks proxy
I wanted to open a web page via socks proxy. My scenario is I have two jump servers. 1 Jump server to get connected and second jump server to access the webpages. ssh user@192.168.1.2 -D 10100 -tt ssh user1@192.168.2.2 -D 10101 I also tried this. ssh user@192.168.1.2 -D 10100 then on the second jump...
I wanted to open a web page via socks proxy. My scenario is I have two jump servers. 1 Jump server to get connected and second jump server to access the webpages.
ssh user@192.168.1.2 -D 10100 -tt ssh user1@192.168.2.2 -D 10101
I also tried this.
ssh user@192.168.1.2 -D 10100
then on the second jump server
user1@192.168.2.2 -D 10101
.
In both the cases I still cannot access my webpage who have direct readability from second jump server which is 192.168.2.2
.
How can I open the webpage from my localhost?
Hulk711
(21 rep)
Nov 16, 2019, 12:55 PM
• Last activity: Jan 15, 2025, 05:03 PM
0
votes
1
answers
2885
views
SOCAT (only) reverse tunnel
I have a situation where we are trying to get data from one network to another - specifically access to a private maven repo on a different network. Network 1 contains a maven repo. And network is protected by a couple SSH hops where port forwarding is disabled on `sshd`. - [Laptop], running a Docke...
I have a situation where we are trying to get data from one network to another - specifically access to a private maven repo on a different network.
Network 1 contains a maven repo. And network is protected by a couple SSH hops where port forwarding is disabled on
sshd
.
- [Laptop], running a Docker Container with VPN into other network laptop
- Docker Container vpn
- [Jumpbox] jumpbox.vpn.network.org
- [Server] server.vpn.network.org
We have successfully run vscode-server on **server** and connect via:
socat tcp-listen:8080,fork EXEC:"ssh server.vpn.network.org nc localhost 8081"
This lets laptop hit localhost:8080
and it tunnels traffic into our server.vpn
which then goes into netcat and sends the traffic into vscode server
I figure it should be possible to do the opposite I'm just getting stuck.
The goal would be to run a Socks5
proxy on laptop via something like
ssh -f -N -D 54321 localhost
And then make a socat call into server.vpn.network.org
and then using the socks env vars I could run maven and have it proxy back through the connection etc.
The approach I took was trying this:
socat -v TCP:localhost:54321 EXEC:"ssh server.vpn.network.org nc -lkv localhost 54321"
It was "sort" of working but kept dropping connection.
I then tried a combo of fork
and reuseaddr
and they didn't seem to solve the issue.
My next approach was to consider unix sockets or something funky - but I'm wondering if somebody knows how to make this work.
Thanks.
Jeef
(157 rep)
Jan 11, 2022, 08:51 PM
• Last activity: Dec 23, 2024, 01:00 AM
0
votes
0
answers
165
views
SSH port forwarding was working, now it's not
I have a pair of CentOS7 servers in a production environment where the server on the internal network opens up an ssh SOCKS proxy tunnel to the server on the edge network to allow the internal server to reach external endpoint. This setup was working for a while, but now it seems it's not. The edge...
I have a pair of CentOS7 servers in a production environment where the server on the internal network opens up an ssh SOCKS proxy tunnel to the server on the edge network to allow the internal server to reach external endpoint.
This setup was working for a while, but now it seems it's not.
The edge server has the following
/etc/ssh/sshd_config
file:
HostKey /etc/ssh/ssh_host_rsa_key
HostKey /etc/ssh/ssh_host_ecdsa_key
HostKey /etc/ssh/ssh_host_ed25519_key
SyslogFacility AUTHPRIV
AuthorizedKeysFile .ssh/authorized_keys
PasswordAuthentication no
ChallengeResponseAuthentication no
GSSAPIAuthentication yes
GSSAPICleanupCredentials no
UsePAM yes
AllowAgentForwarding yes
AllowTcpForwarding yes
X11Forwarding yes
AcceptEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES
AcceptEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT
AcceptEnv LC_IDENTIFICATION LC_ALL LANGUAGE
AcceptEnv XMODIFIERS
Subsystem sftp /usr/libexec/openssh/sftp-server
Protocol 2
HostbasedAuthentication no
IgnoreRhosts yes
Ciphers aes256-ctr,aes128-ctr
MACs umac-64@openssh.com,hmac-sha2-256,hmac-ripemd160,hmac-sha1
KexAlgorithms diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1
Match User update
ChrootDirectory /opt/download
X11Forwarding no
ForceCommand internal-sftp
AllowTcpForwarding no
Match User proxy
X11Forwarding yes
ForceCommand /sbin/nologin
AllowTcpForwarding yes
GatewayPorts yes
PermitOpen any
And the internal server is creating the tunnel with the following command:
/usr/bin/ssh -NT -oServerAliveInterval=60 -oExitOnForwardFailure=yes -oUserKnownHostsFile=/dev/null -oStrictHostKeyChecking=no proxy@10.99.0.6 -D 0.0.0.0:1080
When the internal server tries to use this tunnel:
curl -k -v --proxy socks5h://localhost:1080 https://external.host.name
The connection fails, and the /var/log/secure
file prints an error stating "refused local port forward".
By all accounts, this should be working and in fact was in the past. I also ran setenforce 0
on the production edge server to take SELinux out of the equation but that made no difference.
I copied the /etc/ssh/sshd_config
file to my lab server and was unable to reproduce the issue. Both the lab server and the production server on the edge network are up to date on OS packages.
The authorized_keys
file for the proxy
user doesn't have any options/directives attached to it.
Also, the tunnel does work if I use the root
user.
What could be causing this?
dbush
(113 rep)
Jul 12, 2024, 03:18 PM
• Last activity: Jul 26, 2024, 05:48 PM
0
votes
3
answers
3996
views
Dante SOCKS5 proxy server not working on ipv6
During testing and entering this command curl -x socks5:// : @ : ifconfig.co It returns an error message of Can't complete SOCKS5 connection to When we disable the ipv6, thats the time the curl testing works but thats not the right way. Tried to apply this tutorial but still got no luck http://www.i...
During testing and entering this command
curl -x socks5://:@: ifconfig.co
It returns an error message of
Can't complete SOCKS5 connection to
When we disable the ipv6, thats the time the curl testing works but thats not the right way. Tried to apply this tutorial but still got no luck
http://www.inet.no/dante/doc/latest/config/ipv6.html
=============================================================
dante.conf
logoutput: /var/log/socks.log
internal: enp0s3 port = 1080
external: enp0s3
clientmethod: none
socksmethod: none
user.privileged: root
user.notprivileged: nobody
client pass {
from: 0.0.0.0/0 to: 0.0.0.0/0
log: error connect disconnect
}
client block {
from: 0.0.0.0/0 to: 0.0.0.0/0
log: connect error
}
socks pass {
from: 0.0.0.0/0 to: 0.0.0.0/0
log: error connect disconnect
}
socks block {
from: 0.0.0.0/0 to: 0.0.0.0/0
log: connect error
}
John
(1 rep)
Oct 9, 2020, 12:11 AM
• Last activity: Jun 1, 2024, 01:00 AM
2
votes
1
answers
320
views
Firefox traffic through socks-proxy SSH tunnel attempt to use IPv6 on systems where IPv6 is not supported
I need to use socks proxy in Firefox on my `laptop`, using ssh tunnel to `server` On my `laptop`, I set socks proxy in firefox, and connect to `server`: ssh server -D1234 When I visit any website in firefox, the proxy works, but I get these errors: on `laptop` (in the console where I started ssh) ch...
I need to use socks proxy in Firefox on my
laptop
, using ssh tunnel to server
On my laptop
, I set socks proxy in firefox, and connect to server
:
ssh server -D1234
When I visit any website in firefox, the proxy works, but I get these errors:
on laptop
(in the console where I started ssh)
channel 15: open failed: connect failed: Address family for hostname not supported
on server
(in syslog):
sshd: error: connect_to ff00::: unknown host (Address family for hostname not supported)
this looks like firefox is trying to use IPv6
. But I have no IPv6
support either on laptop
or on server
. And I have explicitly disabled IPv6
in firefox, by setting network.dns.disableIPv6
to true
.
As said, everything works. But I am just bothered by the flood of error messages.
How can I prevent Firefox from even attempting to use IPv6
, or if that is not possible, to get rid of the error messages on both laptop
and server
.
The laptop
is running Debian 12, and server
is running Debian 10.
Both have custom linux kernel, without IPv6
support.
Martin Vegter
(586 rep)
May 15, 2024, 04:51 AM
• Last activity: May 24, 2024, 07:04 AM
1
votes
2
answers
4438
views
Check whether SOCKS5 proxy server support UDP
Suppose I have UDP server that listen incoming message on `192.168.43.1:1234` and SOCKS5 proxy server that listen on `192.168.43.2:9999`. How do I check whether SOCKS5 proxy server support UDP when accessed with a SOCKS5 client? I know that SOCKS5 support UDP, but I just want make sure if it's reall...
Suppose I have UDP server that listen incoming message on
192.168.43.1:1234
and SOCKS5 proxy server that listen on 192.168.43.2:9999
.
How do I check whether SOCKS5 proxy server support UDP when accessed with a SOCKS5 client?
I know that SOCKS5 support UDP, but I just want make sure if it's really supported. I expect UDP server receive message from client and client got reply from server with netcat
or similiar tools.
Muhammad Ikhwan Perwira
(319 rep)
Jan 22, 2023, 04:48 PM
• Last activity: May 13, 2024, 03:01 AM
0
votes
1
answers
797
views
How to connect socks5 proxy in fedora 39?
I recently switched from Windows to Fedora, and I'm used to using "Proxifier" on Windows to connect to a proxy server effortlessly. Now, I've got this socks5 IP, port, username, and password that I want to use system-wide. I tried some tools, but they're either not working or too complicated for me....
I recently switched from Windows to Fedora, and I'm used to using "Proxifier" on Windows to connect to a proxy server effortlessly.
Now, I've got this socks5 IP, port, username, and password that I want to use system-wide.
I tried some tools, but they're either not working or too complicated for me. Can you suggest something or walk me through the steps?
Also, I'd like to know how to easily turn the proxy on or off. Thanks!
Now, I've got this socks5 IP, port, username, and password that I want to use system-wide.
I tried some tools, but they're either not working or too complicated for me. Can you suggest something or walk me through the steps?
Also, I'd like to know how to easily turn the proxy on or off. Thanks!
Sayeed Mahmood
(1 rep)
Mar 1, 2024, 04:21 AM
• Last activity: Mar 5, 2024, 05:11 PM
1
votes
0
answers
153
views
Change tap device gateway
I have vps server, install softether on it , softether use tap device name tap_se with subnet 192.168.24.0/21 netmask 255.255.248.0 broadcast 192.168.31.259, clients connect with openvpn or l2tp to softether , and softether use local dhcp to assign ip in subnet 192,168.24.0/21 to them; i want to soc...
I have vps server, install softether on it , softether use tap device name tap_se with
subnet 192.168.24.0/21 netmask 255.255.248.0 broadcast 192.168.31.259,
clients connect with openvpn or l2tp to softether , and softether use local dhcp to assign ip
in subnet 192,168.24.0/21 to them;
i want to socksify outgoin traffic of softether to another server use tun2socks or alternative , and need to change routes table to do this , what must happen must be :
tap_se ==> tun0 ==> eth0
some suggested routes are :
# Bypass upstream socks5 server
sudo ip route add SOCKS5_SERVER dev DEFAULT_IFACE metric 10
sudo ip -6 route add SOCKS5_SERVER dev DEFAULT_IFACE metric 10
# Route others
sudo ip route add default dev tun0 metric 20
sudo ip -6 route add default dev tun0 metric 20
or :
ip route del default
ip route add default via 198.18.0.1 dev tun0 metric 1
ip route add default via 172.17.0.1 dev eth0 metric 10
and i create tun0 with these commands :
ip tuntap add mode tun dev tun0
ip addr add 198.18.0.1/15 dev tun0
ip link set dev tun0 up
but when do this , i lost my connection to server and need to reboot to routes restore to default, what is correct rules to do all outgoing traffic of tap_se goes through tun0 without lost connection to vps
Arman Kabir
(11 rep)
Feb 9, 2023, 02:29 PM
2
votes
1
answers
2204
views
Using cURL with NordVPN SOCKS5 proxy
I am trying to use the cURL utility to fetch a web page through a NordVPN SOCKS5 proxy, but not having any luck. I would expect the following command line to work. ```sh curl -v -x "socks5:// : @se.socks.nordhold.net:1080" -4 http://google.com ``` However, this returns the following. ``` * Trying 18...
I am trying to use the cURL utility to fetch a web page through a NordVPN SOCKS5 proxy, but not having any luck. I would expect the following command line to work.
curl -v -x "socks5://:@se.socks.nordhold.net:1080" -4 http://google.com
However, this returns the following.
* Trying 185.236.42.56:1080...
* SOCKS5 connect to IPv6 2a00:1450:4009:815::200e:80 (locally resolved)
* Can't complete SOCKS5 connection to google.com. (4)
* Closing connection 0
curl: (97) Can't complete SOCKS5 connection to google.com. (4)
Is there some special configuration I need for cURL to connect to a SOCKS5 proxy operated by NordVPN?
The customer support were able to tell me that
> We’ve changed the way for users to connect to socks5 to reduce the chances for socks5 from being used for malicious purposes such as web scans/proxying/credential stuffing attacks.
... but they could not offer any suggestions on how to use cURL. All I can say is that some other software seems to be able to use NordVPN SOCKS5 proxies without issue.
Noldorin
(107 rep)
Dec 10, 2022, 01:44 AM
• Last activity: Dec 10, 2022, 04:12 AM
6
votes
3
answers
9340
views
browsing localhost via ssh socks tunnel not working
I used to have a successful configuration in my local computer to access a remote host's web server via SSH SOCKS proxy, by typing in Firefox `localhost:5000` for example. I created a rule in the server's firewall to only allow local access to this application. I haven't used it for a while and in t...
I used to have a successful configuration in my local computer to access a remote host's web server via SSH SOCKS proxy, by typing in Firefox
I also tried to configure Chromium to use the SOCKS proxy instead of Firefox, but the result is the same. Also double checked 'no proxy for' to be empty in this case.
My local
localhost:5000
for example. I created a rule in the server's firewall to only allow local access to this application.
I haven't used it for a while and in the meantime I updated my local computer to Ubuntu 18.10. And now that setup is not working anymore. 127.0.0.1:5000
doesn't work either.
The SOCKS setup is actually working - I can see the browser detecting the local IP to be the remote server's and I can browse the Internet normally through the SOCKS proxy. I can in fact access the remote web server by pointing Firefox to the server's external_ip:5000 (let's say http://180.129.54.204:5000) . At the same time, using the same external_ip:5000 from a different browser program (Chromium) that is configured to connect directly, the result is a connection error, as expected.
When establishing the SSH connection with the -vvv
flag, I see activity every time I open a webpage, but when trying to open localhost:5000
nothing happens, as if the request is not even reaching the SSH connection.
If I set the port wrong and point the browser to access external_ip:5000
, I get the error page 'The proxy server is refusing connections'. On the other hand, when trying to access localhost:5000
whatever the config I only see 'Unable to connect
'.
I checked several times, in Firefox's network configuration the field for 'No proxy for
' is empty.

/etc/hosts
127.0.0.1 localhost
127.0.1.1 My_computer_name
# The following lines are desirable for IPv6 capable hosts
::1 ip6-localhost ip6-loopback
fe00::0 ip6-localnet
ff00::0 ip6-mcastprefix
ff02::1 ip6-allnodes
ff02::2 ip6-allrouters
I don't know what changed in my system. Is anyone able to point out the problem or at least indicate log files I should be monitoring and where to look for clues?
user2066480
(173 rep)
Jul 26, 2019, 12:09 PM
• Last activity: Oct 7, 2022, 03:25 PM
1
votes
0
answers
585
views
How to bind SSH SOCKS5 proxy endpoint to a specific interface?
I'd like to use SSH on my Windows box to setup a SOCKS5 proxy to my multi-interface pfSense box and want the proxied traffic to be routed over a specific interface on the pfSense box. The `-b` option binds the SSH client to a specific interface, is there a similar option/command to bind the server?
I'd like to use SSH on my Windows box to setup a SOCKS5 proxy to my multi-interface pfSense box and want the proxied traffic to be routed over a specific interface on the pfSense box. The
-b
option binds the SSH client to a specific interface, is there a similar option/command to bind the server?
zencraft
(113 rep)
Oct 5, 2022, 09:44 PM
1
votes
1
answers
1504
views
How to use unix domain socket for tor socks
I am trying to setup a unix socks socket for tor usage instead of port 9050 in the hopes to gain a tiny bit of performance. However I am getting the below error: Oct 21 11:53:54 HOSTNAME Tor[992986]: Permissions on directory /var/lib/tor-shared are too permissive. Oct 21 11:53:54 HOSTNAME Tor[992986...
I am trying to setup a unix socks socket for tor usage instead of port 9050 in the hopes to gain a tiny bit of performance. However I am getting the below error:
Oct 21 11:53:54 HOSTNAME Tor: Permissions on directory /var/lib/tor-shared are too permissive.
Oct 21 11:53:54 HOSTNAME Tor: Before Tor can create a SOCKS socket in "/var/lib/tor-shared/socks5.socket", the directory "/var/lib/tor-shared" needs to exist, and to be accessible only by the user account that is running Tor. (On some Unix systems, anybody who can list a socket can connect to it, so Tor is being careful.)
Isn't the whole point of a SOCKS socket is to allow other apps to connect to it?
What is the best way to allow an app to use tor via unix domain socket? I don't think the application itself should run as User 'tor' or root. I tried
setfacl
, but tor is smart to not allow that too.
balki
(4717 rep)
Oct 21, 2020, 04:33 PM
• Last activity: Jul 26, 2022, 08:33 PM
1
votes
0
answers
1326
views
socks 5 proxy in centos 7
I want to run socks5 proxy server on centos7 Dante is for Debian squid can not handle socks proxy ss5 is too slow(almost do not work) any good opensource socks5 proxy for centos7? can anyone help me please?
I want to run socks5 proxy server on centos7
Dante is for Debian
squid can not handle socks proxy
ss5 is too slow(almost do not work)
any good opensource socks5 proxy for centos7?
can anyone help me please?
Admiralhr
(11 rep)
Apr 20, 2022, 03:22 PM
0
votes
1
answers
1183
views
Socks5 proxy requests stopped working on Ubuntu 20.04
Good Day. I want to set up a socks5 proxy so I can feed requests through my server with a different IP. I am currently running Ubuntu 20.04 and this is done through DigitalOceans Droplets (VPSes) This has been working for years for me and just stopped working and I can’t figure out why. It worked ab...
Good Day.
I want to set up a socks5 proxy so I can feed requests through my server with a different IP. I am currently running Ubuntu 20.04 and this is done through DigitalOceans Droplets (VPSes)
This has been working for years for me and just stopped working and I can’t figure out why. It worked about ~2 weeks ago and just stopped.
On Droplet A (a.b.c.d) I will run the code once I’ve SSH’d in:
ssh -f -N -D 0.0.0.0:5678 localhost
Note: port 5678 was one chosen at random. On Droplet B (w.x.y.z) I will try and request a web resource via curl webpage through this proxy I've just created.
curl -v -x socks5://a.b.c.d:5678 https://www.google.com
Normally this is able to work and retrieve the request. Last 24 hours since I have been trying it doesn’t. It gets stuck hanging on the same results:
* Trying a.b.c.d:5678...
* TCP_NODELAY set
Then it hangs and never finishes the requests. Both droplets can curl google without a proxy with success. B can both ping and ssh into A. I’ve tried rebooting, recreating droplets with new IPs, different ports same result every time. I’ve also tried playing with dante-server and same issue. I am not an expert in ubuntu so I don’t know what else to try or what could be the problem.
Hoping someone can point me in the right direction. Merci
Reily Bourne
(101 rep)
Dec 14, 2021, 04:47 PM
• Last activity: Dec 15, 2021, 04:52 PM
3
votes
2
answers
25027
views
Proxychains is not going through any proxy
I am using Kali Linux 2020.2 and I have configured `/etc/proxychains.conf` like this: ``` # proxychains.conf VER 3.1 # # HTTP, SOCKS4, SOCKS5 tunneling proxifier with DNS. # # The option below identifies how the ProxyList is treated. # only one option should be uncommented at time, # otherwise the l...
I am using Kali Linux 2020.2 and I have configured
/etc/proxychains.conf
like this:
# proxychains.conf VER 3.1
#
# HTTP, SOCKS4, SOCKS5 tunneling proxifier with DNS.
#
# The option below identifies how the ProxyList is treated.
# only one option should be uncommented at time,
# otherwise the last appearing option will be accepted
#
dynamic_chain
#
# Dynamic - Each connection will be done via chained proxies
# all proxies chained in the order as they appear in the list
# at least one proxy must be online to play in chain
# (dead proxies are skipped)
# otherwise EINTR is returned to the app
#
#strict_chain
#
# Strict - Each connection will be done via chained proxies
# all proxies chained in the order as they appear in the list
# all proxies must be online to play in chain
# otherwise EINTR is returned to the app
#
#random_chain
#
# Random - Each connection will be done via random proxy
# (or proxy chain, see chain_len) from the list.
# this option is good to test your IDS :)
# Make sense only if random_chain
#chain_len = 2
# Quiet mode (no output from library)
#quiet_mode
# Proxy DNS requests - no leak for DNS data
proxy_dns
# Some timeouts in milliseconds
tcp_read_time_out 15000
tcp_connect_time_out 8000
# ProxyList format
# type host port [user pass]
# (values separated by 'tab' or 'blank')
#
#
# Examples:
#
# socks5 192.168.67.78 1080 lamer secret
# http 192.168.89.3 8080 justu hidden
# socks4 192.168.1.49 1080
# http 192.168.39.93 8080
#
#
# proxy types: http, socks4, socks5
# ( auth types supported: "basic"-http "user/pass"-socks )
#
[ProxyList]
# add proxy here ...
# meanwile
# defaults set to "tor"
socks5 127.0.0.1 9050
socks4 127.0.0.1 9050
I also had Tor installed and running while using proxychains. Here is the output of tor status
:
root@kali:~# service tor status
● tor.service - Anonymizing overlay network for TCP (multi-instance-master)
Loaded: loaded (/lib/systemd/system/tor.service; disabled; vendor preset: disabled)
Active: active (exited) since Sat 2020-06-13 19:33:10 UTC; 3s ago
Process: 13092 ExecStart=/bin/true (code=exited, status=0/SUCCESS)
Main PID: 13092 (code=exited, status=0/SUCCESS)
Jun 13 19:33:10 kali systemd: Stopped Anonymizing overlay network for TCP (multi-instance-master).
Jun 13 19:33:10 kali systemd: Stopping Anonymizing overlay network for TCP (multi-instance-master)...
Jun 13 19:33:10 kali systemd: Starting Anonymizing overlay network for TCP (multi-instance-master)...
Jun 13 19:33:10 kali systemd: Finished Anonymizing overlay network for TCP (multi-instance-master).
However, if I type proxychains firefox www.whatismyip.com
, I still get the same IP address again and this is the output of the command:
root@kali:~# proxychains firefox www.whatismyip.com
ProxyChains-3.1 (http://proxychains.sf.net)
root@kali:~#
Any help is appreciated.
Lalit Vavdara
(149 rep)
Jun 13, 2020, 02:10 PM
• Last activity: Dec 6, 2021, 08:45 AM
Showing page 1 of 20 total questions