haad / proxychains

proxychains - a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types: "user/pass" for SOCKS4/5, "basic" for HTTP.
http://proxychains.sourceforge.net/
GNU General Public License v2.0
6.27k stars 603 forks source link

The opposite of localnet (list of ip's that _do_ use the proxy) #161

Closed breathe closed 1 month ago

breathe commented 4 months ago

Is your feature request related to a problem? Please describe.

I want to use proxychains with mitmproxy in reverse proxy mode in order to route traffic from a limited ephemeral compute environment over a userspace tailscale socks5 proxy. mitmproxy doesn't support a socks5 client mode -- proxychains is almost able to work around that.

Describe the solution you'd like

I want to be able to list ip addresses or hostnames that should be routed via the socks server -- while all other traffic is handled normally.

Describe alternatives you've considered

Trying to enumerate the traffic that shouldn't be routed over the proxy by port:

localnet 0.0.0.0:80/0.0.0.0 
localnet 0.0.0.0:443/0.0.0.0 
localnet 0.0.0.0:53/0.0.0.0 
...

Would much rather just have the spiritual equivalent of

# only route traffic destined for a.b.c.d:8080 via the proxy routes
remotenet a.b.c.d:8080/0.0.0.0

(or even a simpler spelling)

github-actions[bot] commented 1 month ago

Stale issue message