Go to file
kayos@tcp.direct eecbe04599
Fix: CI; broken commit summarizer
2024-03-04 11:54:17 -08:00
.github Fix: CI; broken commit summarizer 2024-03-04 11:54:17 -08:00
example Breaking change: refactor statistics, improve p5.CloseAllConns 2023-12-05 13:53:24 -08:00
internal dev->staging (#91) 2023-08-11 22:51:49 -07:00
logger dev->staging (#91) 2023-08-11 22:51:49 -07:00
.gitignore Chore: tidy up 2022-07-25 00:14:26 -07:00
LICENSE small debugging tweak, add email to license 2022-11-22 21:26:11 -08:00
README.md Update README.md (typo) 2024-01-08 17:36:37 -08:00
conductor.go Breaking change: refactor statistics, improve p5.CloseAllConns 2023-12-05 13:53:24 -08:00
daemons.go Breaking change: refactor statistics, improve p5.CloseAllConns 2023-12-05 13:53:24 -08:00
debug.go dev->staging (#91) 2023-08-11 22:51:49 -07:00
defs.go Breaking change: refactor statistics, improve p5.CloseAllConns 2023-12-05 13:53:24 -08:00
dispense.go dev->staging (#91) 2023-08-11 22:51:49 -07:00
getters.go Breaking change: refactor statistics, improve p5.CloseAllConns 2023-12-05 13:53:24 -08:00
go.mod Chore(deps): Bump github.com/gdamore/tcell/v2 from 2.7.0 to 2.7.1 (#124) 2024-02-19 09:45:37 -08:00
go.sum Chore(deps): Bump github.com/gdamore/tcell/v2 from 2.7.0 to 2.7.1 (#124) 2024-02-19 09:45:37 -08:00
list_management.go dev->staging (#91) 2023-08-11 22:51:49 -07:00
mr_worldwide.go Fix recycling 2023-02-09 06:19:34 -08:00
mystery_dialer.go Breaking change: refactor statistics, improve p5.CloseAllConns 2023-12-05 13:53:24 -08:00
mystery_resolver.go Chore: rename 2022-10-16 03:53:04 -07:00
parse.go Drop inet.af/ipaddr and therefore unsafe dependency 2023-02-04 19:06:12 -08:00
parse_test.go Improve parsing 2022-10-11 17:15:57 -07:00
proto.go dev->staging (#91) 2023-08-11 22:51:49 -07:00
proto_test.go Testing: add immutable proto test 2023-01-04 22:08:45 -08:00
prox5_test.go Breaking change: refactor statistics, improve p5.CloseAllConns 2023-12-05 13:53:24 -08:00
proxy.go dev->staging (#91) 2023-08-11 22:51:49 -07:00
scale_util.go Breaking change: refactor statistics, improve p5.CloseAllConns 2023-12-05 13:53:24 -08:00
setters.go dev->staging (#91) 2023-08-11 22:51:49 -07:00
socks5_server.go Complete teardown (broken atm) 2023-01-31 01:21:29 -08:00
stats.go Breaking change: refactor statistics, improve p5.CloseAllConns 2023-12-05 13:53:24 -08:00
validator_engine.go Breaking change: refactor statistics, improve p5.CloseAllConns 2023-12-05 13:53:24 -08:00

Prox5

SOCKS5/4/4a validating proxy pool + SOCKS5 server

Animated Screenshot of Prox5 Example

GoDoc Go Report Card IRC Test Status five

import git.tcp.direct/kayos/prox5

Prox5 is a golang library for managing, validating, and utilizing a very large amount of arbitrary SOCKS proxies.

Notably it features interface compatible dialer functions that dial out from different proxies for every connection, and a SOCKS5 server that utilizes those functions.


Warning Using prox5 to proxy connections from certain offsec tools may cause denial of service.

e.g: https://youtu.be/qVRFnxjD7o8

Please spazz out responsibly.


Table of Contents

  1. Overview
    1. Validation Engine
    2. Auto Scaler
    3. Rate Limiting
    4. Accessing Validated Proxies
  2. Additional info
    1. The Secret Sauce
    2. External Integrations
  3. Status and Final Thoughts

Overview

Validation Engine

  1. TCP Dial to the endpoint, if successful, reuse net.Conn down for step 2
  2. HTTPS GET request to a list of IP echo endpoints
  3. Store the IP address discovered during step 2
  4. Allocate a new prox5.Proxy type || update an existing one, store latest info
  5. Enqueue a pointer to this proxy.Proxy instance, instantiating it for further use

Auto Scaler

The validation has an optional auto scale feature that allows for the automatic tuning of validation worker count as more proxies are dispensed. This feature is still new, but seems to work well. It can be enabled with [...].EnableAutoScaler().

Please refer to the autoscale related items within the documentation for more info.

Rate Limiting

Using Rate5, prox5 naturally reduces the frequency of proxies that fail to validate. It does this by reducing the frequency proxies are accepted into the validation pipeline the more they fail to verify or fail to successfully connect to an endpoint. This is not yet adjustable, but will be soon. See the documentation for Rate5, and the source code for this project (defs.go is a good place to start) for more info.

Accessing Validated Proxies

  • Retrieve validated 4/4a/5 proxies as simple strings for generic use
  • Use one of the dialer functions with any golang code that calls for a net.Dialer
  • Spin up a SOCKS5 server that will then make rotating use of your validated proxies

Additional info

The Secret Sauce

What makes Prox5 special is largely the Mystery Dialer. This dialer satisfies the net.Dialer and ContextDialer interfaces. The implementation is a little bit different from your average dialer. Here's roughly what happens when you dial out with a ProxyEngine;

  • Loads up a previously verified proxy
  • Attempts to make connection with the dial endpoint using said proxy
  • Upon failure, prox5:
    • repeats this process mid-dial
    • does not drop connection to the client
  • Once a proxy has been successfully used to connect to the target endpoint, prox5 passes the same net.Conn onto the client

External Integrations

Mullvad

Take a look at mullsox for an easy way to access all of the mullvad proxies reachable from any one VPN endpoint. It is trivial to feed the results of GetAndVerifySOCKS into prox5.

Here's a snippet that should just about get you there:

package main

import (
    "os"
    "time"

    "git.tcp.direct/kayos/mullsox"
    "git.tcp.direct/kayos/prox5"
)

func main() {
	p5 := prox5.NewProxyEngine()
	mc := mullsox.NewChecker()

	if err := mc.Update(); err != nil {
		println(err.Error())
		return
	}

	incoming, _ := mc.GetAndVerifySOCKS()

	var count = 0
	for line := range incoming {
		if p5.LoadSingleProxy(line.String()) {
			count++
		}
	}

	if count == 0 {
		println("failed to load any proxies")
		return
	}

	if err := p5.Start(); err != nil {
		println(err.Error())
		return
	}
	
	go func() {
		if err := p5.StartSOCKS5Server("127.0.0.1:42069", "", ""); err != nil {
			println(err.Error())
			os.Exit(1)
		}
	}()
	
	time.Sleep(time.Millisecond * 500)
	
	println("proxies loaded and socks server started")
}
ProxyBonanza

Take a look at ProxyGonanza

(TODO: code example here)


Status and Final Thoughts

This project is in development.

It "works" and has been used in "production", but still needs some love.

Please break it and let me know what broke.

The way you choose to use this lib is yours. The API is fairly extensive for you to be able to customize runtime configuration without having to do any surgery.

Things like the amount of validation workers that are concurrently operating, timeouts, and proxy re-use policies may be tuned in real-time.


Please see the docs and the example for more details.