1 ProxyChains-NG ver 4.17 README
2 =============================
4 ProxyChains is a UNIX program, that hooks network-related libc functions
5 in DYNAMICALLY LINKED programs via a preloaded DLL (dlsym(), LD_PRELOAD)
6 and redirects the connections through SOCKS4a/5 or HTTP proxies.
7 It supports TCP only (no UDP/ICMP etc).
9 The way it works is basically a HACK; so it is possible that it doesn't
10 work with your program, especially when it's a script, or starts
11 numerous processes like background daemons or uses dlopen() to load
12 "modules" (bug in glibc dynlinker).
13 It should work with simple compiled (C/C++) dynamically linked programs
16 If your program doesn't work with proxychains, consider using an
17 iptables based solution instead; this is much more robust.
19 Supported Platforms: Linux, BSD, Mac, Haiku.
22 *********** ATTENTION ***********
24 this program can be used to circumvent censorship.
25 doing so can be VERY DANGEROUS in certain countries.
27 ALWAYS MAKE SURE THAT PROXYCHAINS WORKS AS EXPECTED
28 BEFORE USING IT FOR ANYTHING SERIOUS.
30 this involves both the program and the proxy that you're going to
33 for example, you can connect to some "what is my ip" service
34 like ifconfig.me to make sure that it's not using your real ip.
36 ONLY USE PROXYCHAINS IF YOU KNOW WHAT YOU'RE DOING.
38 THE AUTHORS AND MAINTAINERS OF PROXYCHAINS DO NOT TAKE ANY
39 RESPONSIBILITY FOR ANY ABUSE OR MISUSE OF THIS SOFTWARE AND
40 THE RESULTING CONSEQUENCES.
44 # needs a working C compiler, preferably gcc
45 ./configure --prefix=/usr --sysconfdir=/etc
47 [optional] sudo make install
48 [optional] sudo make install-config (installs proxychains.conf)
50 if you dont install, you can use proxychains from the build directory
51 like this: ./proxychains4 -f src/proxychains.conf telnet google.com 80
56 - add hook for close_range function, fixing newer versions of openssh
57 - fat-binary-m1 option for mac
58 - fix DNS error handling in proxy_dns_old
60 - fix openbsd preloading
61 - fix double-close in multithreaded apps
62 - various improvements to configure script
65 - fix regression in configure script linker flag detection
66 - remove 10 year old workaround for wrong glibc getnameinfo signature
67 - support for new DYLD hooking method for OSX Monterey
68 - netbsd compilation fix
69 - support IPv6 localnets
70 - more user-friendly error message when execvp fails
71 - proxy_getaddrinfo(): fill in ai_socktype if requested
74 - fix configure script for buggy binutils version
75 - initialize rand_seed with nano-second granularity
76 - add support for numeric ipv6 in getaddrinfo
77 - fix bug in getaddrinfo when node is null and !passive
81 - add proxy_dns_old to emulate proxychains 3.1 behaviour
82 - add new proxy_dns_daemon feature (experimental)
86 - allow alternative proto://user:pass@ip:port syntax for proxylist
87 - fix endless loop in round robin mode when all proxies are down (#147)
88 - fix compilation on android (#265)
89 - fix fd leak in forked processes (#273)
90 - skip connection attempt to nullrouted ips
91 - allow hostnames for proxylist under specific circumstances
94 - fix robustness of DNS lookup thread and a segfault
95 - fix socks5 user/pass auth on non-conforming servers
97 - add support for Solaris
100 - fix several build issues
104 - compatibility fix for some GUI apps (8870140)
105 - compatibility fix for some HTTP proxies (cf9a16d)
106 - fix several warnings for cleaner build on debian
107 - fix random_chain on OSX (0f6b226)
110 - preliminary IPv6 support
111 - fixed bug in hostsreader
112 - preliminary support for usage on OpenBSD (caveat emptor)
115 - fix regression in linking order with custom LDFLAGS
116 - fix segfault in DNS mapping code in programs with > ~400 different lookups
119 - fix a security issue CVE-2015-3887
120 - add sendto hook to handle MSG_FASTOPEN flag
121 - replace problematic hostentdb with hostsreader
122 - fix compilation on OpenBSD (although doesn't work there)
125 - fix regression in 4.8 install-config Makefile target
128 - fix for odd cornercase where getaddrinfo was used with AI_NUMERICHOST
129 to test for a numeric ip instead of resolving it (fixes nmap).
130 - allow usage with programs that rely on LD_PRELOAD themselves
131 - reject wrong entries in config file
132 - print version number on startup
135 - new round_robin chaintype by crass.
136 - fix bug with lazy allocation when GCC constructor was not used.
137 - new configure flag --fat-binary to create a "fat" binary/library on OS X
138 - return EBADF rather than EINTR in close hook.
139 it's legal for a program to retry close() calls when they receive
140 EINTR, which could cause an infinite loop, as seen in chromium.
143 - some cosmetic fixes to Makefile, fix a bug when non-numeric ip was
144 used as proxy server address.
147 - hook close() to prevent OpenSSH from messing with internal infrastructure.
148 this caused ssh client to segfault when proxified.
152 - fixes some installation issues on Debian and Mac.
155 - fixes programs that do dns-lookups in child processes (fork()ed),
156 like irssi. to achieve this, support for compilation without pthreads
158 - fixes thread safety for gethostent() calls.
159 - improved DNS handling speed, since hostent db is cached.
162 - fixes compilation issues with ubuntu 12.04 toolchain
163 - fixes segfault in rare codepath
166 - support for mac os x (all archs)
167 - all internal functions are threadsafe when compiled with -DTHREAD_SAFE
171 - replaced dnsresolver script (which required a dynamically linked "dig"
172 binary to be present) with remote DNS lookup.
173 this speeds up any operation involving DNS, as the old script had to use TCP.
174 additionally it allows to use .onion urls when used with TOR.
175 - removed broken autoconf build system with a simple Makefile.
176 there's a ./configure script though for convenience.
177 it also adds support for a config file passed via command line switches/
178 environment variables.
181 - support for DNS resolving through proxy
182 supports SOCKS4, SOCKS5 and HTTP CONNECT proxy servers.
183 Auth-types: socks - "user/pass" , http - "basic".
186 1) When the only way to get "outside" from your LAN is through proxy server.
187 2) To get out from behind restrictive firewall which filters outgoing ports.
188 3) To use two (or more) proxies in chain:
189 like: your_host <--> proxy1 <--> proxy2 <--> target_host
190 4) To "proxify" some program with no proxy support built-in (like telnet)
191 5) Access intranet from outside via proxy.
192 6) To use DNS behind proxy.
193 7) To access hidden tor onion services.
197 * This program can mix different proxy types in the same chain
198 like: your_host <-->socks5 <--> http <--> socks4 <--> target_host
199 * Different chaining options supported
200 random order from the list ( user defined length of chain ).
201 exact order (as they appear in the list )
202 dynamic order (smart exclude dead proxies from chain)
203 * You can use it with most TCP client applications, possibly even network
204 scanners, as long as they use standard libc functionality.
205 pcap based scanning does not work.
206 * You can use it with servers, like squid, sendmail, or whatever.
207 * DNS resolving through proxy.
213 proxychains looks for config file in following order:
214 1) file listed in environment variable PROXYCHAINS_CONF_FILE or
215 provided as a -f argument to proxychains script or binary.
216 2) ./proxychains.conf
217 3) $(HOME)/.proxychains/proxychains.conf
218 4) $(sysconfdir)/proxychains.conf **
220 ** usually /etc/proxychains.conf
224 $ proxychains telnet targethost.com
226 in this example it will run telnet through proxy(or chained proxies)
227 specified by proxychains.conf
231 $ proxychains -f /etc/proxychains-other.conf telnet targethost2.com
233 in this example it will use different configuration file then proxychains.conf
234 to connect to targethost2.com host.
238 $ proxyresolv targethost.com
240 in this example it will resolve targethost.com through proxy(or chained proxies)
241 specified by proxychains.conf
245 - newer versions of nmap try to determine the network interface to use
246 even if it's not needed (like when doing simple syn scans which use the
247 standard POSIX socket API. this results in errors when proxychains hands
248 out an ip address to a reserved address space.
249 possible workarounds: disable proxy_dns, use a numeric ip, or use nmap's
250 native support for SOCKS proxies.
252 - Mac OS X 10.11 (El Capitan) ships with a new security feature called SIP
253 that prevents hooking of system apps.
254 workarounds are to partially disable SIP by issuing
255 csrutil enable --without debug in recovery mode,
256 or to copy the system binary into the home directory and run it from there.
257 see github issue #78 for details.
259 - the glibc dynlinker has a bug or security feature that inhibits dlopen()ed
260 modules from being subject to the same dlsym hooks as installed for the main
261 program. this mainly affects scripting languages such as perl or python
262 that heavily rely on dlopen() for modules written in C to work.
263 there are unconfirmed reports that it works as root though.
264 musl libc is unaffected from the bug.
269 #proxychains on irc.libera.chat
273 bitcoins donations are welcome - please send to this address:
274 1C9LBpuy56veBqw5N33sZMoZW8mwCw3tPh