Go to file
Vladislav Yarmak 1889908fe9 upd doc 2020-05-24 19:42:20 +03:00
.dockerignore initial code 2020-05-19 22:53:13 +03:00
.gitignore initial code 2020-05-19 22:53:13 +03:00
Dockerfile initial code 2020-05-19 22:53:13 +03:00
LICENSE Initial commit 2020-05-19 20:50:36 +03:00
Makefile initial code 2020-05-19 22:53:13 +03:00
README.md upd doc 2020-05-24 19:42:20 +03:00
auth.go show appropriate message once browser auth is triggered 2020-05-24 18:49:35 +03:00
condlog.go initial code 2020-05-19 22:53:13 +03:00
go.mod initial code 2020-05-19 22:53:13 +03:00
handler.go filter requests 2020-05-24 16:11:50 +03:00
logwriter.go initial code 2020-05-19 22:53:13 +03:00
main.go http2 support 2020-05-24 15:24:11 +03:00
snapcraft.yaml bump snap version 2020-05-24 01:51:54 +03:00
utils.go http2 support 2020-05-24 15:24:11 +03:00

README.md

dumbproxy

Dumbiest HTTP proxy ever.

Features

  • Cross-platform (Windows/Mac OS/Linux/Android (via shell)/*BSD)
  • Deployment with a single self-contained binary
  • Zero-configuration
  • Supports CONNECT method and forwarding of HTTPS connections
  • Supports Basic proxy authentication
  • Supports TLS operation mode (HTTP(S) proxy over TLS)
  • Supports HTTP/2
  • Resilient to DPI (including active probing, see hidden_domain option for authentication providers)

Installation

Binary download

Pre-built binaries available on releases page.

From source

Alternatively, you may install dumbproxy from source. Run within source directory

go install

Docker

Docker image is available as well. Here is an example for running proxy as a background service:

docker run -d \
    --security-opt no-new-privileges \
    -p 8080:8080 \
    --restart unless-stopped \
    --name dumbproxy \
    yarmak/dumbproxy

Snap Store

Get it from the Snap Store

sudo snap install dumbproxy

Usage

Just run program and it'll start accepting connections on port 8080 (default).

Example: run proxy on port 1234 with Basic authentication with username admin and password 123456:

dumbproxy -bind-address :1234 -auth 'static://?username=admin&password=123456'

Authentication

Authentication parameters are passed as URI via -auth parameter. Scheme of URI defines authentication metnod and query parameters define parameter values for authentication provider.

  • none - no authentication. Example: none://. This is default.
  • static - basic authentication for single login and password pair. Example: static://?username=admin&password=123456. Parameters:
    • username - login.
    • password - password.
    • hidden_domain - if specified and is not an empty string, proxy will respond with "407 Proxy Authentication Required" only on specified domain. All unauthenticated clients will receive "400 Bad Request" status. This option is useful to prevent DPI active probing from discovering that service is a proxy, hiding proxy authentication prompt when no valid auth header was provided. Hidden domain is used for generating 407 response code to trigger browser authorization request in cases when browser has no prior knowledge proxy authentication is required. In such cases user has to navigate to any hidden domain page via plaintext HTTP, authenticate themselves and then browser will remember authentication.

Synopsis

$ ~/go/bin/dumbproxy -h
  -auth string
    	auth parameters (default "none://")
  -bind-address string
    	HTTP proxy listen address (default ":8080")
  -cert string
    	enable TLS and use certificate
  -key string
    	key for TLS certificate
  -timeout duration
    	timeout for network operations (default 10s)
  -verbosity int
    	logging verbosity (10 - debug, 20 - info, 30 - warning, 40 - error, 50 - critical) (default 20)