python-proxy
============
|made-with-python| |PyPI-version| |Hit-Count| |Downloads| |Downloads-month| |Downloads-week|
.. |made-with-python| image:: https://img.shields.io/badge/Made%20with-Python-1f425f.svg
:target: https://www.python.org/
.. |PyPI-version| image:: https://badge.fury.io/py/pproxy.svg
:target: https://pypi.python.org/pypi/pproxy/
.. |Hit-Count| image:: http://hits.dwyl.io/qwj/python-proxy.svg
:target: https://pypi.python.org/pypi/pproxy/
.. |Downloads| image:: https://pepy.tech/badge/pproxy
:target: https://pepy.tech/project/pproxy
.. |Downloads-month| image:: https://pepy.tech/badge/pproxy/month
:target: https://pepy.tech/project/pproxy
.. |Downloads-week| image:: https://pepy.tech/badge/pproxy/week
:target: https://pepy.tech/project/pproxy
HTTP/HTTP2/HTTP3/Socks4/Socks5/Shadowsocks/SSH/Redirect/Pf/QUIC TCP/UDP asynchronous tunnel proxy implemented in Python3 asyncio.
QuickStart
----------
.. code:: rst
$ pip3 install pproxy
Successfully installed pproxy-1.9.5
$ pproxy
Serving on :8080 by http,socks4,socks5
^C
$ pproxy -l ss://chacha20:abc@:8080
Serving on :8080 by ss (chacha20-py)
Optional: (better performance with C ciphers)
.. code:: rst
$ pip3 install pproxy[accelerated]
Successfully installed pycryptodome-3.6.4
Apply OS system-wide proxy: (MacOS, Windows)
.. code:: rst
$ pproxy -r ss://chacha20:abc@server_ip:8080 --sys -vv
Serving on :8080 by http,socks4,socks5
System proxy setting -> socks5 localhost:8080
socks5 ::1:57345 -> ss server_ip:8080 -> slack.com:443
socks5 ::1:57345 -> ss server_ip:8080 -> www.google.com:443
..... (all local traffic log) ......
Apply CLI proxy: (MacOS, Linux)
.. code:: rst
$ export http_proxy=http://localhost:8080
$ export https_proxy=http://localhost:8080
Run With Docker
---------------
`pproxy` Docker container has both python3 (with Cryptodome for performance optimizations) and `pypy` versions available.
Python3:
``docker run -it -p 8080:8080 mosajjal/pproxy:latest -l http://:8080 -vv``
Pypy3:
``docker run -it -p 8080:8080 mosajjal/pproxy:latest-pypy -l http://:8080 -vv``
Features
--------
- Lightweight single-thread asynchronous IO.
- Pure python, no additional library required.
- Proxy client/server for TCP/UDP.
- Schedule (load balance) among remote servers.
- Incoming traffic auto-detect.
- Tunnel/jump/backward-jump support.
- Unix domain socket support.
- HTTP v2, HTTP v3 (QUIC)
- User/password authentication support.
- Filter/block hostname by regex patterns.
- SSL/TLS client/server support.
- Shadowsocks OTA (One-Time-Auth_), SSR plugins.
- Statistics by bandwidth and traffic.
- PAC support for javascript configuration.
- Iptables/Pf NAT redirect packet tunnel.
- System proxy auto-setting support.
- Client/Server API provided.
.. _One-Time-Auth: https://shadowsocks.org/en/spec/one-time-auth.html
Protocols
---------
+-------------------+------------+------------+------------+------------+--------------+
| Name | TCP server | TCP client | UDP server | UDP client | scheme |
+===================+============+============+============+============+==============+
| http (connect) | ✔ | ✔ | | | http:// |
+-------------------+ +------------+------------+------------+--------------+
| http | | ✔ | | | httponly:// |
| (get,post,etc) | | | | | (as client) |
+-------------------+------------+------------+------------+------------+--------------+
| http v2 (connect) | ✔ | ✔ | | | h2:// |
+-------------------+------------+------------+------------+------------+--------------+
| http v3 (connect) | ✔ by UDP | ✔ by UDP | | | h3:// |
+-------------------+------------+------------+------------+------------+--------------+
| https | ✔ | ✔ | | | http+ssl:// |
+-------------------+------------+------------+------------+------------+--------------+
| socks4 | ✔ | ✔ | | | socks4:// |
+-------------------+------------+------------+------------+------------+--------------+
| socks5 | ✔ | ✔ | ✔ udp-only | ✔ udp-only | socks5:// |
+-------------------+------------+------------+------------+------------+--------------+
| socks5 over TLS | ✔ | ✔ | | | socks5+ssl://|
+-------------------+------------+------------+------------+------------+--------------+
| shadowsocks | ✔ | ✔ | ✔ | ✔ | ss:// |
+-------------------+------------+------------+------------+------------+--------------+
| shadowsocks aead | ✔ | ✔ | | | ss:// |
+-------------------+------------+------------+------------+------------+--------------+
| shadowsocksR | ✔ | ✔ | | | ssr:// |
+-------------------+------------+------------+------------+------------+--------------+
| trojan | ✔ | ✔ | | | trojan:// |
+-------------------+------------+------------+------------+------------+--------------+
| ssh tunnel | | ✔ | | | ssh:// |
+-------------------+------------+------------+------------+------------+--------------+
| quic | ✔ by UDP | ✔ by UDP | ✔ | ✔ | http+quic:// |
+-------------------+------------+------------+------------+------------+--------------+
| iptables nat | ✔ | | | | redir:// |
+-------------------+------------+------------+------------+------------+--------------+
| pfctl nat (macos) | ✔ | | | | pf:// |
+-------------------+------------+------------+------------+------------+--------------+
| echo | ✔ | | ✔ | | echo:// |
+-------------------+------------+------------+------------+------------+--------------+
| tunnel | ✔ | ✔ | ✔ | ✔ | tunnel:// |
| (raw socket) | | | | | tunnel{ip}://|
+-------------------+------------+------------+------------+------------+--------------+
| websocket | ✔ | ✔ | | | ws:// |
| (simple tunnel) | | | | | ws{dst_ip}://|
+-------------------+------------+------------+------------+------------+--------------+
| xxx over TLS | ✔ | ✔ | | | xxx+ssl:// |
+-------------------+------------+------------+------------+------------+--------------+
| AUTO DETECT | ✔ | | ✔ | | a+b+c+d:// |
+-------------------+------------+------------+------------+------------+--------------+
Scheduling Algorithms
---------------------
+-------------------+------------+------------+------------+------------+
| Name | TCP | UDP | Parameter | Default |
+===================+============+============+============+============+
| first_available | ✔ | ✔ | -s fa | ✔ |
+-------------------+------------+------------+------------+------------+
| round_robin | ✔ | ✔ | -s rr | |
+-------------------+------------+------------+------------+------------+
| random_choice | ✔ | ✔ | -s rc | |
+-------------------+------------+------------+------------+------------+
| least_connection | ✔ | | -s lc | |
+-------------------+------------+------------+------------+------------+
Requirement
-----------
pycryptodome_ is an optional library to enable faster (C version) cipher. **pproxy** has many built-in pure python ciphers. They are lightweight and stable, but slower than C ciphers. After speedup with PyPy_, pure python ciphers can get similar performance as C version. If the performance is important and don't have PyPy_, install pycryptodome_ instead.
asyncssh_ is an optional library to enable ssh tunnel client support.
These are some performance benchmarks between Python and C ciphers (dataset: 8M):
+---------------------+----------------+
| chacha20-c | 0.64 secs |
+---------------------+----------------+
| chacha20-py (pypy3) | 1.32 secs |
+---------------------+----------------+
| chacha20-py | 48.86 secs |
+---------------------+----------------+
PyPy3 Quickstart:
.. code:: rst
$ pypy3 -m ensurepip
$ pypy3 -m pip install asyncio pproxy
.. _pycryptodome: https://pycryptodome.readthedocs.io/en/latest/src/introduction.html
.. _asyncssh: https://asyncssh.readthedocs.io/en/latest/
.. _PyPy: http://pypy.org
Usage
-----
.. code:: rst
$ pproxy -h
usage: pproxy [-h] [-l LISTEN] [-r RSERVER] [-ul ULISTEN] [-ur URSERVER]
[-b BLOCK] [-a ALIVED] [-v] [--ssl SSLFILE] [--pac PAC]
[--get GETS] [--sys] [--test TESTURL] [--version]
Proxy server that can tunnel among remote servers by regex rules. Supported
protocols: http,socks4,socks5,shadowsocks,shadowsocksr,redirect,pf,tunnel
optional arguments:
-h, --help show this help message and exit
-l LISTEN tcp server uri (default: http+socks4+socks5://:8080/)
-r RSERVER tcp remote server uri (default: direct)
-ul ULISTEN udp server setting uri (default: none)
-ur URSERVER udp remote server uri (default: direct)
-b BLOCK block regex rules
-a ALIVED interval to check remote alive (default: no check)
-s {fa,rr,rc,lc} scheduling algorithm (default: first_available)
-v print verbose output
--ssl SSLFILE certfile[,keyfile] if server listen in ssl mode
--pac PAC http PAC path
--get GETS http custom {path,file}
--sys change system proxy setting (mac, windows)
--test TEST test this url for all remote proxies and exit
--version show program's version number and exit
Online help: <https://github.com/qwj/python-proxy>
URI Syntax
----------
.. code:: rst
{scheme}://[{cipher}@]{netloc}/[@{localbind}][,{plugins}][?{rules}][#{auth}]
- scheme
- Currently supported scheme: http, socks, ss, ssl, secure. You can use + to link multiple protocols together.
+----------+-----------------------------+
| http | http protocol (CONNECT) |
+----------+-----------------------------+
| httponly | http protocol (GET/POST) |
+----------+-----------------------------+
| socks4 | socks4 protocol |
+----------+-----------------------------+
| socks5 | socks5 protocol |
+----------+-----------------------------+
| ss | shadowsocks protocol |
+----------+-----------------------------+
| ssr | shadowsocksr (SSR) protocol |
+----------+-----------------------------+
| trojan | trojan_ protocol |
+----------+-----------------------------+
| ssh | ssh client tunnel |
+----------+-----------------------------+
| redir | redirect (iptables nat) |
+----------+-----------------------------+
| pf | pfctl (macos pf nat) |
+----------+-----------------------------+
| ssl | unsecured ssl/tls (no cert) |
+----------+-----------------------------+
| secure | secured ssl/tls (cert) |
+----------+-----------------------------+
| tunnel | raw connection |
+----------+-----------------------------+
| ws | websocket connection |
+----------+-----------------------------+
| echo | echo-back service |
+----------+-----------------------------+
| direct | direct connection |
+----------+-----------------------------+
.. _trojan: https://trojan-gfw.github.io/trojan/protocol
- "http://" accepts GET/POST/CONNECT as server, sends CONNECT as client. "httponly://" sends "GET/POST" as client, works only on http traffic.
- Valid schemes: http://, http+socks4+socks5://, http+ssl://, ss+secure://, http+socks5+ss://
- Invalid schemes: ssl://, secure://
- cipher
- Cipher's format: "cipher_name:cipher_key". Cipher can be base64-encoded. So cipher string with "YWVzLTEyOC1nY206dGVzdA==" is equal to "aes-128-gcm:test".
- Full cipher support list:
+-----------------+------------+-----------+-------------+
| Cipher | Key Length | IV Length | Score (0-5) |
+=================+============+===========+=============+
| table-py | any | 0 | 0 (lowest) |
+-----------------+------------+-----------+-------------+
| rc4 | 16 | 0 | 0 (lowest) |
+-----------------+------------+-----------+-------------+
| rc4-md5 | 16 | 16 | 0.5 |
+-----------------+------------+-----------+-------------+
| chacha20 | 32 | 8 | 5 (highest) |
+-----------------+------------+-----------+-------------+
| chacha20-ietf | 32 | 12 | 5 |
+-----------------+------------+-----------+-------------+
| chacha20-ietf- | | | |
| poly1305-py | 32 | 32 | AEAD |
+-----------------+------------+-----------+-------------+
| salsa20 | 32 | 8 | 4.5 |
+-----------------+------------+-----------+-------------+
| aes-128-cfb | 16 | 16 | 3 |
| | | | |
| aes-128-cfb8 | | | |
| | | | |
| aes-128-cfb1-py | | | slow |
+-----------------+------------+-----------+-------------+
| aes-192-cfb | 24 | 16 | 3.5 |
| | | | |
| aes-192-cfb8 | | | |
| | | | |
| aes-192-cfb1-py | | | slow |
+-----------------+------------+-----------+-------------+
| aes-256-cfb | 32 | 16 | 4.5 |
| | | | |
| aes-256-ctr | | | |
| | | | |
| aes-256-ofb | | | |
| | | | |
| aes-256-cfb8 | | | |
| | | | |
| aes-256-cfb1-py | | | slow |
+-----------------+------------+-----------+-------------+
| aes-256-gcm | 32 | 32 | AEAD |
| | | | |
| aes-192-gcm | 24 | 24 | AEAD |
| | | | |
| aes-128-gcm | 16 | 16 | AEAD |
+-----------------+------------+-----------+-------------+
| camellia-256-cfb| 32 | 16 | 4 |
| | | | |
| camellia-192-cfb| 24 | 16 | 4 |
| | | | |
| camellia-128-cfb| 16 | 16 | 4 |
+-----------------+------------+-----------+-------------+
| bf-cfb | 16 | 8 | 1 |
+-----------------+------------+-----------+-------------+
| cast5-cfb | 16 | 8 | 2.5 |
+-----------------+------------+-----------+-------------+
| des-cfb | 8 | 8 | 1.5 |
+-----------------+------------+-----------+-------------+
| rc2-cfb-py | 16 | 8 | 2 |
+-----------------+------------+-----------+-------------+
| idea-cfb-py | 16 | 8 | 2.5 |
+-----------------+------------+-----------+-------------+
| seed-cfb-py | 16 | 16 | 2 |
+-----------------+------------+-----------+-------------+
- *pproxy* ciphers have pure python implementations. Program will switch to C cipher if there is C implementation available within pycryptodome_. Otherwise, use pure python cipher.
- AEAD ciphers use additional payload after each packet. The underlying protocol is different. Specifications: AEAD_.
- Some pure python ciphers (aes-256-cfb1-py) is quite slow, and is not recommended to use without PyPy speedup. Try install pycryptodome_ and use C version cipher instead.
- To enable OTA encryption with shadowsocks, add '!' immediately after cipher name.
- netloc
- It can be "hostname:port" or "/unix_domain_socket". If the hostname is empty, server will listen on all interfaces.
- Valid netloc: localhost:8080, 0.0.0.0:8123, /tmp/domain_socket, :8123
- localbind
- It can be "@in" or @ipv4_address or @ipv6_address
- Valid localbind: @in, @192.168.1.15, @::1
- plugins
- It can be multiple plugins joined by ",". Supported plugins: plain, origin, http_simple, tls1.2_ticket_auth, verify_simple, verify_deflate
- Valid plugins: /,tls1.2_ticket_auth,verify_simple
- rules
- The filename that contains regex rules
- auth
- The username, colon ':', and the password
URIs can be joined by "__" to indicate tunneling by jump. For example, ss://1.2.3.4:1324__http://4.5.6.7:4321 make remote connection to the first shadowsocks proxy server, and then jump to the second http proxy server.
.. _AEAD: http://shadowsocks.org/en/spec/AEAD-Ciphers.html
Client API
----------
- TCP Client API
.. code:: rst
import asyncio, pproxy
async def test_tcp(proxy_uri):
conn = pproxy.Connection(proxy_uri)
reader, writer = await conn.tcp_connect('google.com', 80)
writer.write(b'GET / HTTP/1.1\r\n\r\n')
data = await reader.read(1024*16)
print(data.decode())
asyncio.run(test_tcp('ss://aes-256-cfb:password@remote_host:remote_port'))
- UDP Client API
.. code:: rst
import asyncio, pproxy
async def test_udp(proxy_uri):
conn = pproxy.Connection(proxy_uri)
answer = asyncio.Future()
await conn.udp_sendto('8.8.8.8', 53, b'hello the world', answer.set_result)
await answer
print(answer.result())
asyncio.run(test_udp('ss://chacha20:password@remote_host:remote_port'))
Server API
----------
- Server API example:
.. code:: rst
import asyncio
import pproxy
server = pproxy.Server('ss://0.0.0.0:1234')
remote = pproxy.Connection('ss://1.2.3.4:5678')
args = dict( rserver = [remote],
verbose = print )
loop = asyncio.get_event_loop()
handler = loop.run_until_complete(server.start_server(args))
try:
loop.run_forever()
except KeyboardInterrupt:
print('exit!')
handler.close()
loop.run_until_complete(handler.wait_closed())
loop.run_until_complete(loop.shutdown_asyncgens())
loop.close()
Examples
--------
- Regex rule
Define regex file "rules" as follow:
.. code:: rst
#google domains
(?:.+\.)?google.*\.com
(?:.+\.)?gstatic\.com
(?:.+\.)?gmail\.com
(?:.+\.)?ntp\.org
(?:.+\.)?glpals\.com
(?:.+\.)?akamai.*\.net
(?:.+\.)?ggpht\.com
(?:.+\.)?android\.com
(?:.+\.)?gvt1\.com
(?:.+\.)?youtube.*\.com
(?:.+\.)?ytimg\.com
(?:.+\.)?goo\.gl
(?:.+\.)?youtu\.be
(?:.+\.)?google\..+
Then start *pproxy*
.. code:: rst
$ pproxy -r http://aa.bb.cc.dd:8080?rules -vv
Serving on :8080 by http,socks4,socks5
http ::1:57768 -> http aa.bb.cc.dd:8080 -> www.googleapis.com:443
http ::1:57772 -> www.yahoo.com:80
socks4 ::1:57770 -> http aa.bb.cc.dd:8080 -> www.youtube.com:443
*pproxy* will serve incoming traffic by http/socks4/socks5 auto-detect protocol, redirect all google traffic to http proxy aa.bb.cc.dd:8080, and visit all other traffic directly from local.
- Use cipher
Add cipher encryption to make sure data can't be intercepted. Run *pproxy* locally as:
.. code:: rst
$ pproxy -l ss://:8888 -r ss://chacha20:cipher_key@aa.bb.cc.dd:12345 -vv
Next, run pproxy.py remotely on server "aa.bb.cc.dd". The base64 encoded string of "chacha20:cipher_key" is also supported:
.. code:: rst
$ pproxy -l ss://chacha20:cipher_key@:12345
The same as:
.. code:: rst
$ pproxy -l ss://Y2hhY2hhMjA6Y2lwaGVyX2tleQ==@:12345
The traffic between local and aa.bb.cc.dd is encrypted by stream cipher Chacha20 with secret key "cipher_key".
- Unix domain socket
A more complex example:
.. code:: rst
$ pproxy -l ss://salsa20!:complex_cipher_key@/tmp/pproxy_socket -r http+ssl://domain1.com:443#username:password
*pproxy* listen on the unix domain socket "/tmp/pproxy_socket" with cipher "salsa20" and key "complex_cipher_key". OTA packet protocol is enabled by adding ! after cipher name. The traffic is tunneled to remote https proxy with simple http authentication.
- SSL/TLS server
If you want to listen in SSL/TLS, you must specify ssl certificate and private key files by parameter "--ssl":
.. code:: rst
$ pproxy -l http+ssl://0.0.0.0:443 -l http://0.0.0.0:80 --ssl server.crt,server.key --pac /autopac
*pproxy* listen on both 80 HTTP and 443 HTTPS ports, use the specified SSL/TLS certificate and private key files. The "--pac" enable PAC feature, so you can put "https://yourdomain.com/autopac" path in your device's auto-configure url.
Simple guide for generating self-signed ssl certificates:
.. code:: rst
$ openssl genrsa -des3 -out server.key 1024
$ openssl req -new -key server.key -out server.csr
$ cp server.key server.key.org
$ openssl rsa -in server.key.org -out server.key
$ openssl x509 -req -days 365 -in server.csr -signkey server.key -out server.crt
- SSR plugins
ShadowsocksR example with plugin "tls1.2_ticket_auth" to emulate common tls traffic:
.. code:: rst
$ pproxy -l ssr://chacha20:mypass@0.0.0.0:443/,tls1.2_ticket_auth,verify_simple
- Local bind ip
If you want to route the traffic by different local bind, use the @localbind URI syntax. For example, server has three ip interfaces: 192.168.1.15, 111.0.0.1, 112.0.0.1. You want to route traffic matched by "rule1" to 111.0.0.2 and traffic matched by "rule2" to 222.0.0.2, and the remaining traffic directly:
.. code:: rst
$ pproxy -l ss://:8000/@in -r ss://111.0.0.2:8000/@111.0.0.1?rule1 -r ss://222.0.0.2:8000/@222.0.0.1?rule2
- Redirect/Pf protocol
IPTable NAT redirect example (Ubuntu):
.. code:: rst
$ sudo iptables -t nat -A OUTPUT -p tcp --dport 80 -j REDIRECT --to-ports 5555
$ pproxy -l redir://:5555 -r http://remote_http_server:3128 -vv
The above example illustrates how to redirect all local output tcp traffic with destination port 80 to localhost port 5555 listened by **pproxy**, and then tunnel the traffic to remote http proxy.
PF redirect example (MacOS):
.. code:: rst
$ sudo pfctl -ef /dev/stdin
rdr pass on lo0 inet proto tcp from any to any port 80 -> 127.0.0.1 port 8080
pass out on en0 route-to lo0 inet proto tcp from any to any port 80 keep state
^D
$ sudo pproxy -l pf://:8080 -r socks5://remote_socks5_server:1324 -vv
Make sure **pproxy** runs in root mode (sudo), otherwise it cannot redirect pf packet.
- Multiple jumps example
.. code:: rst
$ pproxy -r http://server1__ss://server2__socks://server3
*pproxy* will connect to server1 first, tell server1 connect to server2, and tell server2 connect to server3, and make real traffic by server3.
- Raw connection tunnel
TCP raw connection tunnel example:
.. code:: rst
$ pproxy -l tunnel{google.com}://:80
$ curl -H "Host: google.com" http://localhost
UDP dns tunnel example:
.. code:: rst
$ pproxy -ul tunnel{8.8.8.8}://:53
$ nslookup google.com localhost
- UDP more complicated example
Run the shadowsocks udp proxy on remote machine:
.. code:: rst
$ pproxy -ul ss://remote_server:13245
Run the commands on local machine:
.. code:: rst
$ pproxy -ul tunnel{8.8.8.8}://:53 -ur ss://remote_server:13245 -vv
UDP tunnel 127.0.0.1:60573 -> ss remote_server:13245 -> 8.8.8.8:53
UDP tunnel 127.0.0.1:60574 -> ss remote_server:13245 -> 8.8.8.8:53
...
$ nslookup google.com localhost
- Load balance example
Specify multiple -r server, and a scheduling algorithm (rr = round_robin, rc = random_choice, lc = least_connection):
.. code:: rst
$ pproxy -r http://server1 -r ss://server2 -r socks5://server3 -s rr -vv
http ::1:42356 -> http server1 -> google.com:443
http ::1:42357 -> ss server2 -> google.com:443
http ::1:42358 -> socks5 server3 -> google.com:443
http ::1:42359 -> http server1 -> google.com:443
...
$ pproxy -ul tunnel://:53 -ur tunnel://8.8.8.8:53 -ur tunnel://8.8.4.4:53 -s rc -vv
UDP tunnel ::1:35378 -> tunnel 8.8.8.8:53
UDP tunnel ::1:35378 -> tunnel 8.8.4.4:53
...
- WebSocket example
WebSocket protocol is similar to Tunnel protocol. It is raw and doesn't support any proxy function. It can connect to other proxy like Tunnel protocol.
First run pproxy on remote machine:
.. code:: rst
$ pproxy -l ws://:80 -r tunnel:///tmp/myproxy -v
$ pproxy -l ss://chacha20:abc@/tmp/myproxy -v
Run pproxy on local machine:
.. code:: rst
$ pproxy -l tunnel://:1234 -r ws://remote_ip:80 -vv
Then port :1234 on local machine is connected to the /tmp/myproxy on remote machine by WebSocket tunnel. You can specify any proxy protocol details on /tmp/myproxy.
It is a good practice to use some CDN in the middle of local/remote machines. CDN with WebSocket support can hide remote machine's real IP from public.
- Backward proxy
Sometimes, the proxy server hides behind an NAT router and doesn't have a public ip. The client side has a public ip "client_ip". Backward proxy feature enables the server to connect backward to client and wait for proxy requests.
Run **pproxy** client as follows:
.. code:: rst
$ pproxy -l http://:8080 -r http+in://:8081 -v
Run **pproxy** server as follows:
.. code:: rst
$ pproxy -l http+in://client_ip:8081
Server connects to client_ip:8081 and waits for client proxy requests. The protocol http specified is just an example. It can be any protocol and cipher **pproxy** supports. The scheme "**in**" should exist in URI to inform **pproxy** that it is a backward proxy.
.. code:: rst
$ pproxy -l http+in://jumpserver__http://client_ip:8081
It is a complicated example. Server connects to client_ip:8081 by jump http://jumpserver. The backward proxy works through jumps.
- SSH client tunnel
SSH client tunnel support is enabled by installing additional library asyncssh_. After "pip3 install asyncssh", you can specify "**ssh**" as scheme to proxy via ssh client tunnel.
.. code:: rst
$ pproxy -l http://:8080 -r ssh://remote_server.com/#login:password
If a client private key is used to authenticate, put double colon "::" between login and private key path.
.. code:: rst
$ pproxy -l http://:8080 -r ssh://remote_server.com/#login::private_key_path
SSH connection known_hosts feature is disabled by default.
- SSH jump
SSH jump is supported by using "__" concatenation
.. code:: rst
$ pproxy -r ssh://server1__ssh://server2__ssh://server3
First connection to server1 is made. Second, ssh connection to server2 is made from server1. Finally, connect to server3, and use server3 for proxying traffic.
- SSH remote forward
.. code:: rst
$ pproxy -l ssh://server__tunnel://0.0.0.0:1234 -r tunnel://127.0.0.1:1234
TCP :1234 on remote server is forwarded to 127.0.0.1:1234 on local server
.. code:: rst
$ pproxy -l ssh://server1__ssh://server2__ss://0.0.0.0:1234 -r ss://server3:1234
It is a complicated example. SSH server2 is jumped from SSH server1, and ss://0.0.0.0:1234 on server2 is listened. Traffic is forwarded to ss://server3:1234.
- Trojan protocol example
Normally trojan:// should be used together with ssl://. You should specify the SSL crt/key file for ssl usage. A typical trojan server would be:
.. code:: rst
$ pproxy --ssl ssl.crt,ssl.key -l trojan+tunnel{localhost:80}+ssl://:443#yourpassword -vv
If trojan password doesn't match, the tunnal{localhost:80} will be switched to. It looks exactly the same as a common HTTPS website.
- QUIC protocol example
QUIC is a UDP stream protocol used in HTTP/3. Library **aioquic** is required if you want to proxy via QUIC.
QUIC is listened on UDP port, but can handle TCP or UDP traffic. If you want to handle TCP traffic, you should use "-l quic+http" instead of "-ul quic+http".
.. code:: rst
$ pip3 install aioquic
$ pproxy --ssl ssl.crt,ssl.key -l quic+http://:1234
On the client:
$ pproxy -r quic+http://server:1234
QUIC protocol can transfer a lot of TCP streams on one single UDP stream. If the connection number is hugh, QUIC can benefit by reducing TCP handshake time.
- VPN Server Example
You can run VPN server simply by installing pvpn (python vpn), a lightweight VPN server with pproxy tunnel feature.
.. code:: rst
$ pip3 install pvpn
Successfully installed pvpn-0.2.1
$ pvpn -wg 9999 -r http://remote_server:remote_port
Serving on UDP :500 :4500...
Serving on UDP :9000 (WIREGUARD)...
TCP xx.xx.xx.xx:xx -> HTTP xx.xx.xx.xx:xx -> xx.xx.xx.xx:xx
Projects
--------
+ `python-vpn <https://github.com/qwj/python-vpn>`_ - VPN Server (IPSec,IKE,IKEv2,L2TP,WireGuard) in pure python
+ `shadowproxy <https://github.com/guyingbo/shadowproxy>`_ - Awesome python proxy implementation by guyingbo
Raw data
{
"_id": null,
"home_page": "https://github.com/localstack/python-proxy",
"name": "pproxy-ext",
"maintainer": "",
"docs_url": null,
"requires_python": ">=3.6",
"maintainer_email": "",
"keywords": "proxy socks http shadowsocks shadowsocksr ssr redirect pf tunnel cipher ssl udp",
"author": "Qian Wenjie",
"author_email": "qianwenjie@gmail.com",
"download_url": "https://files.pythonhosted.org/packages/26/2e/0e6cd63988776f48dfb640849dc0b58d184b90bd08ff65c2b5f5c48b079a/pproxy-ext-2.7.9.tar.gz",
"platform": null,
"description": "python-proxy\n============\n\n|made-with-python| |PyPI-version| |Hit-Count| |Downloads| |Downloads-month| |Downloads-week|\n\n.. |made-with-python| image:: https://img.shields.io/badge/Made%20with-Python-1f425f.svg\n :target: https://www.python.org/\n.. |PyPI-version| image:: https://badge.fury.io/py/pproxy.svg\n :target: https://pypi.python.org/pypi/pproxy/\n.. |Hit-Count| image:: http://hits.dwyl.io/qwj/python-proxy.svg\n :target: https://pypi.python.org/pypi/pproxy/\n.. |Downloads| image:: https://pepy.tech/badge/pproxy\n :target: https://pepy.tech/project/pproxy\n.. |Downloads-month| image:: https://pepy.tech/badge/pproxy/month\n :target: https://pepy.tech/project/pproxy\n.. |Downloads-week| image:: https://pepy.tech/badge/pproxy/week\n :target: https://pepy.tech/project/pproxy\n\nHTTP/HTTP2/HTTP3/Socks4/Socks5/Shadowsocks/SSH/Redirect/Pf/QUIC TCP/UDP asynchronous tunnel proxy implemented in Python3 asyncio.\n\nQuickStart\n----------\n\n.. code:: rst\n\n $ pip3 install pproxy\n Successfully installed pproxy-1.9.5\n $ pproxy\n Serving on :8080 by http,socks4,socks5\n ^C\n $ pproxy -l ss://chacha20:abc@:8080\n Serving on :8080 by ss (chacha20-py)\n\nOptional: (better performance with C ciphers)\n\n.. code:: rst\n\n $ pip3 install pproxy[accelerated]\n Successfully installed pycryptodome-3.6.4\n\nApply OS system-wide proxy: (MacOS, Windows)\n\n.. code:: rst\n\n $ pproxy -r ss://chacha20:abc@server_ip:8080 --sys -vv\n Serving on :8080 by http,socks4,socks5\n System proxy setting -> socks5 localhost:8080\n socks5 ::1:57345 -> ss server_ip:8080 -> slack.com:443\n socks5 ::1:57345 -> ss server_ip:8080 -> www.google.com:443\n ..... (all local traffic log) ......\n\nApply CLI proxy: (MacOS, Linux)\n\n.. code:: rst\n\n $ export http_proxy=http://localhost:8080\n $ export https_proxy=http://localhost:8080\n\nRun With Docker\n---------------\n\n`pproxy` Docker container has both python3 (with Cryptodome for performance optimizations) and `pypy` versions available.\n\nPython3:\n\n``docker run -it -p 8080:8080 mosajjal/pproxy:latest -l http://:8080 -vv``\n\nPypy3:\n\n``docker run -it -p 8080:8080 mosajjal/pproxy:latest-pypy -l http://:8080 -vv``\n\nFeatures\n--------\n\n- Lightweight single-thread asynchronous IO.\n- Pure python, no additional library required.\n- Proxy client/server for TCP/UDP.\n- Schedule (load balance) among remote servers.\n- Incoming traffic auto-detect.\n- Tunnel/jump/backward-jump support.\n- Unix domain socket support.\n- HTTP v2, HTTP v3 (QUIC)\n- User/password authentication support.\n- Filter/block hostname by regex patterns.\n- SSL/TLS client/server support.\n- Shadowsocks OTA (One-Time-Auth_), SSR plugins.\n- Statistics by bandwidth and traffic.\n- PAC support for javascript configuration.\n- Iptables/Pf NAT redirect packet tunnel.\n- System proxy auto-setting support.\n- Client/Server API provided.\n\n.. _One-Time-Auth: https://shadowsocks.org/en/spec/one-time-auth.html\n\nProtocols\n---------\n\n+-------------------+------------+------------+------------+------------+--------------+\n| Name | TCP server | TCP client | UDP server | UDP client | scheme |\n+===================+============+============+============+============+==============+\n| http (connect) | \u2714 | \u2714 | | | http:// |\n+-------------------+ +------------+------------+------------+--------------+\n| http | | \u2714 | | | httponly:// |\n| (get,post,etc) | | | | | (as client) |\n+-------------------+------------+------------+------------+------------+--------------+\n| http v2 (connect) | \u2714 | \u2714 | | | h2:// |\n+-------------------+------------+------------+------------+------------+--------------+\n| http v3 (connect) | \u2714 by UDP | \u2714 by UDP | | | h3:// |\n+-------------------+------------+------------+------------+------------+--------------+\n| https | \u2714 | \u2714 | | | http+ssl:// |\n+-------------------+------------+------------+------------+------------+--------------+\n| socks4 | \u2714 | \u2714 | | | socks4:// |\n+-------------------+------------+------------+------------+------------+--------------+\n| socks5 | \u2714 | \u2714 | \u2714 udp-only | \u2714 udp-only | socks5:// |\n+-------------------+------------+------------+------------+------------+--------------+\n| socks5 over TLS | \u2714 | \u2714 | | | socks5+ssl://|\n+-------------------+------------+------------+------------+------------+--------------+\n| shadowsocks | \u2714 | \u2714 | \u2714 | \u2714 | ss:// |\n+-------------------+------------+------------+------------+------------+--------------+\n| shadowsocks aead | \u2714 | \u2714 | | | ss:// |\n+-------------------+------------+------------+------------+------------+--------------+\n| shadowsocksR | \u2714 | \u2714 | | | ssr:// |\n+-------------------+------------+------------+------------+------------+--------------+\n| trojan | \u2714 | \u2714 | | | trojan:// |\n+-------------------+------------+------------+------------+------------+--------------+\n| ssh tunnel | | \u2714 | | | ssh:// |\n+-------------------+------------+------------+------------+------------+--------------+\n| quic | \u2714 by UDP | \u2714 by UDP | \u2714 | \u2714 | http+quic:// |\n+-------------------+------------+------------+------------+------------+--------------+\n| iptables nat | \u2714 | | | | redir:// |\n+-------------------+------------+------------+------------+------------+--------------+\n| pfctl nat (macos) | \u2714 | | | | pf:// |\n+-------------------+------------+------------+------------+------------+--------------+\n| echo | \u2714 | | \u2714 | | echo:// |\n+-------------------+------------+------------+------------+------------+--------------+\n| tunnel | \u2714 | \u2714 | \u2714 | \u2714 | tunnel:// |\n| (raw socket) | | | | | tunnel{ip}://|\n+-------------------+------------+------------+------------+------------+--------------+\n| websocket | \u2714 | \u2714 | | | ws:// |\n| (simple tunnel) | | | | | ws{dst_ip}://|\n+-------------------+------------+------------+------------+------------+--------------+\n| xxx over TLS | \u2714 | \u2714 | | | xxx+ssl:// |\n+-------------------+------------+------------+------------+------------+--------------+\n| AUTO DETECT | \u2714 | | \u2714 | | a+b+c+d:// |\n+-------------------+------------+------------+------------+------------+--------------+\n\nScheduling Algorithms\n---------------------\n\n+-------------------+------------+------------+------------+------------+\n| Name | TCP | UDP | Parameter | Default |\n+===================+============+============+============+============+\n| first_available | \u2714 | \u2714 | -s fa | \u2714 |\n+-------------------+------------+------------+------------+------------+\n| round_robin | \u2714 | \u2714 | -s rr | |\n+-------------------+------------+------------+------------+------------+\n| random_choice | \u2714 | \u2714 | -s rc | |\n+-------------------+------------+------------+------------+------------+\n| least_connection | \u2714 | | -s lc | |\n+-------------------+------------+------------+------------+------------+\n\nRequirement\n-----------\n\npycryptodome_ is an optional library to enable faster (C version) cipher. **pproxy** has many built-in pure python ciphers. They are lightweight and stable, but slower than C ciphers. After speedup with PyPy_, pure python ciphers can get similar performance as C version. If the performance is important and don't have PyPy_, install pycryptodome_ instead.\n\nasyncssh_ is an optional library to enable ssh tunnel client support.\n\nThese are some performance benchmarks between Python and C ciphers (dataset: 8M):\n\n+---------------------+----------------+\n| chacha20-c | 0.64 secs |\n+---------------------+----------------+\n| chacha20-py (pypy3) | 1.32 secs |\n+---------------------+----------------+\n| chacha20-py | 48.86 secs |\n+---------------------+----------------+\n\nPyPy3 Quickstart:\n\n.. code:: rst\n\n $ pypy3 -m ensurepip\n $ pypy3 -m pip install asyncio pproxy\n\n.. _pycryptodome: https://pycryptodome.readthedocs.io/en/latest/src/introduction.html\n.. _asyncssh: https://asyncssh.readthedocs.io/en/latest/\n.. _PyPy: http://pypy.org\n\nUsage\n-----\n\n.. code:: rst\n\n $ pproxy -h\n usage: pproxy [-h] [-l LISTEN] [-r RSERVER] [-ul ULISTEN] [-ur URSERVER]\n [-b BLOCK] [-a ALIVED] [-v] [--ssl SSLFILE] [--pac PAC]\n [--get GETS] [--sys] [--test TESTURL] [--version]\n\n Proxy server that can tunnel among remote servers by regex rules. Supported\n protocols: http,socks4,socks5,shadowsocks,shadowsocksr,redirect,pf,tunnel\n\n optional arguments:\n -h, --help show this help message and exit\n -l LISTEN tcp server uri (default: http+socks4+socks5://:8080/)\n -r RSERVER tcp remote server uri (default: direct)\n -ul ULISTEN udp server setting uri (default: none)\n -ur URSERVER udp remote server uri (default: direct)\n -b BLOCK block regex rules\n -a ALIVED interval to check remote alive (default: no check)\n -s {fa,rr,rc,lc} scheduling algorithm (default: first_available)\n -v print verbose output\n --ssl SSLFILE certfile[,keyfile] if server listen in ssl mode\n --pac PAC http PAC path\n --get GETS http custom {path,file}\n --sys change system proxy setting (mac, windows)\n --test TEST test this url for all remote proxies and exit\n --version show program's version number and exit\n\n Online help: <https://github.com/qwj/python-proxy>\n\nURI Syntax\n----------\n\n.. code:: rst\n\n {scheme}://[{cipher}@]{netloc}/[@{localbind}][,{plugins}][?{rules}][#{auth}]\n\n- scheme\n\n - Currently supported scheme: http, socks, ss, ssl, secure. You can use + to link multiple protocols together.\n\n +----------+-----------------------------+\n | http | http protocol (CONNECT) |\n +----------+-----------------------------+\n | httponly | http protocol (GET/POST) |\n +----------+-----------------------------+\n | socks4 | socks4 protocol |\n +----------+-----------------------------+\n | socks5 | socks5 protocol |\n +----------+-----------------------------+\n | ss | shadowsocks protocol |\n +----------+-----------------------------+\n | ssr | shadowsocksr (SSR) protocol |\n +----------+-----------------------------+\n | trojan | trojan_ protocol |\n +----------+-----------------------------+\n | ssh | ssh client tunnel |\n +----------+-----------------------------+\n | redir | redirect (iptables nat) |\n +----------+-----------------------------+\n | pf | pfctl (macos pf nat) |\n +----------+-----------------------------+\n | ssl | unsecured ssl/tls (no cert) |\n +----------+-----------------------------+\n | secure | secured ssl/tls (cert) |\n +----------+-----------------------------+\n | tunnel | raw connection |\n +----------+-----------------------------+\n | ws | websocket connection |\n +----------+-----------------------------+\n | echo | echo-back service |\n +----------+-----------------------------+\n | direct | direct connection |\n +----------+-----------------------------+\n\n.. _trojan: https://trojan-gfw.github.io/trojan/protocol\n\n - \"http://\" accepts GET/POST/CONNECT as server, sends CONNECT as client. \"httponly://\" sends \"GET/POST\" as client, works only on http traffic.\n\n - Valid schemes: http://, http+socks4+socks5://, http+ssl://, ss+secure://, http+socks5+ss://\n\n - Invalid schemes: ssl://, secure://\n\n- cipher\n\n - Cipher's format: \"cipher_name:cipher_key\". Cipher can be base64-encoded. So cipher string with \"YWVzLTEyOC1nY206dGVzdA==\" is equal to \"aes-128-gcm:test\".\n\n - Full cipher support list:\n\n +-----------------+------------+-----------+-------------+\n | Cipher | Key Length | IV Length | Score (0-5) |\n +=================+============+===========+=============+\n | table-py | any | 0 | 0 (lowest) |\n +-----------------+------------+-----------+-------------+\n | rc4 | 16 | 0 | 0 (lowest) |\n +-----------------+------------+-----------+-------------+\n | rc4-md5 | 16 | 16 | 0.5 |\n +-----------------+------------+-----------+-------------+\n | chacha20 | 32 | 8 | 5 (highest) |\n +-----------------+------------+-----------+-------------+\n | chacha20-ietf | 32 | 12 | 5 |\n +-----------------+------------+-----------+-------------+\n | chacha20-ietf- | | | |\n | poly1305-py | 32 | 32 | AEAD |\n +-----------------+------------+-----------+-------------+\n | salsa20 | 32 | 8 | 4.5 |\n +-----------------+------------+-----------+-------------+\n | aes-128-cfb | 16 | 16 | 3 |\n | | | | |\n | aes-128-cfb8 | | | |\n | | | | |\n | aes-128-cfb1-py | | | slow |\n +-----------------+------------+-----------+-------------+\n | aes-192-cfb | 24 | 16 | 3.5 |\n | | | | |\n | aes-192-cfb8 | | | |\n | | | | |\n | aes-192-cfb1-py | | | slow |\n +-----------------+------------+-----------+-------------+\n | aes-256-cfb | 32 | 16 | 4.5 |\n | | | | |\n | aes-256-ctr | | | |\n | | | | |\n | aes-256-ofb | | | |\n | | | | |\n | aes-256-cfb8 | | | |\n | | | | |\n | aes-256-cfb1-py | | | slow |\n +-----------------+------------+-----------+-------------+\n | aes-256-gcm | 32 | 32 | AEAD |\n | | | | |\n | aes-192-gcm | 24 | 24 | AEAD |\n | | | | |\n | aes-128-gcm | 16 | 16 | AEAD |\n +-----------------+------------+-----------+-------------+\n | camellia-256-cfb| 32 | 16 | 4 |\n | | | | |\n | camellia-192-cfb| 24 | 16 | 4 |\n | | | | |\n | camellia-128-cfb| 16 | 16 | 4 |\n +-----------------+------------+-----------+-------------+\n | bf-cfb | 16 | 8 | 1 |\n +-----------------+------------+-----------+-------------+\n | cast5-cfb | 16 | 8 | 2.5 |\n +-----------------+------------+-----------+-------------+\n | des-cfb | 8 | 8 | 1.5 |\n +-----------------+------------+-----------+-------------+\n | rc2-cfb-py | 16 | 8 | 2 |\n +-----------------+------------+-----------+-------------+\n | idea-cfb-py | 16 | 8 | 2.5 |\n +-----------------+------------+-----------+-------------+\n | seed-cfb-py | 16 | 16 | 2 |\n +-----------------+------------+-----------+-------------+\n\n - *pproxy* ciphers have pure python implementations. Program will switch to C cipher if there is C implementation available within pycryptodome_. Otherwise, use pure python cipher.\n\n - AEAD ciphers use additional payload after each packet. The underlying protocol is different. Specifications: AEAD_.\n\n - Some pure python ciphers (aes-256-cfb1-py) is quite slow, and is not recommended to use without PyPy speedup. Try install pycryptodome_ and use C version cipher instead.\n\n - To enable OTA encryption with shadowsocks, add '!' immediately after cipher name.\n\n- netloc\n\n - It can be \"hostname:port\" or \"/unix_domain_socket\". If the hostname is empty, server will listen on all interfaces.\n\n - Valid netloc: localhost:8080, 0.0.0.0:8123, /tmp/domain_socket, :8123\n\n- localbind\n\n - It can be \"@in\" or @ipv4_address or @ipv6_address\n\n - Valid localbind: @in, @192.168.1.15, @::1\n\n- plugins\n\n - It can be multiple plugins joined by \",\". Supported plugins: plain, origin, http_simple, tls1.2_ticket_auth, verify_simple, verify_deflate\n\n - Valid plugins: /,tls1.2_ticket_auth,verify_simple\n\n- rules\n\n - The filename that contains regex rules\n\n- auth\n\n - The username, colon ':', and the password\n\nURIs can be joined by \"__\" to indicate tunneling by jump. For example, ss://1.2.3.4:1324__http://4.5.6.7:4321 make remote connection to the first shadowsocks proxy server, and then jump to the second http proxy server.\n\n.. _AEAD: http://shadowsocks.org/en/spec/AEAD-Ciphers.html\n\nClient API\n----------\n\n- TCP Client API\n\n .. code:: rst\n\n import asyncio, pproxy\n\n async def test_tcp(proxy_uri):\n conn = pproxy.Connection(proxy_uri)\n reader, writer = await conn.tcp_connect('google.com', 80)\n writer.write(b'GET / HTTP/1.1\\r\\n\\r\\n')\n data = await reader.read(1024*16)\n print(data.decode())\n\n asyncio.run(test_tcp('ss://aes-256-cfb:password@remote_host:remote_port'))\n\n- UDP Client API\n\n .. code:: rst\n\n import asyncio, pproxy\n\n async def test_udp(proxy_uri):\n conn = pproxy.Connection(proxy_uri)\n answer = asyncio.Future()\n await conn.udp_sendto('8.8.8.8', 53, b'hello the world', answer.set_result)\n await answer\n print(answer.result())\n\n asyncio.run(test_udp('ss://chacha20:password@remote_host:remote_port'))\n\nServer API\n----------\n\n- Server API example:\n\n .. code:: rst\n\n import asyncio\n import pproxy\n\n server = pproxy.Server('ss://0.0.0.0:1234')\n remote = pproxy.Connection('ss://1.2.3.4:5678')\n args = dict( rserver = [remote],\n verbose = print )\n\n loop = asyncio.get_event_loop()\n handler = loop.run_until_complete(server.start_server(args))\n try:\n loop.run_forever()\n except KeyboardInterrupt:\n print('exit!')\n\n handler.close()\n loop.run_until_complete(handler.wait_closed())\n loop.run_until_complete(loop.shutdown_asyncgens())\n loop.close()\n\n\nExamples\n--------\n\n- Regex rule\n\n Define regex file \"rules\" as follow:\n\n .. code:: rst\n\n #google domains\n (?:.+\\.)?google.*\\.com\n (?:.+\\.)?gstatic\\.com\n (?:.+\\.)?gmail\\.com\n (?:.+\\.)?ntp\\.org\n (?:.+\\.)?glpals\\.com\n (?:.+\\.)?akamai.*\\.net\n (?:.+\\.)?ggpht\\.com\n (?:.+\\.)?android\\.com\n (?:.+\\.)?gvt1\\.com\n (?:.+\\.)?youtube.*\\.com\n (?:.+\\.)?ytimg\\.com\n (?:.+\\.)?goo\\.gl\n (?:.+\\.)?youtu\\.be\n (?:.+\\.)?google\\..+\n\n Then start *pproxy*\n\n .. code:: rst\n\n $ pproxy -r http://aa.bb.cc.dd:8080?rules -vv\n Serving on :8080 by http,socks4,socks5\n http ::1:57768 -> http aa.bb.cc.dd:8080 -> www.googleapis.com:443\n http ::1:57772 -> www.yahoo.com:80\n socks4 ::1:57770 -> http aa.bb.cc.dd:8080 -> www.youtube.com:443\n\n *pproxy* will serve incoming traffic by http/socks4/socks5 auto-detect protocol, redirect all google traffic to http proxy aa.bb.cc.dd:8080, and visit all other traffic directly from local.\n\n- Use cipher\n\n Add cipher encryption to make sure data can't be intercepted. Run *pproxy* locally as:\n\n .. code:: rst\n\n $ pproxy -l ss://:8888 -r ss://chacha20:cipher_key@aa.bb.cc.dd:12345 -vv\n\n Next, run pproxy.py remotely on server \"aa.bb.cc.dd\". The base64 encoded string of \"chacha20:cipher_key\" is also supported:\n\n .. code:: rst\n\n $ pproxy -l ss://chacha20:cipher_key@:12345\n\n The same as:\n\n .. code:: rst\n\n $ pproxy -l ss://Y2hhY2hhMjA6Y2lwaGVyX2tleQ==@:12345\n\n The traffic between local and aa.bb.cc.dd is encrypted by stream cipher Chacha20 with secret key \"cipher_key\".\n\n- Unix domain socket\n\n A more complex example:\n\n .. code:: rst\n\n $ pproxy -l ss://salsa20!:complex_cipher_key@/tmp/pproxy_socket -r http+ssl://domain1.com:443#username:password\n\n *pproxy* listen on the unix domain socket \"/tmp/pproxy_socket\" with cipher \"salsa20\" and key \"complex_cipher_key\". OTA packet protocol is enabled by adding ! after cipher name. The traffic is tunneled to remote https proxy with simple http authentication.\n\n- SSL/TLS server\n\n If you want to listen in SSL/TLS, you must specify ssl certificate and private key files by parameter \"--ssl\":\n\n .. code:: rst\n\n $ pproxy -l http+ssl://0.0.0.0:443 -l http://0.0.0.0:80 --ssl server.crt,server.key --pac /autopac\n\n *pproxy* listen on both 80 HTTP and 443 HTTPS ports, use the specified SSL/TLS certificate and private key files. The \"--pac\" enable PAC feature, so you can put \"https://yourdomain.com/autopac\" path in your device's auto-configure url.\n\n Simple guide for generating self-signed ssl certificates:\n\n .. code:: rst\n\n $ openssl genrsa -des3 -out server.key 1024\n $ openssl req -new -key server.key -out server.csr\n $ cp server.key server.key.org\n $ openssl rsa -in server.key.org -out server.key\n $ openssl x509 -req -days 365 -in server.csr -signkey server.key -out server.crt\n\n- SSR plugins\n\n ShadowsocksR example with plugin \"tls1.2_ticket_auth\" to emulate common tls traffic:\n\n .. code:: rst\n\n $ pproxy -l ssr://chacha20:mypass@0.0.0.0:443/,tls1.2_ticket_auth,verify_simple\n\n- Local bind ip\n\n If you want to route the traffic by different local bind, use the @localbind URI syntax. For example, server has three ip interfaces: 192.168.1.15, 111.0.0.1, 112.0.0.1. You want to route traffic matched by \"rule1\" to 111.0.0.2 and traffic matched by \"rule2\" to 222.0.0.2, and the remaining traffic directly:\n\n .. code:: rst\n\n $ pproxy -l ss://:8000/@in -r ss://111.0.0.2:8000/@111.0.0.1?rule1 -r ss://222.0.0.2:8000/@222.0.0.1?rule2\n\n- Redirect/Pf protocol\n\n IPTable NAT redirect example (Ubuntu):\n\n .. code:: rst\n\n $ sudo iptables -t nat -A OUTPUT -p tcp --dport 80 -j REDIRECT --to-ports 5555\n $ pproxy -l redir://:5555 -r http://remote_http_server:3128 -vv\n\n The above example illustrates how to redirect all local output tcp traffic with destination port 80 to localhost port 5555 listened by **pproxy**, and then tunnel the traffic to remote http proxy.\n\n PF redirect example (MacOS):\n\n .. code:: rst\n\n $ sudo pfctl -ef /dev/stdin\n rdr pass on lo0 inet proto tcp from any to any port 80 -> 127.0.0.1 port 8080\n pass out on en0 route-to lo0 inet proto tcp from any to any port 80 keep state\n ^D\n $ sudo pproxy -l pf://:8080 -r socks5://remote_socks5_server:1324 -vv\n\n Make sure **pproxy** runs in root mode (sudo), otherwise it cannot redirect pf packet.\n\n- Multiple jumps example\n\n .. code:: rst\n\n $ pproxy -r http://server1__ss://server2__socks://server3\n\n *pproxy* will connect to server1 first, tell server1 connect to server2, and tell server2 connect to server3, and make real traffic by server3.\n\n- Raw connection tunnel\n\n TCP raw connection tunnel example:\n\n .. code:: rst\n\n $ pproxy -l tunnel{google.com}://:80\n $ curl -H \"Host: google.com\" http://localhost\n\n UDP dns tunnel example:\n\n .. code:: rst\n\n $ pproxy -ul tunnel{8.8.8.8}://:53\n $ nslookup google.com localhost\n\n- UDP more complicated example\n\n Run the shadowsocks udp proxy on remote machine:\n\n .. code:: rst\n\n $ pproxy -ul ss://remote_server:13245\n\n Run the commands on local machine:\n\n .. code:: rst\n\n $ pproxy -ul tunnel{8.8.8.8}://:53 -ur ss://remote_server:13245 -vv\n UDP tunnel 127.0.0.1:60573 -> ss remote_server:13245 -> 8.8.8.8:53\n UDP tunnel 127.0.0.1:60574 -> ss remote_server:13245 -> 8.8.8.8:53\n ...\n $ nslookup google.com localhost\n\n- Load balance example\n\n Specify multiple -r server, and a scheduling algorithm (rr = round_robin, rc = random_choice, lc = least_connection):\n\n .. code:: rst\n\n $ pproxy -r http://server1 -r ss://server2 -r socks5://server3 -s rr -vv\n http ::1:42356 -> http server1 -> google.com:443\n http ::1:42357 -> ss server2 -> google.com:443\n http ::1:42358 -> socks5 server3 -> google.com:443\n http ::1:42359 -> http server1 -> google.com:443\n ...\n $ pproxy -ul tunnel://:53 -ur tunnel://8.8.8.8:53 -ur tunnel://8.8.4.4:53 -s rc -vv\n UDP tunnel ::1:35378 -> tunnel 8.8.8.8:53\n UDP tunnel ::1:35378 -> tunnel 8.8.4.4:53\n ...\n\n- WebSocket example\n\n WebSocket protocol is similar to Tunnel protocol. It is raw and doesn't support any proxy function. It can connect to other proxy like Tunnel protocol.\n\n First run pproxy on remote machine:\n\n .. code:: rst\n\n $ pproxy -l ws://:80 -r tunnel:///tmp/myproxy -v\n $ pproxy -l ss://chacha20:abc@/tmp/myproxy -v\n\n Run pproxy on local machine:\n\n .. code:: rst\n\n $ pproxy -l tunnel://:1234 -r ws://remote_ip:80 -vv\n\n Then port :1234 on local machine is connected to the /tmp/myproxy on remote machine by WebSocket tunnel. You can specify any proxy protocol details on /tmp/myproxy.\n\n It is a good practice to use some CDN in the middle of local/remote machines. CDN with WebSocket support can hide remote machine's real IP from public.\n\n- Backward proxy\n\n Sometimes, the proxy server hides behind an NAT router and doesn't have a public ip. The client side has a public ip \"client_ip\". Backward proxy feature enables the server to connect backward to client and wait for proxy requests.\n\n Run **pproxy** client as follows:\n\n .. code:: rst\n\n $ pproxy -l http://:8080 -r http+in://:8081 -v\n\n Run **pproxy** server as follows:\n\n .. code:: rst\n\n $ pproxy -l http+in://client_ip:8081\n\n Server connects to client_ip:8081 and waits for client proxy requests. The protocol http specified is just an example. It can be any protocol and cipher **pproxy** supports. The scheme \"**in**\" should exist in URI to inform **pproxy** that it is a backward proxy.\n\n .. code:: rst\n\n $ pproxy -l http+in://jumpserver__http://client_ip:8081\n\n It is a complicated example. Server connects to client_ip:8081 by jump http://jumpserver. The backward proxy works through jumps.\n\n- SSH client tunnel\n\n SSH client tunnel support is enabled by installing additional library asyncssh_. After \"pip3 install asyncssh\", you can specify \"**ssh**\" as scheme to proxy via ssh client tunnel.\n\n .. code:: rst\n\n $ pproxy -l http://:8080 -r ssh://remote_server.com/#login:password\n\n If a client private key is used to authenticate, put double colon \"::\" between login and private key path.\n\n .. code:: rst\n\n $ pproxy -l http://:8080 -r ssh://remote_server.com/#login::private_key_path\n\n SSH connection known_hosts feature is disabled by default.\n\n- SSH jump\n\n SSH jump is supported by using \"__\" concatenation\n\n .. code:: rst\n\n $ pproxy -r ssh://server1__ssh://server2__ssh://server3\n\n First connection to server1 is made. Second, ssh connection to server2 is made from server1. Finally, connect to server3, and use server3 for proxying traffic.\n\n- SSH remote forward\n\n .. code:: rst\n\n $ pproxy -l ssh://server__tunnel://0.0.0.0:1234 -r tunnel://127.0.0.1:1234\n\n TCP :1234 on remote server is forwarded to 127.0.0.1:1234 on local server\n\n .. code:: rst\n\n $ pproxy -l ssh://server1__ssh://server2__ss://0.0.0.0:1234 -r ss://server3:1234\n\n It is a complicated example. SSH server2 is jumped from SSH server1, and ss://0.0.0.0:1234 on server2 is listened. Traffic is forwarded to ss://server3:1234.\n\n- Trojan protocol example\n\n Normally trojan:// should be used together with ssl://. You should specify the SSL crt/key file for ssl usage. A typical trojan server would be:\n\n .. code:: rst\n\n $ pproxy --ssl ssl.crt,ssl.key -l trojan+tunnel{localhost:80}+ssl://:443#yourpassword -vv\n\n If trojan password doesn't match, the tunnal{localhost:80} will be switched to. It looks exactly the same as a common HTTPS website.\n\n- QUIC protocol example\n\n QUIC is a UDP stream protocol used in HTTP/3. Library **aioquic** is required if you want to proxy via QUIC.\n QUIC is listened on UDP port, but can handle TCP or UDP traffic. If you want to handle TCP traffic, you should use \"-l quic+http\" instead of \"-ul quic+http\".\n\n .. code:: rst\n\n $ pip3 install aioquic\n $ pproxy --ssl ssl.crt,ssl.key -l quic+http://:1234\n\n On the client:\n\n $ pproxy -r quic+http://server:1234\n\n QUIC protocol can transfer a lot of TCP streams on one single UDP stream. If the connection number is hugh, QUIC can benefit by reducing TCP handshake time.\n\n- VPN Server Example\n\n You can run VPN server simply by installing pvpn (python vpn), a lightweight VPN server with pproxy tunnel feature.\n\n .. code:: rst\n\n $ pip3 install pvpn\n Successfully installed pvpn-0.2.1\n $ pvpn -wg 9999 -r http://remote_server:remote_port\n Serving on UDP :500 :4500...\n Serving on UDP :9000 (WIREGUARD)...\n TCP xx.xx.xx.xx:xx -> HTTP xx.xx.xx.xx:xx -> xx.xx.xx.xx:xx\n\n\nProjects\n--------\n\n+ `python-vpn <https://github.com/qwj/python-vpn>`_ - VPN Server (IPSec,IKE,IKEv2,L2TP,WireGuard) in pure python\n+ `shadowproxy <https://github.com/guyingbo/shadowproxy>`_ - Awesome python proxy implementation by guyingbo\n\n",
"bugtrack_url": null,
"license": "MIT",
"summary": "Proxy server that can tunnel among remote servers by regex rules.",
"version": "2.7.9",
"project_urls": {
"Homepage": "https://github.com/localstack/python-proxy"
},
"split_keywords": [
"proxy",
"socks",
"http",
"shadowsocks",
"shadowsocksr",
"ssr",
"redirect",
"pf",
"tunnel",
"cipher",
"ssl",
"udp"
],
"urls": [
{
"comment_text": "",
"digests": {
"blake2b_256": "bb6e760e2e7affc41d7417d63189ed5de206f638e6b0eb1b5d7140c5320b82e9",
"md5": "4e0fca77ee86f3a168b5f8f6ee914aa5",
"sha256": "841c47fe19b9976b67c50c1614480442a53ac0545f000702777b9a31e5bba710"
},
"downloads": -1,
"filename": "pproxy_ext-2.7.9-py3-none-any.whl",
"has_sig": false,
"md5_digest": "4e0fca77ee86f3a168b5f8f6ee914aa5",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": ">=3.6",
"size": 42866,
"upload_time": "2023-09-25T13:55:10",
"upload_time_iso_8601": "2023-09-25T13:55:10.446414Z",
"url": "https://files.pythonhosted.org/packages/bb/6e/760e2e7affc41d7417d63189ed5de206f638e6b0eb1b5d7140c5320b82e9/pproxy_ext-2.7.9-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": "",
"digests": {
"blake2b_256": "262e0e6cd63988776f48dfb640849dc0b58d184b90bd08ff65c2b5f5c48b079a",
"md5": "5850d66de513f436d76c9424d9a0b1d1",
"sha256": "67316762d4d034f362da3cbddea3e587cd470a0fc68c241d354077c89e9e1fea"
},
"downloads": -1,
"filename": "pproxy-ext-2.7.9.tar.gz",
"has_sig": false,
"md5_digest": "5850d66de513f436d76c9424d9a0b1d1",
"packagetype": "sdist",
"python_version": "source",
"requires_python": ">=3.6",
"size": 50417,
"upload_time": "2023-09-25T13:55:12",
"upload_time_iso_8601": "2023-09-25T13:55:12.499817Z",
"url": "https://files.pythonhosted.org/packages/26/2e/0e6cd63988776f48dfb640849dc0b58d184b90bd08ff65c2b5f5c48b079a/pproxy-ext-2.7.9.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2023-09-25 13:55:12",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "localstack",
"github_project": "python-proxy",
"travis_ci": false,
"coveralls": false,
"github_actions": false,
"lcname": "pproxy-ext"
}