I am looking for a solution. I’m thinking of a locally hosted socks5 proxy like TOR has, but instead of TOR, this self hosted proxy can be configured to rotate through other remote proxies that I have access to

is there anything like this?

  • Melody Fwygon@lemmy.one
    link
    fedilink
    English
    arrow-up
    3
    ·
    1 year ago

    Obligatory disclaimer here; I strongly recommend you do not do what you are planning to do with only rotating proxies. Tor is much safer and more private about this sort of thing; you will be de-anonymized easily if you do not use Tor.

    Now that the obligatory “privacy community” disclaimers are out of the way; I can say that I do understand what you’re trying to do. Frequently many websites ban the ever loving crap out of Tor Exit nodes and simply will refuse you any service if they even sniff a hint of The Onion Router on your packets. This is, unfortunately, an intentional design decision of Tor Project. You see; they understand the massive potential for abuse of Tor.

    Unfortunately…this probably leaves you, the reader, in a situation. You end up being required to choose to either trust or do without. In today’s world; that’s just absolutely freaking impractical even in the best of cases.

    Unfortunately the same websites who block Tor are also the same kind of websites with the kind of kinks in their panties that also motivate them to block Proxies as well! Seriously; if your packets come in smelling like they came fresh off a SOCKS5 tunnel; the remote website can often tell. Sometimes the website will be nice and wave this on through; but only if you include headers like X-Forwarded-For: in your request…which defeats the entire purpose of the damn proxy; as that header is for putting your original IP address in.

    So in the end your traffic will still ‘stink’; either of Onions or of SOCKS. Sure, you could buy a VPN; but now you’re coming from an obvious VPN proxy and websites that already hate Onions or Socks also hate VPNs; because they can’t see who might be abusing their service.

    Now you can try all three ideas and see which one the site will accept. Your mileage may vary and some websites indeed will block all three; Cloudflare, which is a CDN that also services many other websites and protects their edges from DDoS attacks is notorious for doing this.

    Best of luck. All I can recommend is a paid VPN plan, pay more than $0 and ideally less than you would spend on a week of coffee; and make sure that the provider not only does not log; but make sure that the provider also is verified by third parties who aren’t shady…to actually be a no-log VPN service. This will take lots of research but it’s worth knowing who in the VPN space are shysters and who arent.

    No, I won’t recommend a particular service; I’d rather you did your own homework and risk analysis anyways

    If a Paid VPN is out of the question; using Tor may be your only option. If you have multiple proxies you’re probably paying for them anyways and could afford a VPN.

  • 0v0@sopuli.xyz
    link
    fedilink
    arrow-up
    1
    ·
    1 year ago

    I think glider can do this, with -strategy rr (Round Robin mode). I have not used it in this way myself, so you might need to experiment a little. Proxychains can also do this, but it doesn’t present a socks5 interface itself (it uses LD_PRELOAD, so it won’t work everywhere).