NaïveProxy
NaïveProxy is a cross-platform proxy that uses Chromium's network stack to camouflage traffic and provides strong censorship resistence and low detectablility when bypassing the Great Firewall of China. It can mitigate TLS fingerprint issues which lead to detection and survived large scale blocking of TLS-based censorship circumvention tools in China. It requires a naiveproxy client and requires a Caddy server with forwardproxy module to work.
Installation
Install naiveproxyAUR and run naiveproxy config.json. Here is an example config file:
config.json
{
"listen": "socks://127.0.0.1:1080",
"proxy": "https://myUsername:myStrongPassword@my.domain"
}
Configuration
Naiveproxy cannot run without a caddy server with forwardproxy module. You can build it with xcaddy:
$ go install github.com/caddyserver/xcaddy/cmd/xcaddy@latest $ ~/go/bin/xcaddy build --with github.com/caddyserver/forwardproxy@caddy2=github.com/klzgrad/forwardproxy@naive
Then, config caddy:
/etc/caddy/Caddyfile
{
order forward_proxy before file_server
}
:443, my.domain:443 {
tls /etc/caddy/ssl.cer /etc/caddy/ssl.key
forward_proxy {
basic_auth myUsername myStrongPassword
hide_ip
hide_via
probe_resistance
}
file_server {
root /var/www/html
}
}
Note that :443 must appear first for this Caddyfile to work. See Caddyfile docs for how to configure TLS certificates.
Then start caddy server:
# setcap cap_net_bind_service=+ep ./caddy && ./caddy start
You may also want to run caddy as a daemon.