How to chain socks5 proxies and setup using Srelay on Ubuntu 16

kashif - March 29, 2017

How to chain socks5 proxies and setup using Srelay on Ubuntu 16

Tutorials

This article is about working through a chain of proxy servers and to setup SRelay(Srelay – the SOCKS proxy and Relay). Using proxy chains, you can make the connection to a remote host that will be performed sequentially from one proxy server to another. This can be useful when a remote host is only accessible through multiple proxies or when you want to ensure a high level of anonymity. Whenever we send a packet to a target, that packet contains our IP address in the IP header. When we establish a TCP connection, the target system will log our IP address as it logs all connections. So, if we ignore any security alarms or alerts, our IP address will be get logged by the target hosts which increase the possibility of detection. To be on safe side of detection, we can use any intermediary machine whose IP address will be left on the target system using proxies. For this purpose, we can string multiple proxies in a chain using SSH, Srelay or proxychains, it makes much harder to detect our original IP address and to make it very unpredictable that if any traffic is attributed to our IP address.

Prerequisites

To setup, a chain of Socks5 proxies, make sure that its it involves multiple proxies and if anyone proxy is not functioning, the entire chain will not work. If the connection is broken at one proxy, the entire connection to the remote host is lost and the total lag will be the sum of all lags at all proxy servers in the chain.

How to chain socks5 proxies using ProxyChains

ProxyChains is used to redirect connections through proxy servers by forcing any TCP connection made by any given TCP client to follow through a single proxy or a chain of proxy. It supports SOCKS4, SOCKS5 and HTTP CONNECT proxy servers with basic and socks authentications. It can be best used when the only way to get “outside” from your LAN is through the proxy server or when you are behind the restrictive firewall which filters outgoing connections to some ports.

The ProxyChains package is available in the default repository of Ubuntu 16 and we can be installed by issuing below command in your command line terminal.

$ sudo apt-get install proxychains

Find the perfect Proxy Product.

Proxyrack offers a multiple options to suit most use cases, if you are unsure our 3 Day Trial allows you to test them all.

Security

Residential proxies

Never get blocked, choose your location

View all option available
Vault

Datacenter proxies

Super fast and reliable

View all option available
Try

3 Day Trial

Test all products to find the best fit

View all option available

Configuring ProxyChains in Ubuntu 16

After installing the proxychains package, you will find its configuration file in ‘/etc/’ directory. Let’s open it using your command line text editor to view or change the default configurations.

$ sudo vim /etc/proxychains.conf

Here is the default configuration file of ProxyChain, let’s say if you are using SOCKS proxy with port 1280, you can replace 9150 with 1280. Just replace the default proxy settings at the end of that file with your desired settings. Follow the Proxy List format as shown in the image to chain your Socks5 or other Socks servers in correct order.

You can use the following three type of proxy chains:

1) dynamic_chain:

In Dynamic chains, each connection will be done via chained proxies all proxies chained in the order as they appear on the list at least one proxy must be online to play in the chain (dead proxies are skipped) otherwise, EINTR is returned to the app.

2) strict_chain:

In a strict chain, each connection will be done via chained proxies where all proxies chained in the order as they appear in the list, while all proxies must be online to play in chain otherwise EINTR is returned to the app.

3) random_chain:

Each connection will be done via random proxy from the list. This option is good to test your IDS.

You can then use proxy chains using below command.

$ proxychains telnet target_host.com

This will run the ‘telnet’ command through your defined chained proxies specified in ‘proxychains.conf’ file to the target host.
Similarly you can use below command to update your system by using your defined chain proxies.

$ sudo proxychains apt-get update

Your system will be updated not using your LAN internet but using your configured chain proxy servers.

How to setup SRelay on Ubuntu 16

Srelay is Socks proxy server ad relay, a middleman handling the connection with the server for clients. Its an Open Source and free to use the proxy server which includes socks version 5 and version 4 support as well. The srelay socks version 5 can be used to connect/bind operation for TCP relaying and connection control with tcp_wrappers(libwrap). The srelay only supports ‘No Authentication’ and ‘Username/Password Authentication’ using the server host’s account information.

It is some time required to use socks authentication to connect to next-hop socks server while working as the intermediate of socks servers chain. In this case, you can specify the username and password for the next-hop socks by using 'srelay.passwd' file by specifying '-a' option.

Socks Relay can be downloaded by following this Link to Srelay Package on Sourceforge. You can simply copy the source link address and then download on your server using ‘wget’ command as shown below.

$ wget https://downloads.sourceforge.net/project/socks-relay/socks-relay/srelay-0.4.8/srelay-0.4.8b5.tar.gz

Once the package is downloaded, then extract the archived package using the below command.

$ tar -zxf srelaye-0.0.2.tar.gz

Then change your directory to the extracted srelay folder, compile it and then installing using ‘make’ command.

$ cd srelay-0.4.8b5/
$ ./configure

After compilation runs the ‘make’ command and then copy ‘srelay’ script to the following binary folder using ‘cp’ command.

$ make
$ sudo cp srelay /usr/local/bin/

Srelay Configuration options

Following are the main option to configure your srelay proxy

– disable-thread disable pthread feature.

Do not use pthread

– with – libwrap = PATH | yes | no with tcp_wrapper access control.

Do not incorporate access control by TcpWrappers

Srelay Startup script

Srelay configuration samples are under the scripts / directory. Let’s use below command to copy its startup script to ‘/etc/init.d’ directory.

$ sudo cp scripts/rc.srelay /etc/init.d/srelay

Now start its service by going through the 'init.d' directory.

$ cd /etc/init.d
$ srelay start

After starting srelay service, make sure that its started successfully without any error. You can check by its port and process if its running or not use below commands.

$ netstat -tlnp
$ ps -ef | grep srelay

How to configure Srelay as Relaying SOCKS

Now you can configure Srelay to use just as a SOCKS server or to configure it as a relaying socks proxy by opening its configuration file using your command line editor.

$ vim srelay-0.4.8b5/srelay.conf
# dest     dest-port    next-hop    next-port

Network_A      any         socks_A     1080

Network_B      any         socks_B     1080

Network_C      any         socks_C     1080

Here in this configuration file, Network_A, Network_B, and Network C may be actual network addresses and socks_A, socks_B and socks_C are the host addresses with their ports that may be different in the configuration file. If you like to control that kind of destination, you have to set FQDN. In many cases, an FQDN might be useless, so, you can do something using wildcards as destinations as well just like shown below.

Example

  # dest      dest-port   next-hop  next-port

  0.0.0.0      any          xxx.xx.xx.xx    1080

  *               any          xxx.xx.xx    1080

This shown that every IPv4, FQDN destination should go through the next Hop SOCKS of xxx.xx.xx.xx port 1080. After making your saved changes, start srelay service using below command

$ srelay -c srelay-0.4.8b5/srelay.conf -r -s

You can find out more about the available options with 'srelay -h' command.

$ srelay -h
srelay 0.4.8b5 2010/12/20 (Tomo.M)
usage: srelay [options]
options:
        -c file config file
        -i i/f  listen interface IP[:PORT]
        -J i/f  outbound interface name
        -m num  max child/thread
        -o min  idle timeout minutes
        -p file pid file
        -a np   auth methods n: no, p:pass
        -u file srelay password file
        -f      run into foreground
        -r      resolve client name in log
        -s      force logging to syslog
        -t      disable threading
        -b      avoid BIND port restriction
        -g      use the same interface for outbound as inbound
        -I      inetd mode
        -v      show version and exit
        -h      show this help and exit

Conclusion

In this article we discussed proxy chaining, then installed and configured it, using ProxyChains and SRelay on Ubuntu 16.04. Proxy Chaining is awesome, that allows you to chain multiple proxies to connect to each other and then wrap your program of choice and connect to the Internet. This protects you and masks your IP with many layers which apparently much difficult for anyone who tries to reach back to your host. There are many other proxy chaining packages available for the cross platforms, like Tor, Proxifier, ProxyHam etc. Any of these tools can be used to achieve the purpose but Srelay is a simple but effective method to stay anonymous over the internet. As by using the normal browser and add-ons you won’t get much security as you get in chaining process. You might also consider the internet speed while using such intermediate servers but if its already cached, then the response time will be remarkable for your requested websites as those are loaded from cache database. That’s it for today’s topic, feel free to get back to us in case of any further assistance or suggestions.

Find the perfect Proxy Product.

Proxyrack offers a multiple options to suit most use cases, if you are unsure our 3 Day Trial allows you to test them all.

Security

Residential proxies

Never get blocked, choose your location

View all option available
Vault

Datacenter proxies

Super fast and reliable

View all option available
Try

3 Day Trial

Test all products to find the best fit

View all option available

Daniel - May 9, 2022

How To Create A Custom SEO Tool

Tutorials
Read Article

Daniel - May 9, 2022

Best Proxies For Enterprises

Tutorials
Read Article

Daniel - April 7, 2022

What Is Autofill Magic?

Tutorials
Read Article

Daniel - April 1, 2022

What Is AdsPower Browser?

Tutorials
Read Article

Get Started by signing up for a Proxy Product

View Plans