Mntp / README.md
eikarna
fix(permission): change default squid dir to tmp dir
6c06868
metadata
title: High Anonymity Squid Proxy
emoji: 🌐
colorFrom: indigo
colorTo: purple
sdk: docker
pinned: false
license: mit
short_description: A high anonymity Squid proxy server
app_port: 7860

High Anonymity Squid Proxy

This is a Dockerized Squid proxy server configured for high anonymity. It removes identifying headers and supports both HTTP and HTTPS connections through the CONNECT method.

Features

  • High anonymity mode (removes identifying headers)
  • Support for HTTP and HTTPS websites
  • Configurable port (default: 7860)
  • Access logging
  • Performance optimizations

How It Works

This proxy works by:

  1. Handling HTTP requests directly with header anonymization
  2. Tunneling HTTPS requests through the CONNECT method (without decrypting them)

The proxy does not decrypt HTTPS traffic, which means:

  • It works with all HTTPS websites
  • It maintains user privacy (the proxy cannot see HTTPS content)
  • Some advanced filtering features are not available for HTTPS traffic

Configuration

The proxy is configured with the following settings:

  • Port: 7860
  • Anonymity: High (removes Via, Forwarded-For, and other identifying headers)
  • Access Control: Open to all IPs (0.0.0.0/0)

Deployment on Hugging Face Spaces

  1. Create a new Space on Hugging Face
  2. Select "Docker" as the SDK
  3. Upload the Dockerfile and this README.md
  4. The proxy will automatically start on port 7860

Usage

After deployment, you can use the proxy by connecting to the Space URL on port 7860:

http://<your-space-name>.hf.space:7860

Customization

To customize the configuration, you can modify the squid.conf generation section in the Dockerfile. Some common customizations:

  • Change the port: Modify the http_port directive in the squid.conf
  • Adjust anonymity settings: Edit the header removal sections
  • Restrict access by IP: Modify the ACL settings

Security Considerations

This proxy is configured for high anonymity but is open to all IP addresses by default. For production use, consider:

  1. Restricting access by IP address
  2. Adding authentication
  3. Regularly updating the base Ubuntu image

License

This project is licensed under the MIT License.