Here's how I set up my secure HTTPS proxy over a coffee break

Discussion in 'Security' started by OnlineProxyIo, Apr 11, 2024.

  1. #1
    Hi digitalpoint! Here's how I set up my secure HTTPS proxy over a coffee break - and why it might be important for all of us. Let's get to the bottom of it!

    In our world where online privacy is becoming more and more valuable, an HTTPS proxy is like your own personal digital bulletproof vest. ️ From bypassing geoblocks to protecting your data from prying eyes, the benefits are numerous. And guess what, it's really not as complicated as it may seem at first glance!

    Step 1: Assign a domain name

    It all starts with the domain name. This will be the address of your proxy server on the internet. I chose `freemyip.com` to get a free domain, which made the process incredibly easy and fast.

    Step 2: Install `dumbproxy`

    Open a terminal and enter the command that will install `dumbproxy`:
    ```
    curl -Lo /usr/local/bin/dumbproxy 'httрs://github.com/Snawoot/dumbproxy/releases/download/v1.6.1/dumbproxy.linux-amd64' && chmod +x /usr/local/bin/dumbproxy
    ```

    Step 3: Create a user

    Let's create a user for our proxy to add a layer of security. Simply replace `USERNAME` and `PASSWORD` with the preferred data:
    ```
    dumbproxy -passwd /etc/dumbproxy.htpasswd 'USERNAME' 'PASSWORD'
    ```

    Step 4: Configuration

    Next, configure `dumbproxy` to use TLS and bind to port 443:
    ```
    OPTIONS=-auth basicfile://?path=/etc/dumbproxy.htpasswd -autocert -bind-address :443
    ```
    And create the `systemd` service to manage `dumbproxy`:
    ```
    [Unit]
    Description=Dumb Proxy
    Documentation=httрs://github.com/Snawoot/dumbproxy/
    After=network.target network-online.target
    Requires=network-online.target
    [Service]
    EnvironmentFile=/etc/default/dumbproxy
    User=root
    Group=root
    ExecStart=/usr/local/bin/dumbproxy $OPTIONS
    TimeoutStopSec=5s
    PrivateTmp=true
    ProtectSystem=full
    LimitNOFILE=20000
    [Install]
    WantedBy=default.target
    ```

    Step 5: Run and Test
    Now activate and run `dumbproxy`:
    ```
    systemctl daemon-reload
    systemctl enable dumbproxy
    systemctl start dumbproxy
    ```
    Let's see if everything is working correctly:
    ```
    curl -x 'httрs://USERNAME:ASSWORD@DOMAIN' http://ifconfig.co
    ```

    Configure clients

    Finally, let's connect our devices to our new proxy.
    **Windows and Mac**: Use this PAC script:
    ```
    function FindProxyForURL(u, h){return "HTTPS example.com:443";}
    ```
    **Chrome**: Can be run with the proxy specified directly:
    ```
    chromium-browser --proxy-server='https://example.com:443'
    ```

    Now you know how to set up your own secure HTTPS proxy to help you stay anonymous on the internet and bypass potential blockages.

    So digitalpoint, how many of you have already tried something like this?

    Share your thoughts, tips or success/failure stories. Let's share our experiences and help each other out!
     
    OnlineProxyIo, Apr 11, 2024 IP