Skip to content

a safe chain proxy server to protect your anonimity online. Remember that User agent still sign your navigation and that DNS leak might break your chain security. Also get in mind even tor choose close node to enhance internet experience so a statistician will always get you.

Notifications You must be signed in to change notification settings

Axle-Bucamp/chain_proxy_server

Repository files navigation

🛡️ Multi-hop Anonymity Proxy Chain: Tor + Privoxy + ProtonVPN + NGINX

This project provides a secure, containerized anonymity pipeline using:

  • 🔄 Tor cluster (replicated, containerized, pluggable obfs4 bridges supported)
  • 🧰 Privoxy (per-Tor exit)
  • 🌐 NGINX stream proxy (to chain Tor→Privoxy→ProtonVPN)
  • 🛡️ ProtonVPN outproxy via tunnel-based Privoxy
  • 📈 Optional: Prometheus, Grafana, Watchtower

📦 Architecture


\[User] → \[NGINX Proxy] → \[Tor Cluster] → \[Privoxy Cluster] → \[Privoxy (ProtonVPN)] → \[Internet]

All services run through docker-compose, replicating Tor + Privoxy nodes and chaining ProtonVPN as a secured egress tunnel.


🚀 Setup Instructions

1. Clone the Repo

git clone https://github.com/Axle-Bucamp/chain_proxy_server
cd chain_proxy_server

2. Prepare Your .env File

Create a .env file in the root folder:

EMAIL=you@example.com
OR_PORT=9001
PT_PORT=9002
NICKNAME=BridgeObfs4Node

GF_SECURITY_ADMIN_USER=admin
GF_SECURITY_ADMIN_PASSWORD=changeme

WATCHTOWER_CLEANUP=true
WATCHTOWER_LABEL_ENABLE=true

ProtonVPN credentials must also be created as a Docker secret named protonvpn.


3. Run the System

docker compose up -d --scale tor=3 --scale privoxy=3

This runs:

  • 3x Tor nodes (dockurr/tor)
  • 3x Privoxy nodes (each mapped to a Tor exit)
  • 1x ProtonVPN tunnel (genericmale/protonvpn)
  • 1x final Privoxy egress via VPN
  • 1x NGINX stream proxy chaining everything

4. Test Your Connection

Test that your IP is not leaking:

curl --proxy http://localhost:8888 https://api.ipify.org

✅ This should return your ProtonVPN IP — not your ISP or Tor IP.


🔐 Enhanced Security Tips

  • IP Leak Prevention: Always run this with --network host or DNS-secured Docker bridge
  • Zero Trust Tunnel: ProtonVPN adds exit encryption after multiple Tor circuits
  • Obfs4 Support: Deploy obfs4-bridge to bypass censorship
  • DNS Hardened: Internal DNS disabled; relies on Tor-resolved or VPN-secured

📊 Optional Observability Stack

You can optionally enable:

These services monitor uptime, restarts, and connectivity across your chain.


📁 Directory Layout

.
├── docker-compose.yml
├── nginx/
│   └── nginx.conf
├── privoxy/
│   ├── config1
│   ├── config2
│   └── config3
├── torrc.d/
│   ├── tor1.conf
│   ├── tor2.conf
│   └── tor3.conf
├── .env
└── README.md

✅ Status

  • Tor replication
  • Privoxy routing per Tor node
  • NGINX chaining
  • Final ProtonVPN tunnel
  • Leak tested

✨ Credits

About

a safe chain proxy server to protect your anonimity online. Remember that User agent still sign your navigation and that DNS leak might break your chain security. Also get in mind even tor choose close node to enhance internet experience so a statistician will always get you.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages