Maybe this could help: https://github.com/kizzx2/docker-wireguard-socks-proxy

> Le 9 oct. 2020 à 15:26, Max R. P. Grossmann <m...@max.pm> a écrit :
> 
> Another idea would be to install WireGuard in a (tiny) virtual machine or a 
> VPS and then ssh into that machine using
> 
>       ssh -TD9151 u...@example.com
> 
> This creates a SOCKS5 proxy on port 9151.
> 
> Then, for example, you could create two Firefox profiles; one without a proxy 
> (for the uncensored websites) and another that utilizes the SOCKS5 proxy on 
> port 9151. The SOCKS5 proxy exposed by ssh will route all traffic over your 
> virtual machine (example.com above), which will in turn route it through 
> WireGuard.
> 
> Since ssh can now be natively used under Windows, I'd be surprised if its -D 
> option were not available. AFAIR, Putty can also do something similar.
> 
> Best,
> 
> Max
> 
> On 20/10/04 03:41pm, Rudi C wrote:
>> I use Wireguard to circumvent Iran's censorship. A major problem with
>> it is that it's very hard to selectively proxy specific domains/apps
>> through Wireguard, while leaving others alone. This is an essential
>> feature for Iran's internet, as:
>> 1. The connection is terrible, so avoiding using the proxy for
>> uncensored sites helps a lot.
>> 2. International traffic is 2x more expensive, so avoiding the proxy
>> for internal traffic is very beneficial.
>> 3. Some internal sites ban international IPs and need Iranian IPs.
>> 
>> The easiest way to solve this program, as far as I understand, is to
>> add the ability to expose the tunnel as a socks5 proxy on the client
>> side. This is the approach that shadowsocks, v2ray, etc have adopted.
>> There are mature solutions to selectively routing traffic through a
>> socks proxy.
>> 
>> I searched around, and there are docker containers that already do
>> this wireguard-to-socks thing; But running docker is expensive on a
>> non-Linux machine, so it'd be much appreciated if you could support
>> exposing socks and HTTP proxy servers natively.


Reply via email to