Mntp / README.md
eikarna
fix(permission): change default squid dir to tmp dir
6c06868
---
title: High Anonymity Squid Proxy
emoji: ๐ŸŒ
colorFrom: indigo
colorTo: purple
sdk: docker
pinned: false
license: mit
short_description: A high anonymity Squid proxy server
app_port: 7860
---
# High Anonymity Squid Proxy
This is a Dockerized Squid proxy server configured for high anonymity. It removes identifying headers and supports both HTTP and HTTPS connections through the CONNECT method.
## Features
- High anonymity mode (removes identifying headers)
- Support for HTTP and HTTPS websites
- Configurable port (default: 7860)
- Access logging
- Performance optimizations
## How It Works
This proxy works by:
1. Handling HTTP requests directly with header anonymization
2. Tunneling HTTPS requests through the CONNECT method (without decrypting them)
The proxy does not decrypt HTTPS traffic, which means:
- It works with all HTTPS websites
- It maintains user privacy (the proxy cannot see HTTPS content)
- Some advanced filtering features are not available for HTTPS traffic
## Configuration
The proxy is configured with the following settings:
- Port: 7860
- Anonymity: High (removes Via, Forwarded-For, and other identifying headers)
- Access Control: Open to all IPs (0.0.0.0/0)
## Deployment on Hugging Face Spaces
1. Create a new Space on Hugging Face
2. Select "Docker" as the SDK
3. Upload the Dockerfile and this README.md
4. The proxy will automatically start on port 7860
## Usage
After deployment, you can use the proxy by connecting to the Space URL on port 7860:
```
http://<your-space-name>.hf.space:7860
```
## Customization
To customize the configuration, you can modify the squid.conf generation section in the Dockerfile. Some common customizations:
- Change the port: Modify the `http_port` directive in the squid.conf
- Adjust anonymity settings: Edit the header removal sections
- Restrict access by IP: Modify the ACL settings
## Security Considerations
This proxy is configured for high anonymity but is open to all IP addresses by default. For production use, consider:
1. Restricting access by IP address
2. Adding authentication
3. Regularly updating the base Ubuntu image
## License
This project is licensed under the MIT License.