# s5p example configuration # Copy to config/s5p.yaml and edit to taste. listen: 127.0.0.1:1080 timeout: 10 retries: 3 # max attempts per connection (proxy_source only) log_level: info # max_connections: 256 # max concurrent client connections (backpressure) # pool_size: 0 # pre-warmed TCP connections to first hop (0 = disabled) # pool_max_idle: 30 # max idle time (seconds) for pooled connections # api_listen: 127.0.0.1:1081 # control API (disabled by default) # Proxy chain -- connections tunnel through each hop in order. # Supported protocols: socks5://, socks4://, http:// # # Example: Tor first hop, then a public proxy chain: - socks5://127.0.0.1:9050 # Tor # - socks5://user:pass@proxy:1080 # post-Tor SOCKS5 proxy # - socks4://proxy:1080 # post-Tor SOCKS4/4a proxy # - http://user:pass@proxy:8080 # post-Tor HTTP CONNECT proxy # Managed proxy pool -- fetches from multiple sources, health-tests, # and rotates alive proxies per-connection after the static chain. # proxy_pool: # sources: # - url: http://10.200.1.250:8081/proxies # proto: socks5 # optional: filter by protocol # country: US # optional: filter by country # limit: 1000 # optional: max proxies to fetch # - file: /etc/s5p/proxies.txt # text file, one proxy URL per line # refresh: 300 # re-fetch sources interval (seconds) # test_interval: 120 # health test cycle interval (seconds) # test_targets: # TLS handshake targets (round-robin) # - www.google.com # - www.cloudflare.com # - www.amazon.com # test_timeout: 15 # per-test timeout (seconds) # test_concurrency: 25 # max parallel tests (auto-scales to ~10% of pool) # max_fails: 3 # consecutive fails before eviction # state_file: "" # empty = ~/.cache/s5p/pool.json # report_url: "" # POST dead proxies here (optional) # Tor control port -- enables NEWNYM signaling (new circuit on demand). # Requires Tor's ControlPort enabled (torrc: ControlPort 9051). # tor: # control_host: 127.0.0.1 # control_port: 9051 # password: "" # HashedControlPassword in torrc # cookie_file: "" # CookieAuthentication file path # newnym_interval: 0 # periodic NEWNYM (seconds, 0 = manual only) # Multi-listener mode -- each listener gets its own address and chain. # The "pool" keyword in a chain appends a random alive proxy from the pool. # Multiple "pool" entries = multiple pool hops (deeper chaining). # # listeners: # - listen: 0.0.0.0:1080 # chain: # - socks5://127.0.0.1:9050 # - pool # Tor + 2 random pool proxies # - pool # # - listen: 0.0.0.0:1081 # chain: # - socks5://127.0.0.1:9050 # - pool # Tor + 1 random pool proxy # # - listen: 0.0.0.0:1082 # chain: # - socks5://127.0.0.1:9050 # Tor only (no pool hops) # # When using "listeners:", the top-level "listen" and "chain" keys are ignored. # If "listeners:" is absent, the old format is used (single listener). # Legacy proxy source (still supported, auto-converts to proxy_pool): # proxy_source: # url: http://10.200.1.250:8081/proxies # proto: socks5 # limit: 1000 # refresh: 300