This plugin enables Caddy to act as a forward proxy (as opposed to reverse proxy, Caddy's standard proxy
directive) for HTTP/2.0 and HTTP/1.1 requests (HTTP/1.0 might work, but is untested).
The simplest way to enable the forward proxy without authentication just include the forwardproxy
directive in your Caddyfile. However, this allows anyone to use your server as a proxy, which might not be desirable.
Open a block for more control; here's an example of all properties in use (note that the syntax is subject to change):
forwardproxy {
basicauth user1 0NtCL2JPJBgPPMmlPcJ
basicauth user2 秘密
ports 80 443
hide_ip
probe_resistance secretlink.localhost
serve_pac /secret-proxy.pac
response_timeout 30
dial_timeout 30
}
(The square brackets [ ]
indicate values you should replace; do not actually include the brackets.)
-
basicauth [user] [password]
Sets basic HTTP auth credentials. This property may be repeated multiple times. Note that this is different from Caddy's built-inbasicauth
directive. BE SURE TO CHECK THE NAME OF THE SITE THAT IS REQUESTING CREDENTIALS BEFORE YOU ENTER THEM.
Default: no authentication required. -
ports [integer] [integer]...
Whitelists ports forwardproxy will HTTP CONNECT to.
Default: no restrictions. -
hide_ip
If set, forwardproxy will not add user's IP to "Forwarded:" header.
WARNING: there are other side-channels in your browser, that you might want to eliminate, such as WebRTC, see here how to disable it.
Default: no hiding;Forwarded: for="useraddress"
will be sent out. -
hide_via
If set, forwardproxy will not add Via header, and prevents simple way to detect proxy usage.
WARNING: there are other side-channels to determine this.
Default: no hiding; Header in form ofVia: 2.0 caddy
will be sent out. -
probe_resistance [secretlink.tld]
EXPERIMENTAL. (Here be dragons!) Attempts to hide the fact that the site is a forward proxy. Proxy will no longer respond with "407 Proxy Authentication Required" if credentials are incorrect or absent, and will attempt to mimic a generic Caddy web server as if the forward proxy is not configured. Since not all clients (browsers, operating systems, etc.) are able to be configured to send credentials right away (some only authenticate after receiving a 407), we will use a secret link. Make sure that specified domain name is visitable, does not contain uppercase characters, does not start with dot, etc. Only this address will trigger a 407 response, prompting browsers to request credentials from users and cache them for the rest of the session. It is possible to use any top level domain (tld), but for secrecy reasons it is highly recommended to use.localhost
. Probing resistance works (and makes sense) only if basicauth is set up. To use your proxy with probe resistance, supply your basicauth credentials to your client configuration if possible. If your proxy client does not authenticate right away, you may then have to visit your secret link in your browser to trigger the authentication.
Default: no probing resistance. -
serve_pac [/path.pac]
Generate (in-memory) and serve a Proxy Auto-Config file on given path. If no path is provided, the PAC file will be served at/proxy.pac
. NOTE: If you enable probe_resistance, your PAC file should also be served at a secret location; serving it at a predictable path can easily defeat probe resistance.
Default: no PAC file will be generated or served by Caddy (you still can manually create and serve proxy.pac like a regular file). -
response_timeout [integer]
Sets timeout (in seconds) for HTTP requests made by proxy on behalf of users (does not affectCONNECT
-method requests).
Default: no timeout (other timeouts will eventually close the connection). -
dial_timeout [integer]
Sets timeout (in seconds) for establishing TCP connection to target website. Affects all requests.
Default: 20 seconds.
Please be aware that client support varies widely, and there are edge cases where clients may not use the proxy when it should or could. It's up to you to be aware of these limitations.
The basic configuration is simply to use your site address and port (usually for all protocols - HTTP, HTTPS, etc). You can also specify the .pac file if you enabled that.
Read this blog post about how to configure your specific client.
Licensed under the Apache License
USE AT YOUR OWN RISK. THIS IS DELIVERED AS-IS. By using this software, you agree and assert that authors, maintainers, and contributors of this software are not responsible or liable for any risks, costs, or problems you may encounter. Consider your threat model and be smart. If you find a flaw or bug, please submit a patch and help make things better!
Initial version of this plugin was developed by Google. This is not an official Google product.