pnproxy

command module
v1.0.0 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Feb 26, 2026 License: MIT Imports: 10 Imported by: 0

README

pnproxy

pnproxy - Plug and Proxy is a simple home proxy for managing Internet traffic.

Features:

  • work on all devices in the local network without additional settings
  • proxy settings for selected sites only
  • ad blocking support (like AdGuard)

Types:

  • DNS proxy
  • Reverse proxy for HTTP and TLS (level 4 proxy)
  • HTTP anonymous proxy

Install

Setup

For example, you want to block ads and also forward all Twitter traffic through external proxy server. And want it to work on all home devices without additional configuration on each device.

In the examples below, you installed pnproxy on your home server 192.168.1.2. And you have an additional proxy server at 192.168.1.3:18080.

  1. Install pnproxy on any server in your home network. It is important that ports 53, 80 and 443 be free on this server.
  2. Create pnproxy.yaml
    hosts:
      adblock: doubleclick.net googlesyndication.com
      tunnel: twitter.com twimg.com t.co x.com
    
    dns:
      listen: ":53"
      rules:
        - name: adblock                         # name from hosts block
          action: static address 127.0.0.1      # block this sites
        - name: tunnel                          # name from hosts block
          action: static address 192.168.1.2    # redirect this sites to pnproxy
      default:
        action: doh provider google             # resolve DNS for all other sites
    
    http:
      listen: ":80"
      rules:
        - name: tunnel                          # name from hosts block
          action: redirect scheme https         # redirect this sites from HTTP to TLS module
      default:
        action: raw_pass
    
    tls:
      listen: ":443"
      rules:
        - name: tunnel                          # name from hosts block
          action: proxy_pass host 192.168.1.3 port 18080  # forward this sites to external HTTP proxy
      default:
        action: raw_pass
    
    proxy:
      listen: ":3128"                           # optionally run local HTTP proxy
    
    log:
      level: trace                              # optionally increase log level (default - info)
    
  3. Setup DNS server for your home router to 192.168.1.2.

Optionally, instead of step 3, you can verify that everything works by configuring an HTTP proxy to 192.168.1.2:3128 on your PC or mobile device.

Configuration

By default, the app looks for the pnproxy.yaml file in the current working directory.

pnproxy -config /config/pnproxy.yaml

By default, all modules disabled and don't listen any ports.

Module: Hosts

Store lists of site domains for use in other modules.

  • Name comparison includes all subdomains, you don't need to specify them separately!
  • Names can be written with spaces or line breaks. Follow YAML syntax.
hosts:
  list1: site1.com site2.com site3.net
  list2:
    site1.com static.site1.cc
    site2.com cdnsite2.com
    site3.in site3.com site3.co.uk

hosts: http_get

This is a very powerful option that allows you to automatically determine the list of blocked websites. For example, for the domain google.com, access to the page https://google.com/ will be checked.

Check with timeout:

hosts:
  http_error: http_get timeout 3

Sometimes it is important to read a few bytes (32000 in the example):

hosts:
  http_error: http_get timeout 3 read_body 32000

Sometimes it is important to look at the HTTP response status (403 and 451 in the example):

hosts:
  http_error: http_get timeout 3 read_body 32000 status 403 status 451

And the best thing is to check if this site works through a proxy:

hosts:
  http_error: http_get timeout 3 read_body 32000 status 403 status 451 proxy http://192.168.1.3:18080

Finally, pnproxy will check whether the site is accessible, whether several bytes of the main page can be read, and what HTTP status the server returns. If there are any problems, pnproxy will check whether the same site works through a proxy. If a proxy fixes problems accessing a site, it will be marked with the http_error rule (you can change the name).

hosts example

hosts:
  adblock: doubleclick.net googlesyndication.com
  http_error: http_get timeout 3 read_body 32000 status 403 status 451 proxy http://192.168.1.3:18080  # change to proxy server

dns:
  listen: ":53"
  rules:
    - name: adblock
      action: static address 127.0.0.1
    - name: http_error
      action: static address 192.168.1.2  # change to pnproxy server
  default:
    action: doh provider google

http:
  listen: ":80"
  rules:
    - name: http_error
      action: redirect scheme https

tls:
  listen: ":443"
  rules:
    - name: http_error
      action: proxy_pass host 192.168.1.3 port 18080  # change to proxy server

Module: DNS

Run DNS server and act as DNS proxy.

dns listen

Enable server:

dns:
  listen: ":53"

dns action: static

Rules action supports setting static address only:

  • Useful for ad blocking.
  • Useful for routing some sites traffic through pnproxy.
dns:
  rules:
    - name: adblocklist
      action: static address 127.0.0.1
    - name: list1 list2
      action: static address 192.168.1.2

dns action: dns

Default action supports DNS, DOT and DOH upstream:

  • Important to use server IP-address, instead of a domain name
dns:
  default:
    action: dns server 8.8.8.8

Support build-in providers - cloudflare, google, quad9, opendns, yandex:

dns:
  default:
    action: dns provider google

dns action: dot

dns:
  default:
    action: dot provider google

dns action: doh

dns:
  default:
    action: doh provider google

dns example

Total config:

dns:
  listen: ":53"
  rules:
    - name: adblocklist
      action: static address 127.0.0.1
    - name: list1 list2
      action: static address 192.168.1.2
  default:
    action: doh provider cloudflare

Module: HTTP

Run HTTP server and act as reverse proxy.

Enable server:

http:
  listen: ":80"

http action: redirect

Rules action supports setting redirect scheme https with optional code:

  • Useful for redirect all sites traffic to TLS module.
http:
  rules:
    - name: list1 list2
      # code - any number (default - 307)
      action: redirect scheme https

http action: raw_pass

Rules action supports setting raw_pass:

http:
  rules:
    - name: list1 list2
      action: raw_pass

http action: proxy_pass

Rules action supports setting proxy_pass:

  • Useful for passing all sites traffic to additional local or remote proxy.
http:
  rules:
    - name: list1 list2
      # host and port - mandatory
      # username and password - optional
      # type - socks5 (default - http)
      action: proxy_pass host 123.123.123.123 port 3128 username user1 password pasw1 type socks5

http default action

Default action support all rules actions:

http:
  default:
    action: raw_pass

Module: TLS

Run TCP server and act as Layer 4 reverse proxy.

tls listen

Enable server:

tls:
  listen: ":443"

tls action: raw_pass

Rules action supports setting raw_pass:

  • Useful for forward HTTPS traffic to another reverse proxies with custom port.
tls:
  rules:
    - name: list1 list2
      # host - optional rewrite connection IP-address
      # port - optional rewrite connection port
      action: raw_pass host 123.123.123.123 port 10443

tls action: proxy_pass

Rules action supports setting proxy_pass:

  • Useful for passing all sites traffic to additional local or remote proxy.
tls:
  rules:
    - name: list1 list2
      # host and port - mandatory
      # username and password - optional
      # type - socks5 (default - http)
      action: proxy_pass host 123.123.123.123 port 3128 username user1 password pasw1

tls default action

Default action support all rules actions:

tls:
  default:
    action: raw_pass

Module: Proxy

Run HTTP proxy server. This module does not have its own rules. It uses the HTTP and TLS module rules. You can choose not to run DNS, HTTP, and TLS servers and use pnproxy only as HTTP proxy server.

proxy listen

Enable server:

proxy:
  listen: ":3128"

Example

log:
  level: info

hosts:
  # list of sited to block
  adblock: doubleclick.net googlesyndication.com
  # forward some sited to proxy
  proxy: twitter.com twimg.com t.co x.com
  # auto-detect blocked sited via proxy server
  error: http_get timeout 3 read_body 32000 status 403 status 451 proxy http://192.168.1.3:18080

dns:
  listen: ":53"
  rules:
    # block this sited
    - name: adblock
      action: static address 127.0.0.1
    # forward this sited to pnproxy server IP
    - name: proxy error
      action: static address 192.168.1.2
  default:
    action: doh provider google

http:
  listen: ":80"
  rules:
    # redirect HTTP requests to HTTPS
    - name: proxy error
      action: redirect scheme https

tls:
  listen: ":443"
  rules:
    # forward this sites to proxy server
    - name: proxy error
      action: proxy_pass host 192.168.1.3 port 18080

proxy:
  # use pnproxy as proxy server for testing purposes
  listen: ":3128"

Tips and Tricks

Mikrotik DNS fail over script

  • Add as System > Scheduler > Interval 00:01:00
:global server "192.168.1.2"

:do {
  :resolve google.com server $server
} on-error={
  :global server "8.8.8.8"
}

:if ([/ip dns get servers] != $server) do={
  /ip dns set servers=$server
  /ip dns cache flush
}

Docker custom IP-address

In case ports 53, 80, 443 are occupied on your server, you can run pnproxy on an custom local IP address using docker.

compose.yml

services:
  pnproxy:
    image: alexxit/pnproxy:master
    restart: unless-stopped
    environment:
      - TZ=Atlantic/Bermuda
    volumes:
      - ~/pnproxy.yaml:/config/pnproxy.yaml
    networks:
      vlan: {ipv4_address: 192.168.1.4}

networks:
  vlan:
    driver: macvlan
    driver_opts:
      parent: eno1                # change to your adapter name `ip a`
    ipam:
      config:
        - subnet: 192.168.1.0/24  # change to your network
          gateway: 192.168.1.1    # change to your network

Known bugs

In rare cases, due to HTTP/2 connection coalescing technology, some site may not work properly when using a TCP/TLS Layer 4 proxy. In HTTP proxy mode everything works fine. Everything works fine in Safari browser (it doesn't support this technology). In Firefox, this feature can be disabled - network.http.http2.coalesce-hostnames.

Documentation

The Go Gopher

There is no documentation for this package.

Directories

Path Synopsis
internal
api
app
dns
tls

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL