New on LowEndTalk? Please Register and read our Community Rules.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
Comments
Maybe you're mixing something up, microsocks is written in C.
Yeah, i obviously am then. Sorry, there was some kind of minimalistic socks implementation written in perl and i could have sworn it's name would have been microsocks but i guess it must have been something else.
OP, disregard what i just said.
Ok, so I set up microsocks and it runs way better! I assume I just need to setup wireguard now? I am not sure how that would work but as long as it doesn't effect any programs that aren't running through the proxy, that would be ideal.
Here is my result from using microsocks - https://www.speedtest.net/result/16003278961
Nice and interesting to see how much slower ssh proxying is!
You want to set up a point-to-point Wireguard vpn connection. Don't have much time to help you with that today, this article seems decent https://www.marksei.com/how-to-vpn-wireguard/
The goal is not to route all traffic through Wireguard, but just to be able to access your server under, say, 10.0.0.1. All connections to 10.0.0.1 will then be encrypted and thus if you configure your socks proxy in your browser to 10.0.0.1:SOME_PORT the socks connection will be encrypted aswell.
This can be easily done with a lowend VPS;
If you are referring to client side application split tunneling (these appa use the VPN and those app don't), then you can install Wireguard whose official app has that feature and if you are referring to the server side tunneling (this traffic goes to route A and that one to somewhere else), then you can use sing-box which not only supports that but also supports various protocols and its app (nekobox) also has a plethora of features.
Oh I see. What you could do is self host these dockers and configure bridged networking. This is pretty straight forward with Portainer. In front of your dockers have OPNsene/PFsense and deploy the tunnel there. With policy based routing one can configure where the traffic needs to go, be it tunnel or regular gateway.
Wireguard performs best here but P2P traffic will always suffer from overhead but near gigabit should be possible
Nice result! Sadly i can't really help you with Wireguard either as i'm still mostly using OpenVPN but this will not perform as good as Wireguard will. The main trick is to not setup a default route going into the VPN (which really isn't the original idea behind a VPN anyways) and just create a virtual network between your PC and the VPS so you can reach it over some LAN IP though, thereby having the traffic going to your socks proxy become encrypted while going over the open internet.
invest on GL-inet router easy to setup and support wireguard with option to modify routing.