Languages:
δΈζ |
Π ΡΡΡΠΊΠΈΠΉ |
ΩΨ§Ψ±Ψ³Ϋ |
ΰ€Ήΰ€Ώΰ€¨ΰ₯ΰ€¦ΰ₯ |
ΰΉΰΈΰΈ’ |
Deutsch |
Norsk |
Π£ΠΊΡΠ°ΡΠ½ΡΡΠΊΠ° |
EspaΓ±ol |
FranΓ§ais |
TiαΊΏng Viα»t
A professional-grade, self-hosted proxy solution that leverages Cloudflare's Warp infrastructure to provide secure, high-performance connectivity for Telegram and other applications.
The command-line interface guides you through the setup process with clear instructions.
This solution creates a local SOCKS5 proxy server that routes traffic through Cloudflare's Warp network, providing several key advantages over traditional proxy methods:
- Cloudflare Warp: Enterprise-grade WireGuard-based VPN infrastructure
- wgcf: Official Cloudflare Warp configuration utility
- sing-box-plus: High-performance universal proxy platform
- Embedded Configuration: Zero-dependency setup with intelligent auto-configuration
Unlike static third-party proxies, our solution automatically connects to the nearest Cloudflare edge server, ensuring optimal latency and throughput based on your geographical location.
Instead of routing all system traffic through Warp (like the official 1.1.1.1 client), this solution provides application-specific proxy routing:
- β Targeted Usage: Only designated applications (e.g., Telegram) use the proxy
- β Bandwidth Optimization: Other applications maintain direct internet access
- β Performance Isolation: No impact on system-wide internet performance
- β Resource Efficiency: Reduced bandwidth consumption and latency overhead
The local SOCKS5 server can be shared across your entire network infrastructure:
- π± Mobile Devices: iOS/Android Telegram clients via LAN
- π» Multiple Computers: Other devices on the same network
- π Internet Sharing: Port forwarding for remote access
- π§ Simple Configuration: No complex network setup required
- End-to-End Encryption: All traffic encrypted through Cloudflare's infrastructure
- Zero-Log Policy: Leverages Cloudflare's privacy-focused network
- Local Processing: Account credentials and configurations stored locally
- Firewall Integration: Automatic Windows Firewall exception management
- Adaptive MTU: Optimized packet size (1280 bytes) for maximum throughput
- DNS Optimization: Cloudflare DNS (1.1.1.1) with intelligent caching
- Connection Persistence: Maintains stable connections with automatic reconnection
- Low Latency: Direct connection to nearest Cloudflare edge servers
- One-Click Deployment: Complete setup with single batch file execution
- Intelligent Downloads: Automatic component retrieval and version management
- Auto-Registration: Seamless Warp account creation and configuration
- Modern UI: Beautiful HTML configuration interface with instant setup links
- Administrative Privileges: Automatic UAC elevation for system-level operations
- Operating System: Windows 10/11 (x86/x64)
- PowerShell: Version 5.0 or higher
- Network: Active internet connection for initial setup
- Privileges: Administrator access (automatically requested)
- Disk Space: ~10MB for components and configurations
- RAM: 4GB+ available system memory
- Network: Broadband connection (10+ Mbps)
- Firewall: Windows Defender Firewall enabled
- Antivirus: Whitelist for sing-box-plus.exe (if required)
Success screen indicating the proxy is ready for use.
-
Download Repository
git clone https://github.com/vancedapps/telegram-proxy.git cd telegram-proxy
-
Execute Setup Script
- Double-click
start-telegram-proxy.bat
- Approve UAC prompt when requested
- Wait for automatic component download and configuration
- Double-click
-
Configure Telegram Client
- Click the auto-generated setup link, or
- Use the modern HTML configuration interface
- Manual configuration:
127.0.0.1:7777
(SOCKS5)
- Simply run
start-telegram-proxy.bat
again - The script intelligently skips downloads and registration
- Provides immediate proxy server startup
π Project Structure
βββ π§ start-telegram-proxy.bat # Main orchestration script
βββ π README.md # Documentation (this file)
βββ βοΈ singbox-config-template.json # Embedded configuration template
βββ π wgcf-account.toml # Warp account credentials (auto-generated)
βββ π wgcf-profile.conf # WireGuard configuration (auto-generated)
βββ βοΈ singbox-config.json # sing-box runtime configuration (auto-generated)
βββ π telegram_proxy_setup.html # Modern configuration interface (auto-generated)
βββ π¦ wgcf.exe # Cloudflare Warp configuration utility (auto-downloaded)
βββ π sing-box-plus.exe # Proxy server engine (auto-downloaded)
- Working Directory Management: Automatic path resolution and administrative elevation
- Component Acquisition: Intelligent download of required binaries from official sources
- Firewall Configuration: Automatic Windows Firewall exception creation
- Template Generation: Embedded sing-box configuration template creation
- Account Registration: New Cloudflare Warp account creation (first run only)
- Configuration Update: Account refresh and profile regeneration
- Key Extraction: Private key extraction from Warp account configuration
- Profile Generation: WireGuard profile creation for network connectivity
- Configuration Assembly: sing-box configuration generation with extracted credentials
- Network Interface Setup: SOCKS5 server binding to localhost:7777
- UI Generation: Modern HTML configuration interface creation
- Service Startup: Proxy server initialization with monitoring
{
"inbounds": [{
"type": "socks",
"listen": "0.0.0.0",
"listen_port": 7777,
"users": []
}],
"outbounds": [{
"type": "wireguard",
"local_address": ["10.0.0.1/32"],
"private_key": "[AUTO-EXTRACTED]",
"peers": [{
"server": "warp_auto",
"public_key": "bmXOC+F1FxEMF9dyiK2H5/1SUtzH0JuVo51h2wPfgyo=",
"allowed_ips": ["0.0.0.0/0"]
}]
}]
}
Modern HTML interface for easy Telegram proxy configuration.
- Access Settings:
Settings
βAdvanced
βConnection Type
- Enable Proxy: Select "Use custom proxy"
- Configure SOCKS5:
- Type: SOCKS5
- Hostname:
127.0.0.1
- Port:
7777
- Credentials: Leave empty
- Access Settings:
Settings
βData and Storage
βProxy Settings
- Add Proxy: Tap "Add Proxy" β "SOCKS5"
- Configure Connection:
- Server:
127.0.0.1
- Port:
7777
- Authentication: None required
- Server:
For other devices on your local network:
- Replace
127.0.0.1
with your computer's IP address - Example:
192.168.1.100:7777
- Ensure Windows Firewall allows connections
Modify the listen port in singbox-config-template.json
:
"listen_port": 7777 // Change to desired port
Change binding address for external access:
"listen": "0.0.0.0" // All interfaces
"listen": "127.0.0.1" // Localhost only
Adjust MTU size for specific network conditions:
"mtu": 1280 // Default optimized value
Symptom: "Permission denied" or binding errors Solution: Ensure UAC prompt is approved; manually run as administrator if needed
Symptom: Proxy starts but connections fail Solution: Script automatically configures firewall; manually add sing-box-plus.exe exception if needed
Symptom: "Address already in use" errors Solution: Check for existing services on port 7777:
netstat -an | findstr :7777
Symptom: Component download errors Solution: Verify internet connectivity; manually download from:
Symptom: Warp account registration fails Solution: Check regional restrictions; retry with different network or VPN
- Monitor Connection: Use Telegram's built-in connection quality indicator
- Server Selection: Restart script to potentially connect to different edge server
- MTU Tuning: Experiment with values between 1200-1400
- QoS Configuration: Use router-level QoS for optimal bandwidth allocation
- Connection Limits: Monitor concurrent connections if sharing across multiple devices
- Local Storage: All configurations stored locally; no cloud synchronization
- Credential Security: Warp private keys stored securely in local configuration files
- Network Isolation: Proxy traffic isolated from system-wide network activity
- Regular Updates: Periodically run script to update account and configuration
- Network Monitoring: Monitor unusual traffic patterns if sharing proxy
- Access Control: Limit LAN access to trusted devices only
Feature | Traditional VPN | Warp Proxy Solution |
---|---|---|
Traffic Routing | All system traffic | Application-specific |
Performance Impact | System-wide overhead | Minimal system impact |
Configuration | Complex setup | One-click deployment |
Sharing | Device-specific | Network-shareable |
Server Selection | Manual selection | Automatic optimization |
Aspect | Third-Party Proxy | Warp Proxy Solution |
---|---|---|
Reliability | Variable quality | Enterprise-grade infrastructure |
Security | Unknown encryption | Cloudflare-grade encryption |
Performance | Fixed server locations | Automatic edge server selection |
Cost | Often paid services | Free Cloudflare Warp |
Privacy | Third-party logging | Cloudflare privacy policy |
- WireGuard Protocol: https://www.wireguard.com/
- Cloudflare Warp: https://developers.cloudflare.com/warp-client/
- sing-box: https://sing-box.sagernet.org/
- wgcf: https://github.com/ViRb3/wgcf
- sing-box-plus: https://github.com/kyochikuto/sing-box-plus
We welcome contributions to improve this proxy solution:
- Bug Reports: Submit issues with detailed reproduction steps
- Feature Requests: Propose enhancements with technical justification
- Code Contributions: Fork repository and submit pull requests
- Documentation: Help improve setup guides and troubleshooting
Developed by: vanced.to
Repository: https://github.com/vancedapps/telegram-proxy
- wgcf: MIT License - Cloudflare Warp configuration utility
- sing-box: Custom License - Universal proxy platform
- Cloudflare Warp: Cloudflare Terms of Service
π§ Support: For technical support and updates, visit vanced.to or submit issues on GitHub.