Proxy requests through Cloudflare workers
A simple worker that acts as proxy to tunnel requests over the internet, forwarding them through Cloudflare's global network of servers. This way, we can archieve automatic IP address rotation, all coming from a trusted ASN (as CF is used by a huge number of websites, their ASNs are usually whitelisted on firewalls 😜 ).
You will need bun to run the client script proxy.js
. You can install it by running:
curl -fsSL https://bun.sh/install | bash
. ~/.bashrc
You also need a Cloudflare account to deploy the worker. A free account is fine, but you might experience some issues with page loading with slow website connections as the workers have a limitation of 10ms CPU time per request on the free tier, but as long as you don't try to download any big files this should be enough to navigate the internet.
Once you have bun installed, go ahead and install wrangler
using:
bun i -g wrangler
Login to CF with wrangler
:
wrangler login
Then, cd into worker/
directory and install dependences with:
cd worker/
bun i
Now, edit the file at src/index.js
to include an authorization token (necessary to avoid other people from using it). Just change the following line:
if (request.headers.get('Authorization') !== '<YOUR-AUTH-TOKEN>')
return new Response('Unauthorized', { status: 401 });
Now, you can deploy the worker with
cd worker/
wrangler deploy
You can run bun proxy.js
(with no arguments) to see options:
proxy.js - Proxy requests through CloudFlare workers
Usage: bun proxy.js [options] <socks|http> <worker>
Options:
-h, --help Show this help message and exit
-p, --port Port to listen on
-a, --auth Authorization header
-v, --verbose Enable verbose mode (default: false)
Example: bun proxy.js -v -a auth-secret socks my-instance.workers.dev
By Lucas V. Araujo <root@lva.sh>
More at https://github.com/lvmalware
The general usage options are -a
(to provide the authorization token), followed by the type of proxy and the worker's address.
For example, lets suppose your worker instance has the address myinstance.workers.dev
, with the auth token of secret
and you want to run a SOCKS5 proxy server on port 1080
(default for SOCKS). This could be done with the following command:
bun proxy.js -a secret -p 1080 socks myinstance.workers.dev
Then configure your browser to use 127.0.0.1:1080
as a SOCKS5 proxy and enjoy the automatic ip address rotation 😉.
For a http proxy, just change the type from socks
to http
, for example:
bun proxy.js -a secret -p 8080 http myinstance.workers.dev
By default, Cloudflare doesn't allow connections to port 25 of any target. Also, connecting to Cloudflare address space from within a worker is not supported, so you might have problems accessing sites that are behind CF (there are some ways around it, but I will leave that as an exercise to the reader 😃).
Your ip address will rotate at each request, since the worker runs on the so-called serverless architecture, spawned in a distributed global network of servers owned by cloudflare. Each time you invoke a worker, a different server might be provisioned depending on the current availability. These servers might be located on your region (which is usually the case) or even in another country.
This project is just an example to showcase an application that I developed while learning javascript and Workers. I'm not related to the company, nor I endorse or otherwise discourage the usage their services. And finally, this project is intended only for educational purposes and I won't be responsible for any bad actions or abuse of this service.