Filtering asynchronous SOCKS5 (TCP/UDP) proxy server https://crates.io/crates/psocks
Find a file
2026-03-28 20:32:32 +02:00
example fix examples location 2026-03-28 07:20:32 +02:00
src set uptime format to float; update minor version as api changed 2026-03-28 20:32:32 +02:00
.gitignore initial commit 2026-03-22 01:06:24 +02:00
Cargo.lock set uptime format to float; update minor version as api changed 2026-03-28 20:32:32 +02:00
Cargo.toml set uptime format to float; update minor version as api changed 2026-03-28 20:32:32 +02:00
LICENSE Initial commit 2026-03-22 00:02:29 +01:00
README.md implement list(s) reload api 2026-03-28 06:40:01 +02:00

psocks

Filtering asynchronous SOCKS5 (TCP/UDP) proxy server based on fast-socks5, featuring allowlist-based access control that drops everything except what is allowed by the user. Includes JSON/API based on Rocket framework.

Goals

  • Ad/tracking protection (before sending a DNS request)
  • Reduce CPU usage by filtering extra SSL traffic on background

Roadmap

  • SOCKS5 (TCP/UDP) server
  • Web JSON/API
  • Web UI

Install

cargo install psocks

Usage

RUST_LOG=trace psokcs -c=/path/to/config.toml no-auth
  • set socks5://127.0.0.1:1080 proxy in your application
  • use http://127.0.0.1:8010 for API:
    • /api/totals - blocking summary
    • /api/list/enable/<ID> - enable all parsed rules of given list ID ([list.ID] in your config)
    • /api/list/disable/<ID> - disable all parsed rules of given list ID ([list.ID] in your config)
    • /api/list/reload/<ID> - reload list rules from its source by list ID ([list.ID] in your config)
    • /api/list/reload - reload all lists rules from their source

Allow list example

# /path/to/allow.txt

// exact match
duckduckgo.com

// google.com with subdomains
.google.com

// IP
1.2.3.4

systemd

git clone https://codeberg.org/yggverse/psocks.git
cd psocks
cargo build --release --locked
sudo install target/release/psocks /usr/local/bin
sudo cp example/config.toml /etc/psocks.toml
sudo useradd -s /usr/sbin/nologin -Mr psocks
sudo mkdir /var/log/psocks && sudo chown psocks:psocks /var/log/psocks
#/etc/systemd/system/psocks.service

[Unit]
After=network-online.target
Wants=network-online.target

[Service]
User=psocks
Group=psocks

ExecStart=/usr/local/bin/psocks -c=/etc/psocks.toml no-auth

Restart=always

Environment="RUST_LOG=psocks=warn"
Environment="NO_COLOR=1"

StandardOutput=file:///var/log/psocks/debug.log
StandardError=file:///var/log/psocks/error.log

[Install]
WantedBy=multi-user.target
  • sudo systemctl restart psocks
  • sudo systemctl enable psocks
  • sudo systemctl status psocks