Lightweight host-spoofing web proxy written in go.
flashlight runs in one of two modes:
client - meant to run locally to wherever the browser is running, forwards requests to the server
server - handles requests from a flashlight client proxy and actually proxies them to the final destination
Using CloudFlare (and other CDNS), flashlight has the ability to masquerade as running on a different domain than it is. The client simply specifies the "masquerade" flag with a value like "thehackernews.com". flashlight will then use that masquerade host for the DNS lookup and will also specify it as the ServerName for SNI (though this is not actually necessary on CloudFlare). The Host header of the HTTP request will actually contain the correct host (e.g. getiantem.org), which causes CloudFlare to route the request to the correct host.
Flashlight uses enproxy to encapsulate data from/to the client as http request/response pairs. This allows it to tunnel regular HTTP as well as HTTPS traffic over CloudFlare. In fact, it can tunnel any TCP traffic.
Usage of flashlight:
-addr="": ip:port on which to listen for requests. When running as a client proxy, we'll listen with http, when running as a server proxy we'll listen with https (required)
-cloudconfig="": optional http(s) URL to a cloud-based source for configuration updates
-cloudconfigca="": optional PEM encoded certificate used to verify TLS connections to fetch cloudconfig
-configaddr="": if specified, run an http-based configuration server at this address
-configdir="": directory in which to store configuration, including flashlight.yaml (defaults to current directory)
-country="xx": 2 digit country code under which to report stats. Defaults to xx.
-cpuprofile="": write cpu profile to given file
-help=false: Get usage help
-instanceid="": instanceId under which to report stats to statshub. If not specified, no stats are reported.
-memprofile="": write heap profile to given file
-parentpid=0: the parent process's PID, used on Windows for killing flashlight when the parent disappears
-portmap=0: try to map this port on the firewall to the port on which flashlight is listening, using UPnP or NAT-PMP. If mapping this port fails, flashlight will exit with status code 50
-role="": either 'client' or 'server' (required)
-server="": FQDN of flashlight server when running in server mode (required)
-statsaddr="": host:port at which to make detailed stats available using server-sent events (optional)
-statshub="pure-journey-3547.herokuapp.com": address of statshub server
-statsperiod=0: time in seconds to wait between reporting stats. If not specified, stats are not reported. If specified, statshub, instanceid and statsaddr must also be specified.
-waddelladdr="": if specified, connect to this waddell server and process NAT traversal requests inbound from waddell
-waddellcert="": if specified, use this cert (PEM-encoded) to authenticate connections to waddell. Otherwise, a default certificate is used.Example Client:
./flashlight -addr localhost:10080 -role clientExample Server:
./flashlight -addr :443 -role serverExample Curl Test:
curl -x localhost:10080 http://www.google.com/humans.txt
Google is built by a large team of engineers, designers, researchers, robots, and others in many different sites across the globe. It is updated continuously, and built with more tools and technologies than we can shake a stick at. If you'd like to help us out, see google.com/careers.On the client, you should see something like this for every request:
Handling request for: http://www.google.com/humans.txtMasquerade host configuration is managed using utilities in the genconfig/ subfolder.
You need the s3cmd tool installed and set up. To install on Ubuntu:
sudo apt-get install s3cmdOn OS X:
brew install s3cmdAnd then run s3cmd --configure and follow the on-screen instructions. You
can get AWS credentials that are good for uploading to S3 in
too-many-secrets/lantern_aws/aws_credential.
The file domains.txt contains the list of masquerade hosts we use, and blacklist.txt contains a list of blacklisted domains that we exclude even if present in domains.txt.
To alter the list of domains or blacklist:
- Edit
domains.txtand/orblacklist.txt go run genconfig.go -domains domains.txt -blacklist blacklist.txt.- Commit the changed
masquerades.goandcloud.yamlto git if you want. - Upload cloud.yaml to s3 using
udpateyaml.bashif you want.

