From ArchWiki

NaïveProxy is a cross-platform proxy that uses Chromium's network stack to camouflage traffic and provides strong censorship resistence and low detectablility when bypassing the Great Firewall of China. It can mitigate TLS fingerprint issues which lead to detection and survived large scale blocking of TLS-based censorship circumvention tools in China. It requires a naiveproxy client and requires a Caddy server with forwardproxy module to work.


Install naiveproxyAUR or naiveproxy-gitAUR for latest development build and run naiveproxy config.json. Here is an example config file:

  "listen": "socks://",
  "proxy": "https://myUsername:myStrongPassword@my.domain"


Naiveproxy cannot run without a caddy server with forwardproxy module. You can build it with xcaddy:

$ go install
$ ~/go/bin/xcaddy build --with

Then, config caddy:

  order forward_proxy before file_server
:443, my.domain:443 {
  tls /etc/caddy/ssl.cer /etc/caddy/ssl.key
  forward_proxy {
    basic_auth myUsername myStrongPassword
  file_server {
    root /var/www/html

Note that :443 must appear first for this Caddyfile to work. See Caddyfile docs for how to configure TLS certificates.

Then start caddy server:

# setcap cap_net_bind_service=+ep ./caddy && ./caddy start

You may also want to run caddy as a daemon.