LiquidBounce includes built-in proxy support for connecting to Minecraft servers through proxy servers, useful for bypassing network restrictions or protecting your IP address.Documentation Index
Fetch the complete documentation index at: https://mintlify.com/CCBlueX/LiquidBounce/llms.txt
Use this file to discover all available pages before exploring further.
Supported Proxy Types
TheProxyManager (features/misc/proxy/ProxyManager.kt:42) supports:
- SOCKS5 - Full protocol support with authentication
- HTTP - HTTP proxy protocol with authentication
Proxy Configuration
Proxy Data Structure
Creating a Proxy
Proxies support multiple input formats:Proxy Validation
Before use, proxies are validated by connecting to a Minecraft ping server:Send Query Request
Attempts to connect to the Minecraft Ping Server through the proxy (ProxyManager.kt:75)
Store or Update
On success, adds the proxy to the list or updates an existing one (ProxyManager.kt:84-95)
Using Proxies
Setting Active Proxy
Current Proxy
Get the current active proxy (validates it’s configured):Network Integration
Pipeline Handler
Proxies are automatically injected into the Netty pipeline:Proxy Handler Creation
The handler is created based on proxy type (Proxy.kt:47-58):Proxy Management
Storing Proxies
Proxies are saved in the config system:Connection Tracking
The manager tracks validation connections for proper cleanup:Advanced Features
Forward Authentication
TheforwardAuthentication flag can be used to control whether credentials are forwarded to the destination server.
IP Information
Proxies can store associated IP information from IpInfo API:- Geographic location
- ISP information
- Connection details
Favorites
Mark frequently used proxies as favorites:Error Handling
Validation failures trigger events with error messages:Best Practices
Always Validate Proxies
Always Validate Proxies
Use
validateProxy() before adding proxies to ensure they work with Minecraft’s protocol, not just HTTP.Handle Local Connections
Handle Local Connections
The system automatically skips proxies for local servers. Don’t manually bypass this behavior.
Secure Credentials
Secure Credentials
Proxy credentials are stored in the config. Ensure your config files are properly secured.
Monitor Events
Monitor Events
Listen to
ProxyCheckResultEvent to provide user feedback on proxy validation results.