Enable & Disable
After initial setup with stronghold init, use enable and disable to control the proxy without re-running the full setup process.
Enable
sudo stronghold enableThis does two things:
- Starts the proxy daemon — launches the
stronghold-proxyprocess on localhost:8402 - Configures firewall rules — sets up iptables/nftables (Linux) or pf (macOS) to route all HTTP and HTTPS traffic through the proxy
Once enabled, all network traffic on the machine is intercepted and scanned. No application configuration is needed — the proxy operates at the kernel level.
Disable
sudo stronghold disableThis reverses the enable step:
- Removes firewall rules — restores direct internet access by removing the iptables/nftables/pf rules
- Stops the proxy daemon — terminates the
stronghold-proxyprocess
Traffic immediately returns to normal after disable.
Root Required
Both enable and disable require root/sudo because they modify kernel-level firewall rules. Running without sudo will fail with a permission error.
Check Status
To check whether the proxy is currently active without needing root:
stronghold statusThis reports:
- Whether the proxy daemon is running
- Whether firewall rules are active
- Current proxy configuration
Why Transparent Interception
The transparent proxy operates at the kernel level using firewall rules, not the HTTP_PROXY or HTTPS_PROXY environment variables. This is a critical distinction:
- Environment variable proxies can be bypassed by any application that ignores them, or by an agent that has been prompt-injected into unsetting them.
- Kernel-level interception cannot be bypassed by applications. All TCP traffic matching the firewall rules is redirected regardless of what the application does.
This makes the proxy tamper-resistant — even a compromised agent cannot disable or circumvent the scanning.