Issue Description:
Is your feature request related to a problem? Please describe.
Currently, tunnel-node egresses traffic directly via the VPS main IP. This presents a significant hurdle for users in two ways:
Cloudflare/Google CAPTCHAs: Most VPS IP ranges have a poor reputation. Users frequently encounter endless cf-captcha loops or are outright blocked by websites using Cloudflare security layers.
Geo-restrictions: VPS IPs are often flagged as "Datacenter" IPs, preventing access to region-locked services (Streaming, AI tools, etc.).
Since I (and many others) haven't routed the entire system traffic through WARP yet, having the tunnel itself handle this would be a lifesaver.
Describe the solution you'd like
I suggest implementing an Outbound Configuration for tunnel-node. Specifically:
SOCKS5 Outbound Support: Allow the node to forward its egress traffic to a local SOCKS5 proxy (like a local WARP-CLI instance running on port 4000).
Direct WARP Integration (Optional but preferred): A native way to define a WARP/WireGuard outbound within the configuration file to rotate or clean the exit IP.
This would allow the tunnel to act as a bridge while the actual "exit" to the internet happens through a clean Cloudflare IP, effectively solving the CAPTCHA and blocking issues.
Describe alternatives you've considered
Setting up a global WARP interface on the OS level is an option, but it often breaks SSH connections or interferes with other services on a technical specialist's server. A per-application outbound is much more robust.
Additional context
This feature is crucial for maintaining the usability of the MasterHttpRelayVPN project in environments with strict filtering and aggressive bot-detection systems.
MODE: FULL (TUNNEL NODE > WARP)
Issue Description:
Is your feature request related to a problem? Please describe.
Currently, tunnel-node egresses traffic directly via the VPS main IP. This presents a significant hurdle for users in two ways:
Cloudflare/Google CAPTCHAs: Most VPS IP ranges have a poor reputation. Users frequently encounter endless cf-captcha loops or are outright blocked by websites using Cloudflare security layers.
Geo-restrictions: VPS IPs are often flagged as "Datacenter" IPs, preventing access to region-locked services (Streaming, AI tools, etc.).
Since I (and many others) haven't routed the entire system traffic through WARP yet, having the tunnel itself handle this would be a lifesaver.
Describe the solution you'd like
I suggest implementing an Outbound Configuration for tunnel-node. Specifically:
SOCKS5 Outbound Support: Allow the node to forward its egress traffic to a local SOCKS5 proxy (like a local WARP-CLI instance running on port 4000).
Direct WARP Integration (Optional but preferred): A native way to define a WARP/WireGuard outbound within the configuration file to rotate or clean the exit IP.
This would allow the tunnel to act as a bridge while the actual "exit" to the internet happens through a clean Cloudflare IP, effectively solving the CAPTCHA and blocking issues.
Describe alternatives you've considered
Setting up a global WARP interface on the OS level is an option, but it often breaks SSH connections or interferes with other services on a technical specialist's server. A per-application outbound is much more robust.
Additional context
This feature is crucial for maintaining the usability of the MasterHttpRelayVPN project in environments with strict filtering and aggressive bot-detection systems.
MODE: FULL (TUNNEL NODE > WARP)