In this tutorial, we'll learn how to install Tinyproxy on AlmaLinux 10.
What is Tinyproxy?
Tinyproxy is basically a lightweight HTTP/HTTPS proxy server built to do one job and not complain about it. It sits between us and the websites or services we access, forwarding traffic while staying small enough to run even on low-resource servers. Unlike heavy proxies like Squid that come with more features than most people ever use, Tinyproxy focuses on speed, minimal memory usage and simple configuration.
That’s why it's a popular choice for VPS setups, internal networks, development environments, and cases where we want secure, controllable proxy access without turning the server into a full-blown networking circus.
Prerequisites
Before we begin, ensure we have the following:
- An Ubuntu 24.04 dedicate server or KVM VPS.
- Basic Linux Command Line Knowledge.
How to Install Tinyproxy on AlmaLinux 10
In this guide, we install, configure, secure, and test Tinyproxy on AlmaLinux 10, focusing on real server use cases.
Step 1: Update the Server
sudo dnf update -y
Keeping packages updated avoids security bugs and installation errors.
Step 2: Install Tinyproxy
sudo dnf install tinyproxy -y
Start and enable service:
systemctl enable --now tinyproxy
Check if it installed correctly:
systemctl status tinyproxy
If it shows active (running), we are good.
Step 3: Open the Configuration File
Backup the default config first:
sudo cp /etc/tinyproxy/tinyproxy.conf /etc/tinyproxy/tinyproxy.conf.bak
Then edit it:
sudo vi /etc/tinyproxy/tinyproxy.conf
This file controls how Tinyproxy behaves.
Inside the config file, edit these values:
1. Listening Port
Default is 8888. You can keep it or change.
Port 8888
2. Allow Specific IPs
Without this, only local system can use the proxy.
Example–allow local & your subnet:
Allow 127.0.0.1
Allow 192.168.1.0/24
Never open it to 0.0.0.0/0 unless we want strangers using our proxy.
3. Logging
LogFile "/var/log/tinyproxy/tinyproxy.log"
LogLevel Info
4 Connection limits & performance
For small to medium traffic, these values are a good starting point:
MaxClients 100
MinSpareServers 5
MaxSpareServers 20
StartServers 10
Timeout 600
5 Restrict HTTPS CONNECT ports (optional but recommended)
Tinyproxy supports the CONNECT method used for HTTPS. To avoid abuse, we can limit which ports are allowed:
ConnectPort 443
ConnectPort 563
This keeps clients from tunneling arbitrary TCP ports through our proxy.
Step 4: Enable Authentication (Secure Setup)
This makes sure only users with credentials can use our proxy.
Open file again:
sudo vi /etc/tinyproxy/tinyproxy.conf
Add this line anywhere below other config:
BasicAuth proxyuser strongpassword123
Replace with your own username and password.
Example secure version:
BasicAuth admin 6ts%kP@92
Save the file and restart Tinyproxy:
sudo systemctl restart tinyproxy
Enable it on boot:
sudo systemctl enable tinyproxy
Step 5: Test Tinyproxy
From your PC or another Linux system
curl -x http://SERVER_IP:8888 http://example.com -L
If using authentication:
curl -x http://proxyuser:strongpassword123@SERVER_IP:8888 http://example.com -L
If output returns page HTML, Tinyproxy is working.
Step 6: Set System-Wide Proxy (Optional)
export http_proxy="http://proxyuser:strongpassword123@SERVER_IP:8888"
export https_proxy="http://proxyuser:strongpassword123@SERVER_IP:8888"
This makes Linux apps route internet traffic through Tinyproxy.
Conclusion
Tinyproxy gives us a clean, lightweight way to route traffic through a secure proxy without draining system resources. By installing it on AlmaLinux 10, setting a custom port, allowing only trusted IPs, enabling authentication, and running basic tests, we build a controlled proxy environment that is fast, reliable, and safe for real-world usage.
This setup works well for development teams, remote access, network filtering, or simply keeping outbound traffic organized. With just a few configuration edits, Tinyproxy runs efficiently on both VPS and dedicated servers, making it a smart choice for anyone who wants stability without complexity.

