How Privacy Proxy works
Privacy Proxy uses the MASQUE protocol suite to create encrypted tunnels between clients and destination servers. This page explains the protocol mechanics and how privacy is preserved.
┌──────────┐ 1. Connect + Auth ┌──────────┐ 4. Connect ┌─────────────┐│ │ ──────────────────────────▶ │ │ ────────────────────▶ │ ││ Client │ 2. CONNECT request │ Privacy │ (Egress IP) │ Destination ││ │ ──────────────────────────▶ │ Proxy │ │ Server ││ │ │ │ ◀──────────────────── │ ││ │ 3. 200 OK │ │ 5. Connected │ ││ │ ◀────────────────────────── │ │ │ ││ │ │ │ │ ││ │ ◀───── 6. Encrypted data tunnel ─────▶ ◀─────────────────────▶│ │└──────────┘ └──────────┘ └─────────────┘
│◀──── Client IP hidden ────▶│◀──── Cloudflare Egress IP visible ──────────▶│- The client establishes an HTTP/2 or HTTP/3 connection to Privacy Proxy and presents credentials (PSK or Privacy Pass token) in the
Proxy-Authorizationheader. - The client sends a CONNECT request specifying the destination hostname and port.
- The proxy responds with
200 OKto confirm the tunnel is ready. - The proxy opens a connection to the destination using an egress IP address selected based on the client's geolocation.
- The client sends encrypted data through the tunnel. The proxy forwards bytes without inspection.
Throughout this process, the proxy learns the destination but not the content. The destination learns the egress IP address but not the client's real IP.
MASQUE ↗ (Multiplexed Application Substrate over QUIC Encryption) defines methods for proxying traffic over HTTP. Privacy Proxy supports two MASQUE methods:
| Method | Transport | Use case |
|---|---|---|
| HTTP CONNECT | TCP | Traditional HTTPS traffic |
| CONNECT-UDP | UDP | QUIC-based traffic, real-time applications |
Both methods create encrypted tunnels where the proxy forwards traffic without inspecting the content. The proxy sees only the destination hostname and port, not the actual requests, paths, or data exchanged.
Privacy Proxy accepts connections over HTTP/2 (TLS over TCP) and HTTP/3 (QUIC), selecting the appropriate protocol based on client capabilities.
For a technical deep dive into how these protocols work, refer to our blog post ↗.
Privacy Proxy creates a privacy boundary between user identity and user activity:
| Information | Who knows it |
|---|---|
| User identity (IP address, account) | Authentication service, first-hop proxy (if using double-hop) |
| Destination server | Privacy Proxy, destination server |
| Request content | Client, destination server only |
The proxy authenticates users to verify they have permission to use the service, but authentication happens separately from proxying. Once authenticated, the proxy forwards traffic without linking individual requests to specific users.
- A Primer on Proxies ↗ - Technical deep dive into HTTP CONNECT and MASQUE protocols.
- MASQUE Working Group ↗ - IETF working group developing proxy protocol standards.
- RFC 9298 ↗ - CONNECT-UDP specification for proxying UDP over HTTP.
Was this helpful?
- Resources
- API
- New to Cloudflare?
- Directory
- Sponsorships
- Open Source
- Support
- Help Center
- System Status
- Compliance
- GDPR
- Company
- cloudflare.com
- Our team
- Careers
- © 2026 Cloudflare, Inc.
- Privacy Policy
- Terms of Use
- Report Security Issues
- Trademark
-