同样head -c 16 /dev/random | base64
记住这个KEY
创建json,配置如下:
vi gopconfig.json
{ "mode": "server", "listen": ":5678", "logfile": "my.log", "loglevel": "WARNING", "adminiface": "127.0.0.1:5234", "cipher": "aes", "key": "your key", "passwd": { "username": "password" } }
把key和username,password,填进去,然后ESC,:wq存盘退出
至此VPS服务端配置完毕
然后运行: nohup ./goproxy -config gopconfig.json &
服务端全部搞定
客户端:
用同样方法编译出win或者linux的可执行文件goproxy,然后创建json配置文件,gopconfig.json,内容如下:
{
"mode": "http",
"listen": ":8000",
"server": "VPS IP:5678",
"logfile": "my.log",
"loglevel": "WARNING",
"adminiface": "127.0.0.1:5234",
"dnsnet": "internal",
"cipher": "aes",
"key": "your key",
"username": "username",
"password": "password"
}
把key和username,password,填进去,存盘退出。
windows下新建一个批处理gopclient.bat,内容: goproxy -config ./gopconfig.json,然后运行
gopclient.bat
linux客户端直接运行:./
goproxy -config ./gopconfig.json
排错日志输出在my.log
最后浏览器新建一个http 127.0.0.1:8000的代理,enjoy!
VPS部署新goproxy简明教程:
然后运行: ./goproxy -config gopconfig.json
服务端全部搞定
客户端:
用同样方法编译出win或者linux的可执行文件goproxy,然后创建json配置文件,gopconfig.json,内容如下:
{
"mode": "http",
"listen": ":8000",
"server": "VPS IP:5678",
"logfile": "my.log",
"loglevel": "WARNING",
"adminiface": "127.0.0.1:5234",
"dnsnet": "internal",
"cipher": "aes",
"key": "your key",
"username": "username",
"password": "password"
}
VPS部署新goproxy简明教程:
phuslu貌似已经从人间消失了
,要等他的goproxy要等到猴年马月去了,这个新版goproxy是我自己无意中发现的,好像还是90后的程序员写的。蓝灯的ATS服务端也挺不错 https://github.com/getlantern/ats 好像可以部署给蓝灯用现在蓝灯的服务器也都是用这个
sudo apt-get update
sudo apt-get install -y git libtool tcl openjdk-7-jre-headless openssl
CERT_PASS=MY_VERY_OWN_PASSWORD
IP=`ifconfig eth0 | grep "inet addr" | awk -F ':' '{print $2}' | awk '{print $1}'`
keytool -genkeypair -keystore keystore.jks -alias ats -keypass "$CERT_PASS" -storepass "$CERT_PASS" -ext san=ip:$IP -dname 'CN=Seacoasts Furtwngler, O=Poising Parched, L=Bin, S=California, C=US' -startdate -3m-27d -keyalg RSA -keysize 2048 -validity 730
keytool -v -importkeystore -srckeystore keystore.jks -srcalias ats --srcstorepass "$CERT_PASS" -destkeystore keystore.p12 -deststoretype PKCS12 --deststorepass "$CERT_PASS"
openssl pkcs12 -in keystore.p12 -passin pass:"$CERT_PASS" -out key.pem -passout pass:"$CERT_PASS" # key.pem will be used by ATS
keytool -export -alias ats -keystore keystore.jks --storepass "$CERT_PASS" -rfc -file cert.pem # cert.pem will be the in chained server config
git clone https://github.com/getlantern/ats
cd ats
sudo AUTH_TOKEN=xxx CERT_FILE=<path of key.pem> CERT_PASS=xxx ./install.sh
4,配置蓝灯Lantern Chained Server服务端chainedservers:
my-fallback-server:
addr: <ip>:443
pipelined: true
cert: "<content of cert.pem here>"
authtoken: "<AUTH_TOKEN here>"
weight: 1000000
qos: 10
trusted: true
sudo apt-get -y install autoconf libtool pkg-config libssl-dev tcl-dev libxml2-dev libpcre3-dev
(cd ~; wget http://mirror.bit.edu.cn/apache/trafficserver/trafficserver-5.3.1.tar.bz2 && tar jxvf trafficserver-5.3.1.tar.bz2)
# To generate headers required by plugin
(cd ~/trafficserver-5.3.1 && autoreconf -if && ./configure --prefix=/opt/ts)
tsxs -I ~/trafficserver-5.3.1/lib/ts/ -o lantern-auth.so -c lantern-auth.c
cp lantern-auth.so /opt/ts/libexec/trafficserver
sudo service trafficserver reload
1,配置环境
可惜我没VPS实验,我用koding来试验,到最后两步就没权限了。。。。
用同样方法编译出win"版,具体怎么编译?语焉不详,能详细说说吗?
VPS部署新goproxy(非phuslu版)简明教程:
VPS部署新goproxy(非phuslu版)简明教程: