A fast reverse proxy to help you expose a local server behind a NAT or firewall to the internet.

frp

Build Status GitHub release

README | 中文文档

What is frp?

frp is a fast reverse proxy to help you expose a local server behind a NAT or firewall to the Internet. As of now, it supports TCP and UDP, as well as HTTP and HTTPS protocols, where requests can be forwarded to internal services by domain name.

frp also has a P2P connect mode.

Table of Contents

Development Status

frp is under development. Try the latest release version in the master branch, or use the dev branch for the version in development.

The protocol might change at a release and we don't promise backwards compatibility. Please check the release log when upgrading the client and the server.

Architecture

architecture

Example Usage

Firstly, download the latest programs from Release page according to your operating system and architecture.

Put frps and frps.ini onto your server A with public IP.

Put frpc and frpc.ini onto your server B in LAN (that can't be connected from public Internet).

Access your computer in LAN by SSH

  1. Modify frps.ini on server A and set the bind_port to be connected to frp clients:
# frps.ini
[common]
bind_port = 7000
  1. Start frps on server A:

./frps -c ./frps.ini

  1. On server B, modify frpc.ini to put in your frps server public IP as server_addr field:
# frpc.ini
[common]
server_addr = x.x.x.x
server_port = 7000

[ssh]
type = tcp
local_ip = 127.0.0.1
local_port = 22
remote_port = 6000

Note that local_port (listened on client) and remote_port (exposed on server) are for traffic goes in/out the frp system, whereas server_port is used between frps.

  1. Start frpc on server B:

./frpc -c ./frpc.ini

  1. From another machine, SSH to server B like this (assuming that username is test):

ssh -oPort=6000 [email protected]

Visit your web service in LAN by custom domains

Sometimes we want to expose a local web service behind a NAT network to others for testing with your own domain name and unfortunately we can't resolve a domain name to a local IP.

However, we can expose an HTTP(S) service using frp.

  1. Modify frps.ini, set the vhost HTTP port to 8080:
# frps.ini
[common]
bind_port = 7000
vhost_http_port = 8080
  1. Start frps:

./frps -c ./frps.ini

  1. Modify frpc.ini and set server_addr to the IP address of the remote frps server. The local_port is the port of your web service:
# frpc.ini
[common]
server_addr = x.x.x.x
server_port = 7000

[web]
type = http
local_port = 80
custom_domains = www.example.com
  1. Start frpc:

./frpc -c ./frpc.ini

  1. Resolve A record of www.example.com to the public IP of the remote frps server or CNAME record to your origin domain.

  2. Now visit your local web service using url http://www.example.com:8080.

Forward DNS query request

  1. Modify frps.ini:
# frps.ini
[common]
bind_port = 7000
  1. Start frps:

./frps -c ./frps.ini

  1. Modify frpc.ini and set server_addr to the IP address of the remote frps server, forward DNS query request to Google Public DNS server 8.8.8.8:53:
# frpc.ini
[common]
server_addr = x.x.x.x
server_port = 7000

[dns]
type = udp
local_ip = 8.8.8.8
local_port = 53
remote_port = 6000
  1. Start frpc:

./frpc -c ./frpc.ini

  1. Test DNS resolution using dig command:

dig @x.x.x.x -p 6000 www.google.com

Forward Unix domain socket

Expose a Unix domain socket (e.g. the Docker daemon socket) as TCP.

Configure frps same as above.

  1. Start frpc with configuration:
# frpc.ini
[common]
server_addr = x.x.x.x
server_port = 7000

[unix_domain_socket]
type = tcp
remote_port = 6000
plugin = unix_domain_socket
plugin_unix_path = /var/run/docker.sock
  1. Test: Get Docker version using curl:

curl http://x.x.x.x:6000/version

Expose a simple HTTP file server

Browser your files stored in the LAN, from public Internet.

Configure frps same as above.

  1. Start frpc with configuration:
# frpc.ini
[common]
server_addr = x.x.x.x
server_port = 7000

[test_static_file]
type = tcp
remote_port = 6000
plugin = static_file
plugin_local_path = /tmp/files
plugin_strip_prefix = static
plugin_http_user = abc
plugin_http_passwd = abc
  1. Visit http://x.x.x.x:6000/static/ from your browser and specify correct user and password to view files in /tmp/files on the frpc machine.

Enable HTTPS for local HTTP(S) service

You may substitute https2https for the plugin, and point the plugin_local_addr to a HTTPS endpoint.

  1. Start frpc with configuration:
# frpc.ini
[common]
server_addr = x.x.x.x
server_port = 7000

[test_https2http]
type = https
custom_domains = test.example.com

plugin = https2http
plugin_local_addr = 127.0.0.1:80
plugin_crt_path = ./server.crt
plugin_key_path = ./server.key
plugin_host_header_rewrite = 127.0.0.1
plugin_header_X-From-Where = frp
  1. Visit https://test.example.com.

Expose your service privately

Some services will be at risk if exposed directly to the public network. With STCP (secret TCP) mode, a preshared key is needed to access the service from another client.

Configure frps same as above.

  1. Start frpc on machine B with the following config. This example is for exposing the SSH service (port 22), and note the sk field for the preshared key, and that the remote_port field is removed here:
# frpc.ini
[common]
server_addr = x.x.x.x
server_port = 7000

[secret_ssh]
type = stcp
sk = abcdefg
local_ip = 127.0.0.1
local_port = 22
  1. Start another frpc (typically on another machine C) with the following config to access the SSH service with a security key (sk field):
# frpc.ini
[common]
server_addr = x.x.x.x
server_port = 7000

[secret_ssh_visitor]
type = stcp
role = visitor
server_name = secret_ssh
sk = abcdefg
bind_addr = 127.0.0.1
bind_port = 6000
  1. On machine C, connect to SSH on machine B, using this command:

ssh -oPort=6000 127.0.0.1

P2P Mode

xtcp is designed for transmitting large amounts of data directly between clients. A frps server is still needed, as P2P here only refers the actual data transmission.

Note it can't penetrate all types of NAT devices. You might want to fallback to stcp if xtcp doesn't work.

  1. In frps.ini configure a UDP port for xtcp:
# frps.ini
bind_udp_port = 7001
  1. Start frpc on machine B, expose the SSH port. Note that remote_port field is removed:
# frpc.ini
[common]
server_addr = x.x.x.x
server_port = 7000

[p2p_ssh]
type = xtcp
sk = abcdefg
local_ip = 127.0.0.1
local_port = 22
  1. Start another frpc (typically on another machine C) with the config to connect to SSH using P2P mode:
# frpc.ini
[common]
server_addr = x.x.x.x
server_port = 7000

[p2p_ssh_visitor]
type = xtcp
role = visitor
server_name = p2p_ssh
sk = abcdefg
bind_addr = 127.0.0.1
bind_port = 6000
  1. On machine C, connect to SSH on machine B, using this command:

ssh -oPort=6000 127.0.0.1

Features

Configuration Files

Read the full example configuration files to find out even more features not described here.

Full configuration file for frps (Server)

Full configuration file for frpc (Client)

Using Environment Variables

Environment variables can be referenced in the configuration file, using Go's standard format:

# frpc.ini
[common]
server_addr = {{ .Envs.FRP_SERVER_ADDR }}
server_port = 7000

[ssh]
type = tcp
local_ip = 127.0.0.1
local_port = 22
remote_port = {{ .Envs.FRP_SSH_REMOTE_PORT }}

With the config above, variables can be passed into frpc program like this:

export FRP_SERVER_ADDR="x.x.x.x"
export FRP_SSH_REMOTE_PORT="6000"
./frpc -c ./frpc.ini

frpc will render configuration file template using OS environment variables. Remember to prefix your reference with .Envs.

Dashboard

Check frp's status and proxies' statistics information by Dashboard.

Configure a port for dashboard to enable this feature:

[common]
dashboard_port = 7500
# dashboard's username and password are both optional,if not set, default is admin.
dashboard_user = admin
dashboard_pwd = admin

Then visit http://[server_addr]:7500 to see the dashboard, with username and password both being admin by default.

dashboard

Admin UI

The Admin UI helps you check and manage frpc's configuration.

Configure an address for admin UI to enable this feature:

[common]
admin_addr = 127.0.0.1
admin_port = 7400
admin_user = admin
admin_pwd = admin

Then visit http://127.0.0.1:7400 to see admin UI, with username and password both being admin by default.

Monitor

When dashboard is enabled, frps will save monitor data in cache. It will be cleared after process restart.

Prometheus is also supported.

Prometheus

Enable dashboard first, then configure enable_prometheus = true in frps.ini.

http://{dashboard_addr}/metrics will provide prometheus monitor data.

Authenticating the Client

There are 2 authentication methods to authenticate frpc with frps.

You can decide which one to use by configuring authentication_method under [common] in frpc.ini and frps.ini.

Configuring authenticate_heartbeats = true under [common] will use the configured authentication method to add and validate authentication on every heartbeat between frpc and frps.

Configuring authenticate_new_work_conns = true under [common] will do the same for every new work connection between frpc and frps.

Token Authentication

When specifying authentication_method = token under [common] in frpc.ini and frps.ini - token based authentication will be used.

Make sure to specify the same token in the [common] section in frps.ini and frpc.ini for frpc to pass frps validation

OIDC Authentication

When specifying authentication_method = oidc under [common] in frpc.ini and frps.ini - OIDC based authentication will be used.

OIDC stands for OpenID Connect, and the flow used is called Client Credentials Grant.

To use this authentication type - configure frpc.ini and frps.ini as follows:

# frps.ini
[common]
authentication_method = oidc
oidc_issuer = https://example-oidc-issuer.com/
oidc_audience = https://oidc-audience.com/.default
# frpc.ini
[common]
authentication_method = oidc
oidc_client_id = 98692467-37de-409a-9fac-bb2585826f18 # Replace with OIDC client ID
oidc_client_secret = oidc_secret
oidc_audience = https://oidc-audience.com/.default
oidc_token_endpoint_url = https://example-oidc-endpoint.com/oauth2/v2.0/token

Encryption and Compression

The features are off by default. You can turn on encryption and/or compression:

# frpc.ini
[ssh]
type = tcp
local_port = 22
remote_port = 6000
use_encryption = true
use_compression = true

TLS

frp supports the TLS protocol between frpc and frps since v0.25.0.

For port multiplexing, frp sends a first byte 0x17 to dial a TLS connection.

Configure tls_enable = true in the [common] section to frpc.ini to enable this feature.

To enforce frps to only accept TLS connections - configure tls_only = true in the [common] section in frps.ini. This is optional.

frpc TLS settings (under the [common] section):

tls_enable = true
tls_cert_file = certificate.crt
tls_key_file = certificate.key
tls_trusted_ca_file = ca.crt

frps TLS settings (under the [common] section):

tls_only = true
tls_enable = true
tls_cert_file = certificate.crt
tls_key_file = certificate.key
tls_trusted_ca_file = ca.crt

You will need a root CA cert and at least one SSL/TLS certificate. It can be self-signed or regular (such as Let's Encrypt or another SSL/TLS certificate provider).

If you using frp via IP address and not hostname, make sure to set the appropriate IP address in the Subject Alternative Name (SAN) area when generating SSL/TLS Certificates.

Given an example:

  • Prepare openssl config file. It exists at /etc/pki/tls/openssl.cnf in Linux System and /System/Library/OpenSSL/openssl.cnf in MacOS, and you can copy it to current path, like cp /etc/pki/tls/openssl.cnf ./my-openssl.cnf. If not, you can build it by yourself, like:
cat > my-openssl.cnf << EOF
[ ca ]
default_ca = CA_default
[ CA_default ]
x509_extensions = usr_cert
[ req ]
default_bits        = 2048
default_md          = sha256
default_keyfile     = privkey.pem
distinguished_name  = req_distinguished_name
attributes          = req_attributes
x509_extensions     = v3_ca
string_mask         = utf8only
[ req_distinguished_name ]
[ req_attributes ]
[ usr_cert ]
basicConstraints       = CA:FALSE
nsComment              = "OpenSSL Generated Certificate"
subjectKeyIdentifier   = hash
authorityKeyIdentifier = keyid,issuer
[ v3_ca ]
subjectKeyIdentifier   = hash
authorityKeyIdentifier = keyid:always,issuer
basicConstraints       = CA:true
EOF
  • build ca certificates:
openssl genrsa -out ca.key 2048
openssl req -x509 -new -nodes -key ca.key -subj "/CN=example.ca.com" -days 5000 -out ca.crt
  • build frps certificates:
openssl genrsa -out server.key 2048

openssl req -new -sha256 -key server.key \
    -subj "/C=XX/ST=DEFAULT/L=DEFAULT/O=DEFAULT/CN=server.com" \
    -reqexts SAN \
    -config <(cat my-openssl.cnf <(printf "\n[SAN]\nsubjectAltName=DNS:localhost,IP:127.0.0.1,DNS:example.server.com")) \
    -out server.csr

openssl x509 -req -days 365 \
	-in server.csr -CA ca.crt -CAkey ca.key -CAcreateserial \
	-extfile <(printf "subjectAltName=DNS:localhost,IP:127.0.0.1,DNS:example.server.com") \
	-out server.crt
  • build frpc certificates:
openssl genrsa -out client.key 2048
openssl req -new -sha256 -key client.key \
    -subj "/C=XX/ST=DEFAULT/L=DEFAULT/O=DEFAULT/CN=client.com" \
    -reqexts SAN \
    -config <(cat my-openssl.cnf <(printf "\n[SAN]\nsubjectAltName=DNS:client.com,DNS:example.client.com")) \
    -out client.csr

openssl x509 -req -days 365 \
    -in client.csr -CA ca.crt -CAkey ca.key -CAcreateserial \
	-extfile <(printf "subjectAltName=DNS:client.com,DNS:example.client.com") \
	-out client.crt

Hot-Reloading frpc configuration

The admin_addr and admin_port fields are required for enabling HTTP API:

# frpc.ini
[common]
admin_addr = 127.0.0.1
admin_port = 7400

Then run command frpc reload -c ./frpc.ini and wait for about 10 seconds to let frpc create or update or delete proxies.

Note that parameters in [common] section won't be modified except 'start'.

Get proxy status from client

Use frpc status -c ./frpc.ini to get status of all proxies. The admin_addr and admin_port fields are required for enabling HTTP API.

Only allowing certain ports on the server

allow_ports in frps.ini is used to avoid abuse of ports:

# frps.ini
[common]
allow_ports = 2000-3000,3001,3003,4000-50000

allow_ports consists of specific ports or port ranges (lowest port number, dash -, highest port number), separated by comma ,.

Port Reuse

vhost_http_port and vhost_https_port in frps can use same port with bind_port. frps will detect the connection's protocol and handle it correspondingly.

We would like to try to allow multiple proxies bind a same remote port with different protocols in the future.

Bandwidth Limit

For Each Proxy

# frpc.ini
[ssh]
type = tcp
local_port = 22
remote_port = 6000
bandwidth_limit = 1MB

Set bandwidth_limit in each proxy's configure to enable this feature. Supported units are MB and KB.

TCP Stream Multiplexing

frp supports tcp stream multiplexing since v0.10.0 like HTTP2 Multiplexing, in which case all logic connections to the same frpc are multiplexed into the same TCP connection.

You can disable this feature by modify frps.ini and frpc.ini:

# frps.ini and frpc.ini, must be same
[common]
tcp_mux = false

Support KCP Protocol

KCP is a fast and reliable protocol that can achieve the transmission effect of a reduction of the average latency by 30% to 40% and reduction of the maximum delay by a factor of three, at the cost of 10% to 20% more bandwidth wasted than TCP.

KCP mode uses UDP as the underlying transport. Using KCP in frp:

  1. Enable KCP in frps:
# frps.ini
[common]
bind_port = 7000
# Specify a UDP port for KCP.
kcp_bind_port = 7000

The kcp_bind_port number can be the same number as bind_port, since bind_port field specifies a TCP port.

  1. Configure frpc.ini to use KCP to connect to frps:
# frpc.ini
[common]
server_addr = x.x.x.x
# Same as the 'kcp_bind_port' in frps.ini
server_port = 7000
protocol = kcp

Connection Pooling

By default, frps creates a new frpc connection to the backend service upon a user request. With connection pooling, frps keeps a certain number of pre-established connections, reducing the time needed to establish a connection.

This feature is suitable for a large number of short connections.

  1. Configure the limit of pool count each proxy can use in frps.ini:
# frps.ini
[common]
max_pool_count = 5
  1. Enable and specify the number of connection pool:
# frpc.ini
[common]
pool_count = 1

Load balancing

Load balancing is supported by group.

This feature is only available for types tcp and http now.

# frpc.ini
[test1]
type = tcp
local_port = 8080
remote_port = 80
group = web
group_key = 123

[test2]
type = tcp
local_port = 8081
remote_port = 80
group = web
group_key = 123

group_key is used for authentication.

Connections to port 80 will be dispatched to proxies in the same group randomly.

For type tcp, remote_port in the same group should be the same.

For type http, custom_domains, subdomain, locations should be the same.

Service Health Check

Health check feature can help you achieve high availability with load balancing.

Add health_check_type = tcp or health_check_type = http to enable health check.

With health check type tcp, the service port will be pinged (TCPing):

# frpc.ini
[test1]
type = tcp
local_port = 22
remote_port = 6000
# Enable TCP health check
health_check_type = tcp
# TCPing timeout seconds
health_check_timeout_s = 3
# If health check failed 3 times in a row, the proxy will be removed from frps
health_check_max_failed = 3
# A health check every 10 seconds
health_check_interval_s = 10

With health check type http, an HTTP request will be sent to the service and an HTTP 2xx OK response is expected:

# frpc.ini
[web]
type = http
local_ip = 127.0.0.1
local_port = 80
custom_domains = test.example.com
# Enable HTTP health check
health_check_type = http
# frpc will send a GET request to '/status'
# and expect an HTTP 2xx OK response
health_check_url = /status
health_check_timeout_s = 3
health_check_max_failed = 3
health_check_interval_s = 10

Rewriting the HTTP Host Header

By default frp does not modify the tunneled HTTP requests at all as it's a byte-for-byte copy.

However, speaking of web servers and HTTP requests, your web server might rely on the Host HTTP header to determine the website to be accessed. frp can rewrite the Host header when forwarding the HTTP requests, with the host_header_rewrite field:

# frpc.ini
[web]
type = http
local_port = 80
custom_domains = test.example.com
host_header_rewrite = dev.example.com

The HTTP request will have the the Host header rewritten to Host: dev.example.com when it reaches the actual web server, although the request from the browser probably has Host: test.example.com.

Setting other HTTP Headers

Similar to Host, You can override other HTTP request headers with proxy type http.

# frpc.ini
[web]
type = http
local_port = 80
custom_domains = test.example.com
host_header_rewrite = dev.example.com
header_X-From-Where = frp

Note that parameter(s) prefixed with header_ will be added to HTTP request headers.

In this example, it will set header X-From-Where: frp in the HTTP request.

Get Real IP

HTTP X-Forwarded-For

This feature is for http proxy only.

You can get user's real IP from HTTP request headers X-Forwarded-For and X-Real-IP.

Proxy Protocol

frp supports Proxy Protocol to send user's real IP to local services. It support all types except UDP.

Here is an example for https service:

# frpc.ini
[web]
type = https
local_port = 443
custom_domains = test.example.com

# now v1 and v2 are supported
proxy_protocol_version = v2

You can enable Proxy Protocol support in nginx to expose user's real IP in HTTP header X-Real-IP, and then read X-Real-IP header in your web service for the real IP.

Require HTTP Basic Auth (Password) for Web Services

Anyone who can guess your tunnel URL can access your local web server unless you protect it with a password.

This enforces HTTP Basic Auth on all requests with the username and password specified in frpc's configure file.

It can only be enabled when proxy type is http.

# frpc.ini
[web]
type = http
local_port = 80
custom_domains = test.example.com
http_user = abc
http_pwd = abc

Visit http://test.example.com in the browser and now you are prompted to enter the username and password.

Custom Subdomain Names

It is convenient to use subdomain configure for http and https types when many people share one frps server.

# frps.ini
subdomain_host = frps.com

Resolve *.frps.com to the frps server's IP. This is usually called a Wildcard DNS record.

# frpc.ini
[web]
type = http
local_port = 80
subdomain = test

Now you can visit your web service on test.frps.com.

Note that if subdomain_host is not empty, custom_domains should not be the subdomain of subdomain_host.

URL Routing

frp supports forwarding HTTP requests to different backend web services by url routing.

locations specifies the prefix of URL used for routing. frps first searches for the most specific prefix location given by literal strings regardless of the listed order.

# frpc.ini
[web01]
type = http
local_port = 80
custom_domains = web.example.com
locations = /

[web02]
type = http
local_port = 81
custom_domains = web.example.com
locations = /news,/about

HTTP requests with URL prefix /news or /about will be forwarded to web02 and other requests to web01.

TCP Port Multiplexing

frp supports receiving TCP sockets directed to different proxies on a single port on frps, similar to vhost_http_port and vhost_https_port.

The only supported TCP port multiplexing method available at the moment is httpconnect - HTTP CONNECT tunnel.

When setting tcpmux_httpconnect_port to anything other than 0 in frps under [common], frps will listen on this port for HTTP CONNECT requests.

The host of the HTTP CONNECT request will be used to match the proxy in frps. Proxy hosts can be configured in frpc by configuring custom_domain and / or subdomain under type = tcpmux proxies, when multiplexer = httpconnect.

For example:

# frps.ini
[common]
bind_port = 7000
tcpmux_httpconnect_port = 1337
# frpc.ini
[common]
server_addr = x.x.x.x
server_port = 7000

[proxy1]
type = tcpmux
multiplexer = httpconnect
custom_domains = test1

[proxy2]
type = tcpmux
multiplexer = httpconnect
custom_domains = test2

In the above configuration - frps can be contacted on port 1337 with a HTTP CONNECT header such as:

CONNECT test1 HTTP/1.1\r\n\r\n

and the connection will be routed to proxy1.

Connecting to frps via HTTP PROXY

frpc can connect to frps using HTTP proxy if you set OS environment variable HTTP_PROXY, or if http_proxy is set in frpc.ini file.

It only works when protocol is tcp.

# frpc.ini
[common]
server_addr = x.x.x.x
server_port = 7000
http_proxy = http://user:[email protected]:8080

Range ports mapping

Proxy with names that start with range: will support mapping range ports.

# frpc.ini
[range:test_tcp]
type = tcp
local_ip = 127.0.0.1
local_port = 6000-6006,6007
remote_port = 6000-6006,6007

frpc will generate 8 proxies like test_tcp_0, test_tcp_1, ..., test_tcp_7.

Client Plugins

frpc only forwards requests to local TCP or UDP ports by default.

Plugins are used for providing rich features. There are built-in plugins such as unix_domain_socket, http_proxy, socks5, static_file and you can see example usage.

Specify which plugin to use with the plugin parameter. Configuration parameters of plugin should be started with plugin_. local_ip and local_port are not used for plugin.

Using plugin http_proxy:

# frpc.ini
[http_proxy]
type = tcp
remote_port = 6000
plugin = http_proxy
plugin_http_user = abc
plugin_http_passwd = abc

plugin_http_user and plugin_http_passwd are configuration parameters used in http_proxy plugin.

Server Manage Plugins

Read the document.

Find more plugins in gofrp/plugin.

Development Plan

  • Log HTTP request information in frps.

Contributing

Interested in getting involved? We would like to help you!

  • Take a look at our issues list and consider sending a Pull Request to dev branch.
  • If you want to add a new feature, please create an issue first to describe the new feature, as well as the implementation approach. Once a proposal is accepted, create an implementation of the new features and submit it as a pull request.
  • Sorry for my poor English. Improvements for this document are welcome, even some typo fixes.
  • If you have great ideas, send an email to [email protected].

Note: We prefer you to give your advise in issues, so others with a same question can search it quickly and we don't need to answer them repeatedly.

Donation

If frp helps you a lot, you can support us by:

frp QQ group: 606194980

AliPay

donation-alipay

Wechat Pay

donation-wechatpay

PayPal

Donate money by PayPal to my account [email protected].

Owner
Comments
  • Windows 20H2 report Atosev!ml & Presenoker

    Windows 20H2 report Atosev!ml & Presenoker

    [REQUIRED] hat version of frp are you using

    Version: 0.34 frpc

    [REQUIRED] What operating system and processor architecture are you using OS: Win CPU architecture: Intel X64

    [REQUIRED] description of errors Windows 20H2 report Atosev!ml & Presenoker

    confile

    NA log file

    NA

    Steps to reproduce the issue

    1. NA

    Supplementary information NA Can you guess what caused this issue NA

    Checklist:

    • [X] I included all information required in the sections above
    • [X] I made sure there are no duplicates of this report (Use Search)
  • 安卓手机用户

    安卓手机用户

    Describe the feature request

    有高手能开发frp安卓手机和苹果手机产品?

    Describe alternatives you've considered

    No response

    Affected area

    • [ ] Docs
    • [ ] Installation
    • [ ] Performance and Scalability
    • [ ] Security
    • [ ] User Experience
    • [ ] Test and Release
    • [ ] Developer Infrastructure
    • [ ] Client Plugin
    • [ ] Server Plugin
    • [x] Extensions
    • [ ] Others
  • frpc.exe detected as virus

    frpc.exe detected as virus

    I am using frpc as a proxy for RDP (port 3389/TCP) on windows, using stcp. Works beautifully, but Windows Defender, the default anti-virus, wrongly reports the executable frpc.exe as a virus and blocks/removes the file immediately. Kaspersky anti-virus does it too. This is totally annoying and makes the use of the program a pain, if not impossible, in my corporate environment that has to have anti-virus software installed by (terrible and dumb) laws and regulations: in some machines the anti-virus program can't be disabled at all. Is there a way to circumvent this issue ?

  • 服务端和客户端都正常连接,但穿透访问网站失败

    服务端和客户端都正常连接,但穿透访问网站失败

    Issue is only used for submiting bug report and documents typo. If there are same issues or answers can be found in documents, we will close it directly. (为了节约时间,提高处理问题的效率,不按照格式填写的 issue 将会直接关闭。)

    Use the commands below to provide key information from your environment: You do NOT have to include this information if this is a FEATURE REQUEST

    What version of frp are you using (./frpc -v or ./frps -v)? Frps version 0.21.0 Frpc version 0.21.0

    What operating system and processor architecture are you using (go env)? CentOS Linux release 7.5.1804 (Core)

    Configures you used: frps.ini [common] bind_addr = 0.0.0.0 bind_port = 19000 kcp_bind_port = 19000 dashboard_port = 19001 dashboard_user = ****** dashboard_pwd = ****** vhost_http_port = 19080 vhost_https_port = 19443 log_file = ./frps.log log_level = info log_max_days = 3 #token = ****** max_pool_count = 50 tcp_mux = true subdomain_host = a***.ml

    frpc.ini [common] server_addr = a***.ml server_port = 19000 #token = ****** log_file = ./frpc.log log_level = info log_max_days = 3

    [http-test] type = http local_ip = 127.0.0.1 local_port = 80 #remote_port = 19080 subdomain = test

    Steps to reproduce the issue: 1.服务器日志和web控制面板(dashboard)可以看出已经连接上并建立透传规则; 2.附上服务端日志 frps.log 2018/11/14 00:06:53 [I] [service.go:130] frps tcp listen on 0.0.0.0:19000 2018/11/14 00:06:53 [I] [service.go:139] frps kcp listen on udp 0.0.0.0:19000 2018/11/14 00:06:53 [I] [service.go:172] http service listen on 0.0.0.0:19080 2018/11/14 00:06:53 [I] [service.go:193] https service listen on 0.0.0.0:19443 2018/11/14 00:06:53 [I] [service.go:216] Dashboard listen on 0.0.0.0:19001 2018/11/14 00:06:53 [I] [root.go:207] Start frps success 2018/11/14 00:29:18 [I] [service.go:319] client login info: ip [.236..*:26320] version [0.21.0] hostname [] os [linux] arch [amd64] 2018/11/14 00:29:18 [I] [proxy.go:291] [5e51079cf47442f5] [http-test] http proxy listen for host [test.a***.ml] location [] 2018/11/14 00:29:18 [I] [control.go:335] [5e51079cf47442f5] new proxy [http-test] success 2018/11/14 00:30:05 [I] [dashboard_api.go:67] Http request: [/api/serverinfo] 2018/11/14 00:30:05 [I] [dashboard_api.go:64] Http response [/api/serverinfo]: code [0] 2018/11/14 00:30:05 [I] [dashboard_api.go:178] Http request: [/api/proxy/http] 2018/11/14 00:30:05 [I] [dashboard_api.go:174] Http response [/api/proxy/http]: code [0] 2018/11/14 00:30:05 [I] [dashboard_api.go:175] /api/proxy/http 2018/11/14 00:30:05 [I] [dashboard_api.go:176] 2018/11/14 00:30:07 [I] [dashboard_api.go:309] Http request: [/api/traffic/http-test] 2018/11/14 00:30:07 [I] [dashboard_api.go:307] Http response [/api/traffic/http-test]: code [0] 3.附上客户端日志 2018/11/14 00:29:17 [I] [proxy_manager.go:300] proxy removed: [] 2018/11/14 00:29:17 [I] [proxy_manager.go:310] proxy added: [http-test] 2018/11/14 00:29:17 [I] [proxy_manager.go:333] visitor removed: [] 2018/11/14 00:29:17 [I] [proxy_manager.go:342] visitor added: [] 2018/11/14 00:29:18 [I] [control.go:246] [5e51079cf47442f5] login to server success, get run id [5e51079cf47442f5], server udp port [0] 2018/11/14 00:29:18 [I] [control.go:169] [5e51079cf47442f5] [http-test] start proxy success

    Describe the results you received: 用不同的浏览器打开http://test.a***.com报404错误,但直接用客户端的IP地址访问网站是正常的。

    Describe the results you expected: 用域名test.a***.com能直接访问客户端的网站

    Additional information you deem important (e.g. issue happens only occasionally):

    Can you point out what caused this issue (optional)

  • 通过frp穿透内网web服务失败。frp服务端提示:http: proxy error: no such domain,

    通过frp穿透内网web服务失败。frp服务端提示:http: proxy error: no such domain,

    Issue is only used for submiting bug report and documents typo. If there are same issues or answers can be found in documents, we will close it directly. (为了节约时间,提高处理问题的效率,不按照格式填写的 issue 将会直接关闭。)

    Use the commands below to provide key information from your environment: You do NOT have to include this information if this is a FEATURE REQUEST

    What version of frp are you using (./frpc -v or ./frps -v)? 0.19.0

    What operating system and processor architecture are you using (go env)? 服务端:centos 7 客户端: windows 10

    Configures you used:

    客户端

    [common] server_addr = 139.199.87.90 server_port = 7000 [web]type = http local_port = 8081 custom_domains = http://www.zhengcehuixiang.cn

    =================================================================

    服务端

    bind_port = 7000 vhost_http_port = 8181

    Steps to reproduce the issue: 1.在centos 7配置服务端文件frps.ini 2.在win10 配置了客户端的配置文件frpc.ini,开启本地web服务,端口为8081。该服务用Spring Boot开发。 3.frp的服务端和客户端显示连接成功,在本地可以访问web服务。

    Describe the results you received: 通过 http://www.zhengcehuixiang.cn:8181/user 访问报错,The page you visit not found. Sorry, the page you are looking for is currently unavailable. Please try again later.

    The server is powered by frp.

    Faithfully yours, frp.

    frp服务端提示: 2018/05/20 11:29:42 [W] [newhttp.go:190] http: proxy error: no such domain 2018/05/20 11:29:42 [W] [newhttp.go:190] http: proxy error: no such domain 2018/05/20 11:33:56 [W] [newhttp.go:190] http: proxy error: no such domain Describe the results you expected: 在web上显示字符串,hello,world。在本地通过localhost:8081/user是可以实现的。

    Additional information you deem important (e.g. issue happens only occasionally):

    Can you point out what caused this issue (optional) 我推测是配置文件没有填对,我是对着frp的官网文档,通过自定义域名访问部署于内网的 web 服务,填写的配置。请各位帮帮忙。衷心感谢。

  • 局域网内机器自带https服务(非公开认证的ssl证书),frp该怎么配置?

    局域网内机器自带https服务(非公开认证的ssl证书),frp该怎么配置?

    使用场景:

    局域网电脑部署了Cockpit(一个基于WEB的Linux运维管理工具),在外网通过Cockpit管理局域网的电脑,Cockpit自带https协议,我该怎么配置 frp 才能正常打开Cockpit管理界面呢?

    现在 frp 支持的 是https2http,我现在遇到的情况似乎是 http2https 或者 https2https。

    现在的问题:

    通过配置 frp ,可以在外网打开 Cockpit 登录页面,登陆后就变白屏了,没什么信息显示。

    参考信息:

    之前用过 花生壳 ,花生壳需要配置一个独立的端口,就通过https从公网访问局域网内https的web应用,不知道花生壳是怎么做的。

    What version of frp are you using (./frpc -v or ./frps -v)?

    v0.29.1

    What operating system and processor architecture are you using (go env)?

    ubuntu 18/16

    Configures you used:

    ==============frps=============

    frps.ini

    [common] bind_port = 11001 kcp_bind_port = 11001 vhost_http_port = 80 vhost_https_port = 443

    ==============frpc=============

    frpc.ini

    [common] server_addr = x.x.x.x server_port = 11001 protocol = kcp

    [hos-http-m.mydomain.cn] type = http local_port = 9090 custom_domains = m.mydomain.cn

    Steps to reproduce the issue: 1. 2. 3.

    Describe the results you received:

    通过配置 frp ,可以在外网打开 Cockpit 登录页面,登陆后就变白屏了,没什么信息显示。

    Describe the results you expected:

    希望,通过 frp 能够连接内网已经是https的web应用。

    Additional information you deem important (e.g. issue happens only occasionally): 之前用过 花生壳 ,花生壳需要配置一个独立的端口,就通过https从公网访问局域网内https的web应用,不知道花生壳是怎么做的。

    Can you point out what caused this issue (optional)

  • 希望添加防火墙功能和来源ip记录

    希望添加防火墙功能和来源ip记录

    Issue is only used for submitting bug report and documents typo. If there are same issues or answers can be found in documents, we will close it directly. (为了节约时间,提高处理问题的效率,不按照格式填写的 issue 将会直接关闭。)

    Use the commands below to provide key information from your environment: You do NOT have to include this information if this is a FEATURE REQUEST

    What version of frp are you using (./frpc -v or ./frps -v)? 0.25.3

    What operating system and processor architecture are you using (go env)? Ubuntu16.04

    Configures you used:

    Steps to reproduce the issue: 1.2.3. Describe the results you received: Describe the results you expected: Additional information you deem important (e.g. issue happens only occasionally): Can you point out what caused this issue (optional)

    This IS A FEATURE REQUEST: 1.希望能添加每个客户端自由配置的防火墙功能,比如一个frps下有两个frpc,每个frpc有自己的白名单iplist,只有该list的ip能通过frps访问这个frpc 2.frps的log我有点看不太懂……,似乎只写了frpc的ip而不是访问frps的ip,希望log能记录一下访问frps的源ip

    近期感觉自己挂出来的windows 远程桌面有被黑客破解的大量记录(无数的重复connection),不知道怎么处置最为科学?我没有frps所在服务器的sudo权限,因此只能开端口,没有改路由表的权限……

  • Https 代理模式对证书的处理可能有问题

    Https 代理模式对证书的处理可能有问题

    Issue is only used for submiting bug report and documents typo. If there are same issues or answers can be found in documents, we will close it directly. (为了节约时间,提高处理问题的效率,不按照格式填写的 issue 将会直接关闭。)

    Use the commands below to provide key information from your environment: You do NOT have to include this information if this is a FEATURE REQUEST

    What version of frp are you using (./frpc -v or ./frps -v)? 0.13.0

    What operating system and processor architecture are you using (go env)? CentOS 7 Server + Nginx 1.13.5 (built with OpenSSL 1.0.2l) / Debian 9 Client

    Configures you used:

    /frpc.ini

    [web01]
    type = tcp
    local_ip = 127.0.0.1
    local_port = 443
    use_encryption = false
    use_compression = false
    remote_port = 7443
    subdomain = web
    
    [web02]
    type = https
    local_ip = 127.0.0.1
    local_port = 443
    use_encryption = false
    use_compression = false 
    subdomain = web
    

    /frps.ini

    [common]
    bind_port = 7000
    kcp_bind_port = 7000
    
    vhost_http_port = 8080
    vhost_https_port = 8443
    
    privilege_token = xxxxx
    
    subdomain_host = xxx.com
    

    nginx vhost config

    server {
        listen       80;
        listen       443 ssl http2;
        server_name  web.xxx.com;
    
        ssl_certificate  /root/keys/xxx.crt;
        ssl_certificate_key  /root/keys/xxx.key;
    
        ssl_session_cache    shared:SSL:1m;
        ssl_session_timeout  5m;
        
        ssl_ciphers 'kEECDH+ECDSA+AES128 kEECDH+ECDSA+AES256 kEECDH+AES128 kEECDH+AES256 kEDH+AES128 kEDH+AES256 DES-CBC3-SHA +SHA !aNULL !eNULL !LOW !kECDH !DSS !MD5 !EXP !PSK !SRP !CAMELLIA !SEED';
        ssl_prefer_server_ciphers  on;
    
        if ( $ssl_protocol = "" ) {
            rewrite ^ https://$host$request_uri?;
        }
        location / {
            proxy_redirect off;
            proxy_set_header Host $host;
            proxy_set_header X-Real-IP $remote_addr;
            proxy_set_header X-Forwarded-For $remote_addr;
            proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
            proxy_set_header X-Forwarded-Proto  $scheme;
            proxy_pass https://127.0.0.1:8443;
        }
    }
    


    Steps to reproduce the issue:

    1. 使用以上配置 用 https://web.xxx.com 访问服务器端 Nginx会报 502 Bad Gateway
    2. 查阅 Nginx 的错误日志找到了以下内容: 2017/11/13 07:51:16 [error] 32703#32703: *6 peer closed connection in SSL handshake while SSL handshaking to upstream,
    3. 在服务器运行 openssl s_client -connect 127.0.0.1:8443 -tls1 的结果显示的证书信息是空的

    snipaste_2017-11-13-01

    PS: 浏览器直接访问 https://web.xxx.com:7443 和 https://web.xxx.com:8443 都是可以的 但是似乎使用https模式的 8443 端口 页面载入会稍慢一些

    Describe the results you received:proxy_pass 修改为 https://127.0.0.1:7443 就可以正常访问 https://web.xxx.com

    openssl s_client -connect 127.0.0.1:7443 -tls1 也可以返回正确信息 snipaste_2017-11-13_02 snipaste_2017-11-13_03

    Describe the results you expected: https 模式无法证书的话就只能使用 tcp 模式进行反代,这样的话 8443 端口无法复用,每次新增站点也要手动配置 nginx 很麻烦。

    Additional information you deem important (e.g. issue happens only occasionally):

    Can you point out what caused this issue (optional)

  • frp转发的内网wordpress博客, 一直正常使用,今天把frps做成了service, 注册开机自启, 然后博客页面无法访问

    frp转发的内网wordpress博客, 一直正常使用,今天把frps做成了service, 注册开机自启, 然后博客页面无法访问

    What version of frp are you using (./frpc -v or ./frps -v)? 0.29.1

    What operating system and processor architecture are you using (go env)? 服务端:搬瓦工VPS Debian9 amd64 客户端:树莓派 armv71

    Configures you used: 两端配置都是正常的, 之前一直在用,没有动过

    Steps to reproduce the issue: 今天因为VPS上装的V2ray从昨天开始突然连不上了,v2ray.service运行正常,就systemctl restart v2ray, 然后systemctl enable v2ray, 还是运行正常,但手机V2rayNG客户端就是连不上,显示contect exceeded sudo reboot重启VPS,V2ray自启成功,但是frps没有自启成功,之前用的nohup /frps -c /frps_full.ini后台启动的frps, 然后再次用这个命令启动frps, 然后启动成功。frps dashboard tcp 在线,http也在线,然后想看看这次重启frps会不会自启成功,又重启了VPS,v2ray自启成功,frps还是没自启,之前没出现过这个问题,就想着像frpc一样,把frps也做成service, 然后enable开机自启。移动frps和配置文件:cp /frps /usr/local/bin/frps,cp /frps_full.ini /etc/frps/frps_full.ini,然后创建frps.service文件:nano /usr/lib/systemd/system/frps.service 填入以下信息: 【Unit】 Description:frps Wants=network-online.target After=network-online.target network.target Requires=network-online.target

    【Service】 ExecStart=/usr/local/bin/frps -c /etc/frps/frps_full.ini ExecStop=/bin/kill $MAINPID Restart=always RestartSec=5 StartLimitInterval=0

    【Install】 WantedBy=multi-user.target

    然后保存,systemctl start frps, systemctl enable frps, 然后重启VPS,frps果然自启成功 然后frps dashboard tcp和http的线路都是通的在线状态

    然后我登陆frp转发的wordpress博客www.brucelog.club,页面不显示,仪表盘也登不上,重启树莓派线路是通的也没用。之前博客一直是正常显示,正常登陆的,因为之前已经把博客的站点URL改成了域名地址,所以输入本地IP也没用,试了VPS IP+/wordpress/wp-admin也不显示。 到底是怎么回事, 按理说转发的http线路是通的就是正常的,用来做博客服务器的树莓派的wordpress文件夹根本没动过,apache2和mariadb也是正常运行,只是把VPS服务端frps改成了service, 并且成功启动了下,线路也是通的,但是博客就突然页面不显示了,后台也不显示,不知道是什么原因? 难道服务端frps只能普通启动/frps -c /frps_full.ini或者nohup /frps -c /frps_full.ini不能做成service?

    哪位大神帮帮我?谢谢!本人不是程序员,只是看教程略懂些linux命令。

  • 希望能加入ChaCha20加密方式

    希望能加入ChaCha20加密方式

    我现在是用 openwrt 路由器跑 frp,功能都正常,但是现在加密方式对于路由器来说太重了, 希望

    1. 加入 ChaCha20 这样比较轻量的加密方式,对于低端设备会更好

    2. 希望发布 release 的时候增加 softfloat 版本 (go编译的时候可以选择),很多低端设备都不具备FPU,加密运算需要浮点计算,编译使用 softfloat 版本对低端设备效率更高 (尤其是 mips , mipsel 这种)

  • frps不设置bind_addr时默认绑定到IPv6

    frps不设置bind_addr时默认绑定到IPv6

    Issue is only used for submiting bug report and documents typo. If there are same issues or answers can be found in documents, we will close it directly. (为了节约时间,提高处理问题的效率,不按照格式填写的 issue 将会直接关闭。)

    Use the commands below to provide key information from your environment: You do NOT have to include this information if this is a FEATURE REQUEST

    What version of frp are you using (./frpc -v or ./frps -v)?

    0.20.0

    What operating system and processor architecture are you using (go env)?

    GOARCH="amd64"
    GOBIN=""
    GOCACHE="/home/qakcn/.cache/go-build"
    GOEXE=""
    GOHOSTARCH="amd64"
    GOHOSTOS="linux"
    GOOS="linux"
    GOPATH="/home/qakcn/go"
    GORACE=""
    GOROOT="/usr/lib/go-1.10"
    GOTMPDIR=""
    GOTOOLDIR="/usr/lib/go-1.10/pkg/tool/linux_amd64"
    GCCGO="gccgo"
    CC="gcc"
    CXX="g++"
    CGO_ENABLED="1"
    CGO_CFLAGS="-g -O2"
    CGO_CPPFLAGS=""
    CGO_CXXFLAGS="-g -O2"
    CGO_FFLAGS="-g -O2"
    CGO_LDFLAGS="-g -O2"
    PKG_CONFIG="pkg-config"
    GOGCCFLAGS="-fPIC -m64 -pthread -fmessage-length=0 -fdebug-prefix-map=/tmp/go-build049950030=/tmp/go-build -gno-record-gcc-switches"
    

    Configures you used:

    frps.ini

    [common]
    bind_addr = 0.0.0.0
    bind_port = 7000
    kcp_bind_port = 7000
    
    log_file = /var/log/frps.log
    log_level =info
    log_max_days = 5
    

    Steps to reproduce the issue:

    1. 按上述配置,有没有bind_addr = 0.0.0.0结果一样
    2. 启动frps服务frps -c frps.ini

    Describe the results you received:

    netstat -nl46检查只有IPv6地址被监听:

    Active Internet connections (only servers)
    Proto Recv-Q Send-Q Local Address           Foreign Address         State
    tcp        0      0 0.0.0.0:23333           0.0.0.0:*               LISTEN
    tcp        0      0 127.0.0.53:53           0.0.0.0:*               LISTEN
    tcp6       0      0 :::23333                :::*                    LISTEN
    tcp6       0      0 :::7000                 :::*                    LISTEN
    udp    24576      0 127.0.0.53:53           0.0.0.0:*
    udp        0      0 0.0.0.0:68              0.0.0.0:*
    udp6       0      0 :::7000                 :::*
    

    Describe the results you expected:

    希望监听IPv4地址。

    Additional information you deem important (e.g. issue happens only occasionally):

    这可能是Go语言通病,之前使用ngrok和kcptun时也有不配置绑定IPv4地址0.0.0.0时默认监听IPv6地址。

    我希望能同时监听所有地址。

    Can you point out what caused this issue (optional)

    Sorry。

  • all quic traffic from frpc to frps stalls

    all quic traffic from frpc to frps stalls

    Bug Description

    The new quic support is great! For static file downloads I was able to increase throughput from 4MB/s to around 13MB/s simply by switching to the new protocol = quic. Unfortunately my excitement was short lived as the tunnel would stop working entirely when I started trying to seek around a video served through the frp tunnel from my Jellyfin media server. Restarting the tunnel would always fix the problem until you seek on the video again a few times. A minimal repro can be made by simply opening a tunnel to a local http server which is serves a video file and dragging the playhead in the browser to generate a bunch of requests:

    https://user-images.githubusercontent.com/18545667/211148931-63a3056d-a2d7-43bb-b86c-1446f396971f.mp4

    It seems to vary how many times you can seek around the video, some times only once would cause the tunnel to break, others maybe 10 or more times. I have found dragging the playhead around the video will guarantee to trigger the issue.

    I have spent a couple days now wrapping my head around the codebase and learning go to try and understand where the issue was occurring. Today I found a hacky solution that solves the video seeking issue at least temporarily.

    index fc59b39..6570323 100644
    --- a/server/service.go
    +++ b/server/service.go
    @@ -218,6 +218,13 @@ func NewService(cfg config.ServerCommonConf) (svr *Service, err error) {
                            MaxIdleTimeout:     time.Duration(cfg.QUICMaxIdleTimeout) * time.Second,
                            MaxIncomingStreams: int64(cfg.QUICMaxIncomingStreams),
                            KeepAlivePeriod:    time.Duration(cfg.QUICKeepalivePeriod) * time.Second,
    +                       // I believe the key thing is the initial connection receive window
    +                       MaxConnectionReceiveWindow:     1e+8,      // 100MB
    +                       InitialConnectionReceiveWindow: 1e+8,
    +                       MaxStreamReceiveWindow:         1e+8 / 50, // Was just testing different settings here, don't think there is anything specific about the /50 that makes this work vs just using e.g. 15MB but I assume this needs to be LESS than MaxConnectionReceiveWindow as I believe the core problem is that the connection receive window allowance is exhausted by unclosed streams or something thus preventing any more data from being sent
    +                       InitialStreamReceiveWindow:     128,       // On an individual stream start the receive window tiny
                    })
                    if err != nil {
                            err = fmt.Errorf("listen on quic udp address %s error: %v", address, err)
    

    With this change in place the quic connection no longer breaks down BUT both frpc and frps memory usage continues increasing as I drag the playhead around the video (after doing so for about 30s I observed ~50MB memory usage on windows), I would assume indicating that there are a bunch of quic streams that are not being closed or something.

    frpc Version

    1.46.0

    frps Version

    1.46.0

    System Architecture

    Observed on linux/amd64, windows/x86_64, linux_arm64, darwin

    Configurations

    frpc.ini

    [common]
    server_addr = localhost
    server_port = 7000
    protocol = quic
    log_level = debug
    
    [tcp-service]
    type = tcp
    local_ip = localhost
    local_port = 3000
    remote_port = 8080
    

    frps.ini

    [common]
    bind_port = 7000
    quic_bind_port = 7000
    log_level = debug
    

    Logs

    frpc.log frps.log

    Steps to reproduce

    • Run a frps with a quic port and have frpc connect opening a tunnel for tcp traffic to an application serving a video file
    • Access and attempt to seek a few times within the video file served over the tunnel
    • Observe eventually frpc traffic is no longer being transmitted back to frps. Frps receives the requests from the browser, and frpc even gets the ReqWorkConn messages, but no StreamFrames are transmitted back from frpc to frps anymore

    Affected area

    • [ ] Docs
    • [ ] Installation
    • [X] Performance and Scalability
    • [ ] Security
    • [X] User Experience
    • [ ] Test and Release
    • [ ] Developer Infrastructure
    • [X] Client Plugin
    • [ ] Server Plugin
    • [ ] Extensions
    • [ ] Others
  • how expose local website http to https in frp server

    how expose local website http to https in frp server

    Bug Description

    Hello guys! I'm trying to expose a local http site to a frp server using https but I'm not succeeding. my frpc.ini looks like this: [common] server_addr = 137.184.181.209 server_port = 7000

    [https] type = https local_port = 8080 custom_domains = api.tiggomark.com.br

    and my frps.ini (on the server) looks like this: [common] bind_port = 7000 vhost_http_port = 9888 vhost_https_port = 7001

    However, even having an ssl certificate installed for the api.tiggomark.com.br domain, when I try to access the address https://api.tiggomark.com.br:7001 I cannot access the address (certificate error), using the tables settings for http, works normally. Can anyone help me? Thanks!

    frpc Version

    0.46.0

    frps Version

    0.46.0

    System Architecture

    linux/amd64

    Configurations

    Sever: [common] bind_port = 7000 vhost_http_port = 9888 vhost_https_port = 7001

    Client: [common] server_addr = 137.184.181.209 server_port = 7000

    [https] type = https local_port = 8080 custom_domains = api.tiggomark.com.br

    Logs

    No response

    Steps to reproduce

    ...

    Affected area

    • [ ] Docs
    • [ ] Installation
    • [ ] Performance and Scalability
    • [ ] Security
    • [ ] User Experience
    • [ ] Test and Release
    • [ ] Developer Infrastructure
    • [ ] Client Plugin
    • [ ] Server Plugin
    • [ ] Extensions
    • [ ] Others
  • Ping类型的代理是多久被执行一次

    Ping类型的代理是多久被执行一次

    Bug Description

    想修改下ping代理的发送时间,但是没有找到相关的参数。

    frpc Version

    0.46.0

    frps Version

    0.46.0

    System Architecture

    linux/amd64

    Configurations

    这是我的服务端配置

    [common] bind_port = 7000 dashboard_port = 7500 quic_max_idle_timeout = 10 [plugin.notify] addr = 127.0.0.1:3578 path = /handler ops = Ping,NewProxy,CloseProxy,NewWorkConn,NewUserConn

    Logs

    No response

    Steps to reproduce

    ...

    Affected area

    • [ ] Docs
    • [ ] Installation
    • [ ] Performance and Scalability
    • [ ] Security
    • [ ] User Experience
    • [ ] Test and Release
    • [ ] Developer Infrastructure
    • [ ] Client Plugin
    • [X] Server Plugin
    • [ ] Extensions
    • [ ] Others
  • [Feature Request]  FRP 隧道 默认的数据加密方式

    [Feature Request] FRP 隧道 默认的数据加密方式

    Describe the feature request

    当FRPS--FRPC 建立隧道时,如果上面承载的是一些明文流量,例如http或者某些tcp.udp流量,隧道本身是否有默认的加密方式? 多谢

    Describe alternatives you've considered

    No response

    Affected area

    • [ ] Docs
    • [ ] Installation
    • [ ] Performance and Scalability
    • [X] Security
    • [ ] User Experience
    • [ ] Test and Release
    • [ ] Developer Infrastructure
    • [ ] Client Plugin
    • [ ] Server Plugin
    • [ ] Extensions
    • [ ] Others
  • frp0.46版,启用OIDC,出现 clientId混乱问题

    frp0.46版,启用OIDC,出现 clientId混乱问题

    Bug Description

    frp0.46版启用OIDC,服务端配置如下 bind_port = 7000 vhost_http_port = 80 subdomain_host =frpserver.com max_pool_count = 50 authentication_method = oidc oidc_issuer = http://192.168.78.124:8080 oidc_audience = http://192.168.78.124:8080/default authenticate_new_work_conns = true

    客户端配置1: [common] #忽略其它配置 authentication_method = oidc oidc_client_id = zzming oidc_client_secret = secret2 oidc_audience = http://192.168.78.124:8080/default oidc_scope = openid oidc_token_endpoint_url =http://192.168.78.124:8080/oauth2/token authenticate_new_work_conns = true [zzming] type = http local_port = 18080 subdomain = zzming 客户端配置2: [common] #忽略其它配置 authentication_method = oidc oidc_client_id = taolin oidc_client_secret = secret1 oidc_audience = http://192.168.78.124:8080/default oidc_scope = openid oidc_token_endpoint_url =http://192.168.78.124:8080/oauth2/token authenticate_new_work_conns = true [taolin] type = http local_port = 6688 subdomain = taolin

    按此配置 运行一段时间后,出现如下错误 2023/01/03 17:04:59 [E] [control.go:155] [b88169377d0c25cd] StartWorkConn contai ns error: received different OIDC subject in login and ping. original subject: t aolin, new subject: zzming

    请问 这是什么原因

    frpc Version

    0.46

    frps Version

    0.46

    System Architecture

    win10

    Configurations

    服务端配置如下 bind_port = 7000 vhost_http_port = 80 subdomain_host =frpserver.com max_pool_count = 50 authentication_method = oidc oidc_issuer = http://192.168.78.124:8080 oidc_audience = http://192.168.78.124:8080/default authenticate_new_work_conns = true

    客户端配置1: [common] #忽略其它配置 authentication_method = oidc oidc_client_id = zzming oidc_client_secret = secret2 oidc_audience = http://192.168.78.124:8080/default oidc_scope = openid oidc_token_endpoint_url =http://192.168.78.124:8080/oauth2/token authenticate_new_work_conns = true [zzming] type = http local_port = 18080 subdomain = zzming 客户端配置2: [common] #忽略其它配置 authentication_method = oidc oidc_client_id = taolin oidc_client_secret = secret1 oidc_audience = http://192.168.78.124:8080/default oidc_scope = openid oidc_token_endpoint_url =http://192.168.78.124:8080/oauth2/token authenticate_new_work_conns = true [taolin] type = http local_port = 6688 subdomain = taolin

    Logs

    aolin, new subject: zzming 2023/01/03 17:03:42 [D] [control.go:286] [b88169377d0c25cd] send heartbeat to se rver 2023/01/03 17:03:42 [D] [control.go:317] [b88169377d0c25cd] receive heartbeat fr om server 2023/01/03 17:04:12 [D] [control.go:286] [b88169377d0c25cd] send heartbeat to se rver 2023/01/03 17:04:12 [D] [control.go:317] [b88169377d0c25cd] receive heartbeat fr om server 2023/01/03 17:04:15 [D] [proxy.go:819] [b88169377d0c25cd] [zzming] join connecti ons closed 2023/01/03 17:04:42 [D] [control.go:286] [b88169377d0c25cd] send heartbeat to se rver 2023/01/03 17:04:42 [D] [control.go:317] [b88169377d0c25cd] receive heartbeat fr om server 2023/01/03 17:04:59 [E] [control.go:155] [b88169377d0c25cd] StartWorkConn contai ns error: received different OIDC subject in login and ping. original subject: t aolin, new subject: zzming 2023/01/03 17:05:12 [D] [control.go:286] [b88169377d0c25cd] send heartbeat to se rver 2023/01/03 17:05:12 [D] [control.go:317] [b88169377d0c25cd] receive heartbeat fr om server 2023/01/03 17:05:42 [D] [control.go:286] [b88169377d0c25cd] send heartbeat to se

    Steps to reproduce

    1. 按配置启动

    ...

    Affected area

    • [ ] Docs
    • [ ] Installation
    • [ ] Performance and Scalability
    • [ ] Security
    • [ ] User Experience
    • [ ] Test and Release
    • [ ] Developer Infrastructure
    • [ ] Client Plugin
    • [ ] Server Plugin
    • [ ] Extensions
    • [ ] Others
rconn is a multiplatform program for creating generic reverse connections. Lets you consume services that are behind firewall or NAT without opening ports or port-forwarding.
rconn is a multiplatform program for creating generic reverse connections. Lets you consume services that are behind firewall or NAT without opening ports or port-forwarding.

rconn (r[everse] conn[ection]) is a multiplatform program for creating reverse connections. It lets you consume services that are behind NAT and/or fi

Jan 1, 2023
May 8, 2022
A http-relay server/client written in golang to forward requests to a service behind a nat router from web

http-relay This repo is WIP http-relay is a server/client application written in go(lang) to forward http(s) requests to an application behind a nat r

Dec 16, 2021
netstat-nat - Display NAT entries on Linux systems

netstat-nat This is a reimplementation of the netstat-nat tool, written entirely in Go. It uses the same command line flags and almost the same output

Oct 26, 2021
Create a dynamic fou tunnels works behind NAT

Dynamic Linux Tunneling This software creates Gretap Tunnels over FOU for Dynamic client endpoints. It also works behind NAT444 (CGN-LSN). You can use

Oct 17, 2022
“Dear Port80” is a zero-config TCP proxy server that hides SSH connection behind a HTTP server!

Dear Port80 About The Project: “Dear Port80” is a zero-config TCP proxy server that hides SSH connection behind a HTTP server! +---------------------

Jun 29, 2022
Internet connectivity for your VPC-attached Lambda functions without a NAT Gateway
Internet connectivity for your VPC-attached Lambda functions without a NAT Gateway

lambdaeip Internet connectivity for your VPC-attached Lambda functions without a NAT Gateway Background I occasionally have serverless applications th

Nov 9, 2022
Go-http-sleep: Delayed response http server, useful for testing various timeout issue for application running behind proxy

delayed response http server, useful for testing various timeout issue for application running behind proxy

Jan 22, 2022
A fast, high performance Cross-platform lightweight Nat Tracker Server,
A fast, high performance Cross-platform lightweight Nat Tracker Server,

NatTrackerServer A fast, high performance Cross-platform lightweight Nat Tracker Server suport IPv4 and IPv6 Tracker Server protocol 1、get NAT public

Apr 15, 2022
Tcp-proxy - A dead simple reverse proxy server.

tcp-proxy A proxy that forwords from a host to another. Building go build -ldflags="-X 'main.Version=$(git describe --tags $(git rev-list --tags --max

Jan 2, 2022
Battlesnake-logging-proxy - A little proxy between the internet and your battlesnake

battlesnake-logging-proxy a little proxy between the internet and your battlesna

Feb 11, 2022
Resolved the issue that Windows cannot detect the Internet even if it does have an Internet connection.

win-connect 中文文档 Background This program is built to resolved the issue that Windows cannot detect the Internet even if it does have an Internet conne

Dec 19, 2021
mt-multiserver-proxy is a reverse proxy designed for linking multiple Minetest servers together

mt-multiserver-proxy mt-multiserver-proxy is a reverse proxy designed for linking multiple Minetest servers together. It is the successor to multiserv

Nov 17, 2022
A TCP proxy used to expose services onto a tailscale network without root. Ideal for container environments.

tailscale-sidecar This is barely tested software, I don't guarantee it works but please make an issue if you use it and find a bug. Pull requests are

Dec 30, 2022
Port-proxy - Temporary expose port for remote connections

Port proxy util Temporary expose port for remote connections. E.g. database/wind

Jan 27, 2022
TProx is a fast reverse proxy path traversal detector and directory bruteforcer.
TProx is a fast reverse proxy path traversal detector and directory bruteforcer.

TProx is a fast reverse proxy path traversal detector and directory bruteforcer Install • Usage • Examples • Join Discord Install Options From Source

Nov 9, 2022
Simple edge server / reverse proxy

reproxy Reproxy is simple edge HTTP(s) sever / reverse proxy supporting various providers (docker, static, file). One or more providers supply informa

Dec 29, 2022
Reverse proxy server to filter traffic based on JA3 fingerprint/hash

JA3RP (JA3 Reverse Proxy) Ja3RP is a basic reverse proxy server that filters traffic based on JA3 fingerprints. It can also operate as a regular HTTP

Sep 17, 2022