![]() Start a tunnel on vps listening on :50000 and forward to 127.0.0.1:38080 : Wget & tar zxfv & rm & mv shadowtunnel /usr/bin/ Wget & tar zxfv & rm & mv proxy /usr/bin/ & proxy http -p 127.0.0.1:38080 &ĭownload shadowtunnel program, execute below on line command on vps with root: (default 300)įirstly, we start a http proxy on 2.2.2.2.ĭownload http proxy program, execute below on line command on vps with root: Read target from socket's redirect opts of iptablesĬache seconds of dns query, if zero, default ttl used. Profiling mode, in this mode, you should stopping processīy : Ctrl+C or 'kill -s SIGHUP $PID_OF_shadowtunnel' Password of encrypt/decrypt (default "shadowtunnel") Tcp milliseconds timeout of connecting to parent (default 3000) Sleep time milliseconds after checking (default 2000) Use only high availability mode to choose parent for LB Load balance method when use multiple parent,can be Host going inactived after this fail count (default 2) Use target address to choose parent for LB, only worked for LB's hash Host going actived after this success count (default 1) ![]() Remote dns server to resolve domain (default "8.8.8.8:53")įorward address,such as : 127.0.0.1:8080 or with mode shadowtunnel:ĭns query cache file path (default "cache.dat") Local machine shadowtunnel service on remote. Which can efficiently compress transmission, and the flow has no characteristics. Shadowtunnel is a secure encryption tunnel between your local machine and remote service to protect your TCP flow,
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |