-
Download and install Squid 3.5 for Windows (default path is C:\Squid)
-
Create file C:\Squid\etc\.htpasswd with the following content:
admin:$apr1$kWA/DRFy$klaeXRe3S3jIPqc64HTMA0
This corresponds to username admin and password 1234
To generate your own username/password use http://www.htaccesstools.com/htpasswd-generator-windows/ -
Open Squid configuration (squid.conf)
این آموزش مربوط به سیستم های یونیکسه.
خب اول یک دامنه یا ساب دامنه انتخاب کنید و یک A رکورد به مقدار آی پی سرور خارجی و پرت HTTPS بسازید.سی دی ان داخلی باشه که طرح رذالتو دور بزنید. باید روی SSL,CDN رو فعال کنید.
خب برای اون دامنه باید اس اس ال داشته باشید با این فایل ها
fullchain.pem, privkey.pem, chain.pem, dhparam.pem
آموزش گرفتن اس اس ال هم که زیاده. (dhparam- Diffie–Hellman (D-H))
اول nginx رو روی سرور خارجی نصب کنید.
defaults | |
timeout connect 5s | |
timeout client 24h | |
timeout server 24h | |
global | |
log /dev/log local0 | |
frontend ssl | |
log global |
I previously write a gist about how to set up v2ray + openvpn to unblock gfw and netflix
Refers to that gist for more detail.
In short, this a solution to proxy your network to bypass Firewall with stable connections, and also unblock Proxy detection for Netflix/Spotify/etc....
In my use case from China network:
This note describes how to connect two networks/devices/VMs over public network using Wireguard with Layer 2 support (ARP, IPv6 link-local, etc).
This can also be achieved using SSH and its "tap" tunnel, however, it does not provide the same level of latency and bandwidth as full-blown VPN such as Wireguard.
In addition, this note describes how to tunnel Wireguard over TCP connection. This may be of use if you encounter firewall in-between so, for instance, you can use TCP port 443 only.
To pass wireguard's traffic through a TCP tunnel by using udp2raw
For Arch linux, install udp2raw by pacman:
pacman -S udp2raw
For Debian or Ubuntu, you can use a binary release from: https://github.com/wangyu-/udp2raw/releases
udptunnel is a small program which can tunnel UDP packets bi-directionally over a TCP connection. Its primary purpose (and original motivation) is to allow multi-media conferences to traverse a firewall which allows only outgoing TCP connections.
# udptunnel -s 443 127.0.0.1/51820