Proxy-Go v8.2 release, within the network through P2P!

Proxy is golang achieve high performance http, https, websocket, tcp, udp, socks5 proxy server that supports forward proxy, reverse proxy, transparent proxy, network penetration, TCP / UDP port mapping, SSH transit, TLS encrypted transmission , protocol conversion, DNS pollution prevention intelligent agent, pre-CDN / Nginx anti generation proxy connection redirection.

update content:

  • Optimize the network through transmission, improved speed.
  • Increased penetration within the network server --server-id parameter.
  • In the case of p2p network through increased support, server and client ends meet nat p2p network environment, you can open the p2p transfer server and client, no longer flow through the bridge, will fail if the holes were using the bridge transit.
  • Network penetration increased client whitelist key parameters --client-keys, the format can be:
     . A file name, file contents line a client key can only contain alphanumeric underscore, that is, the client startup parameters --k value, only the client key client connects to this whitelist. # The beginning of the line, as a comment.
     b "base64: //". base64 encoded content file beginning with a description of the above, such as: base64: // ajfpoajsdfa =
    C "STR: //." beginning of a plurality of key comma separated, for example: str: // default, company, school
    is empty by default, allow all key.
  • Adds tools Tools feature, there are: nat determine the type for easy viewing whether the network support p2p, such as: proxy tools -a nattype

In addition After two rounds of closed beta, open beta round "Agent Control Panel" is about to release, Windows, Linux, macOS, arm a key to install as a system service:

Features:

  • Chain Agent, the program itself can act as a proxy, the proxy if it can be set higher as the two agents, and the N-level proxy.
  • Encrypted communication, if the program is not an agent, but also the higher the agent program, the communication between the higher-level proxy may be encrypted and, using the underlying high strength TLS encryption, no security features.
  • Smart HTTP, SOCKS5 proxy, visit the website will automatically determine whether the shield, the shield if it will use the superior agent (the premise is equipped with superior agent) visit the Web site; site if access is not shielded, in order to speed up access, the agent directly visit the Web site, without the use of a higher level proxy.
  • Domain black list, freer way of controlling access to the site.
  • Cross-platform, whether you are widows, linux, or mac, or even raspberry pie, you can run a good proxy.
  • Multi-protocol support, support for HTTP (S), TCP, UDP, Websocket, SOCKS5 proxy.
  • TCP / UDP port forwarding.
  • Support within the network penetration, P2P transmission protocol supports TCP and UDP, HTTP penetration for optimization.
  • Transit SSH, HTTP (S), SOCKS5 proxy support SSH transit, higher Linux server does not require any server, a proxy can be happy local Internet.
  • KCP protocol support, HTTP (S), SOCKS5 proxy support KCP protocol for transferring data, reduce delays, enhance the browsing experience.
  • Integrated external API, HTTP (S), SOCKS5 proxy authentication functionality may be integrated with an external HTTP API, the user can easily control agent by an external system.
  • Reverse proxy, DNS support directly to the proxy listens ip, proxy and proxy access will help you need to access the HTTP (S) Web site.
  • Transparent HTTP (S) proxy, with iptables, the gateway directly to the forward direction of the flow of 80,443 out of the proxy, can be achieved without the perception of intelligent router agent.
  • Protocol conversion, you can put existing HTTP (S) or SOCKS5 proxy converted into a port to support both HTTP (S) and SOCKS5 proxy, converted SOCKS5 proxy does not support UDP function, while supporting powerful cascading authentication.
  • Custom underlying encrypted transmission, http (s) \ sps \ socks on tcp agent can tls and standard encryption protocol encryption tcp data KCP, in addition to support for custom encryption and after tls KCP, that is to say custom encryption and tls | kcp can be used in combination, the internal use of AES256 encryption, when using only need to define a password.
  • Compressing the underlying efficient transmission, http (s) \ sps \ socks on tcp agent can tls and custom encryption standard encryption protocol encryption and kcp tcp data may be compressed data after encryption, and compression that is custom encryption and tls | kcp can be used in combination.
  • Secure DNS proxy, DNS proxy server can be provided through a local proxy for secure encrypted communications agency superiors pollution prevention and DNS queries.

download link:

Guess you like

Origin www.oschina.net/news/109902/proxy-go-8-2-released