![trojan maker wikipedia trojan maker wikipedia](https://news.hitb.org/sites/default/files/styles/medium/public/field/image/Tibet-claims.jpg)
![trojan maker wikipedia trojan maker wikipedia](https://bbdniit.ac.in/wp-content/uploads/2020/05/2.jpg)
Trojan can also start in a shell, by running: Trojan can be similarly ran with /etc/trojan/config.json by starting/enabling rvice. Trojan can be controlled with rvice and For example, start/enable the rvice instance to run Trojan with the /etc/trojan/ conf.json configuration file. This can be done by, for example, running a web server with nginx and pointing remote_addr and remote_port fields to the server address and port. Trojan servers can be disguised as other services over TLS to prevent active probing. # echo 3 > /proc/sys/net/ipv4/tcp_fastopen Also, make sure that trojan on a server has enough permission to access the certificate and key file.įor TCP Fast Open on servers to work, you will need to turn it on in your OS: Note that you should pin the certificate by setting cert on the client if you generate a self-signed certificate. Then, set the cert, key, and key_password(not necessarily) fields in the config file accordingly. You can either apply for a free certificate with some automation tools like Acme.sh from Let's Encrypt or generate a self-signed one as shown in OpenSSL#Generate a self-signed certificate. You will need to provide a TLS certificate and private key for Trojan servers to work. Detailed explanations of each field of the config file can be found here.Įxamples of config files are at /usr/share/doc/trojan/examples/. All configuration work is done in /etc/trojan/. Trojan cannot run without proper configuration.
#Trojan maker wikipedia install
Install the trojan package or trojan-git AUR for the development version.