Replies: 5 comments
-
|
This is now implemented in commit 6eadcce. The Usage examples: # Local nginx backend on port 8443
mtproto-proxy ... -D 127.0.0.1:8443
# IPv6 backend
mtproto-proxy ... -D [::1]:8443
# Domain with custom port
mtproto-proxy ... -D mydomain.com:8443
# Existing usage still works (defaults to port 443)
mtproto-proxy ... -D google.comTypical setup: Run nginx on a non-standard port with a real certificate for your domain, point the domain's DNS to your server, and run MTProxy on port 443 with Docker users can set |
Beta Was this translation helpful? Give feedback.
-
|
Thank you very much for implementing the change!
But when configured, it works like a charm 🥇 |
Beta Was this translation helpful? Give feedback.
-
|
Thanks for the detailed feedback, @rlqd! Quick follow-up question to help us improve the documentation: When you switched from Also, could you share the relevant nginx |
Beta Was this translation helpful? Give feedback.
-
Yes
Note that I'm using certbot with DNS-01 challenge to maintain valid letsencrypt certificate. |
Beta Was this translation helpful? Give feedback.
-
|
Thanks for the detailed config, @rlqd! We've updated the README with a setup guide based on your feedback — including the |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Please add ability to host own decoy website instead of mimicking public websites (which is now automatically detected and blocked by cenzorship in some cases).
It's set up the following way:
For more details, see how telemt proxy does it https://github.com/telemt/telemt/blob/main/docs/fronting-splitting/TLS-F-TCP-S.ru.md
Beta Was this translation helpful? Give feedback.
All reactions