frp/README.md

343 lines
9.1 KiB
Markdown
Raw Normal View History

2015-12-21 16:25:54 +01:00
# frp
[![Build Status](https://travis-ci.org/fatedier/frp.svg)](https://travis-ci.org/fatedier/frp)
2016-04-06 05:43:50 +02:00
[README](README.md) | [中文文档](README_zh.md)
2016-03-14 08:26:26 +01:00
## What is frp?
2016-08-13 16:32:11 +02:00
frp is a fast reverse proxy to help you expose a local server behind a NAT or firewall to the internet. Now, it supports tcp, http and https protocol when requests can be forwarded by domains to backward web services.
2016-07-11 17:31:35 +02:00
## Catalog
2016-07-11 17:35:34 +02:00
* [What can I do with frp?](#what-can-i-do-with-frp)
* [Status](#status)
* [Architecture](#architecture)
2016-08-13 16:32:11 +02:00
* [Example Usage](#example-usage)
2016-07-11 17:35:34 +02:00
* [Communicate with your computer in LAN by SSH](#communicate-with-your-computer-in-lan-by-ssh)
2016-08-12 07:44:25 +02:00
* [Visit your web service in LAN by custom domains](#visit-your-web-service-in-lan-by-custom-domains)
2016-07-11 17:35:34 +02:00
* [Features](#features)
2016-08-12 06:50:12 +02:00
* [Dashboard](#dashboard)
2016-07-11 17:35:34 +02:00
* [Authentication](#authentication)
* [Encryption and Compression](#encryption-and-compression)
* [Reload configures without frps stopped](#reload-configures-without-frps-stopped)
* [Privilege Mode](#privilege-mode)
2016-08-12 06:50:12 +02:00
* [Port White List](#port-white-list)
* [Connection Pool](#connection-pool)
* [Rewriting the Host Header](#rewriting-the-host-header)
2016-07-11 17:35:34 +02:00
* [Development Plan](#development-plan)
* [Contributing](#contributing)
* [Contributors](#contributors)
2016-03-14 08:26:26 +01:00
2016-04-19 12:53:48 +02:00
## What can I do with frp?
2016-07-11 17:31:35 +02:00
* Expose any http and https service behind a NAT or firewall to the internet by a server with public IP address(Name-based Virtual Host Support).
2016-04-19 12:53:48 +02:00
* Expose any tcp service behind a NAT or firewall to the internet by a server with public IP address.
* Inspect all http requests/responses that are transmitted over the tunnel(future).
2016-03-14 08:26:26 +01:00
## Status
2016-08-13 16:32:11 +02:00
frp is under development and you can try it with latest release version. Master branch for releasing stable version when dev branch for developing.
2016-04-06 05:43:50 +02:00
2016-08-13 16:32:11 +02:00
**We may change any protocol and can't promise backward compatible. Please check the release log when upgrading.**
2016-03-14 08:26:26 +01:00
2016-07-11 17:31:35 +02:00
## Architecture
2016-03-14 08:26:26 +01:00
2016-07-11 17:31:35 +02:00
![architecture](/doc/pic/architecture.png)
2016-03-14 08:26:26 +01:00
2016-07-11 17:31:35 +02:00
## Example Usage
2016-03-14 08:26:26 +01:00
2016-08-12 07:44:25 +02:00
Firstly, download the latest programs from [Release](https://github.com/fatedier/frp/releases) page according to your os and arch.
2016-03-14 08:26:26 +01:00
2016-07-11 17:31:35 +02:00
Put **frps** and **frps.ini** to your server with public IP.
2016-03-14 08:26:26 +01:00
2016-07-11 17:31:35 +02:00
Put **frpc** and **frpc.ini** to your server in LAN.
### Communicate with your computer in LAN by SSH
1. Modify frps.ini, configure a reverse proxy named [ssh]:
```ini
# frps.ini
[common]
bind_port = 7000
[ssh]
listen_port = 6000
auth_token = 123
```
2. Start frps:
`./frps -c ./frps.ini`
3. Modify frpc.ini, set remote frps's server IP as x.x.x.x:
```ini
# frpc.ini
[common]
server_addr = x.x.x.x
server_port = 7000
auth_token = 123
[ssh]
local_port = 22
```
4. Start frpc:
`./frpc -c ./frpc.ini`
5. Connect to server in LAN by ssh assuming that username is test:
`ssh -oPort=6000 test@x.x.x.x`
2016-08-12 07:44:25 +02:00
### Visit your web service in LAN by custom domains
2016-07-11 17:31:35 +02:00
2016-08-12 07:44:25 +02:00
Sometimes we want to expose a local web service behind a NAT network to others for testing with your own domain name and unfortunately we can't resolve a domain name to a local ip.
2016-07-11 17:31:35 +02:00
Howerver, we can expose a http or https service using frp.
2016-08-12 07:44:25 +02:00
1. Modify frps.ini, configure a http reverse proxy named [web] and set http port as 8080, custom domain as `www.yourdomain.com`:
2016-07-11 17:31:35 +02:00
```ini
# frps.ini
[common]
bind_port = 7000
vhost_http_port = 8080
[web]
type = http
custom_domains = www.yourdomain.com
auth_token = 123
```
2. Start frps:
`./frps -c ./frps.ini`
2016-08-12 07:44:25 +02:00
3. Modify frpc.ini and set remote frps server's IP as x.x.x.x. The `local_port` is the port of your web service:
2016-07-11 17:31:35 +02:00
```ini
# frpc.ini
[common]
server_addr = x.x.x.x
server_port = 7000
auth_token = 123
[web]
type = http
local_port = 80
```
4. Start frpc:
`./frpc -c ./frpc.ini`
2016-08-12 07:44:25 +02:00
5. Resolve A record of `www.yourdomain.com` to IP `x.x.x.x` or CNAME record to your origin domain.
2016-07-11 17:31:35 +02:00
2016-08-12 07:44:25 +02:00
6. Now visit your local web service using url `http://www.yourdomain.com:8080`.
2016-07-11 17:31:35 +02:00
## Features
2016-08-12 06:50:12 +02:00
### Dashboard
Check frp's status and proxies's statistics information by Dashboard.
Configure a port for dashboard to enable this feature:
```ini
[common]
dashboard_port = 7500
2016-08-13 16:32:11 +02:00
# dashboard's username and password are both optionalif not set, default is admin.
dashboard_username = abc
dashboard_password = abc
2016-08-12 06:50:12 +02:00
```
2016-08-13 16:32:11 +02:00
Then visit `http://[server_addr]:7500` to see dashboard, default username and password are both `admin`.
2016-08-12 06:50:12 +02:00
![dashboard](/doc/pic/dashboard.png)
2016-07-11 17:31:35 +02:00
### Authentication
2016-08-12 07:44:25 +02:00
`auth_token` in frps.ini is configured for each proxy and check for authentication when frpc login in.
2016-07-11 17:31:35 +02:00
2016-08-12 07:44:25 +02:00
Client that want's to register must set a global `auth_token` equals to frps.ini.
2016-07-11 17:31:35 +02:00
2016-08-12 07:44:25 +02:00
Note that time duration bewtween frpc and frps mustn't exceed 15 minutes because timestamp is used for authentication.
2016-07-11 17:31:35 +02:00
### Encryption and Compression
2016-08-12 07:44:25 +02:00
Defalut value is false, you could decide if the proxy will use encryption or compression whether the type is:
2016-07-11 17:31:35 +02:00
```ini
# frpc.ini
[ssh]
type = tcp
listen_port = 6000
auth_token = 123
use_encryption = true
use_gzip = true
```
### Reload configures without frps stopped
2016-08-12 07:44:25 +02:00
If your want to add a new reverse proxy and avoid restarting frps, you can use this function:
2016-07-11 17:31:35 +02:00
1. `dashboard_port` should be set in frps.ini:
```ini
# frps.ini
[common]
bind_port = 7000
dashboard_port = 7500
```
2. Start frps:
`./frps -c ./frps.ini`
3. Modify frps.ini to add a new proxy [new_ssh]:
```ini
# frps.ini
[common]
bind_port = 7000
dashboard_port = 7500
[new_ssh]
listen_port = 6001
auth_token = 123
```
4. Execute `reload` command:
`./frps -c ./frps.ini --reload`
5. Start frpc and [new_ssh] is available now.
### Privilege Mode
Privilege mode is used for who don't want to do operations in frps everytime adding a new proxy.
2016-08-12 07:44:25 +02:00
All proxies's configurations are set in frpc.ini when privilege mode is enabled.
2016-07-11 17:31:35 +02:00
1. Enable privilege mode and set `privilege_token`.Client with the same `privilege_token` can create proxy automaticly:
```ini
# frps.ini
[common]
bind_port = 7000
privilege_mode = true
privilege_token = 1234
```
2. Start frps:
`./frps -c ./frps.ini`
3. Enable privilege mode for proxy [ssh]:
```ini
# frpc.ini
[common]
server_addr = x.x.x.x
server_port = 7000
privilege_token = 1234
[ssh]
privilege_mode = true
local_port = 22
remote_port = 6000
```
4. Start frpc:
`./frpc -c ./frpc.ini`
2016-08-12 07:44:25 +02:00
5. Connect to server in LAN by ssh assuming username is test:
2016-07-11 17:31:35 +02:00
`ssh -oPort=6000 test@x.x.x.x`
2016-08-12 06:50:12 +02:00
#### Port White List
`privilege_allow_ports` in frps.ini is used for preventing abuse of ports in privilege mode:
```ini
# frps.ini
[common]
privilege_mode = true
privilege_token = 1234
privilege_allow_ports = 2000-3000,3001,3003,4000-50000
```
2016-08-12 07:44:25 +02:00
`privilege_allow_ports` consists of a specific port or a range of ports divided by `,`.
2016-08-12 06:50:12 +02:00
### Connection Pool
By default, frps send message to frpc for create a new connection to backward service when getting an user request.If a proxy's connection pool is enabled, there will be a specified number of connections pre-established.
This feature is fit for a large number of short connections.
1. Configure the limit of pool count each proxy can use in frps.ini:
```ini
# frps.ini
[common]
max_pool_count = 50
```
2. Enable and specify the number of connection pool:
2016-08-13 16:32:11 +02:00
```ini
2016-08-12 06:50:12 +02:00
# frpc.ini
2016-08-13 16:32:11 +02:00
[ssh]
2016-08-12 06:50:12 +02:00
type = tcp
local_port = 22
pool_count = 10
```
### Rewriting the Host Header
When forwarding to a local port, frp does not modify the tunneled HTTP requests at all, they are copied to your server byte-for-byte as they are received. Some application servers use the Host header for determining which development site to display. For this reason, frp can rewrite your requests with a modified Host header. Use the `host_header_rewrite` switch to rewrite incoming HTTP requests.
```ini
# frpc.ini
2016-08-13 16:32:11 +02:00
[web]
2016-08-12 06:50:12 +02:00
privilege_mode = true
type = http
local_port = 80
custom_domains = test.yourdomain.com
host_header_rewrite = dev.yourdomain.com
```
If `host_header_rewrite` is specified, the Host header will be rewritten to match the hostname portion of the forwarding address.
2016-07-11 17:31:35 +02:00
## Development Plan
* Support udp protocol.
* Support wildcard domain name.
* Url router.
* Load balance to different service in frpc.
* Debug mode for frpc, prestent proxy status in terminal.
* Inspect all http requests/responses that are transmitted over the tunnel.
2016-08-12 06:50:12 +02:00
* Frpc can directly be a webserver for static files.
* Full control mode, dynamically modify frpc's configure with dashboard in frps.
2016-07-11 17:31:35 +02:00
* P2p communicate by make udp hole to penetrate NAT.
2016-03-14 09:18:29 +01:00
## Contributing
2016-06-03 12:15:01 +02:00
Interested in getting involved? We would like to help you!
2016-03-14 09:18:29 +01:00
2016-04-06 05:51:12 +02:00
* Take a look at our [issues list](https://github.com/fatedier/frp/issues) and consider submitting a patch
* If you have some wanderful ideas, send email to fatedier@gmail.com.
2016-04-06 05:43:50 +02:00
2016-06-03 12:15:01 +02:00
**Note: We prefer you to give your advise in [issues](https://github.com/fatedier/frp/issues), so others with a same question can search it quickly and we don't need to answer them repeatly.**
2016-04-06 05:43:50 +02:00
## Contributors
* [fatedier](https://github.com/fatedier)
* [Hurricanezwf](https://github.com/Hurricanezwf)
* [vashstorm](https://github.com/vashstorm)
2016-07-04 09:08:16 +02:00
* [maodanp](https://github.com/maodanp)