We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
已知修改“ExecStart=/usr/local/bin/trojan web -p 2000”可以自定义控制台web的监听端口。 那请问如何修改控制台web的监听地址,将其设定为内网地址(如127.0.0.1:2000)。 因为我给控制台web做了域名访问并且加到了本机的一套WAF的防护中,但又因直接暴露了控制台web监听地址与端口,导致能直接通过ip+端口访问bypass WAF的防护。
The text was updated successfully, but these errors were encountered:
Sorry, something went wrong.
补充项目相关的情况: 1.避免端口公网暴露我目前解决方法是防火墙限制公网接入保留内网。但还是希望能在根本上解决 2.为了共用443,我修改了trojan监听端口443->127.0.0.1:4434,并通过nginx sni进行转发443->127.0.0.1:4434。但这样子面板的分享订阅链接仍同步为4434,只能复制下来修改成443。 3.面板貌似传输文件时未正确地指定 Content-Type 响应头,我中间件在添加:add_header X-Content-Type-Options "nosniff" always;配置生效时访问会直接显示为网站源码。 4.面板登录的密码在一段时间后会失效,需要手动重置。
No branches or pull requests
已知修改“ExecStart=/usr/local/bin/trojan web -p 2000”可以自定义控制台web的监听端口。
那请问如何修改控制台web的监听地址,将其设定为内网地址(如127.0.0.1:2000)。
因为我给控制台web做了域名访问并且加到了本机的一套WAF的防护中,但又因直接暴露了控制台web监听地址与端口,导致能直接通过ip+端口访问bypass WAF的防护。
The text was updated successfully, but these errors were encountered: