|
|
@@ -50,7 +50,10 @@ prefer-ip = "prefer-ipv6"
|
|
50
|
50
|
|
|
51
|
51
|
# FakeTLS uses domain fronting protection. So it needs to know a port to
|
|
52
|
52
|
# access.
|
|
53
|
|
-domain-fronting-port = 443
|
|
|
53
|
+#
|
|
|
54
|
+# Deprecated: use [domain-fronting] configuration block. If relevant option
|
|
|
55
|
+# is defined there, this one would be ignored.
|
|
|
56
|
+# domain-fronting-port = 443
|
|
54
|
57
|
|
|
55
|
58
|
# By default, mtg resolves the fronting hostname (from the secret) via DNS
|
|
56
|
59
|
# to establish a TCP connection. If DNS resolution of that hostname is blocked,
|
|
|
@@ -58,11 +61,17 @@ domain-fronting-port = 443
|
|
58
|
61
|
# used for SNI in the TLS handshake.
|
|
59
|
62
|
#
|
|
60
|
63
|
# default value is not set (DNS resolution is used).
|
|
61
|
|
-# domain-fronting-ip = "142.250.185.112"
|
|
|
64
|
+#
|
|
|
65
|
+# Deprecated: use [domain-fronting] configuration block. If relevant option
|
|
|
66
|
+# is defined there, this one would be ignored.
|
|
|
67
|
+# domain-fronting-ip = "10.0.0.10"
|
|
62
|
68
|
|
|
63
|
69
|
# This makes a communication between both fronting website and mtg to use
|
|
64
|
70
|
# proxy protocol.
|
|
65
|
|
-domain-fronting-proxy-protocol = false
|
|
|
71
|
+#
|
|
|
72
|
+# Deprecated: use [domain-fronting] configuration block. If relevant option
|
|
|
73
|
+# is defined there, this one would be ignored.
|
|
|
74
|
+# domain-fronting-proxy-protocol = false
|
|
66
|
75
|
|
|
67
|
76
|
# FakeTLS can compare timestamps to prevent probes. Each message has
|
|
68
|
77
|
# encrypted timestamp. So, mtg can compare this timestamp and decide if
|
|
|
@@ -85,6 +94,27 @@ tolerate-time-skewness = "5s"
|
|
85
|
94
|
# Otherwise, chose a new DC.
|
|
86
|
95
|
allow-fallback-on-unknown-dc = false
|
|
87
|
96
|
|
|
|
97
|
+# This section is relevant to communication with fronting domain. Usually
|
|
|
98
|
+# you do not need to setup anything here but there are plenty of cases, especially
|
|
|
99
|
+# if you put mtg behind load balancer, when some specific configuration is
|
|
|
100
|
+# required.
|
|
|
101
|
+[domain-fronting]
|
|
|
102
|
+# By default, mtg resolves the fronting hostname (from the secret) via DNS
|
|
|
103
|
+# to establish a TCP connection. If DNS resolution of that hostname is blocked,
|
|
|
104
|
+# you can specify an IP address to connect to directly. The hostname is still
|
|
|
105
|
+# used for SNI in the TLS handshake.
|
|
|
106
|
+#
|
|
|
107
|
+# default value is not set (DNS resolution is used).
|
|
|
108
|
+# ip = "10.10.10.11"
|
|
|
109
|
+
|
|
|
110
|
+# FakeTLS uses domain fronting protection. So it needs to know a port to
|
|
|
111
|
+# access. Default value is 443
|
|
|
112
|
+# port = 443
|
|
|
113
|
+
|
|
|
114
|
+# This makes a communication between both fronting website and mtg to use
|
|
|
115
|
+# proxy protocol.
|
|
|
116
|
+# proxy-protocol = false
|
|
|
117
|
+
|
|
88
|
118
|
# network defines different network-related settings
|
|
89
|
119
|
[network]
|
|
90
|
120
|
# please be aware that mtg needs to do some external requests. For
|