|
|
před 4 dny | |
|---|---|---|
| .. | ||
| www | před 1 měsícem | |
| .gitignore | před 5 dny | |
| Caddyfile | před 1 měsícem | |
| README.md | před 5 dny | |
| docker-compose.yml | před 4 dny | |
| haproxy.cfg | před 2 týdny | |
| mtg-config.toml.example | před 5 dny | |
A turnkey docker compose setup that puts an SNI-aware TCP router
(HAProxy) in front of mtg and a real web server (Caddy with
automatic HTTPS).
Modern DPI systems actively probe suspected proxies. If the server closes the connection or returns something unexpected, the IP gets flagged. With this setup:
Because your domain’s DNS points to this server, the SNI/IP match is natural and passive DPI has nothing to flag.
# 1. Point your domain's DNS A/AAAA record to this server's IP.
# 2. Generate an mtg secret:
docker run --rm nineseconds/mtg:2 generate-secret --hex YOUR_DOMAIN
# 3. Configure:
# - .env (or export) → DOMAIN=your.domain # used by HAProxy + Caddy
# - render mtg-config.toml from the tracked template
# (the rendered file is gitignored — secret stays out of git):
export MTG_SECRET=... # paste the hex secret from step 2
envsubst < mtg-config.toml.example > mtg-config.toml
# (Or `cp mtg-config.toml.example mtg-config.toml` and edit ${MTG_SECRET}
# by hand if you don't have envsubst.)
# 4. (Optional) put your site content into www/
# 5. Start:
docker compose up -d
# 6. Verify:
# - Open https://YOUR_DOMAIN in a browser → you should see the web page
# - Configure Telegram with the proxy link from:
docker compose exec mtg mtg access /config/config.toml
HAProxy forwards TCP connections to mtg and Caddy with a PROXY protocol v2 header so both backends see the real client IP instead of HAProxy’s container address. Caddy also receives PROXY v2 from mtg on the fronting path (see “Fronting loop” below), so all four pieces below must stay in sync:
haproxy.cfg — send-proxy-v2 on the mtg and web backend server linesmtg-config.toml — proxy-protocol-listener = true (HAProxy → mtg)mtg-config.toml — [domain-fronting].proxy-protocol = true (mtg → Caddy on fronting)Caddyfile — listener_wrappers { proxy_protocol { ... } tls } on :8443If you disable one, disable all four, otherwise the backend will fail to parse the connection.
[domain-fronting] is set explicitly)When mtg sees TLS that isn’t valid Telegram (a probe or a browser
hitting the domain on :443), it forwards that connection to a real
web server — “domain fronting”. By default mtg uses the secret’s
hostname as the fronting target and resolves it via DNS, which in
this setup points back to this server: the fronting dial lands on
HAProxy, SNI matches the secret, HAProxy routes the connection back
to mtg → loop.
The trigger is DNS, not name equality: any time the secret’s hostname resolves to this host, the loop reproduces. In an SNI-router deployment the secret’s hostname has to point here for clients to reach mtg in the first place, so the loop is the default state unless mtg is steered away from HAProxy.
mtg-config.toml therefore pins the fronting target to the Caddy
container directly:
[domain-fronting]
host = "web"
port = 8443
proxy-protocol = true
host = "web" resolves through compose-network DNS to the web
service (Caddy), bypassing HAProxy. proxy-protocol = true matches
Caddy’s :8443 listener wrapper so the real client IP still
propagates to Caddy’s logs.
Requires mtg ≥ 2.4 — hostname acceptance for the fronting target was added in #480.
HAProxy passes /.well-known/acme-challenge/ requests on :80 to
Caddy so that HTTP-01 validation works out of the box. Make sure your
domain’s DNS A/AAAA record points to this server before starting.
┌──────────────────┐
:443 ──────>│ HAProxy │
│ (TCP, SNI peek) │
└──┬───────────┬───┘
SNI match │ │ default
v v
┌─────────┐ ┌─────────┐
│ mtg │ │ Caddy │
│ :3128 │ │ :8443 │
│ FakeTLS │ │ real TLS│
└─────────┘ └─────────┘
| File | Purpose |
|---|---|
docker-compose.yml |
Service definitions |
haproxy.cfg |
SNI routing rules (reads $DOMAIN from the environment) |
mtg-config.toml.example |
mtg proxy config template — render with envsubst or copy + edit |
mtg-config.toml |
Rendered mtg proxy config (gitignored, contains your secret) |
Caddyfile |
Web server config (auto-HTTPS) |
www/ |
Static site content served by Caddy |