• [ Регистрация ]Открытая и бесплатная
  • Tg admin@ALPHV_Admin (обязательно подтверждение в ЛС форума)

Build your own VPN [sosistab protocol]

admin

#root
Администратор
Регистрация
20.01.2011
Сообщения
7,665
Розыгрыши
0
Реакции
135
This is a commercial VPN and can bypass the Iranian and Chinese firewalls
Для просмотра ссылки Войди или Зарегистрируйся
  • protocol
Для просмотра ссылки Войди или Зарегистрируйся
  • Server
Для просмотра ссылки Войди или Зарегистрируйся

It is written in Rust language
Ability to proxy IPV4 and IPV6 traffic

Because the RUST language is used, the performance requirements of the server are almost very low

You only need to prepare the server side for

1 core 512MB RAM KVM VPS with IPV4 public|IPV6

  • Server
one-liner wizard
Setting up the server (one-liner wizard)
If you have a server running Debian 10 the easiest way to setup Geph is to use the following one-liner:

(as root):

curl -L Для просмотра ссылки Войди или Зарегистрируйся | bash
(otherwise):

curl -L Для просмотра ссылки Войди или Зарегистрируйся | sudo bash
If the script successfully runs, then it will print a line that looks like:

[2021-08-19T22:34:12Z INFO geph4_exit::listen] listening on <PUBLIC_KEY>@<IP_ADDR>:8814
Note the <PUBLIC_KEY>@<IP_ADDR>:8814 string. You can now skip to the "Connecting to the server" section to connect to your server.

manual

/etc/geph4-exit.toml

# Where to listen for incoming connections. Change 8814 to whatever port you like
sosistab_listen = "[::]:8814"
# Where to store secret key
secret_key = "/root/geph4-exit.key"
geph4-exit --config /root/geph4-exit.toml

[2021-08-15T01:17:30Z INFO geph4_exit] read configuration file:
{ ... }
[2021-08-15T01:17:30Z INFO geph4_exit::listen] listening on <PUBLIC_KEY>@<IP_ADDR>:8814


  • Client
After installing rust-lang in windows/linux environment


cargo install --locked geph4-clientgeph4-client connect --override-connect <PUBLIC_KEY>@<IP_ADDRESS>:8814



It will open 2 local services
An http proxy 127.0.0.1:9910
A socks5 proxy 127.0.0.1:9909


If you are in LINUX

export http_proxy=http://127.0.0.1:9910export https_proxy=http://127.0.0.1:9910



or



export http_proxy=socks5://127.0.0.1:9909export https_proxy=socks5://127.0.0.1:9909


If you are in Windows


set HTTP_PROXY=http://127.0.0.1:9910set FTP_PROXY=%HTTP_PROXY%set HTTPS_PROXY=%HTTP_PROXY%


  • Safe
To prevent being scanned
Specify IP to open whitelist



iptables -A INPUT -s YOU PC IP/24 -p udp --dport 8814 -j ACCEPTiptables -A INPUT -s YOU PC IP/24 -p tcp --dport 8814 -j ACCEPT


Deny all IPs



iptables -A INPUT -p tcp --dport 8814 -j DROP iptables -A INPUT -p udp --dport 8814 -j DROP
 
Activity
So far there's no one here