Access your computer in a LAN network via SSH If you are using antivirus, then you may need to whitelist/exclude frpc in your antivirus settings to avoid accidental quarantine/deletion. Antiviruses sometimes flag reverse proxies due to their ability to bypass firewall port restrictions. This is due to frp being a networking tool capable of creating reverse proxies. Some antiviruses improperly mark frpc as malware and delete it. Next, place the frps binary and server configuration file on Server A, which has a public IP address.įinally, place the frpc binary and client configuration file on Server B, which is located on a LAN that cannot be directly accessed from the public internet. To begin, download the latest program for your operating system and architecture from the Release page. We sincerely appreciate your support for frp. While we may carry out some optimizations in the v1 version, ensuring compatibility remains a challenging issue that requires a considerable amount of effort to address. It is unrealistic to expect a non-profit open-source project maintained by a few individuals to meet everyone's needs.įinally, we acknowledge that the current design of modules such as configuration management, permission verification, certificate management, and API management is not modern enough. This approach is far from flexible and convenient, and real-world demands vary greatly. However, it relies on a simple HTTP protocol and requires users to start independent processes and manage them on their own. In frp v1, we introduced the concept of server plugins, which implemented some basic extensibility. In K8s, we can customize development according to enterprise needs, utilizing features such as CRD, controller mode, webhook, CSI, and CNI. In addition, I envision frp itself becoming a highly extensible system and platform, similar to how we can provide a range of extension capabilities based on K8s. Furthermore, we will maintain efficient development and iteration capabilities. Building upon this highly scalable core, we aim to implement all the capabilities of frp v1 while also addressing the functionalities that were previously unachievable or difficult to implement in an elegant manner. This proxy itself is highly scalable, not only capable of implementing the functionality of intranet penetration but also applicable to various other domains. Its core is a modernized four-layer and seven-layer proxy, similar to envoy. The concept behind v2 is based on my years of experience and reflection in the cloud-native domain, particularly in K8s and ServiceMesh. Given this situation, we will continue to optimize and iterate on the current version until we have more free time to proceed with the major version overhaul. I can only work on its development during fragmented time periods, and the constant interruptions disrupt productivity significantly. The complexity and difficulty of the v2 version are much higher than anticipated. We will transition from version 0 to version 1 at the appropriate time and will only accept bug fixes and improvements, rather than big feature requests. However, please note that it will not be compatible with version 1. We are currently working on version 2 and attempting to perform some code refactoring and improvements. You can try the latest release version in the master branch, or use the dev branch to access the version currently in development.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |