mirror of
https://github.com/fatedier/frp.git
synced 2026-05-15 16:15:49 -06:00
[GH-ISSUE #518] Run server with bind_port = 443 and also handle HTTPS connections like ngrok does. #399
Labels
No labels
In Progress
WIP
WaitingForInfo
bug
doc
duplicate
easy
enhancement
future
help wanted
invalid
lifecycle/stale
need-issue-template
need-usage-help
no plan
proposal
pull-request
question
todo
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/frp#399
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @keyoti on GitHub (Nov 10, 2017).
Original GitHub issue: https://github.com/fatedier/frp/issues/518
I apologise if I am wrong in any of my understanding below.
Some firewalls/proxy setups restrict outgoing connections to limited ports (eg 80 and 443).
FRP seems to use bind_port = 7000 for handling control connections coming in from the client.
ngrok seems to be able to handle client control connections on port 443 and also HTTPS connections from browsers. It does this with
It differentiates between control connections and proxy connections in the switch.
Do you believe it would be possible to do the same in FRP? I'm willing to try to do it, but it'd be great to get some insight on the feasibility and also where to start.
@fatedier commented on GitHub (Nov 12, 2017):
I'm not sure if the code you paste from ngrok shows that it can handle client control connections and HTTPS connections from browsers in the same port? msg.Auth and msg.RegProxy are messages got from ngrok client, there is no case for https connections.
But i think it's really a good idea for some special users. It's welcome for you to contribute code for this feature.
I have some ideas:
@fatedier commented on GitHub (May 6, 2018):
It will be supported in next version v0.19.0.
@fatedier commented on GitHub (May 14, 2018):
v0.19.0 is released, so close this issue.