mirror of
https://github.com/fatedier/frp.git
synced 2026-05-15 08:05:49 -06:00
[GH-ISSUE #5131] transport.tls.force = false not working as expected #4012
Labels
No labels
In Progress
WIP
WaitingForInfo
bug
doc
duplicate
easy
enhancement
future
help wanted
invalid
lifecycle/stale
need-issue-template
need-usage-help
no plan
proposal
pull-request
question
todo
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/frp#4012
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @Simon-Blandford-Onepoint on GitHub (Jan 16, 2026).
Original GitHub issue: https://github.com/fatedier/frp/issues/5131
Bug Description
When transport.tls.force = false in frps.toml non-tls connection attempts are not accepted. TLS connections work as expected.
Also, the expected error message, "non-TLS connection received on a TlsOnly server", is not reported on the server when transport.tls.force = true and a non-tls connection is attempted.
frpc Version
0.66
frps Version
0.66
System Architecture
linux/amd64
Configurations
FRPS
FRPC case with TLS
FRPC Without TLS
Logs
frpc log with TLS enabled on client and on server with force=false...
frps log with TLS enabled on client and on server with force=false...
frpc log with no TLS set up on client and TLS set up on server with force=false...
frps log with no TLS set up on client and TLS set up on server with force=false...
Steps to reproduce
Affected area
@fatedier commented on GitHub (Jan 20, 2026):
https://gofrp.org/en/docs/features/common/network/network-tls/
Plaintext client compatibility is intended as a temporary migration path only; we may remove plaintext support entirely in the future. If you rely on mixed TLS/plaintext, please treat it as transitional and plan to move all clients to TLS.
@Simon-Blandford-Onepoint commented on GitHub (Jan 21, 2026):
Please don't remove the non-encrypted option. If there are already a number of SSH tunnels set up then (1) it is already encrypted and doesn't need more encryption and (2) the change is disruptive for anyone that have already set up a lot of clients.
Update: I have just understood how this encryption actually works and didn't even realise I was already using it. Please ignore above comment. It's not so bad after all (since it is transparent and doesn't add complexity)!
https://gofrp.org/en/docs/features/common/network/network-tls/
@github-actions[bot] commented on GitHub (Feb 5, 2026):
Issues go stale after 14d of inactivity. Stale issues rot after an additional 3d of inactivity and eventually close.