📚 Wiki Index
Trojan
Trojan is a secure proxy protocol designed to bypass internet censorship by mimicking legitimate HTTPS traffic. It uses TLS encryption to disguise proxy traffic as normal website traffic, making it difficult to detect and block.
Features of Trojan
- HTTPS Mimicry: Traffic appears as normal HTTPS connections to popular websites.
- TLS Encryption: Uses standard TLS for secure communication.
- Password Authentication: Simple password-based authentication mechanism.
- Forward Secrecy: Supports perfect forward secrecy for enhanced security.
- Multi-Platform: Available on Windows, macOS, Linux, Android, and iOS.
Trojan and Clash
Clash for Windows supports the Trojan protocol and can import subscription links containing Trojan nodes. Configuring Trojan requires the following parameters:
server: Server addressport: Server portpassword: Authentication passwordsni: Server Name Indication (optional)alpn: Application-Layer Protocol Negotiation (optional)
