Trojan

Trojan is a secure proxy protocol designed to bypass internet censorship by mimicking legitimate HTTPS traffic. It uses TLS encryption to disguise proxy traffic as normal website traffic, making it difficult to detect and block.

Features of Trojan

  • HTTPS Mimicry: Traffic appears as normal HTTPS connections to popular websites.
  • TLS Encryption: Uses standard TLS for secure communication.
  • Password Authentication: Simple password-based authentication mechanism.
  • Forward Secrecy: Supports perfect forward secrecy for enhanced security.
  • Multi-Platform: Available on Windows, macOS, Linux, Android, and iOS.

Trojan and Clash

Clash for Windows supports the Trojan protocol and can import subscription links containing Trojan nodes. Configuring Trojan requires the following parameters:

  • server: Server address
  • port: Server port
  • password: Authentication password
  • sni: Server Name Indication (optional)
  • alpn: Application-Layer Protocol Negotiation (optional)