A development-focused, clean-room reverse-tunnel core with high config compatibility for the original script output.
go build -o bin/backhaul_freemium ./cmd/backhaul./bin/backhaul_freemium -c /path/to/config.toml
./bin/backhaul_freemium -vchmod +x scripts/backhaul_freemium.sh
./scripts/backhaul_freemium.shThe script creates config files under /root/backhaul-core/configs and systemd services named backhaul_freemium-<config_name>.service.
tcp: supportedslipstream(slip/sstreamalias): supported (custom handshake + framed stream)slipstreammux(slipmux/sstreammuxalias): supported (slipstream + mux)rawsocket(raw/socketrawalias): supportedanytls: supported (requirestls_certandtls_keyon server)ws/wss: supported (RFC6455 handshake + framing)tcpmux/xtcpmux: supported (internal stream multiplexer)wsmux/wssmux/xwsmux: supported (ws + mux)http/https: supported (HTTP CONNECT control channel, optional TLS)httpmux/httpsmux: supported (HTTP CONNECT + mux, optional TLS)kcp/kcpmux/xkcpmux: supported (KCP reliable UDP, optional mux)grpc/grpcs: supported (gRPC bidirectional control stream, optional TLS)grpcmux/grpcsmux: supported (gRPC + mux, optional TLS)udp/udpmux: supported (native UDP control channel, with optional mux)dns/dnsmux: supported (DNS-style UDP mode, default port 53 if omitted)tun: accepted and mapped to mux runtime path for compatibility- if
[tun].encapsulation = "slipstream"=> runtime usesslipstreammux
- if
443443=5000443-600443-600:5201
[listener][dialer][transport][ports][security][tls][logging][mux][tun][ipx][tuning][accept_udp]
tokenauth is active by default (your_tokenunless overridden).accept_udp = trueenables UDP relay through control channels.ipx/tunadvanced kernel-level behavior is compatibility-mapped and intended for iterative hardening.
- build binary:
go build -o bin/backhaul_freemium.exe ./cmd/backhaul