.TH TROJAN 1 "June 2020" "version 1.16.0" .SH NAME trojan \- an unidentifiable mechanism that helps you bypass GFW .SH SYNOPSIS .B trojan [\fB\-htv\fR] [\fB\-l\fR \fILOG\fR] [\fB\-k\fR \fIKEYLOG\fR] [[\fB\-c\fR] \fICONFIG\fR] .SH DESCRIPTION .B trojan is an unidentifiable mechanism that helps you bypass GFW. It will load the config file located in .I CONFIG and start either a proxy client or a proxy server. .SH OPTIONS .TP .BR \-c, " " \-\-config=\fICONFIG\fR Set the config file to be loaded. Default is \fI/etc/trojan/config.json\fR. .TP .BR \-h, " " \-\-help Print help message. .TP .BR \-k, " " \-\-keylog=\fIKEYLOG\fR Set the keylog file to be written. .TP .BR \-l, " " \-\-log=\fILOG\fR Set the log file to be written. If not specified, the log will be outputted to stderr. .TP .BR \-t, " " \-\-test Test the config file, without starting a server. .TP .BR \-v, " " \-\-version Print version and build info. .SH FILES .TP .IR /etc/trojan/config.json The default config file. See for details. .SH SEE ALSO Full documentation at: