diff --git a/How_To_Choose.jpg b/How_To_Choose.jpg
new file mode 100644
index 0000000..ff5a6e6
Binary files /dev/null and b/How_To_Choose.jpg differ
diff --git a/README.md b/README.md
index 39db056..2bb9861 100644
--- a/README.md
+++ b/README.md
@@ -11,6 +11,13 @@
如果你在配置过程中遇到问题,请再看一遍文档,或是在Google搜索以求自己解决问题。当你确认你的问题无法独立解决时,你可以在v2ray的telegram群组里求助,或是在v2ray官方项目中提交issue。
遇事不决,请RTFM/STFW。
+
+**如何选取适合自己的配置**:
+![](How_To_Choose.jpg)
+附加说明:
+尽管websocket+TLS+Web可能称得上是现阶段最好的方案,但**绝对**不是推荐新手一上来就尝试的方案,更不是V2Ray唯一的用法。
+同时,你应当了解,每个地区的网络状况不同(主要指对不同协议的QoS程度),你可以将所有配置都尝试一遍来寻找最适合自己的,尽量少问、最好不问"为什么我的V2Ray这么慢?"这样的问题。
+
玩的愉快。
感谢Project V的所有开发人员,以及v2ray.fun的作者雨落无声。
diff --git a/http/config_server.json b/http/config_server.json
index 4ee60de..878e2e5 100644
--- a/http/config_server.json
+++ b/http/config_server.json
@@ -63,8 +63,7 @@
"reason": "OK",
"version": "1.1"
}
- },
- "connectionReuse": true
+ }
},
"tlsSettings": {},
"security": ""
diff --git a/websocket+Caddy+TLS(use header)/Caddyfile b/websocket+Caddy+TLS(use header)/Caddyfile
new file mode 100644
index 0000000..a66e5ff
--- /dev/null
+++ b/websocket+Caddy+TLS(use header)/Caddyfile
@@ -0,0 +1,17 @@
+https://example.domain * {
+ gzip
+ tls kiri_so@outlook.com
+ proxy / https://www.baidu.com
+ log / stdout "{request}"
+
+ rewrite {
+ if {host} is google.com
+ to /test
+ }
+
+ proxy /test localhost:1234 {
+ websocket
+ without /test
+ }
+}
+
diff --git a/websocket+Caddy+TLS(use header)/config_client.json b/websocket+Caddy+TLS(use header)/config_client.json
new file mode 100755
index 0000000..63ae65a
--- /dev/null
+++ b/websocket+Caddy+TLS(use header)/config_client.json
@@ -0,0 +1,105 @@
+{
+ "outbound": {
+ "streamSettings": {
+ "network": "ws",
+ "kcpSettings": null,
+ "wsSettings": {
+ "headers": {
+ "host": "google.com"
+ },
+ "path": "/"
+ },
+ "tcpSettings": null,
+ "tlsSettings": {},
+ "security": "tls"
+ },
+ "tag": "agentout",
+ "protocol": "vmess",
+ "mux": {
+ "enabled": true,
+ "concurrency": 8
+ },
+ "settings": {
+ "vnext": [{
+ "users": [{
+ "alterId": 100,
+ "security": "aes-128-gcm",
+ "id": "e2b39869-7e9e-411b-a561-00904419bed9"
+ }],
+ "port": 443,
+ "address": "example.domain"
+ }]
+ }
+ },
+ "log": {
+ "access": "",
+ "loglevel": "info",
+ "error": ""
+ },
+ "outboundDetour": [{
+ "tag": "direct",
+ "protocol": "freedom",
+ "settings": {
+ "response": null
+ }
+ },
+ {
+ "tag": "blockout",
+ "protocol": "blackhole",
+ "settings": {
+ "response": {
+ "type": "http"
+ }
+ }
+ }
+ ],
+ "inbound": {
+ "streamSettings": null,
+ "settings": {
+ "ip": "127.0.0.1",
+ "udp": true,
+ "clients": null,
+ "auth": "noauth"
+ },
+ "protocol": "socks",
+ "port": 10086,
+ "listen": "0.0.0.0"
+ },
+ "inboundDetour": null,
+ "routing": {
+ "settings": {
+ "rules": [{
+ "ip": [
+ "0.0.0.0/8",
+ "10.0.0.0/8",
+ "100.64.0.0/10",
+ "127.0.0.0/8",
+ "169.254.0.0/16",
+ "172.16.0.0/12",
+ "192.0.0.0/24",
+ "192.0.2.0/24",
+ "192.168.0.0/16",
+ "198.18.0.0/15",
+ "198.51.100.0/24",
+ "203.0.113.0/24",
+ "::1/128",
+ "fc00::/7",
+ "fe80::/10"
+ ],
+ "domain": null,
+ "type": "field",
+ "port": null,
+ "outboundTag": "direct"
+ }],
+ "domainStrategy": "IPIfNonMatch"
+ },
+ "strategy": "rules"
+ },
+ "dns": {
+ "servers": [
+ "8.8.8.8",
+ "8.8.4.4",
+ "localhost"
+ ]
+ }
+}
diff --git a/websocket+Caddy+TLS(use header)/config_server.json b/websocket+Caddy+TLS(use header)/config_server.json
new file mode 100644
index 0000000..79f127d
--- /dev/null
+++ b/websocket+Caddy+TLS(use header)/config_server.json
@@ -0,0 +1,84 @@
+{
+ "outbound": {
+ "streamSettings": null,
+ "tag": null,
+ "protocol": "freedom",
+ "mux": null,
+ "settings": null
+ },
+ "log": {
+ "access": "/var/log/v2ray/access.log",
+ "loglevel": "info",
+ "error": "/var/log/v2ray/error.log"
+ },
+ "outboundDetour": [{
+ "tag": "direct",
+ "protocol": "freedom",
+ "settings": null
+ },
+ {
+ "tag": "blocked",
+ "protocol": "blackhole",
+ "settings": null
+ }
+ ],
+ "inbound": {
+ "streamSettings": {
+ "network": "ws",
+ "kcpSettings": null,
+ "wsSettings": {
+ "headers": {
+ "host": "google.com"
+ },
+ "path": "/"
+ },
+ "tcpSettings": null,
+ "tlsSettings": {},
+ "security": ""
+ },
+ "settings": {
+ "ip": null,
+ "udp": true,
+ "clients": [{
+ "alterId": 100,
+ "security": "aes-128-gcm",
+ "id": "e2b39869-7e9e-411b-a561-00904419bed9"
+ }],
+ "auth": null
+ },
+ "protocol": "vmess",
+ "port": 1234,
+ "listen": null
+ },
+ "inboundDetour": null,
+ "routing": {
+ "settings": {
+ "rules": [{
+ "ip": [
+ "0.0.0.0/8",
+ "10.0.0.0/8",
+ "100.64.0.0/10",
+ "127.0.0.0/8",
+ "169.254.0.0/16",
+ "172.16.0.0/12",
+ "192.0.0.0/24",
+ "192.0.2.0/24",
+ "192.168.0.0/16",
+ "198.18.0.0/15",
+ "198.51.100.0/24",
+ "203.0.113.0/24",
+ "::1/128",
+ "fc00::/7",
+ "fe80::/10"
+ ],
+ "domain": null,
+ "type": "field",
+ "port": null,
+ "outboundTag": "blocked"
+ }],
+ "domainStrategy": null
+ },
+ "strategy": "rules"
+ },
+ "dns": null
+}
diff --git a/websocket+Caddy+TLS/Caddyfile b/websocket+Caddy+TLS(use path)/Caddyfile
similarity index 100%
rename from websocket+Caddy+TLS/Caddyfile
rename to websocket+Caddy+TLS(use path)/Caddyfile
diff --git a/websocket+Caddy+TLS/config_client.json b/websocket+Caddy+TLS(use path)/config_client.json
similarity index 100%
rename from websocket+Caddy+TLS/config_client.json
rename to websocket+Caddy+TLS(use path)/config_client.json
diff --git a/websocket+Caddy+TLS/config_server.json b/websocket+Caddy+TLS(use path)/config_server.json
similarity index 96%
rename from websocket+Caddy+TLS/config_server.json
rename to websocket+Caddy+TLS(use path)/config_server.json
index b643120..2d94aad 100644
--- a/websocket+Caddy+TLS/config_server.json
+++ b/websocket+Caddy+TLS(use path)/config_server.json
@@ -30,8 +30,7 @@
"headers": {
"host": "example.domain"
},
- "path": "/test",
- "connectionReuse": true
+ "path": "/test"
},
"tcpSettings": null,
"tlsSettings": {},
diff --git a/websocket+Nginx+TLS/Nginx.config b/websocket+Nginx+TLS/Nginx.config
new file mode 100644
index 0000000..2341ed0
--- /dev/null
+++ b/websocket+Nginx+TLS/Nginx.config
@@ -0,0 +1,119 @@
+##
+# You should look at the following URL's in order to grasp a solid understanding
+# of Nginx configuration files in order to fully unleash the power of Nginx.
+# https://www.nginx.com/resources/wiki/start/
+# https://www.nginx.com/resources/wiki/start/topics/tutorials/config_pitfalls/
+# https://wiki.debian.org/Nginx/DirectoryStructure
+#
+# In most cases, administrators will remove this file from sites-enabled/ and
+# leave it as reference inside of sites-available where it will continue to be
+# updated by the nginx packaging team.
+#
+# This file will automatically load configuration files provided by other
+# applications, such as Drupal or Wordpress. These applications will be made
+# available underneath a path with that package name, such as /drupal8.
+#
+# Please see /usr/share/doc/nginx-doc/examples/ for more detailed examples.
+##
+
+# Default server configuration
+#
+server {
+ #listen 80 default_server;
+ listen 127.0.0.1:80;
+ #listen [::]:80 default_server;
+
+ # SSL configuration
+ #
+ # listen 443 ssl default_server;
+ # listen [::]:443 ssl default_server;
+ #
+ # Note: You should disable gzip for SSL traffic.
+ # See: https://bugs.debian.org/773332
+ #
+ # Read up on ssl_ciphers to ensure a secure configuration.
+ # See: https://bugs.debian.org/765782
+ #
+ # Self signed certs generated by the ssl-cert package
+ # Don't use them in a production server!
+ #
+ # include snippets/snakeoil.conf;
+
+ server_name domain.Name;
+ return 301 https://$server_name/$request_uri;
+}
+
+
+server {
+ #listen 443 ssl http2;
+ #listen [::]:443 ssl;
+ listen 127.0.0.1:443 ssl;
+ ssl on;
+ ssl_certificate PATH;
+ ssl_certificate_key PATH;
+ #openssl dhparam out dhparam.pem 2048
+ #openssl dhparam out dhparam.pem 4096
+ ssl_dhparam /home/acme/data/dhparam.pem;
+ ssl_session_cache shared:SSL:10m;
+ ssl_session_timeout 5m;
+ ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
+ ssl_ciphers "ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:CAMELLIA:DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA"; #屏蔽不安全的加密方式
+
+
+ root /var/www/html;
+
+ # Add index.php to the list if you are using PHP
+ index index.html index.htm index.nginx-debian.html index.php tail.html ;
+
+ server_name _;
+
+
+ location /PATH/ {
+ proxy_http_version 1.1;
+ proxy_set_header Upgrade $http_upgrade;
+ proxy_set_header Connection "upgrade";
+ proxy_set_header Host $http_host;
+
+ if ($http_host = "domain.Name" ) {
+ proxy_pass http://127.0.0.1:10086;
+ }
+ }
+
+ # pass PHP scripts to FastCGI server
+ #
+ location ~ \.php$ {
+ include snippets/fastcgi-php.conf;
+ #
+ # # With php-fpm (or other unix sockets):
+ fastcgi_pass unix:/var/run/php/php7.0-fpm.sock;
+ # # With php-cgi (or other tcp sockets):
+ # fastcgi_pass 127.0.0.1:9000;
+ }
+
+ # deny access to .htaccess files, if Apache's document root
+ # concurs with nginx's one
+ #
+ #location ~ /\.ht {
+ # deny all;
+ #}
+}
+
+
+# Virtual Host configuration for example.com
+#
+# You can move that to a different file under sites-available/ and symlink that
+# to sites-enabled/ to enable it.
+#
+#server {
+# listen 80;
+# listen [::]:80;
+#
+# server_name example.com;
+#
+# root /var/www/example.com;
+# index index.html;
+#
+# location / {
+# try_files $uri $uri/ =404;
+# }
+#}
diff --git a/websocket+Nginx+TLS/config_client.json b/websocket+Nginx+TLS/config_client.json
new file mode 100644
index 0000000..d4952ca
--- /dev/null
+++ b/websocket+Nginx+TLS/config_client.json
@@ -0,0 +1,143 @@
+{
+ "outbound": {
+ "protocol": "freedom",
+ "settings": { },
+ "tag": "direct"
+ },
+ "inboundDetour": [
+ {
+ "domainOverride": [
+ "http",
+ "tls"
+ ],
+ "port": 1086,
+ "listen": "127.0.0.1",
+ "protocol": "socks",
+ "settings": {
+ "auth": "noauth",
+ "timeout": 300,
+ "udp": true
+ }
+ }
+ ],
+ "outboundDetour": [
+ {
+ "mux": {
+ "concurrency": 6,
+ "enabled": true
+ },
+ "protocol": "vmess",
+ "settings": {
+ "vnext": [
+ {
+ "users": [
+ {
+ "id": "97c0ec9c-dc4e-11e7-9296-cec278b6b50a",
+ "alterId": 0,
+ "security": "aes-128-cfb"
+ }
+ ],
+ "address": "domain.Name",
+ "port": 443
+ }
+ ]
+ },
+ "streamSettings": {
+ "tlsSettings": {
+ "allowInsecure": false
+ },
+ "wsSettings": {
+ "headers": {
+ "Host": "domain.Name"
+ },
+ "path": "/PATH/"
+ },
+ "network": "ws",
+ "security": "tls"
+ },
+ "tag": "proxy"
+ },
+ {
+ "protocol": "blackhole",
+ "settings": { },
+ "tag": "block"
+ }
+ ],
+ "dns": {
+ "servers": [
+ "8.8.8.8",
+ "8.8.4.4"
+ ]
+ },
+ "inbound": {
+ "port": 1087,
+ "listen": "127.0.0.1",
+ "protocol": "http",
+ "settings": {
+ "timeout": 300
+ }
+ },
+ "routing": {
+ "settings": {
+ "rules": [
+ {
+ "type": "field",
+ "ip": [
+ "geoip:cn"
+ ],
+ "outboundTag": "direct"
+ },
+ {
+ "type": "field",
+ "domain": [
+ "geosite:cn"
+ ],
+ "outboundTag": "direct"
+ },
+ {
+ "type": "field",
+ "domain": [
+ "google",
+ "facebook",
+ "youtube",
+ "twitter",
+ "instagram",
+ "gmail",
+ "domain:twimg.com",
+ "domain:t.co"
+ ],
+ "outboundTag": "proxy"
+ },
+ {
+ "type": "field",
+ "ip": [
+ "8.8.8.8/32",
+ "8.8.4.4/32",
+ "91.108.56.0/22",
+ "91.108.4.0/22",
+ "109.239.140.0/24",
+ "149.154.164.0/22",
+ "91.108.56.0/23",
+ "67.198.55.0/24",
+ "149.154.168.0/22",
+ "149.154.172.0/22"
+ ],
+ "outboundTag": "proxy"
+ },
+ {
+ "type": "field",
+ "ip": [
+ "192.168.0.0/16",
+ "10.0.0.0/8",
+ "172.16.0.0/12",
+ "127.0.0.0/8",
+ "geoip:cn"
+ ],
+ "outboundTag": "direct"
+ }
+ ],
+ "domainStrategy": "IPIfNonMatch"
+ },
+ "strategy": "rules"
+ }
+}
diff --git a/websocket+Nginx+TLS/config_server.json b/websocket+Nginx+TLS/config_server.json
new file mode 100644
index 0000000..c725de2
--- /dev/null
+++ b/websocket+Nginx+TLS/config_server.json
@@ -0,0 +1,77 @@
+{
+ "log": {
+ "access": "/var/log/v2ray/access.log",
+ "error": "/var/log/v2ray/error.log",
+ //可能取值 "debug" "info" "warning" "error" 其中"debug"记录的数据最多,"error"记录的最少 "none"表示不记录任何内容 默认值为"warning"
+ "loglevel": "debug"
+ },
+ "inbound": {
+ //默认值为"0.0.0.0"
+ "listen": "127.0.0.1",
+ "port": 10086,
+ "protocol": "vmess",
+ "settings": {
+ "clients": [
+ {
+ "id": "7f43b638-dc47-11e7-9296-cec278b6b50a",
+ "level": 0,
+ "alterId": 64
+ }
+ ]
+ },
+ "streamSettings": {
+ "network": "ws",
+ "security": "auto",
+ "wsSettings": {
+ "path": "/PATH/",
+ "connectionReuse": true,
+ "headers": {
+ "Host": "domain.Name"
+ }
+ }
+ },
+ "mux": {
+ "enabled": true,
+ "concurrency": 64
+ }
+ },
+ "outbound": {
+ "protocol": "freedom",
+ "settings": { }
+ },
+ "outboundDetour": [
+ {
+ "protocol": "blackhole",
+ "settings": { },
+ "tag": "blocked"
+ }
+ ],
+ "routing": {
+ "strategy": "rules",
+ "settings": {
+ "rules": [
+ {
+ "type": "field",
+ "ip": [
+ "0.0.0.0/8",
+ "10.0.0.0/8",
+ "100.64.0.0/10",
+ "127.0.0.0/8",
+ "169.254.0.0/16",
+ "172.16.0.0/12",
+ "192.0.0.0/24",
+ "192.0.2.0/24",
+ "192.168.0.0/16",
+ "198.18.0.0/15",
+ "198.51.100.0/24",
+ "203.0.113.0/24",
+ "::1/128",
+ "fc00::/7",
+ "fe80::/10"
+ ],
+ "outboundTag": "blocked"
+ }
+ ]
+ }
+ }
+}
diff --git a/websocket+TLS/config_client.json b/websocket+TLS/config_client.json
old mode 100755
new mode 100644
index 8d8e2bd..0e33473
--- a/websocket+TLS/config_client.json
+++ b/websocket+TLS/config_client.json
@@ -1,105 +1,111 @@
{
- "outbound": {
- "streamSettings": {
- "network": "ws",
- "kcpSettings": null,
- "wsSettings": {
- "headers": {
- "host": "example.domain"
- },
- "path": ""
- },
- "tcpSettings": null,
- "tlsSettings": {},
- "security": "tls"
- },
- "tag": "agentout",
- "protocol": "vmess",
- "mux": {
- "enabled": true,
- "concurrency": 8
- },
- "settings": {
- "vnext": [{
- "users": [{
- "alterId": 100,
- "security": "aes-128-gcm",
- "id": "e2b39869-7e9e-411b-a561-00904419bed9"
- }],
- "port": 443,
- "address": "example.domain"
- }]
- }
- },
- "log": {
- "access": "",
- "loglevel": "debug",
- "error": ""
- },
- "outboundDetour": [{
- "tag": "direct",
- "protocol": "freedom",
- "settings": {
- "response": null
- }
- },
+ "outbound": {
+ "streamSettings": {
+ "network": "ws",
+ "kcpSettings": null,
+ "wsSettings": {
+ "headers": {
+ "host": "example.domain"
+ },
+ "path": ""
+ },
+ "tcpSettings": null,
+ "tlsSettings": {},
+ "security": "tls"
+ },
+ "tag": "agentout",
+ "protocol": "vmess",
+ "mux": {
+ "enabled": true
+ },
+ "settings": {
+ "vnext": [
{
- "tag": "blockout",
- "protocol": "blackhole",
- "settings": {
- "response": {
- "type": "http"
- }
+ "users": [
+ {
+ "alterId": 100,
+ "security": "aes-128-gcm",
+ "id": "0cdf8a45-303d-4fed-9780-29aa7f54175e"
}
+ ],
+ "port": 443,
+ "address": "example.domain"
}
- ],
- "inbound": {
- "streamSettings": null,
- "settings": {
- "ip": "127.0.0.1",
- "udp": true,
- "clients": null,
- "auth": "noauth"
- },
- "protocol": "socks",
- "port": 10086,
- "listen": "0.0.0.0"
- },
- "inboundDetour": null,
- "routing": {
- "settings": {
- "rules": [{
- "ip": [
- "0.0.0.0/8",
- "10.0.0.0/8",
- "100.64.0.0/10",
- "127.0.0.0/8",
- "169.254.0.0/16",
- "172.16.0.0/12",
- "192.0.0.0/24",
- "192.0.2.0/24",
- "192.168.0.0/16",
- "198.18.0.0/15",
- "198.51.100.0/24",
- "203.0.113.0/24",
- "::1/128",
- "fc00::/7",
- "fe80::/10"
- ],
- "domain": null,
- "type": "field",
- "port": null,
- "outboundTag": "direct"
- }],
- "domainStrategy": "IPIfNonMatch"
- },
- "strategy": "rules"
- },
- "dns": {
- "servers": [
- "8.8.8.8",
- "8.8.4.4",
- "localhost"
- ]
+ ]
}
+ },
+ "log": {
+ "access": "",
+ "loglevel": "info",
+ "error": ""
+ },
+ "outboundDetour": [
+ {
+ "tag": "direct",
+ "protocol": "freedom",
+ "settings": {
+ "response": null
+ }
+ },
+ {
+ "tag": "blockout",
+ "protocol": "blackhole",
+ "settings": {
+ "response": {
+ "type": "http"
+ }
+ }
+ }
+ ],
+ "inbound": {
+ "streamSettings": null,
+ "settings": {
+ "ip": "127.0.0.1",
+ "udp": true,
+ "clients": null,
+ "auth": "noauth"
+ },
+ "protocol": "socks",
+ "port": 1080,
+ "listen": "0.0.0.0"
+ },
+ "inboundDetour": null,
+ "routing": {
+ "settings": {
+ "rules": [
+ {
+ "ip": [
+ "0.0.0.0/8",
+ "10.0.0.0/8",
+ "100.64.0.0/10",
+ "127.0.0.0/8",
+ "169.254.0.0/16",
+ "172.16.0.0/12",
+ "192.0.0.0/24",
+ "192.0.2.0/24",
+ "192.168.0.0/16",
+ "198.18.0.0/15",
+ "198.51.100.0/24",
+ "203.0.113.0/24",
+ "::1/128",
+ "fc00::/7",
+ "fe80::/10"
+ ],
+ "domain": null,
+ "type": "field",
+ "port": null,
+ "outboundTag": "direct"
+ }
+ ],
+ "domainStrategy": "IPIfNonMatch"
+ },
+ "strategy": "rules"
+ },
+ "dns": {
+ "servers": [
+ "8.8.8.8",
+ "8.8.4.4",
+ "localhost"
+ ]
+ }
}
diff --git a/websocket+TLS/config_server.json b/websocket+TLS/config_server.json
index c03bd40..d02bac7 100644
--- a/websocket+TLS/config_server.json
+++ b/websocket+TLS/config_server.json
@@ -1,91 +1,91 @@
{
- "outbound": {
- "streamSettings": null,
- "tag": null,
- "protocol": "freedom",
- "mux": null,
- "settings": null
- },
- "log": {
- "access": "/var/log/v2ray/access.log",
- "loglevel": "info",
- "error": "/var/log/v2ray/error.log"
- },
- "outboundDetour": [{
- "tag": "blocked",
- "protocol": "blackhole",
- "settings": null
- }],
- "inbound": {
- "streamSettings": {
- "network": "kcp",
- "kcpSettings": {
- "uplinkCapacity": 100,
- "downlinkCapacity": 100,
- "readBufferSize": 2,
- "mtu": 1350,
- "header": {
- "type": "srtp",
- "request": null,
- "response": null
- },
- "tti": 50,
- "congestion": false,
- "writeBufferSize": 2
- },
- "wsSettings": null,
- "tcpSettings": null,
- "tlsSettings": {
- "certificates": [{
- "keyFile": "/path/to/example.domain.key",
- "certificateFile": "/path/to/example.domain/fullchain.cer"
- }]
- },
- "security": "tls"
- },
- "settings": {
- "ip": null,
- "udp": true,
- "clients": [{
- "alterId": 100,
- "security": "aes-128-gcm",
- "id": "e2b39869-7e9e-411b-a561-00904419bed9"
- }],
- "auth": null
- },
- "protocol": "vmess",
- "port": 443,
- "listen": null
- },
- "inboundDetour": null,
- "routing": {
- "settings": {
- "rules": [{
- "ip": [
- "0.0.0.0/8",
- "10.0.0.0/8",
- "100.64.0.0/10",
- "127.0.0.0/8",
- "169.254.0.0/16",
- "172.16.0.0/12",
- "192.0.0.0/24",
- "192.0.2.0/24",
- "192.168.0.0/16",
- "198.18.0.0/15",
- "198.51.100.0/24",
- "203.0.113.0/24",
- "::1/128",
- "fc00::/7",
- "fe80::/10"
- ],
- "domain": null,
- "type": "field",
- "port": null,
- "outboundTag": "blocked"
- }],
- "domainStrategy": null
- },
- "strategy": "rules"
- },
- "dns": null
+ "outbound": {
+ "streamSettings": null,
+ "tag": null,
+ "protocol": "freedom",
+ "mux": null,
+ "settings": null
+ },
+ "log": {
+ "access": "/var/log/v2ray/access.log",
+ "loglevel": "error",
+ "error": "/var/log/v2ray/error.log"
+ },
+ "inboundDetour": null,
+ "inbound": {
+ "streamSettings": {
+ "network": "ws",
+ "kcpSettings": null,
+ "wsSettings": {
+ "headers": {
+ "host": "example.domain"
+ },
+ "path": ""
+ },
+ "tcpSettings": null,
+ "tlsSettings": {
+ "certificates": [
+ {
+ "keyFile": "/path/to/example.domain.key",
+ "certificateFile": "/path/to/example.domain/fullchain.cer"
+ }
+ ]
+ },
+ "security": "tls"
+ },
+ "listen": null,
+ "protocol": "vmess",
+ "port": 443,
+ "settings": {
+ "ip": null,
+ "udp": true,
+ "clients": [
+ {
+ "alterId": 100,
+ "security": "aes-128-gcm",
+ "id": "0cdf8a45-303d-4fed-9780-29aa7f54175e"
+ }
+ ],
+ "auth": null
+ }
+ },
+ "outboundDetour": [
+ {
+ "tag": "blocked",
+ "protocol": "blackhole",
+ "settings": null
+ }
+ ],
+ "routing": {
+ "strategy": "rules",
+ "settings": {
+ "rules": [
+ {
+ "ip": [
+ "0.0.0.0/8",
+ "10.0.0.0/8",
+ "100.64.0.0/10",
+ "127.0.0.0/8",
+ "169.254.0.0/16",
+ "172.16.0.0/12",
+ "192.0.0.0/24",
+ "192.0.2.0/24",
+ "192.168.0.0/16",
+ "198.18.0.0/15",
+ "198.51.100.0/24",
+ "203.0.113.0/24",
+ "::1/128",
+ "fc00::/7",
+ "fe80::/10"
+ ],
+ "domain": null,
+ "type": "field",
+ "port": null,
+ "outboundTag": "blocked"
+ }
+ ],
+ "domainStrategy": null
+ }
+ },
+ "dns": null
}
diff --git a/websocket/config_server.json b/websocket/config_server.json
index f4e8e30..0083e2b 100644
--- a/websocket/config_server.json
+++ b/websocket/config_server.json
@@ -20,8 +20,7 @@
"headers": {
"host": "example.domain"
},
- "path": "",
- "connectionReuse": true
+ "path": ""
},
"tcpSettings": null,
"tlsSettings": {},