diff --git a/How_To_Choose.jpg b/How_To_Choose.jpg new file mode 100644 index 0000000..ff5a6e6 Binary files /dev/null and b/How_To_Choose.jpg differ diff --git a/README.md b/README.md index 39db056..2bb9861 100644 --- a/README.md +++ b/README.md @@ -11,6 +11,13 @@ 如果你在配置过程中遇到问题,请再看一遍文档,或是在Google搜索以求自己解决问题。当你确认你的问题无法独立解决时,你可以在v2ray的telegram群组里求助,或是在v2ray官方项目中提交issue。
遇事不决,请RTFM/STFW。
+ +**如何选取适合自己的配置**: +![](How_To_Choose.jpg) +附加说明:
+尽管websocket+TLS+Web可能称得上是现阶段最好的方案,但**绝对**不是推荐新手一上来就尝试的方案,更不是V2Ray唯一的用法。
+同时,你应当了解,每个地区的网络状况不同(主要指对不同协议的QoS程度),你可以将所有配置都尝试一遍来寻找最适合自己的,尽量少问、最好不问"为什么我的V2Ray这么慢?"这样的问题。 + 玩的愉快。 感谢Project V的所有开发人员,以及v2ray.fun的作者雨落无声。 diff --git a/http/config_server.json b/http/config_server.json index 4ee60de..878e2e5 100644 --- a/http/config_server.json +++ b/http/config_server.json @@ -63,8 +63,7 @@ "reason": "OK", "version": "1.1" } - }, - "connectionReuse": true + } }, "tlsSettings": {}, "security": "" diff --git a/websocket+Caddy+TLS(use header)/Caddyfile b/websocket+Caddy+TLS(use header)/Caddyfile new file mode 100644 index 0000000..a66e5ff --- /dev/null +++ b/websocket+Caddy+TLS(use header)/Caddyfile @@ -0,0 +1,17 @@ +https://example.domain * { + gzip + tls kiri_so@outlook.com + proxy / https://www.baidu.com + log / stdout "{request}" + + rewrite { + if {host} is google.com + to /test + } + + proxy /test localhost:1234 { + websocket + without /test + } +} + diff --git a/websocket+Caddy+TLS(use header)/config_client.json b/websocket+Caddy+TLS(use header)/config_client.json new file mode 100755 index 0000000..63ae65a --- /dev/null +++ b/websocket+Caddy+TLS(use header)/config_client.json @@ -0,0 +1,105 @@ +{ + "outbound": { + "streamSettings": { + "network": "ws", + "kcpSettings": null, + "wsSettings": { + "headers": { + "host": "google.com" + }, + "path": "/" + }, + "tcpSettings": null, + "tlsSettings": {}, + "security": "tls" + }, + "tag": "agentout", + "protocol": "vmess", + "mux": { + "enabled": true, + "concurrency": 8 + }, + "settings": { + "vnext": [{ + "users": [{ + "alterId": 100, + "security": "aes-128-gcm", + "id": "e2b39869-7e9e-411b-a561-00904419bed9" + }], + "port": 443, + "address": "example.domain" + }] + } + }, + "log": { + "access": "", + "loglevel": "info", + "error": "" + }, + "outboundDetour": [{ + "tag": "direct", + "protocol": "freedom", + "settings": { + "response": null + } + }, + { + "tag": "blockout", + "protocol": "blackhole", + "settings": { + "response": { + "type": "http" + } + } + } + ], + "inbound": { + "streamSettings": null, + "settings": { + "ip": "127.0.0.1", + "udp": true, + "clients": null, + "auth": "noauth" + }, + "protocol": "socks", + "port": 10086, + "listen": "0.0.0.0" + }, + "inboundDetour": null, + "routing": { + "settings": { + "rules": [{ + "ip": [ + "0.0.0.0/8", + "10.0.0.0/8", + "100.64.0.0/10", + "127.0.0.0/8", + "169.254.0.0/16", + "172.16.0.0/12", + "192.0.0.0/24", + "192.0.2.0/24", + "192.168.0.0/16", + "198.18.0.0/15", + "198.51.100.0/24", + "203.0.113.0/24", + "::1/128", + "fc00::/7", + "fe80::/10" + ], + "domain": null, + "type": "field", + "port": null, + "outboundTag": "direct" + }], + "domainStrategy": "IPIfNonMatch" + }, + "strategy": "rules" + }, + "dns": { + "servers": [ + "8.8.8.8", + "8.8.4.4", + "localhost" + ] + } +} diff --git a/websocket+Caddy+TLS(use header)/config_server.json b/websocket+Caddy+TLS(use header)/config_server.json new file mode 100644 index 0000000..79f127d --- /dev/null +++ b/websocket+Caddy+TLS(use header)/config_server.json @@ -0,0 +1,84 @@ +{ + "outbound": { + "streamSettings": null, + "tag": null, + "protocol": "freedom", + "mux": null, + "settings": null + }, + "log": { + "access": "/var/log/v2ray/access.log", + "loglevel": "info", + "error": "/var/log/v2ray/error.log" + }, + "outboundDetour": [{ + "tag": "direct", + "protocol": "freedom", + "settings": null + }, + { + "tag": "blocked", + "protocol": "blackhole", + "settings": null + } + ], + "inbound": { + "streamSettings": { + "network": "ws", + "kcpSettings": null, + "wsSettings": { + "headers": { + "host": "google.com" + }, + "path": "/" + }, + "tcpSettings": null, + "tlsSettings": {}, + "security": "" + }, + "settings": { + "ip": null, + "udp": true, + "clients": [{ + "alterId": 100, + "security": "aes-128-gcm", + "id": "e2b39869-7e9e-411b-a561-00904419bed9" + }], + "auth": null + }, + "protocol": "vmess", + "port": 1234, + "listen": null + }, + "inboundDetour": null, + "routing": { + "settings": { + "rules": [{ + "ip": [ + "0.0.0.0/8", + "10.0.0.0/8", + "100.64.0.0/10", + "127.0.0.0/8", + "169.254.0.0/16", + "172.16.0.0/12", + "192.0.0.0/24", + "192.0.2.0/24", + "192.168.0.0/16", + "198.18.0.0/15", + "198.51.100.0/24", + "203.0.113.0/24", + "::1/128", + "fc00::/7", + "fe80::/10" + ], + "domain": null, + "type": "field", + "port": null, + "outboundTag": "blocked" + }], + "domainStrategy": null + }, + "strategy": "rules" + }, + "dns": null +} diff --git a/websocket+Caddy+TLS/Caddyfile b/websocket+Caddy+TLS(use path)/Caddyfile similarity index 100% rename from websocket+Caddy+TLS/Caddyfile rename to websocket+Caddy+TLS(use path)/Caddyfile diff --git a/websocket+Caddy+TLS/config_client.json b/websocket+Caddy+TLS(use path)/config_client.json similarity index 100% rename from websocket+Caddy+TLS/config_client.json rename to websocket+Caddy+TLS(use path)/config_client.json diff --git a/websocket+Caddy+TLS/config_server.json b/websocket+Caddy+TLS(use path)/config_server.json similarity index 96% rename from websocket+Caddy+TLS/config_server.json rename to websocket+Caddy+TLS(use path)/config_server.json index b643120..2d94aad 100644 --- a/websocket+Caddy+TLS/config_server.json +++ b/websocket+Caddy+TLS(use path)/config_server.json @@ -30,8 +30,7 @@ "headers": { "host": "example.domain" }, - "path": "/test", - "connectionReuse": true + "path": "/test" }, "tcpSettings": null, "tlsSettings": {}, diff --git a/websocket+Nginx+TLS/Nginx.config b/websocket+Nginx+TLS/Nginx.config new file mode 100644 index 0000000..2341ed0 --- /dev/null +++ b/websocket+Nginx+TLS/Nginx.config @@ -0,0 +1,119 @@ +## +# You should look at the following URL's in order to grasp a solid understanding +# of Nginx configuration files in order to fully unleash the power of Nginx. +# https://www.nginx.com/resources/wiki/start/ +# https://www.nginx.com/resources/wiki/start/topics/tutorials/config_pitfalls/ +# https://wiki.debian.org/Nginx/DirectoryStructure +# +# In most cases, administrators will remove this file from sites-enabled/ and +# leave it as reference inside of sites-available where it will continue to be +# updated by the nginx packaging team. +# +# This file will automatically load configuration files provided by other +# applications, such as Drupal or Wordpress. These applications will be made +# available underneath a path with that package name, such as /drupal8. +# +# Please see /usr/share/doc/nginx-doc/examples/ for more detailed examples. +## + +# Default server configuration +# +server { + #listen 80 default_server; + listen 127.0.0.1:80; + #listen [::]:80 default_server; + + # SSL configuration + # + # listen 443 ssl default_server; + # listen [::]:443 ssl default_server; + # + # Note: You should disable gzip for SSL traffic. + # See: https://bugs.debian.org/773332 + # + # Read up on ssl_ciphers to ensure a secure configuration. + # See: https://bugs.debian.org/765782 + # + # Self signed certs generated by the ssl-cert package + # Don't use them in a production server! + # + # include snippets/snakeoil.conf; + + server_name domain.Name; + return 301 https://$server_name/$request_uri; +} + + +server { + #listen 443 ssl http2; + #listen [::]:443 ssl; + listen 127.0.0.1:443 ssl; + ssl on; + ssl_certificate PATH; + ssl_certificate_key PATH; + #openssl dhparam out dhparam.pem 2048 + #openssl dhparam out dhparam.pem 4096 + ssl_dhparam /home/acme/data/dhparam.pem; + ssl_session_cache shared:SSL:10m; + ssl_session_timeout 5m; + ssl_protocols TLSv1 TLSv1.1 TLSv1.2; + ssl_ciphers "ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:CAMELLIA:DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA"; #屏蔽不安全的加密方式 + + + root /var/www/html; + + # Add index.php to the list if you are using PHP + index index.html index.htm index.nginx-debian.html index.php tail.html ; + + server_name _; + + + location /PATH/ { + proxy_http_version 1.1; + proxy_set_header Upgrade $http_upgrade; + proxy_set_header Connection "upgrade"; + proxy_set_header Host $http_host; + + if ($http_host = "domain.Name" ) { + proxy_pass http://127.0.0.1:10086; + } + } + + # pass PHP scripts to FastCGI server + # + location ~ \.php$ { + include snippets/fastcgi-php.conf; + # + # # With php-fpm (or other unix sockets): + fastcgi_pass unix:/var/run/php/php7.0-fpm.sock; + # # With php-cgi (or other tcp sockets): + # fastcgi_pass 127.0.0.1:9000; + } + + # deny access to .htaccess files, if Apache's document root + # concurs with nginx's one + # + #location ~ /\.ht { + # deny all; + #} +} + + +# Virtual Host configuration for example.com +# +# You can move that to a different file under sites-available/ and symlink that +# to sites-enabled/ to enable it. +# +#server { +# listen 80; +# listen [::]:80; +# +# server_name example.com; +# +# root /var/www/example.com; +# index index.html; +# +# location / { +# try_files $uri $uri/ =404; +# } +#} diff --git a/websocket+Nginx+TLS/config_client.json b/websocket+Nginx+TLS/config_client.json new file mode 100644 index 0000000..d4952ca --- /dev/null +++ b/websocket+Nginx+TLS/config_client.json @@ -0,0 +1,143 @@ +{ + "outbound": { + "protocol": "freedom", + "settings": { }, + "tag": "direct" + }, + "inboundDetour": [ + { + "domainOverride": [ + "http", + "tls" + ], + "port": 1086, + "listen": "127.0.0.1", + "protocol": "socks", + "settings": { + "auth": "noauth", + "timeout": 300, + "udp": true + } + } + ], + "outboundDetour": [ + { + "mux": { + "concurrency": 6, + "enabled": true + }, + "protocol": "vmess", + "settings": { + "vnext": [ + { + "users": [ + { + "id": "97c0ec9c-dc4e-11e7-9296-cec278b6b50a", + "alterId": 0, + "security": "aes-128-cfb" + } + ], + "address": "domain.Name", + "port": 443 + } + ] + }, + "streamSettings": { + "tlsSettings": { + "allowInsecure": false + }, + "wsSettings": { + "headers": { + "Host": "domain.Name" + }, + "path": "/PATH/" + }, + "network": "ws", + "security": "tls" + }, + "tag": "proxy" + }, + { + "protocol": "blackhole", + "settings": { }, + "tag": "block" + } + ], + "dns": { + "servers": [ + "8.8.8.8", + "8.8.4.4" + ] + }, + "inbound": { + "port": 1087, + "listen": "127.0.0.1", + "protocol": "http", + "settings": { + "timeout": 300 + } + }, + "routing": { + "settings": { + "rules": [ + { + "type": "field", + "ip": [ + "geoip:cn" + ], + "outboundTag": "direct" + }, + { + "type": "field", + "domain": [ + "geosite:cn" + ], + "outboundTag": "direct" + }, + { + "type": "field", + "domain": [ + "google", + "facebook", + "youtube", + "twitter", + "instagram", + "gmail", + "domain:twimg.com", + "domain:t.co" + ], + "outboundTag": "proxy" + }, + { + "type": "field", + "ip": [ + "8.8.8.8/32", + "8.8.4.4/32", + "91.108.56.0/22", + "91.108.4.0/22", + "109.239.140.0/24", + "149.154.164.0/22", + "91.108.56.0/23", + "67.198.55.0/24", + "149.154.168.0/22", + "149.154.172.0/22" + ], + "outboundTag": "proxy" + }, + { + "type": "field", + "ip": [ + "192.168.0.0/16", + "10.0.0.0/8", + "172.16.0.0/12", + "127.0.0.0/8", + "geoip:cn" + ], + "outboundTag": "direct" + } + ], + "domainStrategy": "IPIfNonMatch" + }, + "strategy": "rules" + } +} diff --git a/websocket+Nginx+TLS/config_server.json b/websocket+Nginx+TLS/config_server.json new file mode 100644 index 0000000..c725de2 --- /dev/null +++ b/websocket+Nginx+TLS/config_server.json @@ -0,0 +1,77 @@ +{ + "log": { + "access": "/var/log/v2ray/access.log", + "error": "/var/log/v2ray/error.log", + //可能取值 "debug" "info" "warning" "error" 其中"debug"记录的数据最多,"error"记录的最少 "none"表示不记录任何内容 默认值为"warning" + "loglevel": "debug" + }, + "inbound": { + //默认值为"0.0.0.0" + "listen": "127.0.0.1", + "port": 10086, + "protocol": "vmess", + "settings": { + "clients": [ + { + "id": "7f43b638-dc47-11e7-9296-cec278b6b50a", + "level": 0, + "alterId": 64 + } + ] + }, + "streamSettings": { + "network": "ws", + "security": "auto", + "wsSettings": { + "path": "/PATH/", + "connectionReuse": true, + "headers": { + "Host": "domain.Name" + } + } + }, + "mux": { + "enabled": true, + "concurrency": 64 + } + }, + "outbound": { + "protocol": "freedom", + "settings": { } + }, + "outboundDetour": [ + { + "protocol": "blackhole", + "settings": { }, + "tag": "blocked" + } + ], + "routing": { + "strategy": "rules", + "settings": { + "rules": [ + { + "type": "field", + "ip": [ + "0.0.0.0/8", + "10.0.0.0/8", + "100.64.0.0/10", + "127.0.0.0/8", + "169.254.0.0/16", + "172.16.0.0/12", + "192.0.0.0/24", + "192.0.2.0/24", + "192.168.0.0/16", + "198.18.0.0/15", + "198.51.100.0/24", + "203.0.113.0/24", + "::1/128", + "fc00::/7", + "fe80::/10" + ], + "outboundTag": "blocked" + } + ] + } + } +} diff --git a/websocket+TLS/config_client.json b/websocket+TLS/config_client.json old mode 100755 new mode 100644 index 8d8e2bd..0e33473 --- a/websocket+TLS/config_client.json +++ b/websocket+TLS/config_client.json @@ -1,105 +1,111 @@ { - "outbound": { - "streamSettings": { - "network": "ws", - "kcpSettings": null, - "wsSettings": { - "headers": { - "host": "example.domain" - }, - "path": "" - }, - "tcpSettings": null, - "tlsSettings": {}, - "security": "tls" - }, - "tag": "agentout", - "protocol": "vmess", - "mux": { - "enabled": true, - "concurrency": 8 - }, - "settings": { - "vnext": [{ - "users": [{ - "alterId": 100, - "security": "aes-128-gcm", - "id": "e2b39869-7e9e-411b-a561-00904419bed9" - }], - "port": 443, - "address": "example.domain" - }] - } - }, - "log": { - "access": "", - "loglevel": "debug", - "error": "" - }, - "outboundDetour": [{ - "tag": "direct", - "protocol": "freedom", - "settings": { - "response": null - } - }, + "outbound": { + "streamSettings": { + "network": "ws", + "kcpSettings": null, + "wsSettings": { + "headers": { + "host": "example.domain" + }, + "path": "" + }, + "tcpSettings": null, + "tlsSettings": {}, + "security": "tls" + }, + "tag": "agentout", + "protocol": "vmess", + "mux": { + "enabled": true + }, + "settings": { + "vnext": [ { - "tag": "blockout", - "protocol": "blackhole", - "settings": { - "response": { - "type": "http" - } + "users": [ + { + "alterId": 100, + "security": "aes-128-gcm", + "id": "0cdf8a45-303d-4fed-9780-29aa7f54175e" } + ], + "port": 443, + "address": "example.domain" } - ], - "inbound": { - "streamSettings": null, - "settings": { - "ip": "127.0.0.1", - "udp": true, - "clients": null, - "auth": "noauth" - }, - "protocol": "socks", - "port": 10086, - "listen": "0.0.0.0" - }, - "inboundDetour": null, - "routing": { - "settings": { - "rules": [{ - "ip": [ - "0.0.0.0/8", - "10.0.0.0/8", - "100.64.0.0/10", - "127.0.0.0/8", - "169.254.0.0/16", - "172.16.0.0/12", - "192.0.0.0/24", - "192.0.2.0/24", - "192.168.0.0/16", - "198.18.0.0/15", - "198.51.100.0/24", - "203.0.113.0/24", - "::1/128", - "fc00::/7", - "fe80::/10" - ], - "domain": null, - "type": "field", - "port": null, - "outboundTag": "direct" - }], - "domainStrategy": "IPIfNonMatch" - }, - "strategy": "rules" - }, - "dns": { - "servers": [ - "8.8.8.8", - "8.8.4.4", - "localhost" - ] + ] } + }, + "log": { + "access": "", + "loglevel": "info", + "error": "" + }, + "outboundDetour": [ + { + "tag": "direct", + "protocol": "freedom", + "settings": { + "response": null + } + }, + { + "tag": "blockout", + "protocol": "blackhole", + "settings": { + "response": { + "type": "http" + } + } + } + ], + "inbound": { + "streamSettings": null, + "settings": { + "ip": "127.0.0.1", + "udp": true, + "clients": null, + "auth": "noauth" + }, + "protocol": "socks", + "port": 1080, + "listen": "0.0.0.0" + }, + "inboundDetour": null, + "routing": { + "settings": { + "rules": [ + { + "ip": [ + "0.0.0.0/8", + "10.0.0.0/8", + "100.64.0.0/10", + "127.0.0.0/8", + "169.254.0.0/16", + "172.16.0.0/12", + "192.0.0.0/24", + "192.0.2.0/24", + "192.168.0.0/16", + "198.18.0.0/15", + "198.51.100.0/24", + "203.0.113.0/24", + "::1/128", + "fc00::/7", + "fe80::/10" + ], + "domain": null, + "type": "field", + "port": null, + "outboundTag": "direct" + } + ], + "domainStrategy": "IPIfNonMatch" + }, + "strategy": "rules" + }, + "dns": { + "servers": [ + "8.8.8.8", + "8.8.4.4", + "localhost" + ] + } } diff --git a/websocket+TLS/config_server.json b/websocket+TLS/config_server.json index c03bd40..d02bac7 100644 --- a/websocket+TLS/config_server.json +++ b/websocket+TLS/config_server.json @@ -1,91 +1,91 @@ { - "outbound": { - "streamSettings": null, - "tag": null, - "protocol": "freedom", - "mux": null, - "settings": null - }, - "log": { - "access": "/var/log/v2ray/access.log", - "loglevel": "info", - "error": "/var/log/v2ray/error.log" - }, - "outboundDetour": [{ - "tag": "blocked", - "protocol": "blackhole", - "settings": null - }], - "inbound": { - "streamSettings": { - "network": "kcp", - "kcpSettings": { - "uplinkCapacity": 100, - "downlinkCapacity": 100, - "readBufferSize": 2, - "mtu": 1350, - "header": { - "type": "srtp", - "request": null, - "response": null - }, - "tti": 50, - "congestion": false, - "writeBufferSize": 2 - }, - "wsSettings": null, - "tcpSettings": null, - "tlsSettings": { - "certificates": [{ - "keyFile": "/path/to/example.domain.key", - "certificateFile": "/path/to/example.domain/fullchain.cer" - }] - }, - "security": "tls" - }, - "settings": { - "ip": null, - "udp": true, - "clients": [{ - "alterId": 100, - "security": "aes-128-gcm", - "id": "e2b39869-7e9e-411b-a561-00904419bed9" - }], - "auth": null - }, - "protocol": "vmess", - "port": 443, - "listen": null - }, - "inboundDetour": null, - "routing": { - "settings": { - "rules": [{ - "ip": [ - "0.0.0.0/8", - "10.0.0.0/8", - "100.64.0.0/10", - "127.0.0.0/8", - "169.254.0.0/16", - "172.16.0.0/12", - "192.0.0.0/24", - "192.0.2.0/24", - "192.168.0.0/16", - "198.18.0.0/15", - "198.51.100.0/24", - "203.0.113.0/24", - "::1/128", - "fc00::/7", - "fe80::/10" - ], - "domain": null, - "type": "field", - "port": null, - "outboundTag": "blocked" - }], - "domainStrategy": null - }, - "strategy": "rules" - }, - "dns": null + "outbound": { + "streamSettings": null, + "tag": null, + "protocol": "freedom", + "mux": null, + "settings": null + }, + "log": { + "access": "/var/log/v2ray/access.log", + "loglevel": "error", + "error": "/var/log/v2ray/error.log" + }, + "inboundDetour": null, + "inbound": { + "streamSettings": { + "network": "ws", + "kcpSettings": null, + "wsSettings": { + "headers": { + "host": "example.domain" + }, + "path": "" + }, + "tcpSettings": null, + "tlsSettings": { + "certificates": [ + { + "keyFile": "/path/to/example.domain.key", + "certificateFile": "/path/to/example.domain/fullchain.cer" + } + ] + }, + "security": "tls" + }, + "listen": null, + "protocol": "vmess", + "port": 443, + "settings": { + "ip": null, + "udp": true, + "clients": [ + { + "alterId": 100, + "security": "aes-128-gcm", + "id": "0cdf8a45-303d-4fed-9780-29aa7f54175e" + } + ], + "auth": null + } + }, + "outboundDetour": [ + { + "tag": "blocked", + "protocol": "blackhole", + "settings": null + } + ], + "routing": { + "strategy": "rules", + "settings": { + "rules": [ + { + "ip": [ + "0.0.0.0/8", + "10.0.0.0/8", + "100.64.0.0/10", + "127.0.0.0/8", + "169.254.0.0/16", + "172.16.0.0/12", + "192.0.0.0/24", + "192.0.2.0/24", + "192.168.0.0/16", + "198.18.0.0/15", + "198.51.100.0/24", + "203.0.113.0/24", + "::1/128", + "fc00::/7", + "fe80::/10" + ], + "domain": null, + "type": "field", + "port": null, + "outboundTag": "blocked" + } + ], + "domainStrategy": null + } + }, + "dns": null } diff --git a/websocket/config_server.json b/websocket/config_server.json index f4e8e30..0083e2b 100644 --- a/websocket/config_server.json +++ b/websocket/config_server.json @@ -20,8 +20,7 @@ "headers": { "host": "example.domain" }, - "path": "", - "connectionReuse": true + "path": "" }, "tcpSettings": null, "tlsSettings": {},