Merge pull request #3 from KiriKira/master

sync
This commit is contained in:
q158073378252010 2018-01-01 16:22:53 +08:00 committed by GitHub
commit 8f561dcf3e
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
16 changed files with 770 additions and 199 deletions

BIN
How_To_Choose.jpg Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 108 KiB

View File

@ -11,6 +11,13 @@
如果你在配置过程中遇到问题请再看一遍文档或是在Google搜索以求自己解决问题。当你确认你的问题无法独立解决时你可以在v2ray的telegram群组里求助或是在v2ray官方项目中提交issue。<br>
遇事不决请RTFM/STFW。<br>
**如何选取适合自己的配置**
![](How_To_Choose.jpg)
附加说明:<br>
尽管websocket+TLS+Web可能称得上是现阶段最好的方案但**绝对**不是推荐新手一上来就尝试的方案更不是V2Ray唯一的用法。<br>
同时,你应当了解,每个地区的网络状况不同(主要指对不同协议的QoS程度),你可以将所有配置都尝试一遍来寻找最适合自己的,尽量少问、最好不问"为什么我的V2Ray这么慢"这样的问题。
玩的愉快。
感谢Project V的所有开发人员以及v2ray.fun的作者雨落无声。

View File

@ -63,8 +63,7 @@
"reason": "OK",
"version": "1.1"
}
},
"connectionReuse": true
}
},
"tlsSettings": {},
"security": ""

View File

@ -1,4 +1,4 @@
`{
{
"outbound": {
"streamSettings": {
"network": "kcp",
@ -109,4 +109,4 @@
"localhost"
]
}
}`
}

View File

@ -0,0 +1,17 @@
https://example.domain * {
gzip
tls kiri_so@outlook.com
proxy / https://www.baidu.com
log / stdout "{request}"
rewrite {
if {host} is google.com
to /test
}
proxy /test localhost:1234 {
websocket
without /test
}
}

View File

@ -5,9 +5,9 @@
"kcpSettings": null,
"wsSettings": {
"headers": {
"host": "example.domain"
"host": "google.com"
},
"path": "/test"
"path": "/"
},
"tcpSettings": null,
"tlsSettings": {},

View File

@ -28,10 +28,9 @@
"kcpSettings": null,
"wsSettings": {
"headers": {
"host": "example.domain"
"host": "google.com"
},
"path": "/test",
"connectionReuse": true
"path": "/"
},
"tcpSettings": null,
"tlsSettings": {},

View File

@ -0,0 +1,102 @@
{
"outbound": {
"streamSettings": {
"network": "ws",
"kcpSettings": null,
"wsSettings": {
"path": "/test"
},
"tcpSettings": null,
"tlsSettings": {},
"security": "tls"
},
"tag": "agentout",
"protocol": "vmess",
"mux": {
"enabled": true,
"concurrency": 8
},
"settings": {
"vnext": [{
"users": [{
"alterId": 100,
"security": "aes-128-gcm",
"id": "e2b39869-7e9e-411b-a561-00904419bed9"
}],
"port": 443,
"address": "example.domain"
}]
}
},
"log": {
"access": "",
"loglevel": "info",
"error": ""
},
"outboundDetour": [{
"tag": "direct",
"protocol": "freedom",
"settings": {
"response": null
}
},
{
"tag": "blockout",
"protocol": "blackhole",
"settings": {
"response": {
"type": "http"
}
}
}
],
"inbound": {
"streamSettings": null,
"settings": {
"ip": "127.0.0.1",
"udp": true,
"clients": null,
"auth": "noauth"
},
"protocol": "socks",
"port": 10086,
"listen": "0.0.0.0"
},
"inboundDetour": null,
"routing": {
"settings": {
"rules": [{
"ip": [
"0.0.0.0/8",
"10.0.0.0/8",
"100.64.0.0/10",
"127.0.0.0/8",
"169.254.0.0/16",
"172.16.0.0/12",
"192.0.0.0/24",
"192.0.2.0/24",
"192.168.0.0/16",
"198.18.0.0/15",
"198.51.100.0/24",
"203.0.113.0/24",
"::1/128",
"fc00::/7",
"fe80::/10"
],
"domain": null,
"type": "field",
"port": null,
"outboundTag": "direct"
}],
"domainStrategy": "IPIfNonMatch"
},
"strategy": "rules"
},
"dns": {
"servers": [
"8.8.8.8",
"8.8.4.4",
"localhost"
]
}
}

View File

@ -0,0 +1,81 @@
{
"outbound": {
"streamSettings": null,
"tag": null,
"protocol": "freedom",
"mux": null,
"settings": null
},
"log": {
"access": "/var/log/v2ray/access.log",
"loglevel": "info",
"error": "/var/log/v2ray/error.log"
},
"outboundDetour": [{
"tag": "direct",
"protocol": "freedom",
"settings": null
},
{
"tag": "blocked",
"protocol": "blackhole",
"settings": null
}
],
"inbound": {
"streamSettings": {
"network": "ws",
"kcpSettings": null,
"wsSettings": {
"path": "/test"
},
"tcpSettings": null,
"tlsSettings": {},
"security": ""
},
"settings": {
"ip": null,
"udp": true,
"clients": [{
"alterId": 100,
"security": "aes-128-gcm",
"id": "e2b39869-7e9e-411b-a561-00904419bed9"
}],
"auth": null
},
"protocol": "vmess",
"port": 1234,
"listen": null
},
"inboundDetour": null,
"routing": {
"settings": {
"rules": [{
"ip": [
"0.0.0.0/8",
"10.0.0.0/8",
"100.64.0.0/10",
"127.0.0.0/8",
"169.254.0.0/16",
"172.16.0.0/12",
"192.0.0.0/24",
"192.0.2.0/24",
"192.168.0.0/16",
"198.18.0.0/15",
"198.51.100.0/24",
"203.0.113.0/24",
"::1/128",
"fc00::/7",
"fe80::/10"
],
"domain": null,
"type": "field",
"port": null,
"outboundTag": "blocked"
}],
"domainStrategy": null
},
"strategy": "rules"
},
"dns": null
}

View File

@ -0,0 +1,146 @@
##
# You should look at the following URL's in order to grasp a solid understanding
# of Nginx configuration files in order to fully unleash the power of Nginx.
# https://www.nginx.com/resources/wiki/start/
# https://www.nginx.com/resources/wiki/start/topics/tutorials/config_pitfalls/
# https://wiki.debian.org/Nginx/DirectoryStructure
#
# In most cases, administrators will remove this file from sites-enabled/ and
# leave it as reference inside of sites-available where it will continue to be
# updated by the nginx packaging team.
#
# This file will automatically load configuration files provided by other
# applications, such as Drupal or Wordpress. These applications will be made
# available underneath a path with that package name, such as /drupal8.
#
# Please see /usr/share/doc/nginx-doc/examples/ for more detailed examples.
##
# Default server configuration
#
#####兼容客户端Firefox 27, Chrome 30, IE 11 on Windows 7, Edge, Opera 17, Safari 9, Android 5.0, and Java 8
#####此文件的真身路径是 /etc/nginx/sites-available/default 如果你修改了 /etc/nginx/nginx.conf 中的内容,但
#####/etc/nginx/sites-available/default 中的 参数 与 前者 重叠 那么 会 遵从 后者
server {
#listen 80 default_server;
#listen [::]:80 default_server;
# SSL configuration
#
# listen 443 ssl default_server;
# listen [::]:443 ssl default_server;
#
# Note: You should disable gzip for SSL traffic.
# See: https://bugs.debian.org/773332
#
# Read up on ssl_ciphers to ensure a secure configuration.
# See: https://bugs.debian.org/765782
#
# Self signed certs generated by the ssl-cert package
# Don't use them in a production server!
#
# include snippets/snakeoil.conf;
listen 127.0.0.1:80 default_server;
server_name domain.Name;
return 301 https://$host/$request_uri;
}
server {
#listen 443 ssl http2;
#listen [::]:443 ssl;
#要开启HTTP/2需要nginx版本在1.10.0以上且需要openssl版本在1.0.2以上编译
#可以使用 nginx -V 检查
listen 127.0.0.1:443 ssl http2;
#证书配置
ssl_certificate PATH;
ssl_certificate_key PATH;
ssl_session_cache shared:SSL:10m;
ssl_session_timeout 5m;
ssl_session_tickets off;
#https://nginx.org/en/docs/http/ngx_http_ssl_module.html
ssl_protocols TLSv1.2;
###openssl ciphers
ssl_ciphers 'ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA'; #屏蔽不安全的加密方式
ssl_prefer_server_ciphers on;
# HSTS (ngx_http_headers_module is required) (15768000 seconds = 6 months)
#
###测试前请使用较少的时间 此处以从 15768000 >>> 15
###https://www.nginx.com/blog/http-strict-transport-security-hsts-and-nginx/
#add_header Strict-Transport-Security max-age=15;
#openssl dhparam out dhparam.pem 2048
#openssl dhparam out dhparam.pem 4096
#ssl_dhparam /home/acme/data/dhparam.pem;
# OCSP Stapling ---
# fetch OCSP records from URL in ssl_certificate and cache them
#有条件就开
#ssl_stapling on;
#ssl_stapling_verify on;
root /var/www/html;
# Add index.php to the list if you are using PHP
index index.html index.htm index.nginx-debian.html index.php tail.html ;
server_name _;
location /PATH/ {
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_set_header Host $http_host;
#host判断
if ($http_host = "domain.Name" ) {
#v 监听端口
proxy_pass http://127.0.0.1:10086;
}
}
# pass PHP scripts to FastCGI server
#
location ~ \.php$ {
include snippets/fastcgi-php.conf;
#
# # With php-fpm (or other unix sockets):
fastcgi_pass unix:/var/run/php/php7.0-fpm.sock;
# # With php-cgi (or other tcp sockets):
# fastcgi_pass 127.0.0.1:9000;
}
# deny access to .htaccess files, if Apache's document root
# concurs with nginx's one
#
#location ~ /\.ht {
# deny all;
#}
}
# Virtual Host configuration for example.com
#
# You can move that to a different file under sites-available/ and symlink that
# to sites-enabled/ to enable it.
#
#server {
# listen 80;
# listen [::]:80;
#
# server_name example.com;
#
# root /var/www/example.com;
# index index.html;
#
# location / {
# try_files $uri $uri/ =404;
# }
#}

View File

@ -0,0 +1,143 @@
{
"outbound": {
"protocol": "freedom",
"settings": { },
"tag": "direct"
},
"inboundDetour": [
{
"domainOverride": [
"http",
"tls"
],
"port": 1086,
"listen": "127.0.0.1",
"protocol": "socks",
"settings": {
"auth": "noauth",
"timeout": 300,
"udp": true
}
}
],
"outboundDetour": [
{
"mux": {
"concurrency": 6,
"enabled": true
},
"protocol": "vmess",
"settings": {
"vnext": [
{
"users": [
{
"id": "97c0ec9c-dc4e-11e7-9296-cec278b6b50a",
"alterId": 0,
"security": "aes-128-cfb"
}
],
"address": "domain.Name",
"port": 443
}
]
},
"streamSettings": {
"tlsSettings": {
"allowInsecure": false
},
"wsSettings": {
"headers": {
"Host": "domain.Name"
},
"path": "/PATH/"
},
"network": "ws",
"security": "tls"
},
"tag": "proxy"
},
{
"protocol": "blackhole",
"settings": { },
"tag": "block"
}
],
"dns": {
"servers": [
"8.8.8.8",
"8.8.4.4"
]
},
"inbound": {
"port": 1087,
"listen": "127.0.0.1",
"protocol": "http",
"settings": {
"timeout": 300
}
},
"routing": {
"settings": {
"rules": [
{
"type": "field",
"ip": [
"geoip:cn"
],
"outboundTag": "direct"
},
{
"type": "field",
"domain": [
"geosite:cn"
],
"outboundTag": "direct"
},
{
"type": "field",
"domain": [
"google",
"facebook",
"youtube",
"twitter",
"instagram",
"gmail",
"domain:twimg.com",
"domain:t.co"
],
"outboundTag": "proxy"
},
{
"type": "field",
"ip": [
"8.8.8.8/32",
"8.8.4.4/32",
"91.108.56.0/22",
"91.108.4.0/22",
"109.239.140.0/24",
"149.154.164.0/22",
"91.108.56.0/23",
"67.198.55.0/24",
"149.154.168.0/22",
"149.154.172.0/22"
],
"outboundTag": "proxy"
},
{
"type": "field",
"ip": [
"192.168.0.0/16",
"10.0.0.0/8",
"172.16.0.0/12",
"127.0.0.0/8",
"geoip:cn"
],
"outboundTag": "direct"
}
],
"domainStrategy": "IPIfNonMatch"
},
"strategy": "rules"
}
}

View File

@ -0,0 +1,72 @@
{
"log": {
"access": "/var/log/v2ray/access.log",
"error": "/var/log/v2ray/error.log",
// "debug" "info" "warning" "error" "debug""error" "none" "warning"
"loglevel": "debug"
},
"inbound": {
//"0.0.0.0"
"listen": "127.0.0.1",
"port": 10086,
"protocol": "vmess",
"settings": {
"clients": [
{
"id": "7f43b638-dc47-11e7-9296-cec278b6b50a",
"level": 0,
"alterId": 64
}
]
},
"streamSettings": {
"network": "ws",
"security": "auto",
"wsSettings": {
"path": "/PATH/",
"headers": {
"Host": "domain.Name"
}
}
}
},
"outbound": {
"protocol": "freedom",
"settings": { }
},
"outboundDetour": [
{
"protocol": "blackhole",
"settings": { },
"tag": "blocked"
}
],
"routing": {
"strategy": "rules",
"settings": {
"rules": [
{
"type": "field",
"ip": [
"0.0.0.0/8",
"10.0.0.0/8",
"100.64.0.0/10",
"127.0.0.0/8",
"169.254.0.0/16",
"172.16.0.0/12",
"192.0.0.0/24",
"192.0.2.0/24",
"192.168.0.0/16",
"198.18.0.0/15",
"198.51.100.0/24",
"203.0.113.0/24",
"::1/128",
"fc00::/7",
"fe80::/10"
],
"outboundTag": "blocked"
}
]
}
}
}

204
websocket+TLS/config_client.json Executable file → Normal file
View File

@ -1,105 +1,111 @@
{
"outbound": {
"streamSettings": {
"network": "ws",
"kcpSettings": null,
"wsSettings": {
"headers": {
"host": "example.domain"
},
"path": ""
},
"tcpSettings": null,
"tlsSettings": {},
"security": "tls"
},
"tag": "agentout",
"protocol": "vmess",
"mux": {
"enabled": true,
"concurrency": 8
},
"settings": {
"vnext": [{
"users": [{
"alterId": 100,
"security": "aes-128-gcm",
"id": "e2b39869-7e9e-411b-a561-00904419bed9"
}],
"port": 443,
"address": "example.domain"
}]
}
},
"log": {
"access": "",
"loglevel": "debug",
"error": ""
},
"outboundDetour": [{
"tag": "direct",
"protocol": "freedom",
"settings": {
"response": null
}
},
"outbound": {
"streamSettings": {
"network": "ws",
"kcpSettings": null,
"wsSettings": {
"headers": {
"host": "example.domain"
},
"path": ""
},
"tcpSettings": null,
"tlsSettings": {},
"security": "tls"
},
"tag": "agentout",
"protocol": "vmess",
"mux": {
"enabled": true
},
"settings": {
"vnext": [
{
"tag": "blockout",
"protocol": "blackhole",
"settings": {
"response": {
"type": "http"
}
"users": [
{
"alterId": 100,
"security": "aes-128-gcm",
"id": "0cdf8a45-303d-4fed-9780-29aa7f54175e"
}
],
"port": 443,
"address": "example.domain"
}
],
"inbound": {
"streamSettings": null,
"settings": {
"ip": "127.0.0.1",
"udp": true,
"clients": null,
"auth": "noauth"
},
"protocol": "socks",
"port": 10086,
"listen": "0.0.0.0"
},
"inboundDetour": null,
"routing": {
"settings": {
"rules": [{
"ip": [
"0.0.0.0/8",
"10.0.0.0/8",
"100.64.0.0/10",
"127.0.0.0/8",
"169.254.0.0/16",
"172.16.0.0/12",
"192.0.0.0/24",
"192.0.2.0/24",
"192.168.0.0/16",
"198.18.0.0/15",
"198.51.100.0/24",
"203.0.113.0/24",
"::1/128",
"fc00::/7",
"fe80::/10"
],
"domain": null,
"type": "field",
"port": null,
"outboundTag": "direct"
}],
"domainStrategy": "IPIfNonMatch"
},
"strategy": "rules"
},
"dns": {
"servers": [
"8.8.8.8",
"8.8.4.4",
"localhost"
]
]
}
},
"log": {
"access": "",
"loglevel": "info",
"error": ""
},
"outboundDetour": [
{
"tag": "direct",
"protocol": "freedom",
"settings": {
"response": null
}
},
{
"tag": "blockout",
"protocol": "blackhole",
"settings": {
"response": {
"type": "http"
}
}
}
],
"inbound": {
"streamSettings": null,
"settings": {
"ip": "127.0.0.1",
"udp": true,
"clients": null,
"auth": "noauth"
},
"protocol": "socks",
"port": 1080,
"listen": "0.0.0.0"
},
"inboundDetour": null,
"routing": {
"settings": {
"rules": [
{
"ip": [
"0.0.0.0/8",
"10.0.0.0/8",
"100.64.0.0/10",
"127.0.0.0/8",
"169.254.0.0/16",
"172.16.0.0/12",
"192.0.0.0/24",
"192.0.2.0/24",
"192.168.0.0/16",
"198.18.0.0/15",
"198.51.100.0/24",
"203.0.113.0/24",
"::1/128",
"fc00::/7",
"fe80::/10"
],
"domain": null,
"type": "field",
"port": null,
"outboundTag": "direct"
}
],
"domainStrategy": "IPIfNonMatch"
},
"strategy": "rules"
},
"dns": {
"servers": [
"8.8.8.8",
"8.8.4.4",
"localhost"
]
}
}

View File

@ -1,91 +1,91 @@
{
"outbound": {
"streamSettings": null,
"tag": null,
"protocol": "freedom",
"mux": null,
"settings": null
},
"log": {
"access": "/var/log/v2ray/access.log",
"loglevel": "info",
"error": "/var/log/v2ray/error.log"
},
"outboundDetour": [{
"tag": "blocked",
"protocol": "blackhole",
"settings": null
}],
"inbound": {
"streamSettings": {
"network": "kcp",
"kcpSettings": {
"uplinkCapacity": 100,
"downlinkCapacity": 100,
"readBufferSize": 2,
"mtu": 1350,
"header": {
"type": "srtp",
"request": null,
"response": null
},
"tti": 50,
"congestion": false,
"writeBufferSize": 2
},
"wsSettings": null,
"tcpSettings": null,
"tlsSettings": {
"certificates": [{
"keyFile": "/path/to/example.domain.key",
"certificateFile": "/path/to/example.domain/fullchain.cer"
}]
},
"security": "tls"
},
"settings": {
"ip": null,
"udp": true,
"clients": [{
"alterId": 100,
"security": "aes-128-gcm",
"id": "e2b39869-7e9e-411b-a561-00904419bed9"
}],
"auth": null
},
"protocol": "vmess",
"port": 443,
"listen": null
},
"inboundDetour": null,
"routing": {
"settings": {
"rules": [{
"ip": [
"0.0.0.0/8",
"10.0.0.0/8",
"100.64.0.0/10",
"127.0.0.0/8",
"169.254.0.0/16",
"172.16.0.0/12",
"192.0.0.0/24",
"192.0.2.0/24",
"192.168.0.0/16",
"198.18.0.0/15",
"198.51.100.0/24",
"203.0.113.0/24",
"::1/128",
"fc00::/7",
"fe80::/10"
],
"domain": null,
"type": "field",
"port": null,
"outboundTag": "blocked"
}],
"domainStrategy": null
},
"strategy": "rules"
},
"dns": null
"outbound": {
"streamSettings": null,
"tag": null,
"protocol": "freedom",
"mux": null,
"settings": null
},
"log": {
"access": "/var/log/v2ray/access.log",
"loglevel": "error",
"error": "/var/log/v2ray/error.log"
},
"inboundDetour": null,
"inbound": {
"streamSettings": {
"network": "ws",
"kcpSettings": null,
"wsSettings": {
"headers": {
"host": "example.domain"
},
"path": ""
},
"tcpSettings": null,
"tlsSettings": {
"certificates": [
{
"keyFile": "/path/to/example.domain.key",
"certificateFile": "/path/to/example.domain/fullchain.cer"
}
]
},
"security": "tls"
},
"listen": null,
"protocol": "vmess",
"port": 443,
"settings": {
"ip": null,
"udp": true,
"clients": [
{
"alterId": 100,
"security": "aes-128-gcm",
"id": "0cdf8a45-303d-4fed-9780-29aa7f54175e"
}
],
"auth": null
}
},
"outboundDetour": [
{
"tag": "blocked",
"protocol": "blackhole",
"settings": null
}
],
"routing": {
"strategy": "rules",
"settings": {
"rules": [
{
"ip": [
"0.0.0.0/8",
"10.0.0.0/8",
"100.64.0.0/10",
"127.0.0.0/8",
"169.254.0.0/16",
"172.16.0.0/12",
"192.0.0.0/24",
"192.0.2.0/24",
"192.168.0.0/16",
"198.18.0.0/15",
"198.51.100.0/24",
"203.0.113.0/24",
"::1/128",
"fc00::/7",
"fe80::/10"
],
"domain": null,
"type": "field",
"port": null,
"outboundTag": "blocked"
}
],
"domainStrategy": null
}
},
"dns": null
}

View File

@ -20,8 +20,7 @@
"headers": {
"host": "example.domain"
},
"path": "",
"connectionReuse": true
"path": ""
},
"tcpSettings": null,
"tlsSettings": {},