File tree 13 files changed +279
-59
lines changed
13 files changed +279
-59
lines changed Original file line number Diff line number Diff line change 1
1
package constant
2
2
3
- var Version = "1.1-rc1 "
3
+ var Version = "1.1"
Original file line number Diff line number Diff line change
1
+ #### 1.1
2
+
3
+ * Fix close clash cache
4
+
5
+ Important changes since 1.0:
6
+
7
+ * Add support for use with android VPNService
8
+ * Add tun support for WireGuard outbound
9
+ * Add system tun stack
10
+ * Add comment filter for config
11
+ * Add option for allow optional proxy protocol header
12
+ * Add Clash mode and persistence support
13
+ * Add TLS ECH and uTLS support for outbound TLS options
14
+ * Add internal simple-obfs and v2ray-plugin
15
+ * Add ShadowsocksR outbound
16
+ * Add VLESS outbound and XUDP
17
+ * Skip wait for hysteria tcp handshake response
18
+ * Add v2ray mux support for all inbound
19
+ * Add XUDP support for VMess
20
+ * Improve websocket writer
21
+ * Refine tproxy write back
22
+ * Fix DNS leak caused by
23
+ Windows' ordinary multihomed DNS resolution behavior
24
+ * Add sniff_timeout listen option
25
+ * Add custom route support for tun
26
+ * Add option for custom wireguard reserved bytes
27
+ * Split bind_address into ipv4 and ipv6
28
+ * Add ShadowTLS v1 and v2 support
29
+
1
30
#### 1.1-rc1
2
31
3
32
* Fix TLS config for h2 server
Original file line number Diff line number Diff line change
1
+ ``` json
2
+ {
3
+ "dns" : {
4
+ "rules" : [
5
+ {
6
+ "domain" : [
7
+ " clash.razord.top" ,
8
+ " yacd.haishan.me"
9
+ ],
10
+ "server" : " local"
11
+ },
12
+ {
13
+ "clash_mode" : " direct" ,
14
+ "server" : " local"
15
+ }
16
+ ]
17
+ },
18
+ "outbounds" : [
19
+ {
20
+ "type" : " selector" ,
21
+ "tag" : " default" ,
22
+ "outbounds" : [
23
+ " proxy-a" ,
24
+ " proxy-b"
25
+ ]
26
+ }
27
+ ],
28
+ "route" : {
29
+ "rules" : [
30
+ {
31
+ "clash_mode" : " direct" ,
32
+ "outbound" : " direct"
33
+ },
34
+ {
35
+ "domain" : [
36
+ " clash.razord.top" ,
37
+ " yacd.haishan.me"
38
+ ],
39
+ "outbound" : " direct"
40
+ }
41
+ ],
42
+ "final" : " default"
43
+ },
44
+ "experimental" : {
45
+ "clash_api" : {
46
+ "external_controller" : " 127.0.0.1:9090" ,
47
+ "store_selected" : true
48
+ }
49
+ }
50
+ }
51
+
52
+ ```
Original file line number Diff line number Diff line change 3
3
Configuration examples for sing-box.
4
4
5
5
* [ Linux Server Installation] ( ./linux-server-installation )
6
- * [ Shadowsocks Server] ( ./ss-server )
7
- * [ Shadowsocks Client] ( ./ss-client )
8
- * [ Shadowsocks Tun] ( ./ss-tun )
9
- * [ DNS Hijack] ( ./dns-hijack.md )
6
+ * [ Tun] ( ./tun )
7
+ * [ DNS Hijack] ( ./dns-hijack.md )
8
+ * [ Shadowsocks] ( ./shadowsocks )
9
+ * [ ShadowTLS] ( ./shadowtls )
10
+ * [ Clash API] ( ./clash-api )
Original file line number Diff line number Diff line change 3
3
sing-box 的配置示例。
4
4
5
5
* [ Linux 服务器安装] ( ./linux-server-installation )
6
- * [ Shadowsocks 服务器] ( ./ss-server )
7
- * [ Shadowsocks 客户端] ( ./ss-client )
8
- * [ Shadowsocks Tun] ( ./ss-tun )
9
- * [ DNS 劫持] ( ./dns-hijack.md )
6
+ * [ Tun] ( ./tun )
7
+ * [ DNS 劫持] ( ./dns-hijack.md )
8
+ * [ Shadowsocks] ( ./shadowsocks )
9
+ * [ ShadowTLS] ( ./shadowtls )
10
+ * [ Clash API] ( ./clash-api )
Original file line number Diff line number Diff line change
1
+ # Shadowsocks
2
+
3
+ ## Single User
4
+
5
+ #### Server
6
+
7
+ ``` json
8
+ {
9
+ "inbounds" : [
10
+ {
11
+ "type" : " shadowsocks" ,
12
+ "listen" : " ::" ,
13
+ "listen_port" : 8080 ,
14
+ "method" : " 2022-blake3-aes-128-gcm" ,
15
+ "password" : " 8JCsPssfgS8tiRwiMlhARg=="
16
+ }
17
+ ]
18
+ }
19
+ ```
20
+
21
+ #### Client
22
+
23
+ ``` json
24
+ {
25
+ "inbounds" : [
26
+ {
27
+ "type" : " mixed" ,
28
+ "listen" : " ::" ,
29
+ "listen_port" : 2080
30
+ }
31
+ ],
32
+ "outbounds" : [
33
+ {
34
+ "type" : " shadowsocks" ,
35
+ "server" : " 127.0.0.1" ,
36
+ "server_port" : 8080 ,
37
+ "method" : " 2022-blake3-aes-128-gcm" ,
38
+ "password" : " 8JCsPssfgS8tiRwiMlhARg=="
39
+ }
40
+ ]
41
+ }
42
+
43
+ ```
44
+
45
+ ## Multiple Users
46
+
47
+ #### Server
48
+
49
+ ``` json
50
+ {
51
+ "inbounds" : [
52
+ {
53
+ "type" : " shadowsocks" ,
54
+ "listen" : " ::" ,
55
+ "listen_port" : 8080 ,
56
+ "method" : " 2022-blake3-aes-128-gcm" ,
57
+ "password" : " 8JCsPssfgS8tiRwiMlhARg==" ,
58
+ "users" : [
59
+ {
60
+ "name" : " sekai" ,
61
+ "password" : " BXYxVUXJ9NgF7c7KPLQjkg=="
62
+ }
63
+ ]
64
+ }
65
+ ]
66
+ }
67
+ ```
68
+
69
+ #### Client
70
+
71
+ ``` json
72
+ {
73
+ "inbounds" : [
74
+ {
75
+ "type" : " mixed" ,
76
+ "listen" : " ::" ,
77
+ "listen_port" : 2080
78
+ }
79
+ ],
80
+ "outbounds" : [
81
+ {
82
+ "type" : " shadowsocks" ,
83
+ "server" : " 127.0.0.1" ,
84
+ "server_port" : 8080 ,
85
+ "method" : " 2022-blake3-aes-128-gcm" ,
86
+ "password" : " 8JCsPssfgS8tiRwiMlhARg==:BXYxVUXJ9NgF7c7KPLQjkg=="
87
+ }
88
+ ]
89
+ }
90
+
91
+ ```
92
+
93
+ ## Relay
94
+
95
+ #### Server
96
+
97
+ ``` json
98
+ {
99
+ "inbounds" : [
100
+ {
101
+ "type" : " shadowsocks" ,
102
+ "listen" : " ::" ,
103
+ "listen_port" : 8080 ,
104
+ "method" : " 2022-blake3-aes-128-gcm" ,
105
+ "password" : " 8JCsPssfgS8tiRwiMlhARg=="
106
+ }
107
+ ]
108
+ }
109
+ ```
110
+
111
+ #### Relay
112
+
113
+ ``` json
114
+ {
115
+ "inbounds" : [
116
+ {
117
+ "type" : " shadowsocks" ,
118
+ "listen" : " ::" ,
119
+ "listen_port" : 8081 ,
120
+ "method" : " 2022-blake3-aes-128-gcm" ,
121
+ "password" : " BXYxVUXJ9NgF7c7KPLQjkg==" ,
122
+ "destinations" : [
123
+ {
124
+ "name" : " my_server" ,
125
+ "password" : " 8JCsPssfgS8tiRwiMlhARg==" ,
126
+ "server" : " 127.0.0.1" ,
127
+ "server_port" : 8080
128
+ }
129
+ ]
130
+ }
131
+ ]
132
+ }
133
+ ```
134
+
135
+ #### Client
136
+
137
+ ``` json
138
+ {
139
+ "inbounds" : [
140
+ {
141
+ "type" : " mixed" ,
142
+ "listen" : " ::" ,
143
+ "listen_port" : 2080
144
+ }
145
+ ],
146
+ "outbounds" : [
147
+ {
148
+ "type" : " shadowsocks" ,
149
+ "server" : " 127.0.0.1" ,
150
+ "server_port" : 8081 ,
151
+ "method" : " 2022-blake3-aes-128-gcm" ,
152
+ "password" : " 8JCsPssfgS8tiRwiMlhARg==:BXYxVUXJ9NgF7c7KPLQjkg=="
153
+ }
154
+ ]
155
+ }
156
+
157
+ ```
Original file line number Diff line number Diff line change 7
7
"type" : " shadowtls" ,
8
8
"listen" : " ::" ,
9
9
"listen_port" : 4443 ,
10
+ "version" : 2 ,
11
+ "password" : " fuck me till the daylight" ,
10
12
"handshake" : {
11
13
"server" : " google.com" ,
12
14
"server_port" : 443
45
47
"tag" : " shadowtls-out" ,
46
48
"server" : " 127.0.0.1" ,
47
49
"server_port" : 4443 ,
50
+ "version" : 2 ,
51
+ "password" : " fuck me till the daylight" ,
48
52
"tls" : {
49
53
"enabled" : true ,
50
54
"server_name" : " google.com"
Load Diff This file was deleted.
Load Diff This file was deleted.
Original file line number Diff line number Diff line change 10
10
"tag" : " local" ,
11
11
"address" : " 223.5.5.5" ,
12
12
"detour" : " direct"
13
+ },
14
+ {
15
+ "tag" : " block" ,
16
+ "address" : " rcode://success"
13
17
}
14
18
],
15
19
"rules" : [
20
+ {
21
+ "geosite" : " category-ads-all" ,
22
+ "server" : " block" ,
23
+ "disable_cache" : true
24
+ },
16
25
{
17
26
"domain" : " mydomain.com" ,
18
27
"geosite" : " cn" ,
26
35
"type" : " tun" ,
27
36
"inet4_address" : " 172.19.0.1/30" ,
28
37
"auto_route" : true ,
38
+ "strict_route" : false ,
29
39
"sniff" : true
30
40
}
31
41
],
57
67
"protocol" : " dns" ,
58
68
"outbound" : " dns-out"
59
69
},
60
- {
61
- "geosite" : " category-ads-all" ,
62
- "outbound" : " block"
63
- },
64
70
{
65
71
"geosite" : " cn" ,
66
- "geoip" : " cn" ,
72
+ "geoip" : [
73
+ " private" ,
74
+ " cn"
75
+ ],
67
76
"outbound" : " direct"
77
+ },
78
+ {
79
+ "geosite" : " category-ads-all" ,
80
+ "outbound" : " block"
68
81
}
69
82
],
70
83
"auto_detect_interface" : true
Original file line number Diff line number Diff line change @@ -7,11 +7,11 @@ the public internet.
7
7
8
8
##### on Android
9
9
10
- ` auto-route ` cannot automatically hijack DNS requests when Android's ` Private DNS ` is enabled.
10
+ ` auto-route ` cannot automatically hijack DNS requests when Android's ` Private DNS ` enabled or ` strict_route ` disabled .
11
11
12
12
##### on Linux
13
13
14
- ` auto-route ` cannot automatically hijack DNS requests with ` systemd-resolved ` enabled, you can switch to NetworkManager .
14
+ ` auto-route ` cannot automatically hijack DNS requests with ` systemd-resolved ` enabled and ` strict_route ` disabled .
15
15
16
16
#### System proxy
17
17
You can’t perform that action at this time.
0 commit comments