GFW
Clash
proxies:
- name: Local_WWW
type: ss
server: 127.0.0.1
port: 5445
cipher: chacha20-ietf-poly1305
password: $password
udp: true
- name: V2ray_WWW_443
type: vmess
server: $domain
port: 443
uuid: $uuid
alterId: 76
cipher: auto
tls: true
network: ws
ws-opts:
path: /v
mux: falsegit config --global https.proxy socks5://192.168.2.50:1086
Rsyslog
###############
#### RULES ####
###############
if $programname == 'ss-server' then {
/var/log/shadowsocks.log
stop
}
V2Ray
mkdir /lib/systemd/system/v2ray.service.d
echo '[Service]' > /lib/systemd/system/v2ray.service.d/50-logs-directory.conf
echo 'LogsDirectory=v2ray' >> /lib/systemd/system/v2ray.service.d/50-logs-directory.conf
systemctl daemon-reload
systemctl restart v2ray
systemctl status v2ray
V2Ray MacOS Client
{
// in
"inbounds": [
{
"port": 5446,
"listen": "127.0.0.1",
"protocol": "socks",
"settings": {
"auth": "noauth",
"udp": false,
"ip": "127.0.0.1"
},
"sniffing": {
"enabled": true,
"destOverride": ["http", "tls"]
}
}
],
// out
"outbounds": [
{
"tag":"proxy",
"protocol":"vmess",
"settings": {
"vnext": [
{
"address": "2.2.2.2",
"port": 443,
"users": [
{
"id": "your server uuid copy here",
"alterId": 76
}
]
}
]
},
"streamSettings": {
"network": "ws",
"security": "tls",
"wsSettings": {
"path": "/xxxxxxx"
}
},
"mux": {
"enabled": true
}
},
{
"protocol": "freedom",
"settings":{},
"tag": "direct"
},
{
"protocol": "blackhole",
"settings":{},
"tag": "adblock"
}
],
// route
"routing": {
"domainStrategy": "IPOnDemand",
"rules": [
]
}
}