GFW

Clash

proxies:
  - name: Local_WWW
    type: ss
    server: 127.0.0.1
    port: 5445
    cipher: chacha20-ietf-poly1305
    password: $password
    udp: true

  - name: V2ray_WWW_443
    type: vmess
    server: $domain
    port: 443
    uuid: $uuid
    alterId: 76
    cipher: auto
    tls: true
    network: ws
    ws-opts:
        path: /v
        mux: falsegit config --global https.proxy socks5://192.168.2.50:1086

Rsyslog

###############
#### RULES ####
###############
if $programname == 'ss-server' then {
    /var/log/shadowsocks.log
    stop
}

V2Ray

mkdir /lib/systemd/system/v2ray.service.d
echo '[Service]' > /lib/systemd/system/v2ray.service.d/50-logs-directory.conf
echo 'LogsDirectory=v2ray' >> /lib/systemd/system/v2ray.service.d/50-logs-directory.conf
systemctl daemon-reload
systemctl restart v2ray
systemctl status v2ray

V2Ray MacOS Client

{
  // in
  "inbounds": [
    {
      "port": 5446,
      "listen": "127.0.0.1",
      "protocol": "socks",
      "settings": {
        "auth": "noauth",
        "udp": false,
        "ip": "127.0.0.1"
      },
      "sniffing": {
        "enabled": true,
        "destOverride": ["http", "tls"]
      }
    }
  ],

  // out
  "outbounds": [
    {
      "tag":"proxy",
      "protocol":"vmess",
      "settings": {
        "vnext": [
          {
            "address": "2.2.2.2",
            "port": 443,
            "users": [
              {
                "id": "your server uuid copy here",
                "alterId": 76
              }
            ]
          }
        ]
      },
      "streamSettings": {
        "network": "ws",
        "security": "tls",
        "wsSettings": {
          "path": "/xxxxxxx"
        }
      },
      "mux": {
              "enabled": true
      }
    },
    {
      "protocol": "freedom",
      "settings":{},
      "tag": "direct"
    },
    {
      "protocol": "blackhole",
      "settings":{},
      "tag": "adblock"
    }
  ],

  // route
  "routing": {
    "domainStrategy": "IPOnDemand",
    "rules": [
    ]
  }
}

MacOS kcptun + ss

1. install brew
2. install kcptun
brew install kcptun
brew services start kcptun
3. config kcptun
list config location
$ ps auxww | grep kcptun
admin              785   0.8  0.1 411877472  39232   ??  S     8:05PM   0:25.67 /opt/homebrew/opt/kcptun/bin/kcptun_client -c /opt/homebrew/etc/kcptun_client.json
vi /opt/homebrew/etc/kcptun_client.json

$ cat /opt/homebrew/etc/kcptun_client.json
{
    "localaddr": "127.0.0.1:5444",
    "remoteaddr": "www.abc.com:123-456",
    "key": "xxxxxxxxxxxx",
    "crypt": "blowfish",
    "mode": "fast3",
    "quiet": true,
    "nocomp": false
}
4. install ShadowsocksX-NG 
https://github.com/shadowsocks/ShadowsocksX-NG/releases/download/v1.10.3/ShadowsocksX-NG.dmg

5. config ShadowsocksX-NG
Address: 127.0.0.1
Port: 5444
Encryption: chacha20-ietf-poly1305
Password: xxxxxxxxxx
Plugin: empty
Plugin Opt: empty
Remarks: XXX
powered by GitbookFile Modify: 2025-12-04 22:48:46

results matching ""

    No results matching ""