Closed mhnhh123 closed 1 year ago
Xray 1.7.5 (Xray, Penetrates Everything.) Custom (go1.20 windows/amd64)
@mhnhh123 希望你能明白,issue 区主要是发 bug 用的,不会用的问题请进 Project X 群,请群友帮忙解决
@mhnhh123 希望你能明白,issue 区主要是发 bug 用的,不会用的问题请进 Project X 群,请群友帮忙解决
请问R佬 vision流控它支持mKCP不( 我盯上了那个模拟dns流量的pr(现已合并)
Support, if don't misunderstand title 😎
Feb 26, 2023 21:44:43 Extreme_Ice @.***>:
@mhnhh123[https://github.com/mhnhh123] 希望你能明白,issue 区主要是发 bug 用的,不会用的问题请进 Project X 群,请群友帮忙解决
请问R佬 vision流控它支持mKCP不( 我盯上了那个模拟dns流量的pr(现已合并)
— Reply to this email directly, view it on GitHub[https://github.com/XTLS/Xray-core/issues/1688#issuecomment-1445365618], or unsubscribe[https://github.com/notifications/unsubscribe-auth/AKGBAYH5CO3LLHXHOG74Q53WZNM4VANCNFSM6AAAAAAVDAGNHI]. You are receiving this because you are subscribed to this thread.[Tracking image][https://github.com/notifications/beacon/AKGBAYDHRXOAHUSFEBP223DWZNM4VA5CNFSM6AAAAAAVDAGNHKWGG33NNVSW45C7OR4XAZNMJFZXG5LFINXW23LFNZ2KUY3PNVWWK3TUL5UWJTSWE2DXE.gif]
Vision 理论上支持 mKCP,实际上需要改几行代码才能正常用 mKCP,和不能用于中转是同一个小问题,所以我并不打算修好它
Vision 理论上支持 mKCP,实际上需要改几行代码才能正常用 mKCP,和不能用于中转是同一个小问题,~所以我并不打算修好它~
所以我说盯上了那个伪装DNS流量的pr 希望借此绕过校园网登陆验证
都已经是 UDP 了,用普通 TLS 就行,用 Vision 的意义不大,除了性能好点,但都 mKCP 了应该不在乎性能 吧
都已经是 UDP 了,用普通 TLS 就行,用 Vision 的意义不大,除了性能好点,但都 mKCP 了应该不在乎性能 吧
就目前 vision确实够用了,但是那个校园网贼难破,nslookup时好时坏,正好有人pr了dns流量伪装,所以想用vision防封+mkcp传输层 不过既然伪装dns流量那adguard就寄了。 如果懒得修可以往后放放(
Vision 防封是因为解决了 TLS in TLS,mKCP 是 UDP,混淆一下,再伪装成 DNS 流量,外观早就不是 TCP TLS 了,起不到防封作用
MUX over TLS over mKCP,又有 TLS 的安全级别,延迟又低,不香吗,这样看来可能会给 mKCP 加 REALITY
回复群里:QUIC 没队头阻塞,再暴力发包的话确实更优,但他是要伪装成 DNS 流量,Xray-core 的 QUIC 貌似还没这功能,得加
Vision 防封是因为解决了 TLS in TLS,mKCP 是 UDP,混淆一下,再伪装成 DNS 流量,外观早就不是 TCP TLS 了,起不到防封作用
MUX over TLS over mKCP,又有 TLS 的安全级别,延迟又低,不香吗,~这样看来可能会给 mKCP 加 REALITY~
我回去翻看了下sduoduo233的pr,说不止vmess,其他支持mkcp的也可,既然说到了vision不适合用于此,是不是我得换其他的vless流控才能搞定mkcp
@Extreme-Icer 我的意思是,不要流控,MUX over VLESS over TLS over mKCP,再伪装成 DNS 流量即可
@Extreme-Icer 我的意思是,不要流控,MUX over VLESS over TLS over mKCP,再伪装成 DNS 流量即可
谢谢R佬,我刚想补充这个
@RPRX 请问,相较于“伪装”,能不能发送真实的DNS包,比如,将数据编码后放入TXT记录应答即可
@RPRX 请问,相较于“伪装”,能不能发送真实的DNS包,比如,将数据编码后放入TXT记录应答即可
可以,但它相较于“伪装”并不会更防封,因为它们特征都很明显,想封都能封
xray版本是1.75 服务端 { "log": { "loglevel": "warning" }, "routing": { "domainStrategy": "IPIfNonMatch", "rules": [ { "type": "field", "domain": [ "geosite:category-ads-all" ], "outboundTag": "block" }, { "type": "field", "ip": [ "geoip:cn" ], "outboundTag": "block" } ] }, "inbounds": [ { "listen": "0.0.0.0", "port": 443, "protocol": "vless", "settings": { "clients": [ { "id": "mhnhh123", "flow": "xtls-rprx-vision" } ], "decryption": "none" }, "streamSettings": { "network": "tcp", "security": "reality", "realitySettings": { "show": false, "dest": "8006", "xver": 1, "serverNames": [ "dd.mhnhh.com" ], "privateKey": "9MascsLz6UyX9r9aGXMvd-wxPTgVnY7rCy7L61oZGH0", "shortIds": [ "" ] } }, "sniffing": { "enabled": true, "destOverride": [ "http", "tls" ] } } ], "outbounds": [ { "protocol": "freedom", "tag": "direct" }, { "protocol": "blackhole", "tag": "block" } ], "policy": { "levels": { "0": { "handshake": 3, "connIdle": 180 } } } } 客户端 { "log": { "loglevel": "warning" }, "routing": { "domainStrategy": "IPIfNonMatch", "rules": [ { "type": "field", "domain": [ "geosite:category-ads-all" ], "outboundTag": "block" }, { "type": "field", "domain": [ "geosite:category-games@cn" ], "outboundTag": "direct" }, { "type": "field", "domain": [ "geosite:geolocation-!cn" ], "outboundTag": "proxy" }, { "type": "field", "domain": [ "geosite:cn", "geosite:private" ], "outboundTag": "direct" }, { "type": "field", "ip": [ "geoip:cn", "geoip:private" ], "outboundTag": "direct" } ] }, "inbounds": [ { "listen": "127.0.0.1", "port": 10808, "protocol": "socks", "settings": { "udp": true }, "sniffing": { "enabled": true, "destOverride": [ "http", "tls" ] } }, { "listen": "127.0.0.1", "port": 10809, "protocol": "http", "sniffing": { "enabled": true, "destOverride": [ "http", "tls" ] } } ], "outbounds": [ { "protocol": "vless", "settings": { "vnext": [ { "address": "x.x.x.x", "port": 14443, "users": [ { "id": "mhnhh123", "flow": "xtls-rprx-vision", "encryption": "none" } ] } ] }, "streamSettings": { "network": "tcp", "security": "reality", "realitySettings": { "fingerprint": "chrome", "serverName": "dd.mhnhh.com", "publicKey": "nZHoemu5zMjSMl8JspKjQoohiDx1D1bwBwt3RNKcSxI", "shortId": "", "spiderX": "" } }, "tag": "proxy" }, { "protocol": "freedom", "tag": "direct" }, { "protocol": "blackhole", "tag": "block" } ] } nginx.conf user nginx; worker_processes auto;
error_log /var/log/nginx/error.log notice; pid /var/run/nginx.pid;
events { worker_connections 1024; }
http { log_format main '[$time_local] $remote_addr "$http_referer" "$http_user_agent"'; access_log /var/log/nginx/access.log main;
} 报错 配置成功
[Custom] racknerd 启动服务(2023/2/21 20:44:32)... Xray 1.7.5 (Xray, Penetrates Everything.) Custom (go1.20 windows/amd64) A unified platform for anti-censorship. 2023/02/21 20:44:33 [Info] infra/conf/serial: Reading config: C:\Users\Lenovo\Desktop\v2rayN-Core\guiConfigs\config.json 2023/02/21 20:44:33 [Warning] core: Xray 1.7.5 started 2023/02/21 20:44:33 127.0.0.1:59699 accepted http://149.154.165.120:80/api [proxy] 2023/02/21 20:44:33 127.0.0.1:59700 accepted http://91.108.56.123:80/api [proxy] 2023/02/21 20:44:33 127.0.0.1:59701 accepted http://149.154.165.120:80/api [proxy] 2023/02/21 20:44:33 127.0.0.1:59697 accepted //91.108.56.123:443 [proxy] 2023/02/21 20:44:33 127.0.0.1:59696 accepted //149.154.165.120:443 [proxy] 2023/02/21 20:44:33 127.0.0.1:59698 accepted //149.154.165.120:443 [proxy] 2023/02/21 20:44:33 127.0.0.1:59703 accepted //149.154.165.120:443 [proxy] 2023/02/21 20:44:33 127.0.0.1:59702 accepted //91.108.56.113:443 [proxy] 2023/02/21 20:44:33 127.0.0.1:59714 accepted http://91.108.56.123:80/api [proxy] 2023/02/21 20:44:33 127.0.0.1:59707 accepted http://91.108.56.113:80/api [proxy] 2023/02/21 20:44:33 127.0.0.1:59708 accepted http://149.154.165.120:80/api [proxy] 2023/02/21 20:44:33 127.0.0.1:59715 accepted http://91.108.56.123:80/api [proxy] 2023/02/21 20:44:33 127.0.0.1:59716 accepted http://91.108.56.123:80/api [proxy] 2023/02/21 20:44:33 127.0.0.1:59717 accepted http://91.108.56.113:80/api [proxy] 2023/02/21 20:44:33 127.0.0.1:59704 accepted //91.108.56.123:443 [proxy] 2023/02/21 20:44:33 127.0.0.1:59712 accepted //91.108.56.123:443 [proxy] 2023/02/21 20:44:33 127.0.0.1:59711 accepted //91.108.56.113:443 [proxy] 2023/02/21 20:44:33 127.0.0.1:59713 accepted //91.108.56.123:443 [proxy] 2023/02/21 20:44:33 127.0.0.1:59705 accepted //91.108.56.123:443 [proxy] 2023/02/21 20:44:33 127.0.0.1:59709 accepted //91.108.56.113:443 [proxy] 2023/02/21 20:44:33 127.0.0.1:59710 accepted //91.108.56.123:443 [proxy] 2023/02/21 20:44:33 127.0.0.1:59706 accepted //91.108.56.123:443 [proxy] 2023/02/21 20:44:33 127.0.0.1:59721 accepted http://91.108.56.123:80/api [proxy] 2023/02/21 20:44:33 127.0.0.1:59718 accepted http://91.108.56.123:80/api [proxy] 2023/02/21 20:44:33 127.0.0.1:59719 accepted http://91.108.56.113:80/api [proxy] 2023/02/21 20:44:33 127.0.0.1:59720 accepted http://91.108.56.123:80/api [proxy] 2023/02/21 20:44:33 127.0.0.1:59725 accepted http://149.154.175.50:80/api [proxy] 2023/02/21 20:44:33 127.0.0.1:59724 accepted http://149.154.175.57:80/api [proxy] 2023/02/21 20:44:33 127.0.0.1:59722 accepted //149.154.175.57:443 [proxy] 2023/02/21 20:44:33 127.0.0.1:59723 accepted //149.154.175.50:443 [proxy] 2023/02/21 20:44:33 [Warning] [4030330604] app/proxyman/outbound: failed to process outbound traffic > proxy/vless/outbound: XTLS only supports TCP, mKCP and DomainSocket for now. 2023/02/21 20:44:33 [Warning] [2603141934] app/proxyman/outbound: failed to process outbound traffic > proxy/vless/outbound: XTLS only supports TCP, mKCP and DomainSocket for now. 2023/02/21 20:44:33 [Warning] [806713294] app/proxyman/outbound: failed to process outbound traffic > proxy/vless/outbound: XTLS only supports TCP, mKCP and DomainSocket for now. 2023/02/21 20:44:33 [Warning] [1059026757] app/proxyman/outbound: failed to process outbound traffic > proxy/vless/outbound: XTLS only supports TCP, mKCP and DomainSocket for now. 2023/02/21 20:44:33 [Warning] [1059026757] proxy/http: failed to read response from 149.154.165.120:80 > io: read/write on closed pipe 2023/02/21 20:44:33 127.0.0.1:59758 accepted //149.154.165.120:443 [proxy] 2023/02/21 20:44:33 [Warning] [121582691] app/proxyman/outbound: failed to process outbound traffic > proxy/vless/outbound: XTLS only supports TCP, mKCP and DomainSocket for now. 2023/02/21 20:44:33 [Warning] [3666179473] app/proxyman/outbound: failed to process outbound traffic > proxy/vless/outbound: XTLS only supports TCP, mKCP and DomainSocket for now. 2023/02/21 20:44:33 [Warning] [1629766580] app/proxyman/outbound: failed to process outbound traffic > proxy/vless/outbound: XTLS only supports TCP, mKCP and DomainSocket for now. 2023/02/21 20:44:33 [Warning] [3666179473] proxy/http: failed to read response from 91.108.56.113:80 > io: read/write on closed pipe 2023/02/21 20:44:33 [Warning] [1656114383] app/proxyman/outbound: failed to process outbound traffic > proxy/vless/outbound: XTLS only supports TCP, mKCP and DomainSocket for now. 2023/02/21 20:44:33 [Warning] [1629766580] proxy/http: failed to read response from 149.154.165.120:80 > io: read/write on closed pipe 2023/02/21 20:44:33 [Warning] [1656114383] proxy/http: failed to read response from 149.154.165.120:80 > io: read/write on closed pipe 2023/02/21 20:44:33 [Warning] [1313893300] app/proxyman/outbound: failed to process outbound traffic > proxy/vless/outbound: XTLS only supports TCP, mKCP and DomainSocket for now. 2023/02/21 20:44:33 [Warning] [4017055796] app/proxyman/outbound: failed to process outbound traffic >