2022-08-08 20:57:50 +08:00
### Structure
```json
{
"inbounds": [
{
"type": "trojan",
"tag": "trojan-in",
"listen": "::",
"listen_port": 2080,
"tcp_fast_open": false,
"sniff": false,
"sniff_override_destination": false,
"domain_strategy": "prefer_ipv6",
2022-08-23 23:15:56 +08:00
"proxy_protocol": false,
2022-08-08 20:57:50 +08:00
"users": [
{
"name": "sekai",
"password": "8JCsPssfgS8tiRwiMlhARg=="
}
],
2022-08-20 20:54:20 +08:00
"tls": {},
"fallback": {
"server": "127.0.0.0.1",
"server_port": 8080
2022-08-23 23:15:56 +08:00
},
"transport": {}
2022-08-08 20:57:50 +08:00
}
]
}
```
2022-08-23 23:15:56 +08:00
### Trojan Fields
#### users
Trojan users.
#### tls
TLS configuration, see [TLS inbound structure ](/configuration/shared/tls/#inbound-structure ).
#### fallback
!!! error ""
There is no evidence that GFW detects and blocks Trojan servers based on HTTP responses, and opening the standard http/s port on the server is a much bigger signature.
Fallback server configuration. Disabled if empty.
#### transport
V2Ray Transport configuration, see [V2Ray Transport ](/configuration/shared/v2ray-transport ).
2022-08-08 20:57:50 +08:00
### Listen Fields
#### listen
==Required==
Listen address.
#### listen_port
==Required==
Listen port.
#### tcp_fast_open
Enable tcp fast open for listener.
#### sniff
Enable sniffing.
See [Sniff ](/configuration/route/sniff/ ) for details.
#### sniff_override_destination
Override the connection destination address with the sniffed domain.
If the domain name is invalid (like tor), this will not work.
#### domain_strategy
One of `prefer_ipv4` `prefer_ipv6` `ipv4_only` `ipv6_only` .
If set, the requested domain name will be resolved to IP before routing.
If `sniff_override_destination` is in effect, its value will be taken as a fallback.
2022-08-23 23:15:56 +08:00
#### proxy_protocol
2022-08-20 20:54:20 +08:00
2022-08-23 23:15:56 +08:00
Parse [Proxy Protocol ](https://www.haproxy.org/download/1.8/doc/proxy-protocol.txt ) in the connection header.