2022-07-15 08:42:02 +08:00
|
|
|
`redirect` inbound is a linux Redirect server.
|
|
|
|
|
|
|
|
### Structure
|
|
|
|
|
|
|
|
```json
|
|
|
|
{
|
|
|
|
"inbounds": [
|
|
|
|
{
|
|
|
|
"type": "redirect",
|
|
|
|
"tag": "redirect-in",
|
|
|
|
"listen": "::",
|
|
|
|
"listen_port": 5353,
|
|
|
|
"sniff": false,
|
|
|
|
"sniff_override_destination": false,
|
2022-07-16 21:49:54 +08:00
|
|
|
"domain_strategy": "prefer_ipv6"
|
2022-07-15 08:42:02 +08:00
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
### Listen Fields
|
|
|
|
|
|
|
|
#### listen
|
|
|
|
|
|
|
|
==Required==
|
|
|
|
|
|
|
|
Listen address.
|
|
|
|
|
|
|
|
#### listen_port
|
|
|
|
|
|
|
|
==Required==
|
|
|
|
|
|
|
|
Listen port.
|
|
|
|
|
|
|
|
#### sniff
|
|
|
|
|
|
|
|
Enable sniffing.
|
|
|
|
|
|
|
|
Reads domain names for routing, supports HTTP TLS for TCP, QUIC for UDP.
|
|
|
|
|
|
|
|
This does not break zero copy, like splice.
|
|
|
|
|
|
|
|
#### sniff_override_destination
|
|
|
|
|
|
|
|
Override the connection destination address with the sniffed domain.
|
|
|
|
|
|
|
|
If the domain name is invalid (like tor), this will not work.
|
|
|
|
|
|
|
|
#### domain_strategy
|
|
|
|
|
|
|
|
One of `prefer_ipv4` `prefer_ipv6` `ipv4_only` `ipv6_only`.
|
|
|
|
|
|
|
|
If set, the requested domain name will be resolved to IP before routing.
|
|
|
|
|
2022-07-16 21:49:54 +08:00
|
|
|
If `sniff_override_destination` is in effect, its value will be taken as a fallback.
|