mirror of
https://github.com/SagerNet/sing-box.git
synced 2024-11-16 13:22:22 +08:00
1.8 KiB
1.8 KiB
Structure
{
"inbounds": [
{
"type": "trojan",
"tag": "trojan-in",
"listen": "::",
"listen_port": 2080,
"tcp_fast_open": false,
"sniff": false,
"sniff_override_destination": false,
"domain_strategy": "prefer_ipv6",
"proxy_protocol": false,
"users": [
{
"name": "sekai",
"password": "8JCsPssfgS8tiRwiMlhARg=="
}
],
"tls": {},
"fallback": {
"server": "127.0.0.0.1",
"server_port": 8080
},
"transport": {}
}
]
}
Trojan Fields
users
==Required==
Trojan users.
tls
TLS configuration, see TLS.
fallback
!!! error ""
There is no evidence that GFW detects and blocks Trojan servers based on HTTP responses, and opening the standard http/s port on the server is a much bigger signature.
Fallback server configuration. Disabled if empty.
transport
V2Ray Transport configuration, see V2Ray Transport.
Listen Fields
listen
==Required==
Listen address.
listen_port
==Required==
Listen port.
tcp_fast_open
Enable tcp fast open for listener.
sniff
Enable sniffing.
See Protocol Sniff for details.
sniff_override_destination
Override the connection destination address with the sniffed domain.
If the domain name is invalid (like tor), this will not work.
domain_strategy
One of prefer_ipv4
prefer_ipv6
ipv4_only
ipv6_only
.
If set, the requested domain name will be resolved to IP before routing.
If sniff_override_destination
is in effect, its value will be taken as a fallback.
proxy_protocol
Parse Proxy Protocol in the connection header.