| 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253 |
- {
- "log": {
- "loglevel": "debug"
- },
- "inbounds": [
- {
- "port": 443,
- "protocol": "trojan",
- "settings": {
- "clients": [
- {
- "password":"your_password", // password
- "flow": "xtls-rprx-vison"
- }
- ],
- "fallbacks": [
- {
- "dest": "/dev/shm/default.sock",
- "xver": 1
- },
- {
- "alpn": "h2",
- "dest": "/dev/shm/h2c.sock",
- "xver": 1
- }
- ]
- },
- "streamSettings": {
- "network": "tcp",
- "security": "tls",
- "tlsSettings": {
- "alpn": [
- "http/1.1",
- "h2"
- ],
- "certificates": [
- {
- "certificateFile": "/path/to/cert", // Certificate file absolute directory
- "keyFile": "/path/to/key", // Key file absolute directory
- "ocspStapling": 3600 // Verification cycle 3600 Second
- }
- ],
- "minVersion": "1.2" // If it is an ecc certificate, use TLSv1.2 at least. If you don't know the certificate type or it is not an ecc certificate, delete this line
- }
- }
- }
- ],
- "outbounds": [
- {
- "protocol": "freedom"
- }
- ]
- }
|