{
"listen": "::",
"listen_port": 5353,
"tcp_fast_open": false,
"udp_fragment": false,
"sniff": false,
"sniff_override_destination": false,
"sniff_timeout": "300ms",
"domain_strategy": "prefer_ipv6",
"udp_timeout": 300,
"proxy_protocol": false,
"proxy_protocol_accept_no_header": false,
"detour": "another-in"
}
| Field | Available Context |
|---|---|
listen |
Needs to listen on TCP or UDP. |
listen_port |
Needs to listen on TCP or UDP. |
tcp_fast_open |
Needs to listen on TCP. |
udp_timeout |
Needs to assemble UDP connections, currently Tun and Shadowsocks. |
proxy_protocol |
Needs to listen on TCP. |
proxy_protocol_accept_no_header |
When proxy_protocol enabled |
==Required==
Listen address.
Listen port.
Enable TCP Fast Open.
Enable UDP fragmentation.
Enable sniffing.
See Protocol Sniff for details.
Override the connection destination address with the sniffed domain.
If the domain name is invalid (like tor), this will not work.
Timeout for sniffing.
300ms is used by default.
One of prefer_ipv4 prefer_ipv6 ipv4_only ipv6_only.
If set, the requested domain name will be resolved to IP before routing.
If sniff_override_destination is in effect, its value will be taken as a fallback.
UDP NAT expiration time in seconds, default is 300 (5 minutes).
Parse Proxy Protocol in the connection header.
Accept connections without Proxy Protocol header.
If set, connections will be forwarded to the specified inbound.
Requires target inbound support, see Injectable.