direct inbound is a tunnel server.
{
"inbounds": [
{
"type": "direct",
"tag": "direct-in",
"listen": "::",
"listen_port": 5353,
"tcp_fast_open": false,
"sniff": false,
"sniff_override_destination": false,
"domain_strategy": "prefer_ipv6",
"udp_timeout": 300,
"network": "udp",
"override_address": "1.0.0.1",
"override_port": 53
}
]
}
Listen address.
Listen port.
Enable tcp fast open for listener.
Enable sniffing.
Reads domain names for routing, supports HTTP TLS for TCP, QUIC for UDP.
This does not break zero copy, like splice.
Override the connection destination address with the sniffed domain.
If the domain name is invalid (like tor), this will not work.
One of prefer_ipv4 prefer_ipv6 ipv4_only ipv6_only.
If set, the requested domain name will be resolved to IP before routing.
If sniff_override_destination is in effect, its value will be taken as a fallback.
UDP NAT expiration time in seconds, default is 300 (5 minutes).
Listen network, one of tcp udp.
Both if empty.
Override the connection destination address.
Override the connection destination port.