mirror of
https://github.com/SagerNet/sing-box.git
synced 2024-11-30 04:21:29 +00:00
87 lines
1.6 KiB
Markdown
87 lines
1.6 KiB
Markdown
### Structure
|
|
|
|
```json
|
|
{
|
|
"inbounds": [
|
|
{
|
|
"type": "trojan",
|
|
"tag": "trojan-in",
|
|
|
|
"listen": "::",
|
|
"listen_port": 2080,
|
|
"tcp_fast_open": false,
|
|
"sniff": false,
|
|
"sniff_override_destination": false,
|
|
"domain_strategy": "prefer_ipv6",
|
|
|
|
"users": [
|
|
{
|
|
"name": "sekai",
|
|
"password": "8JCsPssfgS8tiRwiMlhARg=="
|
|
}
|
|
],
|
|
"tls": {},
|
|
"fallback": {
|
|
"server": "127.0.0.0.1",
|
|
"server_port": 8080
|
|
}
|
|
}
|
|
]
|
|
}
|
|
```
|
|
|
|
### Listen Fields
|
|
|
|
#### listen
|
|
|
|
==Required==
|
|
|
|
Listen address.
|
|
|
|
#### listen_port
|
|
|
|
==Required==
|
|
|
|
Listen port.
|
|
|
|
#### tcp_fast_open
|
|
|
|
Enable tcp fast open for listener.
|
|
|
|
#### sniff
|
|
|
|
Enable sniffing.
|
|
|
|
See [Sniff](/configuration/route/sniff/) for details.
|
|
|
|
#### sniff_override_destination
|
|
|
|
Override the connection destination address with the sniffed domain.
|
|
|
|
If the domain name is invalid (like tor), this will not work.
|
|
|
|
#### domain_strategy
|
|
|
|
One of `prefer_ipv4` `prefer_ipv6` `ipv4_only` `ipv6_only`.
|
|
|
|
If set, the requested domain name will be resolved to IP before routing.
|
|
|
|
If `sniff_override_destination` is in effect, its value will be taken as a fallback.
|
|
|
|
### Trojan Fields
|
|
|
|
#### users
|
|
|
|
Trojan users.
|
|
|
|
#### tls
|
|
|
|
TLS configuration, see [TLS inbound structure](/configuration/shared/tls/#inbound-structure).
|
|
|
|
#### fallback
|
|
|
|
!!! error ""
|
|
|
|
There is no evidence that GFW detects and blocks Trojan servers based on HTTP responses, and opening the standard http/s port on the server is a much bigger signature.
|
|
|
|
Fallback server configuration. Disabled if empty. |