mirror of
https://github.com/springzfx/cgproxy.git
synced 2026-02-09 21:14:57 +08:00
Compare commits
25 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
2838ffbb70 | ||
|
|
749fe38ca8 | ||
|
|
c0668fd8d2 | ||
|
|
06ae0b9fc5 | ||
|
|
4e04dcf84a | ||
|
|
c0e9ea24c1 | ||
|
|
f8e0abbb55 | ||
|
|
6c24c68831 | ||
|
|
d3b2dc0465 | ||
|
|
4be7be2083 | ||
|
|
25f94968ae | ||
|
|
3b4b67df33 | ||
|
|
31ae519193 | ||
|
|
7f0ebe9d35 | ||
|
|
236c08172b | ||
|
|
c07ae13030 | ||
|
|
d5ea832b4f | ||
|
|
aa5ca6f204 | ||
|
|
a80187f947 | ||
|
|
dca895c7cc | ||
|
|
08097a54d7 | ||
|
|
bce568d802 | ||
|
|
98c07a31af | ||
|
|
916c11d280 | ||
|
|
72579bc84a |
@@ -1,6 +1,6 @@
|
|||||||
cmake_minimum_required(VERSION 3.10)
|
cmake_minimum_required(VERSION 3.10)
|
||||||
|
|
||||||
project(cgproxy VERSION 3.5)
|
project(cgproxy VERSION 3.8)
|
||||||
add_executable(cgattach cgattach.cpp)
|
add_executable(cgattach cgattach.cpp)
|
||||||
|
|
||||||
install(TARGETS cgattach DESTINATION /usr/bin
|
install(TARGETS cgattach DESTINATION /usr/bin
|
||||||
@@ -21,6 +21,9 @@ install(FILES cgproxy.conf
|
|||||||
DESTINATION /etc/)
|
DESTINATION /etc/)
|
||||||
install(FILES cgroup-tproxy.sh
|
install(FILES cgroup-tproxy.sh
|
||||||
DESTINATION /usr/share/cgproxy/scripts/)
|
DESTINATION /usr/share/cgproxy/scripts/)
|
||||||
|
|
||||||
|
install(FILES readme.md
|
||||||
|
DESTINATION /share/doc/cgproxy/)
|
||||||
|
|
||||||
|
|
||||||
## package for deb and rpm
|
## package for deb and rpm
|
||||||
@@ -48,4 +51,4 @@ set(CONTROL_DIR ${CMAKE_SOURCE_DIR}/control)
|
|||||||
set(CPACK_RPM_POST_INSTALL_SCRIPT_FILE "${CONTROL_DIR}/postinst")
|
set(CPACK_RPM_POST_INSTALL_SCRIPT_FILE "${CONTROL_DIR}/postinst")
|
||||||
set(CPACK_RPM_PRE_UNINSTALL_SCRIPT_FILE "${CONTROL_DIR}/prerm")
|
set(CPACK_RPM_PRE_UNINSTALL_SCRIPT_FILE "${CONTROL_DIR}/prerm")
|
||||||
|
|
||||||
include(CPack)
|
include(CPack)
|
||||||
|
|||||||
40
aur-cgproxy-local/PKGBUILD
Normal file
40
aur-cgproxy-local/PKGBUILD
Normal file
@@ -0,0 +1,40 @@
|
|||||||
|
# Maintainer: Fancy Zhang <springzfx@gmail.com>
|
||||||
|
pkgname=cgproxy-git
|
||||||
|
pkgver=v3.8.r1.gc0668fd
|
||||||
|
pkgrel=1
|
||||||
|
pkgdesc="A transparent proxy program with cgroup2, like proxychains"
|
||||||
|
arch=('x86_64')
|
||||||
|
url="https://github.com/springzfx/cgproxy"
|
||||||
|
license=('')
|
||||||
|
groups=('')
|
||||||
|
makedepends=('cmake')
|
||||||
|
depends=('systemd')
|
||||||
|
provides=('cgproxy')
|
||||||
|
conflicts=('cgproxy')
|
||||||
|
|
||||||
|
curr_dir="$( cd "$( dirname "${BASH_SOURCE[0]}" )" >/dev/null 2>&1 && pwd )"
|
||||||
|
source=("${pkgname}::git+file://${curr_dir}/../.git")
|
||||||
|
# source=("${pkgname}::git+file:///home/fancy/workspace/cgproxy/.git")
|
||||||
|
md5sums=('SKIP')
|
||||||
|
|
||||||
|
pkgver() {
|
||||||
|
cd "$pkgname"
|
||||||
|
( set -o pipefail
|
||||||
|
git describe --long --tags 2>/dev/null | sed 's/\([^-]*-g\)/r\1/;s/-/./g' ||
|
||||||
|
printf "r%s.%s" "$(git rev-list --count HEAD)" "$(git rev-parse --short HEAD)"
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
backup=('etc/cgproxy.conf')
|
||||||
|
install="cgproxy.install"
|
||||||
|
|
||||||
|
build(){
|
||||||
|
cd "$pkgname"
|
||||||
|
mkdir -p build && cd build && cmake .. && make
|
||||||
|
}
|
||||||
|
|
||||||
|
package_cgproxy-git(){
|
||||||
|
cd "$pkgname"/build
|
||||||
|
make DESTDIR=$pkgdir install
|
||||||
|
}
|
||||||
|
|
||||||
8
aur-cgproxy-local/cgproxy.install
Normal file
8
aur-cgproxy-local/cgproxy.install
Normal file
@@ -0,0 +1,8 @@
|
|||||||
|
#!/bin/sh
|
||||||
|
|
||||||
|
post_install(){
|
||||||
|
cat <<'DOC'
|
||||||
|
to start service:
|
||||||
|
systemctl enable --now cgproxy.service
|
||||||
|
DOC
|
||||||
|
}
|
||||||
36
cgattach.cpp
36
cgattach.cpp
@@ -10,6 +10,10 @@
|
|||||||
#include <unistd.h>
|
#include <unistd.h>
|
||||||
using namespace std;
|
using namespace std;
|
||||||
|
|
||||||
|
|
||||||
|
#define error(...) {fprintf(stderr, __VA_ARGS__);fprintf(stderr, "\n");}
|
||||||
|
#define debug(...) {fprintf(stdout, __VA_ARGS__);fprintf(stdout, "\n");}
|
||||||
|
|
||||||
void print_usage() { fprintf(stdout, "usage: cgattach <pid> <cgroup>\n"); }
|
void print_usage() { fprintf(stdout, "usage: cgattach <pid> <cgroup>\n"); }
|
||||||
|
|
||||||
bool exist(string path) {
|
bool exist(string path) {
|
||||||
@@ -26,29 +30,32 @@ bool validate(string pid, string cgroup) {
|
|||||||
if (pid_v && cg_v)
|
if (pid_v && cg_v)
|
||||||
return true;
|
return true;
|
||||||
|
|
||||||
fprintf(stderr, "paramater validate error\n");
|
error("paramater validate error");
|
||||||
print_usage();
|
print_usage();
|
||||||
exit(EXIT_FAILURE);
|
exit(EXIT_FAILURE);
|
||||||
}
|
}
|
||||||
|
|
||||||
string get_cgroup2_mount_point(){
|
string get_cgroup2_mount_point(){
|
||||||
char cgroup2_mount_point[100];
|
char cgroup2_mount_point[100]="";
|
||||||
FILE* fp = popen("findmnt -t cgroup2 -n |cut -d' ' -f 1", "r");
|
FILE* fp = popen("findmnt -t cgroup2 -n -o TARGET", "r");
|
||||||
fscanf(fp,"%s",&cgroup2_mount_point);
|
int count=fscanf(fp,"%s",&cgroup2_mount_point);
|
||||||
fclose(fp);
|
fclose(fp);
|
||||||
|
if (count=0){
|
||||||
|
error("cgroup2 not supported");
|
||||||
|
exit(EXIT_FAILURE);
|
||||||
|
}
|
||||||
return cgroup2_mount_point;
|
return cgroup2_mount_point;
|
||||||
}
|
}
|
||||||
|
|
||||||
int main(int argc, char *argv[]) {
|
int main(int argc, char *argv[]) {
|
||||||
setuid(0);
|
int flag=setuid(0);
|
||||||
setgid(0);
|
if (flag!=0) {
|
||||||
if (getuid() != 0 || getgid() != 0) {
|
perror("cgattach setuid");
|
||||||
fprintf(stderr, "cgattach need suid sticky bit or run with root\n");
|
|
||||||
exit(EXIT_FAILURE);
|
exit(EXIT_FAILURE);
|
||||||
}
|
}
|
||||||
|
|
||||||
if (argc != 3) {
|
if (argc != 3) {
|
||||||
fprintf(stderr, "only need 2 paramaters\n");
|
error("only need 2 paramaters");
|
||||||
print_usage();
|
print_usage();
|
||||||
exit(EXIT_FAILURE);
|
exit(EXIT_FAILURE);
|
||||||
}
|
}
|
||||||
@@ -65,20 +72,19 @@ int main(int argc, char *argv[]) {
|
|||||||
if (!exist(cgroup_target_path)) {
|
if (!exist(cgroup_target_path)) {
|
||||||
if (mkdir(cgroup_target_path.c_str(),
|
if (mkdir(cgroup_target_path.c_str(),
|
||||||
S_IRWXU | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH) == 0) {
|
S_IRWXU | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH) == 0) {
|
||||||
fprintf(stdout, "created cgroup %s success\n", cgroup_target.c_str());
|
debug("created cgroup %s success", cgroup_target.c_str());
|
||||||
} else {
|
} else {
|
||||||
fprintf(stderr, "created cgroup %s failed, errno %d\n",
|
error("created cgroup %s failed, errno %d", cgroup_target.c_str(), errno);
|
||||||
cgroup_target.c_str(), errno);
|
|
||||||
exit(EXIT_FAILURE);
|
exit(EXIT_FAILURE);
|
||||||
}
|
}
|
||||||
// fprintf(stderr, "cgroup %s not exist\n",cgroup_target.c_str());
|
// error("cgroup %s not exist",cgroup_target.c_str());
|
||||||
// exit(EXIT_FAILURE);
|
// exit(EXIT_FAILURE);
|
||||||
}
|
}
|
||||||
|
|
||||||
// put pid to target cgroup
|
// put pid to target cgroup
|
||||||
ofstream procs(cgroup_target_procs, ofstream::app);
|
ofstream procs(cgroup_target_procs, ofstream::app);
|
||||||
if (!procs.is_open()) {
|
if (!procs.is_open()) {
|
||||||
fprintf(stderr, "open file %s failed\n", cgroup_target_procs.c_str());
|
error("open file %s failed", cgroup_target_procs.c_str());
|
||||||
exit(EXIT_FAILURE);
|
exit(EXIT_FAILURE);
|
||||||
}
|
}
|
||||||
procs << pid.c_str() << endl;
|
procs << pid.c_str() << endl;
|
||||||
@@ -86,7 +92,7 @@ int main(int argc, char *argv[]) {
|
|||||||
|
|
||||||
// maybe there some write error, for example process pid may not exist
|
// maybe there some write error, for example process pid may not exist
|
||||||
if (!procs) {
|
if (!procs) {
|
||||||
fprintf(stderr, "write %s to %s failed, maybe process %s not exist\n",
|
error("write %s to %s failed, maybe process %s not exist",
|
||||||
pid.c_str(), cgroup_target_procs.c_str(), pid.c_str());
|
pid.c_str(), cgroup_target_procs.c_str(), pid.c_str());
|
||||||
exit(EXIT_FAILURE);
|
exit(EXIT_FAILURE);
|
||||||
}
|
}
|
||||||
|
|||||||
42
cgproxy.conf
42
cgproxy.conf
@@ -1,34 +1,48 @@
|
|||||||
# see how to configure
|
|
||||||
# https://github.com/springzfx/cgproxy
|
|
||||||
|
|
||||||
########################################################################
|
|
||||||
## cgroup transparent proxy
|
## cgroup transparent proxy
|
||||||
|
## see how to configure, https://github.com/springzfx/cgproxy
|
||||||
|
|
||||||
|
###################################################################################
|
||||||
## any process in cgroup_proxy will be proxied, and cgroup_noproxy the opposite
|
## any process in cgroup_proxy will be proxied, and cgroup_noproxy the opposite
|
||||||
## cgroup must start with slash '/'
|
## note, cgroup must start with slash '/'
|
||||||
|
## the value can be string or bash array
|
||||||
|
## for array, only the first element will be created if not exist
|
||||||
|
## and the rest elements will not, so won't be applied
|
||||||
|
|
||||||
|
### global proxy with v2ray service
|
||||||
# cgroup_proxy="/"
|
# cgroup_proxy="/"
|
||||||
|
# cgroup_noproxy=("/noproxy.slice" "/system.slice/v2ray.service")
|
||||||
|
|
||||||
|
### global proxy with manual `cgnoporxy qv2ray`
|
||||||
|
# cgroup_proxy="/"
|
||||||
|
# cgroup_noproxy="/noproxy.slice"
|
||||||
|
|
||||||
|
### default
|
||||||
cgroup_proxy="/proxy.slice"
|
cgroup_proxy="/proxy.slice"
|
||||||
# cgroup_noproxy="/system.slice/v2ray.service"
|
|
||||||
cgroup_noproxy="/noproxy.slice"
|
cgroup_noproxy="/noproxy.slice"
|
||||||
|
|
||||||
########################################################################
|
|
||||||
|
###################################################################################
|
||||||
## allow as gateway for local network
|
## allow as gateway for local network
|
||||||
enable_gateway=false
|
enable_gateway=false
|
||||||
|
|
||||||
########################################################################
|
|
||||||
|
###################################################################################
|
||||||
## listening port of another proxy process, for example v2ray
|
## listening port of another proxy process, for example v2ray
|
||||||
port=12345
|
port=12345
|
||||||
|
|
||||||
########################################################################
|
|
||||||
## if you set to false, it's traffic won't go through proxy, but still can go direct to internet
|
###################################################################################
|
||||||
|
## if you set to false, it's traffic won't go through proxy,
|
||||||
|
## but still can go direct to internet
|
||||||
|
enable_dns=true
|
||||||
enable_tcp=true
|
enable_tcp=true
|
||||||
enable_udp=true
|
enable_udp=true
|
||||||
enable_ipv4=true
|
enable_ipv4=true
|
||||||
enable_ipv6=true
|
enable_ipv6=true
|
||||||
enable_dns=true
|
|
||||||
|
|
||||||
########################################################################
|
|
||||||
|
###################################################################################
|
||||||
## do not modify this if you don't known what you are doing
|
## do not modify this if you don't known what you are doing
|
||||||
table=100
|
table=100
|
||||||
fwmark=0x01
|
fwmark=0x01
|
||||||
mark_noproxy=0xff
|
mark_newin=0x02
|
||||||
mark_newin=0x02
|
|
||||||
|
|||||||
108
cgroup-tproxy.sh
108
cgroup-tproxy.sh
@@ -30,6 +30,13 @@ cat << 'DOC'
|
|||||||
DOC
|
DOC
|
||||||
}
|
}
|
||||||
|
|
||||||
|
check_root(){
|
||||||
|
uid=$(id -u)
|
||||||
|
[ ! $uid -eq 0 ] && { >&2 echo "permission denied, need root";exit 0; }
|
||||||
|
}
|
||||||
|
|
||||||
|
check_root
|
||||||
|
|
||||||
## any process in this cgroup will be proxied
|
## any process in this cgroup will be proxied
|
||||||
cgroup_proxy="/proxy.slice"
|
cgroup_proxy="/proxy.slice"
|
||||||
cgroup_noproxy="/noproxy.slice"
|
cgroup_noproxy="/noproxy.slice"
|
||||||
@@ -39,22 +46,21 @@ enable_gateway=false
|
|||||||
|
|
||||||
## some variables
|
## some variables
|
||||||
port=12345
|
port=12345
|
||||||
|
|
||||||
|
## some options
|
||||||
|
enable_dns=true
|
||||||
enable_tcp=true
|
enable_tcp=true
|
||||||
enable_udp=true
|
enable_udp=true
|
||||||
enable_ipv4=true
|
enable_ipv4=true
|
||||||
enable_ipv6=true
|
enable_ipv6=true
|
||||||
enable_dns=true
|
|
||||||
|
|
||||||
## do not modify this if you don't known what you are doing
|
## do not modify this if you don't known what you are doing
|
||||||
table=100
|
table=100
|
||||||
fwmark=0x01
|
fwmark=0x01
|
||||||
mark_noproxy=0xff
|
|
||||||
make_newin=0x02
|
make_newin=0x02
|
||||||
|
|
||||||
## cgroup things
|
## cgroup things
|
||||||
# cgroup_mount_point=$(findmnt -t cgroup,cgroup2 -n -J|jq '.filesystems[0].target')
|
cgroup_mount_point=$(findmnt -t cgroup2 -n -o TARGET)
|
||||||
# cgroup_type=$(findmnt -t cgroup,cgroup2 -n -J|jq '.filesystems[0].fstype')
|
|
||||||
cgroup_mount_point=$(findmnt -t cgroup2 -n |cut -d' ' -f 1)
|
|
||||||
cgroup_type="cgroup2"
|
cgroup_type="cgroup2"
|
||||||
cgroup_procs_file="cgroup.procs"
|
cgroup_procs_file="cgroup.procs"
|
||||||
|
|
||||||
@@ -63,6 +69,7 @@ for i in "$@"
|
|||||||
do
|
do
|
||||||
case $i in
|
case $i in
|
||||||
stop)
|
stop)
|
||||||
|
echo "stopping tproxy iptables"
|
||||||
iptables -t mangle -D PREROUTING -j TPROXY_PRE
|
iptables -t mangle -D PREROUTING -j TPROXY_PRE
|
||||||
iptables -t mangle -D OUTPUT -j TPROXY_OUT
|
iptables -t mangle -D OUTPUT -j TPROXY_OUT
|
||||||
iptables -t mangle -F TPROXY_PRE
|
iptables -t mangle -F TPROXY_PRE
|
||||||
@@ -85,13 +92,12 @@ case $i in
|
|||||||
ip -6 route flush table $table
|
ip -6 route flush table $table
|
||||||
## may not exist, just ignore, and tracking their existence is not reliable
|
## may not exist, just ignore, and tracking their existence is not reliable
|
||||||
iptables -t nat -D POSTROUTING -m owner ! --socket-exists -j MASQUERADE &> /dev/null
|
iptables -t nat -D POSTROUTING -m owner ! --socket-exists -j MASQUERADE &> /dev/null
|
||||||
ip6tables -t nat -D POSTROUTING -m owner ! --socket-exists -j MASQUERADE &> /dev/null
|
ip6tables -t nat -D POSTROUTING -m owner ! --socket-exists -s fc00::/7 -j MASQUERADE &> /dev/null
|
||||||
exit 0
|
exit 0
|
||||||
;;
|
;;
|
||||||
--config=*)
|
--config=*)
|
||||||
config=${i#*=}
|
config=${i#*=}
|
||||||
source $config
|
source $config
|
||||||
shift
|
|
||||||
;;
|
;;
|
||||||
--help)
|
--help)
|
||||||
print_help
|
print_help
|
||||||
@@ -109,8 +115,8 @@ test -d $cgroup_mount_point$cgroup_noproxy || mkdir $cgroup_mount_point$cgroup_
|
|||||||
ip rule add fwmark $fwmark table $table
|
ip rule add fwmark $fwmark table $table
|
||||||
ip route add local default dev lo table $table
|
ip route add local default dev lo table $table
|
||||||
iptables -t mangle -N TPROXY_ENT
|
iptables -t mangle -N TPROXY_ENT
|
||||||
iptables -t mangle -A TPROXY_ENT -p tcp -j TPROXY --on-ip 127.0.0.1 --on-port $port --tproxy-mark $fwmark
|
iptables -t mangle -A TPROXY_ENT -p tcp -j TPROXY --on-ip localhost --on-port $port --tproxy-mark $fwmark
|
||||||
iptables -t mangle -A TPROXY_ENT -p udp -j TPROXY --on-ip 127.0.0.1 --on-port $port --tproxy-mark $fwmark
|
iptables -t mangle -A TPROXY_ENT -p udp -j TPROXY --on-ip localhost --on-port $port --tproxy-mark $fwmark
|
||||||
|
|
||||||
iptables -t mangle -N TPROXY_PRE
|
iptables -t mangle -N TPROXY_PRE
|
||||||
iptables -t mangle -A TPROXY_PRE -m socket --transparent -j MARK --set-mark $fwmark
|
iptables -t mangle -A TPROXY_PRE -m socket --transparent -j MARK --set-mark $fwmark
|
||||||
@@ -119,76 +125,78 @@ iptables -t mangle -A TPROXY_PRE -p icmp -j RETURN
|
|||||||
iptables -t mangle -A TPROXY_PRE -p udp --dport 53 -j TPROXY_ENT
|
iptables -t mangle -A TPROXY_PRE -p udp --dport 53 -j TPROXY_ENT
|
||||||
iptables -t mangle -A TPROXY_PRE -p tcp --dport 53 -j TPROXY_ENT
|
iptables -t mangle -A TPROXY_PRE -p tcp --dport 53 -j TPROXY_ENT
|
||||||
iptables -t mangle -A TPROXY_PRE -m addrtype --dst-type LOCAL -j RETURN
|
iptables -t mangle -A TPROXY_PRE -m addrtype --dst-type LOCAL -j RETURN
|
||||||
iptables -t mangle -A TPROXY_PRE -m pkttype --pkt-type broadcast -j RETURN
|
iptables -t mangle -A TPROXY_PRE -m addrtype ! --dst-type UNICAST -j RETURN
|
||||||
iptables -t mangle -A TPROXY_PRE -m pkttype --pkt-type multicast -j RETURN
|
|
||||||
iptables -t mangle -A TPROXY_PRE -j TPROXY_ENT
|
iptables -t mangle -A TPROXY_PRE -j TPROXY_ENT
|
||||||
iptables -t mangle -A PREROUTING -j TPROXY_PRE
|
iptables -t mangle -A PREROUTING -j TPROXY_PRE
|
||||||
|
|
||||||
iptables -t mangle -N TPROXY_OUT
|
iptables -t mangle -N TPROXY_OUT
|
||||||
iptables -t mangle -A TPROXY_OUT -o lo -j RETURN
|
|
||||||
iptables -t mangle -A TPROXY_OUT -p icmp -j RETURN
|
iptables -t mangle -A TPROXY_OUT -p icmp -j RETURN
|
||||||
iptables -t mangle -A TPROXY_OUT -m connmark --mark $make_newin -j RETURN
|
iptables -t mangle -A TPROXY_OUT -m connmark --mark $make_newin -j RETURN
|
||||||
iptables -t mangle -A TPROXY_OUT -m pkttype --pkt-type broadcast -j RETURN
|
iptables -t mangle -A TPROXY_OUT -m addrtype --dst-type LOCAL -j RETURN
|
||||||
iptables -t mangle -A TPROXY_OUT -m pkttype --pkt-type multicast -j RETURN
|
iptables -t mangle -A TPROXY_OUT -m addrtype ! --dst-type UNICAST -j RETURN
|
||||||
iptables -t mangle -A TPROXY_OUT -m mark --mark $mark_noproxy -j RETURN
|
for cg in ${cgroup_noproxy[@]}; do
|
||||||
iptables -t mangle -A TPROXY_OUT -m cgroup --path $cgroup_noproxy -j RETURN
|
iptables -t mangle -A TPROXY_OUT -m cgroup --path $cg -j RETURN
|
||||||
iptables -t mangle -A TPROXY_OUT -m cgroup --path $cgroup_proxy -j MARK --set-mark $fwmark
|
done
|
||||||
|
for cg in ${cgroup_proxy[@]}; do
|
||||||
|
iptables -t mangle -A TPROXY_OUT -m cgroup --path $cg -j MARK --set-mark $fwmark
|
||||||
|
done
|
||||||
iptables -t mangle -A OUTPUT -j TPROXY_OUT
|
iptables -t mangle -A OUTPUT -j TPROXY_OUT
|
||||||
|
|
||||||
#ipv6#
|
#ipv6#
|
||||||
ip -6 rule add fwmark $fwmark table $table
|
ip -6 rule add fwmark $fwmark table $table
|
||||||
ip -6 route add local default dev lo table $table
|
ip -6 route add local default dev lo table $table
|
||||||
ip6tables -t mangle -N TPROXY_ENT
|
ip6tables -t mangle -N TPROXY_ENT
|
||||||
ip6tables -t mangle -A TPROXY_ENT -p tcp -j TPROXY --on-ip ::1 --on-port $port --tproxy-mark $fwmark
|
ip6tables -t mangle -A TPROXY_ENT -p tcp -j TPROXY --on-ip localhost --on-port $port --tproxy-mark $fwmark
|
||||||
ip6tables -t mangle -A TPROXY_ENT -p udp -j TPROXY --on-ip ::1 --on-port $port --tproxy-mark $fwmark
|
ip6tables -t mangle -A TPROXY_ENT -p udp -j TPROXY --on-ip localhost --on-port $port --tproxy-mark $fwmark
|
||||||
|
|
||||||
ip6tables -t mangle -N TPROXY_PRE
|
ip6tables -t mangle -N TPROXY_PRE
|
||||||
ip6tables -t mangle -A TPROXY_PRE -m socket --transparent -j MARK --set-mark $fwmark
|
ip6tables -t mangle -A TPROXY_PRE -m socket --transparent -j MARK --set-mark $fwmark
|
||||||
ip6tables -t mangle -A TPROXY_PRE -m socket --transparent -j RETURN
|
ip6tables -t mangle -A TPROXY_PRE -m socket --transparent -j RETURN
|
||||||
ip6tables -t mangle -A TPROXY_PRE -p icmp -j RETURN
|
ip6tables -t mangle -A TPROXY_PRE -p icmpv6 -j RETURN
|
||||||
ip6tables -t mangle -A TPROXY_PRE -p udp --dport 53 -j TPROXY_ENT
|
ip6tables -t mangle -A TPROXY_PRE -p udp --dport 53 -j TPROXY_ENT
|
||||||
ip6tables -t mangle -A TPROXY_PRE -p tcp --dport 53 -j TPROXY_ENT
|
ip6tables -t mangle -A TPROXY_PRE -p tcp --dport 53 -j TPROXY_ENT
|
||||||
ip6tables -t mangle -A TPROXY_PRE -m addrtype --dst-type LOCAL -j RETURN
|
ip6tables -t mangle -A TPROXY_PRE -m addrtype --dst-type LOCAL -j RETURN
|
||||||
ip6tables -t mangle -A TPROXY_PRE -m pkttype --pkt-type broadcast -j RETURN
|
ip6tables -t mangle -A TPROXY_PRE -m addrtype ! --dst-type UNICAST -j RETURN
|
||||||
ip6tables -t mangle -A TPROXY_PRE -m pkttype --pkt-type multicast -j RETURN
|
|
||||||
ip6tables -t mangle -A TPROXY_PRE -j TPROXY_ENT
|
ip6tables -t mangle -A TPROXY_PRE -j TPROXY_ENT
|
||||||
ip6tables -t mangle -A PREROUTING -j TPROXY_PRE
|
ip6tables -t mangle -A PREROUTING -j TPROXY_PRE
|
||||||
|
|
||||||
ip6tables -t mangle -N TPROXY_OUT
|
ip6tables -t mangle -N TPROXY_OUT
|
||||||
ip6tables -t mangle -A TPROXY_OUT -o lo -j RETURN
|
ip6tables -t mangle -A TPROXY_OUT -p icmpv6 -j RETURN
|
||||||
ip6tables -t mangle -A TPROXY_OUT -p icmp -j RETURN
|
|
||||||
ip6tables -t mangle -A TPROXY_OUT -m pkttype --pkt-type broadcast -j RETURN
|
|
||||||
ip6tables -t mangle -A TPROXY_OUT -m pkttype --pkt-type multicast -j RETURN
|
|
||||||
ip6tables -t mangle -A TPROXY_OUT -m connmark --mark $make_newin -j RETURN
|
ip6tables -t mangle -A TPROXY_OUT -m connmark --mark $make_newin -j RETURN
|
||||||
ip6tables -t mangle -A TPROXY_OUT -m mark --mark $mark_noproxy -j RETURN
|
ip6tables -t mangle -A TPROXY_OUT -m addrtype --dst-type LOCAL -j RETURN
|
||||||
ip6tables -t mangle -A TPROXY_OUT -m cgroup --path $cgroup_noproxy -j RETURN
|
ip6tables -t mangle -A TPROXY_OUT -m addrtype ! --dst-type UNICAST -j RETURN
|
||||||
ip6tables -t mangle -A TPROXY_OUT -m cgroup --path $cgroup_proxy -j MARK --set-mark $fwmark
|
for cg in ${cgroup_noproxy[@]}; do
|
||||||
|
ip6tables -t mangle -A TPROXY_OUT -m cgroup --path $cg -j RETURN
|
||||||
|
done
|
||||||
|
for cg in ${cgroup_proxy[@]}; do
|
||||||
|
ip6tables -t mangle -A TPROXY_OUT -m cgroup --path $cg -j MARK --set-mark $fwmark
|
||||||
|
done
|
||||||
ip6tables -t mangle -A OUTPUT -j TPROXY_OUT
|
ip6tables -t mangle -A OUTPUT -j TPROXY_OUT
|
||||||
|
|
||||||
## allow to disable, order is important
|
## allow to disable, order is important
|
||||||
$enable_dns || iptables -t mangle -I TPROXY_OUT -p udp --dport 53 -j RETURN
|
$enable_dns || iptables -t mangle -I TPROXY_OUT -p udp --dport 53 -j RETURN
|
||||||
$enable_dns || ip6tables -t mangle -I TPROXY_OUT -p udp --dport 53 -j RETURN
|
$enable_dns || ip6tables -t mangle -I TPROXY_OUT -p udp --dport 53 -j RETURN
|
||||||
$enable_udp || iptables -t mangle -I TPROXY_OUT -p udp -j RETURN
|
$enable_udp || iptables -t mangle -I TPROXY_OUT -p udp -j RETURN
|
||||||
$enable_udp || ip6tables -t mangle -I TPROXY_OUT -p udp -j RETURN
|
$enable_udp || ip6tables -t mangle -I TPROXY_OUT -p udp -j RETURN
|
||||||
$enable_tcp || iptables -t mangle -I TPROXY_OUT -p tcp -j RETURN
|
$enable_tcp || iptables -t mangle -I TPROXY_OUT -p tcp -j RETURN
|
||||||
$enable_tcp || ip6tables -t mangle -I TPROXY_OUT -p tcp -j RETURN
|
$enable_tcp || ip6tables -t mangle -I TPROXY_OUT -p tcp -j RETURN
|
||||||
$enable_ipv4 || iptables -t mangle -I TPROXY_OUT -j RETURN
|
$enable_ipv4 || iptables -t mangle -I TPROXY_OUT -j RETURN
|
||||||
$enable_ipv6 || ip6tables -t mangle -I TPROXY_OUT -j RETURN
|
$enable_ipv6 || ip6tables -t mangle -I TPROXY_OUT -j RETURN
|
||||||
|
|
||||||
if $enable_gateway; then
|
if $enable_gateway; then
|
||||||
$enable_dns || iptables -t mangle -I TPROXY_PRE -p udp --dport 53 -j RETURN
|
$enable_dns || iptables -t mangle -I TPROXY_PRE -p udp --dport 53 -j RETURN
|
||||||
$enable_dns || ip6tables -t mangle -I TPROXY_PRE -p udp --dport 53 -j RETURN
|
$enable_dns || ip6tables -t mangle -I TPROXY_PRE -p udp --dport 53 -j RETURN
|
||||||
$enable_udp || iptables -t mangle -I TPROXY_PRE -p udp -j RETURN
|
$enable_udp || iptables -t mangle -I TPROXY_PRE -p udp -j RETURN
|
||||||
$enable_udp || ip6tables -t mangle -I TPROXY_PRE -p udp -j RETURN
|
$enable_udp || ip6tables -t mangle -I TPROXY_PRE -p udp -j RETURN
|
||||||
$enable_tcp || iptables -t mangle -I TPROXY_PRE -p tcp -j RETURN
|
$enable_tcp || iptables -t mangle -I TPROXY_PRE -p tcp -j RETURN
|
||||||
$enable_tcp || ip6tables -t mangle -I TPROXY_PRE -p tcp -j RETURN
|
$enable_tcp || ip6tables -t mangle -I TPROXY_PRE -p tcp -j RETURN
|
||||||
$enable_ipv4 || iptables -t mangle -I TPROXY_PRE -j RETURN
|
$enable_ipv4 || iptables -t mangle -I TPROXY_PRE -j RETURN
|
||||||
$enable_ipv6 || ip6tables -t mangle -I TPROXY_PRE -j RETURN
|
$enable_ipv6 || ip6tables -t mangle -I TPROXY_PRE -j RETURN
|
||||||
fi
|
fi
|
||||||
|
|
||||||
## do not handle local device connection through tproxy if gateway is not enabled
|
## do not handle local device connection through tproxy if gateway is not enabled
|
||||||
$enable_gateway || iptables -t mangle -I TPROXY_PRE -m addrtype ! --src-type LOCAL -m addrtype ! --dst-type LOCAL -j RETURN
|
$enable_gateway || iptables -t mangle -I TPROXY_PRE -m addrtype ! --src-type LOCAL -j RETURN
|
||||||
$enable_gateway || ip6tables -t mangle -I TPROXY_PRE -m addrtype ! --src-type LOCAL -m addrtype ! --dst-type LOCAL -j RETURN
|
$enable_gateway || ip6tables -t mangle -I TPROXY_PRE -m addrtype ! --src-type LOCAL -j RETURN
|
||||||
|
|
||||||
## make sure following rules are the first in chain TPROXY_PRE to mark new incoming connection or gateway proxy connection
|
## make sure following rules are the first in chain TPROXY_PRE to mark new incoming connection or gateway proxy connection
|
||||||
## so must put at last to insert first
|
## so must put at last to insert first
|
||||||
@@ -197,14 +205,14 @@ ip6tables -t mangle -I TPROXY_PRE -m addrtype ! --src-type LOCAL -m conntrack --
|
|||||||
|
|
||||||
## message for user
|
## message for user
|
||||||
cat << DOC
|
cat << DOC
|
||||||
noproxy cgroup: $cgroup_noproxy
|
noproxy cgroup: ${cgroup_noproxy[@]}
|
||||||
proxied cgroup: $cgroup_proxy
|
proxied cgroup: ${cgroup_proxy[@]}
|
||||||
DOC
|
DOC
|
||||||
|
|
||||||
|
|
||||||
if $enable_gateway; then
|
if $enable_gateway; then
|
||||||
iptables -t nat -A POSTROUTING -m owner ! --socket-exists -j MASQUERADE
|
iptables -t nat -A POSTROUTING -m owner ! --socket-exists -j MASQUERADE
|
||||||
ip6tables -t nat -A POSTROUTING -m owner ! --socket-exists -j MASQUERADE
|
ip6tables -t nat -A POSTROUTING -m owner ! --socket-exists -s fc00::/7 -j MASQUERADE # only masquerade ipv6 private address
|
||||||
sysctl -w net.ipv4.ip_forward=1
|
sysctl -w net.ipv4.ip_forward=1
|
||||||
sysctl -w net.ipv6.conf.all.forwarding=1
|
sysctl -w net.ipv6.conf.all.forwarding=1
|
||||||
echo "gateway enabled"
|
echo "gateway enabled"
|
||||||
|
|||||||
97
readme.md
97
readme.md
@@ -1,3 +1,5 @@
|
|||||||
|
|
||||||
|
|
||||||
# Transparent Proxy with cgroup v2
|
# Transparent Proxy with cgroup v2
|
||||||
|
|
||||||
|
|
||||||
@@ -6,7 +8,7 @@
|
|||||||
|
|
||||||
cgproxy will transparent proxy anything running in specific cgroup. It resembles with *proxychains* and *tsock*, but without their disadvantages, and more powerfull.
|
cgproxy will transparent proxy anything running in specific cgroup. It resembles with *proxychains* and *tsock*, but without their disadvantages, and more powerfull.
|
||||||
|
|
||||||
It aslo supports global transparent proxy and gateway proxy. See [Global transparent proxy](#global-transparent-proxy) and [Gateway proxy](#gateway-proxy)
|
It aslo supports global transparent proxy and gateway proxy. See [Global transparent proxy](#global-transparent-proxy) and [Gateway proxy](#gateway-proxy).
|
||||||
|
|
||||||
<!--ts-->
|
<!--ts-->
|
||||||
|
|
||||||
@@ -36,27 +38,26 @@ It aslo supports global transparent proxy and gateway proxy. See [Global transpa
|
|||||||
|
|
||||||
- TPROXY
|
- TPROXY
|
||||||
|
|
||||||
A process listening on port (e.g. 12345) to accept iptables TPROXY, for example v2ray's dokodemo-door in tproxy mode.
|
A process listening on port (e.g. 12345) to accept iptables TPROXY, for example v2ray's dokodemo-door in tproxy mode.
|
||||||
|
|
||||||
## How to install
|
## How to install
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
mkdir build && cd build && cmake .. && make && make install
|
mkdir build && cd build && cmake .. && make && sudo make install
|
||||||
```
|
```
|
||||||
|
|
||||||
- It is alreay in [archlinux AUR](https://aur.archlinux.org/packages/cgproxy/).
|
- It is alreay in [archlinux AUR](https://aur.archlinux.org/packages/?K=cgproxy).
|
||||||
|
|
||||||
- DEB and RPM are packaged in [release page](https://github.com/springzfx/cgproxy/releases).
|
- DEB and RPM are packaged in [release page](https://github.com/springzfx/cgproxy/releases).
|
||||||
|
|
||||||
## How to use
|
## How to use
|
||||||
|
|
||||||
- First enable service
|
- First enable and start service
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
sudo systemctl enable --now cgproxy.service
|
sudo systemctl enable --now cgproxy.service
|
||||||
sudo systemctl status cgproxy.service
|
|
||||||
```
|
```
|
||||||
|
|
||||||
- Then prefix with cgproxy with your command, just like proxychains
|
- Then prefix with cgproxy with your command, just like proxychains
|
||||||
|
|
||||||
```
|
```
|
||||||
@@ -69,39 +70,59 @@ mkdir build && cd build && cmake .. && make && make install
|
|||||||
cgproxy curl -vIs https://www.google.com
|
cgproxy curl -vIs https://www.google.com
|
||||||
```
|
```
|
||||||
|
|
||||||
|
- To completely stop
|
||||||
|
```
|
||||||
|
sudo systemctl disable --now cgproxy.service
|
||||||
|
```
|
||||||
|
----
|
||||||
<details>
|
<details>
|
||||||
<summary>More config in `/etc/cgproxy.conf` (click to expand)</summary>
|
<summary>More config in <i>/etc/cgproxy.conf</i> (click to expand)</summary>
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
########################################################################
|
###################################################################################
|
||||||
## cgroup transparent proxy
|
|
||||||
## any process in cgroup_proxy will be proxied, and cgroup_noproxy the opposite
|
## any process in cgroup_proxy will be proxied, and cgroup_noproxy the opposite
|
||||||
## cgroup must start with slash '/'
|
## note, cgroup must start with slash '/'
|
||||||
|
## the value can be string or bash array
|
||||||
|
## for array, only the first element will be created if not exist
|
||||||
|
## and the rest elements will not, so won't be applied
|
||||||
|
|
||||||
|
### global proxy with v2ray service
|
||||||
# cgroup_proxy="/"
|
# cgroup_proxy="/"
|
||||||
|
# cgroup_noproxy=("/noproxy.slice" "/system.slice/v2ray.service")
|
||||||
|
|
||||||
|
### global proxy with manual `cgnoporxy qv2ray`
|
||||||
|
# cgroup_proxy="/"
|
||||||
|
# cgroup_noproxy="/noproxy.slice"
|
||||||
|
|
||||||
|
### default
|
||||||
cgroup_proxy="/proxy.slice"
|
cgroup_proxy="/proxy.slice"
|
||||||
cgroup_noproxy="/noproxy.slice"
|
cgroup_noproxy="/noproxy.slice"
|
||||||
|
|
||||||
########################################################################
|
|
||||||
|
###################################################################################
|
||||||
## allow as gateway for local network
|
## allow as gateway for local network
|
||||||
enable_gateway=false
|
enable_gateway=false
|
||||||
|
|
||||||
########################################################################
|
|
||||||
|
###################################################################################
|
||||||
## listening port of another proxy process, for example v2ray
|
## listening port of another proxy process, for example v2ray
|
||||||
port=12345
|
port=12345
|
||||||
|
|
||||||
########################################################################
|
|
||||||
## if you set to false, it's traffic won't go through proxy, but still can go direct to internet
|
###################################################################################
|
||||||
|
## if you set to false, it's traffic won't go through proxy,
|
||||||
|
## but still can go direct to internet
|
||||||
|
enable_dns=true
|
||||||
enable_tcp=true
|
enable_tcp=true
|
||||||
enable_udp=true
|
enable_udp=true
|
||||||
enable_ipv4=true
|
enable_ipv4=true
|
||||||
enable_ipv6=true
|
enable_ipv6=true
|
||||||
enable_dns=true
|
|
||||||
|
|
||||||
########################################################################
|
|
||||||
|
###################################################################################
|
||||||
## do not modify this if you don't known what you are doing
|
## do not modify this if you don't known what you are doing
|
||||||
table=100
|
table=100
|
||||||
fwmark=0x01
|
fwmark=0x01
|
||||||
mark_noproxy=0xff
|
|
||||||
mark_newin=0x02
|
mark_newin=0x02
|
||||||
```
|
```
|
||||||
</details>
|
</details>
|
||||||
@@ -113,24 +134,29 @@ sudo systemctl restart cgproxy.service
|
|||||||
|
|
||||||
## Global transparent proxy
|
## Global transparent proxy
|
||||||
|
|
||||||
- First, set **cgroup_proxy="/"** in `/etc/cgproxy.conf`, this will proxy all connection
|
- Set `cgroup_proxy="/"` in */etc/cgproxy.conf*, this will proxy all connection
|
||||||
|
|
||||||
- Then, run your proxy software in cgroup_noproxy to allow direct to internet
|
- And allow your proxy program (v2ray) direct to internet, two ways:
|
||||||
|
- active way
|
||||||
|
|
||||||
```bash
|
run `cgnoproxy <PROXY PROGRAM>`
|
||||||
cgnoproxy <PROXY PROGRAM>
|
|
||||||
# qv2ray as example
|
example: `cgnoproxy sudo v2ray -config config_file`
|
||||||
cgnoproxy qv2ray
|
|
||||||
# v2ray as example
|
example: `cgnoproxy qv2ray`
|
||||||
cgnoproxy sudo v2ray --config config_file
|
|
||||||
```
|
- passive way, useful if you run v2ray as service
|
||||||
|
|
||||||
- Finally, restart service `sudo systemctl restart cgproxy.service`, that's all
|
set `cgroup_noproxy="<PROXY PROGRAM's CGROUP>"`
|
||||||
|
|
||||||
|
example: `cgroup_noproxy=("/noproxy.slice" "/system.slice/v2ray.service")`
|
||||||
|
|
||||||
|
- Finally, restart cgproxy service, that's all
|
||||||
|
|
||||||
## Gateway proxy
|
## Gateway proxy
|
||||||
|
|
||||||
- Set **enable_gateway=true** in `/etc/cgproxy.conf` and restart service
|
- Set `enable_gateway=true` in */etc/cgproxy.conf*
|
||||||
- Run your proxy software in cgroup_noproxy to allow direct to internet as above. This is necessary when you use global transparent proxy the same time.
|
- And allow your proxy software (v2ray) direct to internet, described above
|
||||||
- Other device set this host as gateway, and set public dns if necessary
|
- Other device set this host as gateway, and set public dns if necessary
|
||||||
|
|
||||||
## Other useful tools provided in this project
|
## Other useful tools provided in this project
|
||||||
@@ -159,7 +185,7 @@ sudo systemctl restart cgproxy.service
|
|||||||
|
|
||||||
## NOTES
|
## NOTES
|
||||||
|
|
||||||
- `cgattach` attach pid to specific cgroup, and has *suid* bit set by default, be careful to use on multi-user server for securiry. To avoid this situation, you can remove the *suid* bit , then it will fallback to use *sudo*, with *visudo* you can restrict permission or set NOPASSWD for youself.
|
- `cgattach` has *suid* bit set by default, be careful to use on multi-user server for securiry. To avoid this situation, you can remove the *suid* bit , then it will fallback to use *sudo*, with *sudoer* you can restrict permission or set NOPASSWD for youself.
|
||||||
|
|
||||||
- v2ray TPROXY need root or special permission
|
- v2ray TPROXY need root or special permission
|
||||||
|
|
||||||
@@ -167,13 +193,14 @@ sudo systemctl restart cgproxy.service
|
|||||||
sudo setcap "cap_net_admin,cap_net_bind_service=ep" /usr/lib/v2ray/v2ray
|
sudo setcap "cap_net_admin,cap_net_bind_service=ep" /usr/lib/v2ray/v2ray
|
||||||
```
|
```
|
||||||
|
|
||||||
- Why not outbound mark solution, because in v2ray [when `"localhost"` is used, out-going DNS traffic is not controlled by V2Ray](https://www.v2fly.org/en/configuration/dns.html), so no mark at all, that's pitty.
|
- Why not outbound mark solution, because in v2ray [when `"localhost"` is used, out-going DNS traffic is not controlled by V2Ray](https://www.v2fly.org/en/configuration/dns.html), so no mark at all, that's pity.
|
||||||
|
|
||||||
## TIPS
|
## TIPS
|
||||||
|
|
||||||
- `systemd-cgls` to see the cgroup hierarchical tree.
|
- `systemd-cgls` to see the cgroup hierarchical tree.
|
||||||
- v2ray full config exmaple in [v2ray_buid](https://github.com/springzfx/cgproxy/tree/master/v2ray_buid), more to see [v2ray multi-file config](https://www.v2fly.org/chapter_02/multiple_config.html)
|
- Check cgroup2 support `findmnt -t cgroup2`
|
||||||
- Qv2ray config example
|
- Offer you v2ray service and full config exmaple in [v2ray_config](https://github.com/springzfx/cgproxy/tree/master/v2ray_config)
|
||||||
|
- Offer you qv2ray config example
|
||||||
|
|
||||||
|
|
||||||

|

|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
{
|
{
|
||||||
"log": {
|
"log": {
|
||||||
"loglevel": "debug"
|
"loglevel": "none"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,6 +1,11 @@
|
|||||||
{
|
{
|
||||||
"dns": {
|
"dns": {
|
||||||
|
"hosts": {
|
||||||
|
"geosite:category-ads": "127.0.0.1"
|
||||||
|
},
|
||||||
"servers": [
|
"servers": [
|
||||||
|
"https+local://223.5.5.5/dns-query",
|
||||||
|
"https://1.1.1.1/dns-query",
|
||||||
{
|
{
|
||||||
"address": "localhost",
|
"address": "localhost",
|
||||||
"port": 53,
|
"port": 53,
|
||||||
@@ -10,9 +15,7 @@
|
|||||||
"expectIPs": [
|
"expectIPs": [
|
||||||
"geoip:cn"
|
"geoip:cn"
|
||||||
]
|
]
|
||||||
},
|
}
|
||||||
"https+local://1.1.1.1/dns-query",
|
|
||||||
"223.6.6.6"
|
|
||||||
],
|
],
|
||||||
"tag": "dns_inbound"
|
"tag": "dns_inbound"
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -2,6 +2,20 @@
|
|||||||
"routing": {
|
"routing": {
|
||||||
"domainStrategy": "IPIfNonMatch",
|
"domainStrategy": "IPIfNonMatch",
|
||||||
"rules": [
|
"rules": [
|
||||||
|
{
|
||||||
|
"domain": [
|
||||||
|
"geosite:category-ads-all"
|
||||||
|
],
|
||||||
|
"outboundTag": "outBound_BLACKHOLE",
|
||||||
|
"type": "field"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"inboundTag": [
|
||||||
|
"inbound_API"
|
||||||
|
],
|
||||||
|
"outboundTag": "API",
|
||||||
|
"type": "field"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"outboundTag": "dns-out",
|
"outboundTag": "dns-out",
|
||||||
"port": "53",
|
"port": "53",
|
||||||
@@ -20,27 +34,6 @@
|
|||||||
"outboundTag": "outBound_PROXY",
|
"outboundTag": "outBound_PROXY",
|
||||||
"type": "field"
|
"type": "field"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"ip": [
|
|
||||||
"geoip:private"
|
|
||||||
],
|
|
||||||
"outboundTag": "outBound_DIRECT",
|
|
||||||
"type": "field"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"domain": [
|
|
||||||
"geosite:category-ads-all"
|
|
||||||
],
|
|
||||||
"outboundTag": "outBound_BLACKHOLE",
|
|
||||||
"type": "field"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"ip": [
|
|
||||||
"geoip:cn"
|
|
||||||
],
|
|
||||||
"outboundTag": "outBound_DIRECT",
|
|
||||||
"type": "field"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"domain": [
|
"domain": [
|
||||||
"geosite:cn"
|
"geosite:cn"
|
||||||
@@ -49,10 +42,11 @@
|
|||||||
"type": "field"
|
"type": "field"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"inboundTag": [
|
"ip": [
|
||||||
"inbound_API"
|
"geoip:cn",
|
||||||
|
"geoip:private"
|
||||||
],
|
],
|
||||||
"outboundTag": "API",
|
"outboundTag": "outBound_DIRECT",
|
||||||
"type": "field"
|
"type": "field"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
30
v2ray_config/05_inbounds_01_tproxy_ipv4lo.json
Normal file
30
v2ray_config/05_inbounds_01_tproxy_ipv4lo.json
Normal file
@@ -0,0 +1,30 @@
|
|||||||
|
{
|
||||||
|
"inbounds": [
|
||||||
|
{
|
||||||
|
"listen": "127.0.0.1",
|
||||||
|
"port": 12345,
|
||||||
|
"protocol": "dokodemo-door",
|
||||||
|
"settings": {
|
||||||
|
"address": "",
|
||||||
|
"followRedirect": true,
|
||||||
|
"network": "tcp,udp",
|
||||||
|
"port": 0,
|
||||||
|
"timeout": 300,
|
||||||
|
"userLevel": 0
|
||||||
|
},
|
||||||
|
"sniffing": {
|
||||||
|
"destOverride": [
|
||||||
|
"http",
|
||||||
|
"tls"
|
||||||
|
],
|
||||||
|
"enabled": true
|
||||||
|
},
|
||||||
|
"streamSettings": {
|
||||||
|
"sockopt": {
|
||||||
|
"tproxy": "tproxy"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"tag": "tproxy_IN_ipv4lo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
@@ -1,7 +1,7 @@
|
|||||||
{
|
{
|
||||||
"inbounds": [
|
"inbounds": [
|
||||||
{
|
{
|
||||||
"listen": "0.0.0.0",
|
"listen": "::1",
|
||||||
"port": 12345,
|
"port": 12345,
|
||||||
"protocol": "dokodemo-door",
|
"protocol": "dokodemo-door",
|
||||||
"settings": {
|
"settings": {
|
||||||
@@ -9,7 +9,7 @@
|
|||||||
"followRedirect": true,
|
"followRedirect": true,
|
||||||
"network": "tcp,udp",
|
"network": "tcp,udp",
|
||||||
"port": 0,
|
"port": 0,
|
||||||
"timeout": 0,
|
"timeout": 300,
|
||||||
"userLevel": 0
|
"userLevel": 0
|
||||||
},
|
},
|
||||||
"sniffing": {
|
"sniffing": {
|
||||||
@@ -24,7 +24,7 @@
|
|||||||
"tproxy": "tproxy"
|
"tproxy": "tproxy"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"tag": "tproxy_IN"
|
"tag": "tproxy_IN_ipv6lo"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
1
v2ray_config/06_outbounds_10_myproxy.json
Normal file
1
v2ray_config/06_outbounds_10_myproxy.json
Normal file
@@ -0,0 +1 @@
|
|||||||
|
{}
|
||||||
@@ -1 +0,0 @@
|
|||||||
{}
|
|
||||||
@@ -1,2 +1,2 @@
|
|||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
jq -rs 'reduce .[] as $item ({}; . + $item + {inbounds: (.inbounds + $item.inbounds)} + {outbounds: ($item.outbounds + .outbounds)})' *.json |sudo tee /etc/v2ray/config.json
|
jq -rs 'reduce .[] as $item ({}; . + $item + {inbounds: (.inbounds + $item.inbounds)} + {outbounds: ($item.outbounds + .outbounds)})' *.json |sudo tee /etc/v2ray/config.json > /dev/null
|
||||||
|
|||||||
@@ -1 +1,8 @@
|
|||||||
Fill `06_outbounds_myproxy.json` with your vmess proxy config with tag `outBound_PROXY`.
|
## Usage
|
||||||
|
- Fill `06_outbounds_myproxy.json` with your vmess proxy config with tag `outBound_PROXY`.
|
||||||
|
- Start with `sudo v2ray -confdir .`
|
||||||
|
|
||||||
|
## Reference
|
||||||
|
|
||||||
|
- [v2ray multi-file config](https://www.v2fly.org/chapter_02/multiple_config.html)
|
||||||
|
|
||||||
|
|||||||
@@ -5,15 +5,14 @@ After=network.target nss-lookup.target
|
|||||||
Wants=network-online.target
|
Wants=network-online.target
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Type=simple
|
Type=exec
|
||||||
|
ExecStart=/usr/lib/v2ray/v2ray -config /etc/v2ray/config.json
|
||||||
User=nobody
|
User=nobody
|
||||||
#AmbientCapabilities=CAP_NET_ADMIN CAP_NET_BIND_SERVICE
|
AmbientCapabilities=CAP_NET_ADMIN CAP_NET_BIND_SERVICE
|
||||||
CapabilityBoundingSet=CAP_NET_ADMIN CAP_NET_BIND_SERVICE
|
|
||||||
NoNewPrivileges=yes
|
NoNewPrivileges=yes
|
||||||
ExecStart=+/usr/lib/v2ray/v2ray -config /etc/v2ray/config.json
|
|
||||||
Restart=on-failure
|
Restart=on-failure
|
||||||
# Don't restart in the case of configuration error
|
# Don't restart in the case of configuration error
|
||||||
RestartPreventExitStatus=23
|
RestartPreventExitStatus=23
|
||||||
|
|
||||||
[Install]
|
[Install]
|
||||||
WantedBy=multi-user.target
|
WantedBy=multi-user.target
|
||||||
Reference in New Issue
Block a user