123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687 |
- mixed-port: 7890
- allow-lan: false
- bind-address: '*'
- mode: rule
- log-level: info
- external-controller: '127.0.0.1:9090'
- dns:
- enable: true
- ipv6: false
- default-nameserver: [223.5.5.5, 223.6.6.6]
- enhanced-mode: fake-ip
- fake-ip-range: 198.18.0.1/16
- use-hosts: true
- nameserver: ['https://dns.alidns.com/dns-query']
- fallback: ['https://dns.alidns.com/dns-query', 'https://dns.cloudflare.com/dns-query', 'tls://8.8.4.4:853']
- fallback-filter: { geoip: true, ipcidr: [240.0.0.0/4, 0.0.0.0/32] }
- proxies:
- - name: vless-ws-tls-2
- type: vless
- server: icook.hk
- port: 8443
- uuid: 73b6dbd5-a27a-4c76-9ad1-42a82380dddb
- udp: true
- tls: true
- network: ws
- servername: worker.ariesver.online
- ws-opts:
- path: "/?ed=2048"
- headers:
- Host: worker.ariesver.online
- - name: warp-1
- type: wireguard
- server: 188.114.98.244
- port: 987
- ip: 172.16.0.2/32
- ipv6: 2606:4700:110:86f7:4d4c:8ad2:7372:41b9/128
- public-key: bmXOC+F1FxEMF9dyiK2H5/1SUtzH0JuVo51h2wPfgyo=
- private-key: gOt0GSXgyRM89twzV2UE/hTDVBT/NWwZwq1Rx03KE3M=
- udp: true
- reserved: [174,236,8]
- keepalive: 45
- mtu: 1280
- - name: warp-2
- type: wireguard
- server: 188.114.98.244
- port: 987
- ip: 172.16.0.2/32
- ipv6: 2606:4700:110:846a:1a0d:7c22:6aea:6fb1/128
- public-key: bmXOC+F1FxEMF9dyiK2H5/1SUtzH0JuVo51h2wPfgyo=
- private-key: yBqdZrWsTfbO1/oQAJklJO3ikWJKZ+s79UX8wdSf+0k=
- udp: true
- reserved: [60,80,230]
- keepalive: 45
- mtu: 1280
-
- proxy-providers: {WARP: {type: http, path: ./warp.yaml, url: 'https://neko-warp.nloli.xyz/neko_warp.yaml', interval: 3600, health-check: {enable: true, url: 'https://www.gstatic.com/generate_204', interval: 300}}}
- proxy-groups:
- - { name: PROXY, type: select, proxies: [vless-ws-tls-2, warp-1, warp-2], use: [WARP] }
- rule-providers:
- reject: { type: http, behavior: domain, url: 'https://mirror.ghproxy.com/https://raw.githubusercontent.com/Loyalsoldier/clash-rules/release/reject.txt', path: ./ruleset/reject.yaml, interval: 86400 }
- icloud: { type: http, behavior: domain, url: 'https://mirror.ghproxy.com/https://raw.githubusercontent.com/Loyalsoldier/clash-rules/release/icloud.txt', path: ./ruleset/icloud.yaml, interval: 86400 }
- apple: { type: http, behavior: domain, url: 'https://mirror.ghproxy.com/https://raw.githubusercontent.com/Loyalsoldier/clash-rules/release/apple.txt', path: ./ruleset/apple.yaml, interval: 86400 }
- proxy: { type: http, behavior: domain, url: 'https://mirror.ghproxy.com/https://raw.githubusercontent.com/Loyalsoldier/clash-rules/release/proxy.txt', path: ./ruleset/proxy.yaml, interval: 86400 }
- direct: { type: http, behavior: domain, url: 'https://mirror.ghproxy.com/https://raw.githubusercontent.com/Loyalsoldier/clash-rules/release/direct.txt', path: ./ruleset/direct.yaml, interval: 86400 }
- private: { type: http, behavior: domain, url: 'https://mirror.ghproxy.com/https://raw.githubusercontent.com/Loyalsoldier/clash-rules/release/private.txt', path: ./ruleset/private.yaml, interval: 86400 }
- telegramcidr: { type: http, behavior: ipcidr, url: 'https://mirror.ghproxy.com/https://raw.githubusercontent.com/Loyalsoldier/clash-rules/release/telegramcidr.txt', path: ./ruleset/telegramcidr.yaml, interval: 86400 }
- cncidr: { type: http, behavior: ipcidr, url: 'https://mirror.ghproxy.com/https://raw.githubusercontent.com/Loyalsoldier/clash-rules/release/cncidr.txt', path: ./ruleset/cncidr.yaml, interval: 86400 }
- lancidr: { type: http, behavior: ipcidr, url: 'https://mirror.ghproxy.com/https://raw.githubusercontent.com/Loyalsoldier/clash-rules/release/lancidr.txt', path: ./ruleset/lancidr.yaml, interval: 86400 }
- applications: { type: http, behavior: classical, url: 'https://mirror.ghproxy.com/https://raw.githubusercontent.com/Loyalsoldier/clash-rules/release/applications.txt', path: ./ruleset/applications.yaml, interval: 86400 }
- rules:
- - 'RULE-SET,applications,DIRECT'
- - 'RULE-SET,private,DIRECT'
- - 'RULE-SET,reject,REJECT'
- - 'RULE-SET,icloud,DIRECT'
- - 'RULE-SET,apple,DIRECT'
- - 'RULE-SET,proxy,PROXY'
- - 'RULE-SET,direct,DIRECT'
- - 'RULE-SET,lancidr,DIRECT'
- - 'RULE-SET,cncidr,DIRECT'
- - 'RULE-SET,telegramcidr,PROXY'
- - 'GEOIP,LAN,DIRECT'
- - 'GEOIP,CN,DIRECT'
- - 'MATCH,PROXY'
|