forked from xiaolinshao/linshao
-
Notifications
You must be signed in to change notification settings - Fork 0
/
52字母.yaml
86 lines (82 loc) · 4.19 KB
/
52字母.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
mixed-port: 7890
allow-lan: false
bind-address: '*'
mode: rule
log-level: info
external-controller: '127.0.0.1:9090'
dns:
enable: true
ipv6: false
default-nameserver: [223.5.5.5, 223.6.6.6]
enhanced-mode: fake-ip
fake-ip-range: 198.18.0.1/16
use-hosts: true
nameserver: ['https://dns.alidns.com/dns-query']
fallback: ['https://dns.alidns.com/dns-query', 'https://dns.cloudflare.com/dns-query', 'tls://8.8.4.4:853']
fallback-filter: { geoip: true, ipcidr: [240.0.0.0/4, 0.0.0.0/32] }
proxies:
- name: vless-ws-tls-2
type: vless
server: icook.hk
port: 8443
uuid: 73b6dbd5-a27a-4c76-9ad1-42a82380dddb
udp: true
tls: true
network: ws
servername: worker.ariesver.online
ws-opts:
path: "/?ed=2048"
headers:
Host: worker.ariesver.online
- name: warp-1
type: wireguard
server: 188.114.98.244
port: 987
ip: 172.16.0.2/32
ipv6: 2606:4700:110:86f7:4d4c:8ad2:7372:41b9/128
public-key: bmXOC+F1FxEMF9dyiK2H5/1SUtzH0JuVo51h2wPfgyo=
private-key: gOt0GSXgyRM89twzV2UE/hTDVBT/NWwZwq1Rx03KE3M=
udp: true
reserved: [174,236,8]
keepalive: 45
mtu: 1280
- name: warp-2
type: wireguard
server: 188.114.98.244
port: 987
ip: 172.16.0.2/32
ipv6: 2606:4700:110:846a:1a0d:7c22:6aea:6fb1/128
public-key: bmXOC+F1FxEMF9dyiK2H5/1SUtzH0JuVo51h2wPfgyo=
private-key: yBqdZrWsTfbO1/oQAJklJO3ikWJKZ+s79UX8wdSf+0k=
udp: true
reserved: [60,80,230]
keepalive: 45
mtu: 1280
proxy-providers: {WARP: {type: http, path: ./warp.yaml, url: 'https://neko-warp.nloli.xyz/neko_warp.yaml', interval: 3600, health-check: {enable: true, url: 'https://www.gstatic.com/generate_204', interval: 300}}}
proxy-groups:
- { name: PROXY, type: select, proxies: [vless-ws-tls-2, warp-1, warp-2], use: [WARP] }
rule-providers:
reject: { type: http, behavior: domain, url: 'https://mirror.ghproxy.com/https://raw.githubusercontent.com/Loyalsoldier/clash-rules/release/reject.txt', path: ./ruleset/reject.yaml, interval: 86400 }
icloud: { type: http, behavior: domain, url: 'https://mirror.ghproxy.com/https://raw.githubusercontent.com/Loyalsoldier/clash-rules/release/icloud.txt', path: ./ruleset/icloud.yaml, interval: 86400 }
apple: { type: http, behavior: domain, url: 'https://mirror.ghproxy.com/https://raw.githubusercontent.com/Loyalsoldier/clash-rules/release/apple.txt', path: ./ruleset/apple.yaml, interval: 86400 }
proxy: { type: http, behavior: domain, url: 'https://mirror.ghproxy.com/https://raw.githubusercontent.com/Loyalsoldier/clash-rules/release/proxy.txt', path: ./ruleset/proxy.yaml, interval: 86400 }
direct: { type: http, behavior: domain, url: 'https://mirror.ghproxy.com/https://raw.githubusercontent.com/Loyalsoldier/clash-rules/release/direct.txt', path: ./ruleset/direct.yaml, interval: 86400 }
private: { type: http, behavior: domain, url: 'https://mirror.ghproxy.com/https://raw.githubusercontent.com/Loyalsoldier/clash-rules/release/private.txt', path: ./ruleset/private.yaml, interval: 86400 }
telegramcidr: { type: http, behavior: ipcidr, url: 'https://mirror.ghproxy.com/https://raw.githubusercontent.com/Loyalsoldier/clash-rules/release/telegramcidr.txt', path: ./ruleset/telegramcidr.yaml, interval: 86400 }
cncidr: { type: http, behavior: ipcidr, url: 'https://mirror.ghproxy.com/https://raw.githubusercontent.com/Loyalsoldier/clash-rules/release/cncidr.txt', path: ./ruleset/cncidr.yaml, interval: 86400 }
lancidr: { type: http, behavior: ipcidr, url: 'https://mirror.ghproxy.com/https://raw.githubusercontent.com/Loyalsoldier/clash-rules/release/lancidr.txt', path: ./ruleset/lancidr.yaml, interval: 86400 }
applications: { type: http, behavior: classical, url: 'https://mirror.ghproxy.com/https://raw.githubusercontent.com/Loyalsoldier/clash-rules/release/applications.txt', path: ./ruleset/applications.yaml, interval: 86400 }
rules:
- 'RULE-SET,applications,DIRECT'
- 'RULE-SET,private,DIRECT'
- 'RULE-SET,reject,REJECT'
- 'RULE-SET,icloud,DIRECT'
- 'RULE-SET,apple,DIRECT'
- 'RULE-SET,proxy,PROXY'
- 'RULE-SET,direct,DIRECT'
- 'RULE-SET,lancidr,DIRECT'
- 'RULE-SET,cncidr,DIRECT'
- 'RULE-SET,telegramcidr,PROXY'
- 'GEOIP,LAN,DIRECT'
- 'GEOIP,CN,DIRECT'
- 'MATCH,PROXY'