如何在Clash 客户端或者使用 Proxy-provider代理集时,添加自建节点,比如说,VLESS、XTLS等Xray内核的协议节点。

很简单,将对应协议的配置范本,修改为自己的节点信息就好。这样子,你也可以在使用 Proxy-provider的情况下,使用自建节点。

感谢波仔老师的分享:点击跳转

各个协议节点范本

# Hysteria(Meta 内核专属)
- name: "hysteria"
  type: hysteria
  server: server.com
  port: 443
  auth_str: yourpassword
  #obfs: yourpassword
  alpn: h3
  protocol: udp          #支持udp/wechat-video/faketcp
  up: '30 Mbps'          #若不写单位,默认为Mbps
  down: '200 Mbps'       #若不写单位,默认为Mbps
  #sni: server.com
  #skip-cert-verify: false
  #recv_window_conn: 12582912
  #recv_window: 52428800
  #auth_str: "yubiyubi"
  #ca: "./my.ca"
  #ca_str: "xyz"
    #disable_mtu_discovery: false

# Vless (Meta 内核专属,包含 TCP (XTLS) 以及 WS 的两种协议)
- name: "vless-tcp"
  type: vless
  server: server
  port: 443
  uuid: uuid
  network: tcp
  servername: example.com # AKA SNI
  # flow: xtls-rprx-direct # xtls-rprx-origin  # enable XTLS
    # skip-cert-verify: true

- name: "vless-ws"
  type: vless
  server: server
  port: 443
  uuid: uuid
  udp: true
  tls: true
  network: ws
  servername: example.com # priority over wss host
  # skip-cert-verify: true
  ws-opts:
    path: "/"
    headers:
        Host: example.com
# Shadowsocks (Meta 内核,支持 SS2022加密 )
- name: "ss1"
  type: ss
  server: server
  port: 443
  cipher: chacha20-ietf-poly1305
  password: "password"
    # udp: true

- name: "ss2"
  type: ss
  server: server
  port: 443
  cipher: chacha20-ietf-poly1305
  password: "password"
  plugin: obfs
  plugin-opts:
    mode: tls # or http
      # host: bing.com

- name: "ss3"
  type: ss
  server: server
  port: 443
  cipher: chacha20-ietf-poly1305
  password: "password"
  plugin: v2ray-plugin
  plugin-opts:
    mode: websocket # no QUIC now
    # tls: true # wss
    # skip-cert-verify: true
    # host: bing.com
    # path: "/"
    # mux: true
    # headers:
      #   custom: value

  # vmess

  # 加密支持 auto/aes-128-gcm/chacha20-poly1305/none

- name: "vmess"
  type: vmess
  server: server
  port: 443
  uuid: uuid
  alterId: 32
  cipher: auto
  # udp: true
  # tls: true
  # skip-cert-verify: true
  # servername: example.com # priority over wss host
  # network: ws
  # ws-opts:
  #   path: /path
  #   headers:
  #     Host: v2ray.com
  #   max-early-data: 2048
    #   early-data-header-name: Sec-WebSocket-Protocol

- name: "vmess-h2"
  type: vmess
  server: server
  port: 443
  uuid: uuid
  alterId: 32
  cipher: auto
  network: h2
  tls: true
  h2-opts:
    host:
      - http.example.com
      - http-alt.example.com
      path: /

- name: "vmess-http"
  type: vmess
  server: server
  port: 443
  uuid: uuid
  alterId: 32
  cipher: auto
  # udp: true
  # network: http
  # http-opts:
  #   # method: "GET"
  #   # path:
  #   #   - '/'
  #   #   - '/video'
  #   # headers:
  #   #   Connection:
    #   #     - keep-alive

- name: vmess-grpc
  server: server
  port: 443
  type: vmess
  uuid: uuid
  alterId: 32
  cipher: auto
  network: grpc
  tls: true
  servername: example.com
  # skip-cert-verify: true
  grpc-opts:
      grpc-service-name: "example"

# socks5
- name: "socks"
  type: socks5
  server: server
  port: 443
  # username: username
  # password: password
  # tls: true
  # skip-cert-verify: true
  # udp: true

# http
- name: "http"
  type: http
  server: server
  port: 443
  # username: username
  # password: password
  # tls: true # https
  # skip-cert-verify: true
  # sni: custom.com
    # headers:                      #【Meta专属】
  #   X-T5-Auth: "1962xxxxx709"
  #   User-Agent: "okhttp/3.11.0 Dalvik/2.1.0 ...... "

# Snell
  # 不支持UDP

- name: "snell"
  type: snell
  server: server
  port: 44046
  psk: yourpsk
  # version: 2
  # obfs-opts:
    # mode: http # or tls
    # host: bing.com

# Trojan

- name: "trojan"
  type: trojan
  server: server
  port: 443
  password: password
  # udp: true
  # sni: example.com # aka server name
  # alpn:
  #   - h2
  #   - http/1.1
    # skip-cert-verify: true

- name: trojan-grpc
  server: server
  port: 443
  type: trojan
  password: "example"
  network: grpc
  sni: example.com
  # skip-cert-verify: true
  udp: true
  grpc-opts:
      grpc-service-name: "example"

- name: trojan-ws
  server: server
  port: 443
  type: trojan
  password: "example"
  network: ws
  sni: example.com
  # skip-cert-verify: true
  udp: true
  # ws-opts:
    # path: /path
    # headers:
      #   Host: example.com
最后修改日期: 21 5 月, 2024

留言

撰写回覆或留言

发布留言必须填写的电子邮件地址不会公开。