Clash.Meta/README.md

372 lines
9.6 KiB
Markdown
Raw Normal View History

2018-06-23 00:44:28 +08:00
<h1 align="center">
2021-12-09 17:54:53 +08:00
<img src="Meta.png" alt="Meta Kennel" width="200">
2022-01-06 10:49:26 +08:00
<br>Meta Kernel<br>
2018-06-23 00:44:28 +08:00
</h1>
2022-01-06 10:49:26 +08:00
<h3 align="center">Another Clash Kernel.</h3>
2018-06-23 00:44:28 +08:00
<p align="center">
2021-12-04 20:40:09 +08:00
<a href="https://goreportcard.com/report/github.com/Clash-Mini/Clash.Meta">
<img src="https://goreportcard.com/badge/github.com/Clash-Mini/Clash.Meta?style=flat-square">
2018-06-23 00:44:28 +08:00
</a>
2021-09-20 17:22:40 +08:00
<img src="https://img.shields.io/github/go-mod/go-version/Dreamacro/clash?style=flat-square">
2021-12-04 20:40:09 +08:00
<a href="https://github.com/Clash-Mini/Clash.Meta/releases">
<img src="https://img.shields.io/github/release/Clash-Mini/Clash.Meta/all.svg?style=flat-square">
2018-06-23 00:44:28 +08:00
</a>
2021-12-04 20:40:09 +08:00
<a href="https://github.com/Clash-Mini/Clash.Meta">
<img src="https://img.shields.io/badge/release-Meta-00b4f0?style=flat-square">
2021-09-20 17:22:40 +08:00
</a>
2018-06-23 00:44:28 +08:00
</p>
2018-06-10 22:50:03 +08:00
## Features
- Local HTTP/HTTPS/SOCKS server with authentication support
- VMess, Shadowsocks, Trojan, Snell protocol support for remote connections
- Built-in DNS server that aims to minimize DNS pollution attack impact, supports DoH/DoT upstream and fake IP.
2021-09-20 17:22:40 +08:00
- Rules based off domains, GEOIP, IPCIDR or Process to forward packets to different nodes
- Remote groups allow users to implement powerful rules. Supports automatic fallback, load balancing or auto select node based off latency
- Remote providers, allowing users to get node lists remotely instead of hardcoding in config
- Netfilter TCP redirecting. Deploy Clash on your Internet gateway with `iptables`.
- Comprehensive HTTP RESTful API controller
2018-08-14 18:06:56 +08:00
2023-01-20 17:13:32 +08:00
## Wiki
2023-03-30 23:57:52 +08:00
Configuration examples can be found at [/docs/config.yaml](https://github.com/MetaCubeX/Clash.Meta/blob/Alpha/docs/config.yaml), while documentation can be found [Clash.Meta Wiki](https://clash-meta.wiki).
2022-01-05 17:04:56 +08:00
## Build
You should install [golang](https://go.dev) first.
Then get the source code of Clash.Meta:
```shell
git clone https://github.com/MetaCubeX/Clash.Meta.git
cd Clash.Meta && go mod download
```
If you can't visit github,you should set proxy first:
```shell
go env -w GOPROXY=https://goproxy.io,direct
```
2023-01-20 17:13:32 +08:00
Now you can build it:
```shell
go build
```
2023-01-20 17:13:32 +08:00
If you need gvisor for tun stack, build with:
2023-01-20 17:13:32 +08:00
```shell
go build -tags with_gvisor
```
2023-02-05 23:36:08 +08:00
<!-- ## Advanced usage of this fork -->
2023-02-05 23:36:08 +08:00
<!-- ### DNS configuration
2021-11-17 16:03:47 +08:00
Support `geosite` with `fallback-filter`.
2022-01-05 17:04:56 +08:00
Restore `Redir remote resolution`.
Support resolve ip with a `Proxy Tunnel`.
```yaml
proxy-groups:
- name: DNS
type: url-test
use:
- HK
url: http://cp.cloudflare.com
interval: 180
lazy: true
```
2021-11-17 16:03:47 +08:00
```yaml
dns:
enable: true
use-hosts: true
ipv6: false
2022-01-05 17:04:56 +08:00
enhanced-mode: redir-host
2021-11-17 16:03:47 +08:00
fake-ip-range: 198.18.0.1/16
listen: 127.0.0.1:6868
default-nameserver:
- 119.29.29.29
- 114.114.114.114
nameserver:
- https://doh.pub/dns-query
- tls://223.5.5.5:853
fallback:
- "https://1.0.0.1/dns-query#DNS" # append the proxy adapter name or group name to the end of DNS URL with '#' prefix.
- "tls://8.8.4.4:853#DNS"
2021-11-17 16:03:47 +08:00
fallback-filter:
geoip: false
geosite:
- gfw # `geosite` filter only use fallback server to resolve ip, prevent DNS leaks to unsafe DNS providers.
2021-11-17 16:03:47 +08:00
domain:
- +.example.com
ipcidr:
- 0.0.0.0/32
```
### TUN configuration
2021-12-04 20:40:09 +08:00
2021-11-17 16:03:47 +08:00
Supports macOS, Linux and Windows.
2021-12-04 20:40:09 +08:00
Built-in [Wintun](https://www.wintun.net) driver.
2021-11-17 16:03:47 +08:00
```yaml
# Enable the TUN listener
tun:
enable: true
2023-01-20 17:13:32 +08:00
stack: system # system/gvisor
dns-hijack:
2022-01-05 17:04:56 +08:00
- 0.0.0.0:53 # additional dns server listen on TUN
2021-11-17 16:03:47 +08:00
auto-route: true # auto set global route
```
2021-11-17 16:03:47 +08:00
### Rules configuration
2021-11-17 16:03:47 +08:00
- Support rule `GEOSITE`.
2021-12-05 00:48:35 +08:00
- Support rule-providers `RULE-SET`.
2021-11-17 16:03:47 +08:00
- Support `multiport` condition for rule `SRC-PORT` and `DST-PORT`.
- Support `network` condition for all rules.
- Support source IPCIDR condition for all rules, just append to the end.
2021-12-04 20:40:09 +08:00
- The `GEOSITE` databases via https://github.com/Loyalsoldier/v2ray-rules-dat.
2021-11-17 16:03:47 +08:00
```yaml
rules:
# network(tcp/udp) condition for all rules
- DOMAIN-SUFFIX,bilibili.com,DIRECT,tcp
- DOMAIN-SUFFIX,bilibili.com,REJECT,udp
2021-11-17 16:03:47 +08:00
# multiport condition for rules SRC-PORT and DST-PORT
- DST-PORT,123/136/137-139,DIRECT,udp
2021-11-17 16:03:47 +08:00
# rule GEOSITE
- GEOSITE,category-ads-all,REJECT
- GEOSITE,icloud@cn,DIRECT
- GEOSITE,apple@cn,DIRECT
- GEOSITE,apple-cn,DIRECT
- GEOSITE,microsoft@cn,DIRECT
- GEOSITE,facebook,PROXY
- GEOSITE,youtube,PROXY
- GEOSITE,geolocation-cn,DIRECT
- GEOSITE,geolocation-!cn,PROXY
2021-11-17 16:03:47 +08:00
# source IPCIDR condition for all rules in gateway proxy
#- GEOSITE,geolocation-!cn,REJECT,192.168.1.88/32,192.168.1.99/32
- GEOIP,telegram,PROXY,no-resolve
- GEOIP,private,DIRECT,no-resolve
- GEOIP,cn,DIRECT
2021-11-17 16:03:47 +08:00
- MATCH,PROXY
```
### Proxies configuration
2022-01-05 17:04:56 +08:00
Active health detection `urltest / fallback` (based on tcp handshake, multiple failures within a limited time will actively trigger health detection to use the node)
Support `Policy Group Filter`
```yaml
proxy-groups:
- name: 🚀 HK Group
type: select
use:
- ALL
filter: "HK"
2022-01-05 17:04:56 +08:00
- name: 🚀 US Group
type: select
use:
- ALL
filter: "US"
2022-01-05 17:04:56 +08:00
proxy-providers:
ALL:
type: http
url: "xxxxx"
interval: 3600
path: "xxxxx"
health-check:
enable: true
interval: 600
url: http://www.gstatic.com/generate_204
```
2021-11-17 16:03:47 +08:00
Support outbound transport protocol `VLESS`.
The XTLS support (TCP/UDP) transport by the XRAY-CORE.
2021-11-17 16:03:47 +08:00
```yaml
proxies:
- name: "vless"
2021-11-17 16:03:47 +08:00
type: vless
server: server
port: 443
uuid: uuid
servername: example.com # AKA SNI
# flow: xtls-rprx-direct # xtls-rprx-origin # enable XTLS
# skip-cert-verify: true
2021-11-17 16:03:47 +08:00
- name: "vless-ws"
type: vless
server: server
port: 443
uuid: uuid
tls: true
2021-11-17 16:03:47 +08:00
udp: true
network: ws
servername: example.com # priority over wss host
# skip-cert-verify: true
ws-opts:
path: /path
headers: { Host: example.com, Edge: "12a00c4.fm.huawei.com:82897" }
- name: "vless-grpc"
type: vless
server: server
port: 443
uuid: uuid
tls: true
udp: true
network: grpc
servername: example.com # priority over wss host
# skip-cert-verify: true
grpc-opts:
grpc-service-name: grpcname
2021-11-17 16:03:47 +08:00
```
2022-11-09 19:55:30 +08:00
Support outbound transport protocol `Wireguard`
2022-11-09 19:55:30 +08:00
```yaml
proxies:
- name: "wg"
type: wireguard
server: 162.159.192.1
port: 2480
ip: 172.16.0.2
ipv6: fd01:5ca1:ab1e:80fa:ab85:6eea:213f:f4a5
private-key: eCtXsJZ27+4PbhDkHnB923tkUn2Gj59wZw5wFA75MnU=
public-key: Cr8hWlKvtDt7nrvf+f0brNQQzabAqrjfBvas9pmowjo=
udp: true
```
2022-11-25 08:08:14 +08:00
Support outbound transport protocol `Tuic`
2022-11-25 08:08:14 +08:00
```yaml
proxies:
- name: "tuic"
server: www.example.com
port: 10443
type: tuic
token: TOKEN
2022-11-25 10:45:06 +08:00
# ip: 127.0.0.1 # for overwriting the DNS lookup result of the server address set in option 'server'
# heartbeat-interval: 10000
2022-11-25 08:08:14 +08:00
# alpn: [h3]
# disable-sni: true
reduce-rtt: true
# request-timeout: 8000
udp-relay-mode: native # Available: "native", "quic". Default: "native"
# congestion-controller: bbr # Available: "cubic", "new_reno", "bbr". Default: "cubic"
# max-udp-relay-packet-size: 1500
# fast-open: true
2022-11-25 08:08:14 +08:00
# skip-cert-verify: true
2023-02-05 23:36:08 +08:00
``` -->
2022-11-25 08:08:14 +08:00
### IPTABLES configuration
2023-02-05 23:36:08 +08:00
Work on Linux OS which supported `iptables`
2021-11-17 16:03:47 +08:00
```yaml
# Enable the TPROXY listener
tproxy-port: 9898
iptables:
enable: true # default is false
inbound-interface: eth0 # detect the inbound interface, default is 'lo'
2021-11-17 16:03:47 +08:00
```
### General installation guide for Linux
2021-11-17 16:03:47 +08:00
- Create user given name `clash-meta`
2022-03-05 01:33:11 +08:00
- Download and decompress pre-built binaries from [releases](https://github.com/MetaCubeX/Clash.Meta/releases)
2022-03-05 01:33:11 +08:00
- Rename executable file to `Clash-Meta` and move to `/usr/local/bin/`
2022-03-05 01:33:11 +08:00
- Create folder `/etc/Clash-Meta/` as working directory
2022-03-05 01:33:11 +08:00
2022-03-29 14:50:12 +08:00
Run Meta Kernel by user `clash-meta` as a daemon.
2022-03-05 01:33:11 +08:00
Create the systemd configuration file at `/etc/systemd/system/Clash-Meta.service`:
2021-12-04 19:59:41 +08:00
2021-11-17 16:03:47 +08:00
```
[Unit]
Description=Clash-Meta Daemon, Another Clash Kernel.
2022-03-29 14:50:12 +08:00
After=network.target NetworkManager.service systemd-networkd.service iwd.service
2021-11-17 16:03:47 +08:00
[Service]
Type=simple
2022-03-29 14:50:12 +08:00
User=clash-meta
Group=clash-meta
LimitNPROC=500
LimitNOFILE=1000000
CapabilityBoundingSet=CAP_NET_ADMIN CAP_NET_RAW CAP_NET_BIND_SERVICE
AmbientCapabilities=CAP_NET_ADMIN CAP_NET_RAW CAP_NET_BIND_SERVICE
2021-11-17 16:03:47 +08:00
Restart=always
2022-03-29 14:50:12 +08:00
ExecStartPre=/usr/bin/sleep 1s
2022-03-05 01:33:11 +08:00
ExecStart=/usr/local/bin/Clash-Meta -d /etc/Clash-Meta
2021-11-17 16:03:47 +08:00
[Install]
WantedBy=multi-user.target
```
2021-11-17 16:03:47 +08:00
Launch clashd on system startup with:
2021-11-17 16:03:47 +08:00
```shell
$ systemctl enable Clash-Meta
2021-11-17 16:03:47 +08:00
```
2021-11-17 16:03:47 +08:00
Launch clashd immediately with:
2021-12-04 20:50:57 +08:00
2021-11-17 16:03:47 +08:00
```shell
$ systemctl start Clash-Meta
2021-11-17 16:03:47 +08:00
```
### Display Process name
2021-12-04 20:40:09 +08:00
2021-11-17 16:03:47 +08:00
Clash add field `Process` to `Metadata` and prepare to get process name for Restful API `GET /connections`.
To display process name in GUI please use [Razord-meta](https://github.com/MetaCubeX/Razord-meta).
### Dashboard
2020-12-27 00:14:24 +08:00
We also made a custom fork of yacd provide better support for this project, check it out at [Yacd-meta](https://github.com/MetaCubeX/Yacd-meta)
2021-12-04 20:50:57 +08:00
## Development
2021-12-04 20:50:57 +08:00
If you want to build an application that uses clash as a library, check out the
the [GitHub Wiki](https://github.com/Dreamacro/clash/wiki/use-clash-as-a-library)
2023-01-30 20:39:13 +08:00
## Debugging
Check [wiki](https://github.com/MetaCubeX/Clash.Meta/wiki/How-to-use-debug-api) to get an instruction on using debug API.
## Credits
2018-08-12 04:22:14 +08:00
- [Dreamacro/clash](https://github.com/Dreamacro/clash)
- [SagerNet/sing-box](https://github.com/SagerNet/sing-box)
- [riobard/go-shadowsocks2](https://github.com/riobard/go-shadowsocks2)
- [v2ray/v2ray-core](https://github.com/v2ray/v2ray-core)
- [WireGuard/wireguard-go](https://github.com/WireGuard/wireguard-go)
- [yaling888/clash-plus-pro](https://github.com/yaling888/clash)
2018-09-16 23:08:04 +08:00
## License
2018-08-12 04:22:14 +08:00
This software is released under the GPL-3.0 license.
[![FOSSA Status](https://app.fossa.io/api/projects/git%2Bgithub.com%2FDreamacro%2Fclash.svg?type=large)](https://app.fossa.io/projects/git%2Bgithub.com%2FDreamacro%2Fclash?ref=badge_large)