We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
版本:Xray 25.5.16 (Xray, Penetrates Everything.) 800b8b5 (go1.24.3 linux/amd64) 偷docs.misaka.io域名正常,但是偷blog.medium.com域名 (X25519MLKEM768),使用xhttp和xtls-rprx-vision均失败。
正常运行xray
{ "log": { "loglevel": "debug" }, "inbounds": [ { "port": "1080", "protocol": "socks" } ], "outbounds": [ { "tag": "proxy-out", "protocol": "vless", "settings": { "vnext": [ { "address": "xxxx", "port": 8002, "users": [ { "flow": "xtls-rprx-vision", "id": "xxxx", "encryption": "none" } ] } ] }, "streamSettings": { "network": "raw", "security": "reality", "realitySettings": { "fingerprint": "chrome", "serverName": "blog.medium.com", "publicKey": "xxxx", "shortId": "xxxx" } } } ] }
{ "log": { "loglevel": "info" }, "inbounds": [ { "port": 8002, "protocol": "vless", "settings": { "clients": [ { "flow": "xtls-rprx-vision", "id": "xxxx" } ], "decryption": "none" }, "streamSettings": { "network": "raw", "security": "reality", "realitySettings": { "target": "blog.medium.com:443", "serverNames": ["blog.medium.com"], "privateKey": "xxxx", "shortIds": ["xxxx"] } } } ], "outbounds": [ { "protocol": "freedom" } ] }
2025/05/20 08:57:01.259228 [Info] [1899247828] transport/internet/tcp: dialing TCP to tcp:xxxx:8002 2025/05/20 08:57:01.260085 [Debug] [1899247828] transport/internet: dialing to tcp:xxxx:8002 2025/05/20 08:57:02.120170 [Info] [1899247828] app/proxyman/outbound: app/proxyman/outbound: failed to process outbound traffic > proxy/vless/outbound: failed to find an available destination > common/retry: [read tcp 192.168.31.90:55311->xxxx:8002: read: connection reset by peer read tcp 192.168.31.90:55312->xxxx:8002: read: connection reset by peer read tcp 192.168.31.90:55313->xxxx:8002: read: connection reset by peer read tcp 192.168.31.90:55314->xxxx:8002: read: connection reset by peer read tcp 192.168.31.90:55315->xxxx:8002: read: connection reset by peer] > common/retry: all retry attempts failed 2025/05/20 08:57:02.120494 [Info] [1899247828] app/proxyman/inbound: connection ends > proxy/socks: connection ends > proxy/socks: failed to transport all TCP response > io: read/write on closed pipe
2025/05/20 09:56:59.114561 [Info] infra/conf/serial: Reading config: &{Name:./test.json Format:json} 2025/05/20 09:56:59.114644 [Info] transport/internet/splithttp: listening TCP for XHTTP on 0.0.0.0:8001 2025/05/20 09:56:59.114707 [Info] transport/internet/tcp: listening TCP on 0.0.0.0:8002 2025/05/20 09:56:59.114740 [Warning] core: Xray 25.5.16 started 2025/05/20 09:56:59.999414 [Info] transport/internet/tcp: REALITY: processed invalid connection 2025/05/20 09:57:00.057377 [Info] transport/internet/tcp: REALITY: processed invalid connection 2025/05/20 09:57:00.322137 [Info] transport/internet/tcp: REALITY: processed invalid connection 2025/05/20 09:57:00.775568 [Info] transport/internet/tcp: REALITY: processed invalid connection 2025/05/20 09:57:01.435747 [Info] transport/internet/tcp: REALITY: processed invalid connection 2025/05/20 09:57:02.302305 [Info] transport/internet/tcp: REALITY: processed invalid connection
The text was updated successfully, but these errors were encountered:
不是 伪装白名单域名的功能你拿个被墙的域名几个意思
Sorry, something went wrong.
No branches or pull requests
完整性要求
描述
版本:Xray 25.5.16 (Xray, Penetrates Everything.) 800b8b5 (go1.24.3 linux/amd64)
偷docs.misaka.io域名正常,但是偷blog.medium.com域名 (X25519MLKEM768),使用xhttp和xtls-rprx-vision均失败。
重现方式
正常运行xray
客户端配置
服务端配置
客户端日志
服务端日志
The text was updated successfully, but these errors were encountered: