Update singbox config

This commit is contained in:
Whispering Wind
2025-03-01 15:28:24 +03:30
committed by GitHub
parent 4430a91cb7
commit 13f6cdfcbe

View File

@ -1,85 +1,93 @@
{ {
"log": { "log": {
"level": "warn", "level": "info",
"output": "box.log",
"timestamp": true "timestamp": true
}, },
"dns": { "dns": {
"servers": [ "servers": [
{ {
"tag": "dns-remote", "tag": "proxyDns",
"address": "udp://1.1.1.1", "address": "tls://8.8.8.8",
"address_resolver": "dns-direct" "detour": "Proxy"
}, },
{ {
"tag": "dns-direct", "tag": "localDns",
"address": "1.1.1.1", "address": "https://223.5.5.5/dns-query",
"address_resolver": "dns-local",
"detour": "direct" "detour": "direct"
},
{
"tag": "dns-local",
"address": "local",
"detour": "direct"
},
{
"tag": "dns-block",
"address": "rcode://success"
} }
], ],
"independent_cache": true "rules": [
{
"outbound": "any",
"server": "localDns"
},
{
"rule_set": "geosite-ir",
"server": "proxyDns"
},
{
"clash_mode": "direct",
"server": "localDns"
},
{
"clash_mode": "global",
"server": "proxyDns"
}
],
"final": "localDns",
"strategy": "ipv4_only"
}, },
"inbounds": [ "inbounds": [
{ {
"type": "tun",
"tag": "tun-in", "tag": "tun-in",
"type": "tun",
"address": [ "address": [
"172.18.0.1/30", "172.19.0.0/30"
"fdfe:dcba:9876::1/126"
], ],
"mtu": 9000, "mtu": 9000,
"auto_route": true, "auto_route": true,
"auto_redirect": false,
"strict_route": true, "strict_route": true,
"route_address": [ "stack": "system",
"0.0.0.0/1", "platform": {
"128.0.0.0/1", "http_proxy": {
"::/1", "enabled": true,
"8000::/1" "server": "127.0.0.1",
], "server_port": 2080
}
"route_exclude_address": [ }
"192.168.0.0/16",
"fc00::/7"
],
"sniff": true,
"sniff_override_destination": true
}, },
{ {
"type": "direct", "tag": "mixed-in",
"tag": "dns-in", "type": "mixed",
"listen": "127.0.0.1", "listen": "127.0.0.1",
"listen_port": 6450 "listen_port": 2080
} }
], ],
"outbounds": [ "outbounds": [
{ {
"tag": "Proxy",
"type": "selector", "type": "selector",
"tag": "select",
"outbounds": [ "outbounds": [
"auto" "auto",
], "direct"
"default": "auto" ]
}, },
{ {
"type": "urltest", "tag": "Global",
"tag": "auto", "type": "selector",
"outbounds": [ "outbounds": [
"direct"
]
},
{
"tag": "auto",
"type": "urltest",
"outbounds": [
"Proxy"
], ],
"url": "http://connectivitycheck.gstatic.com/generate_204", "url": "http://www.gstatic.com/generate_204",
"interval": "10m0s", "interval": "10m",
"idle_timeout": "1h40m0s" "tolerance": 50
}, },
{ {
"type": "direct", "type": "direct",
@ -87,42 +95,44 @@
}, },
{ {
"type": "direct", "type": "direct",
"tag": "bypass" "tag": "local"
} }
], ],
"route": { "route": {
"auto_detect_interface": true,
"final": "Proxy",
"rules": [ "rules": [
{ {
"inbound": "tun-in", "inbound": [
"tun-in",
"mixed-in"
],
"action": "sniff" "action": "sniff"
}, },
{ {
"action": "reject", "type": "logical",
"rule_set": "geosite-category-ads-all" "mode": "or",
"rules": [
{
"port": 53
}, },
{ {
"action": "reject",
"rule_set": "geosite-malware"
},
{
"action": "reject",
"rule_set": "geosite-phishing"
},
{
"action": "reject",
"rule_set": "geosite-cryptominers"
},
{
"action": "reject",
"rule_set": "geoip-malware"
},
{
"action": "reject",
"rule_set": "geoip-phishing"
},
{
"action": "hijack-dns",
"protocol": "dns" "protocol": "dns"
}
],
"action": "hijack-dns"
},
{
"rule_set": "geosite-category-ads-all",
"action": "reject"
},
{
"rule_set": "geosite-category-ads-all",
"outbound": "Proxy"
},
{
"ip_is_private": true,
"outbound": "direct"
}, },
{ {
"action": "route", "action": "route",
@ -135,74 +145,28 @@
"outbound": "direct" "outbound": "direct"
} }
], ],
"rule_set": [ "rule_set": [
{ {
"type": "remote",
"tag": "geosite-ir",
"format": "binary",
"url": "https://raw.githubusercontent.com/Chocolate4U/Iran-sing-box-rules/rule-set/geosite-ir.srs",
"download_detour": "direct",
"update_interval": "72h0m0s"
},
{
"type": "remote",
"tag": "geosite-category-ads-all", "tag": "geosite-category-ads-all",
"type": "remote",
"format": "binary", "format": "binary",
"url": "https://raw.githubusercontent.com/Chocolate4U/Iran-sing-box-rules/rule-set/geosite-category-ads-all.srs", "url": "https://raw.githubusercontent.com/Chocolate4U/Iran-sing-box-rules/rule-set/geosite-category-ads-all.srs",
"download_detour": "direct", "download_detour": "direct"
"update_interval": "72h0m0s"
},
{
"type": "remote",
"tag": "geosite-malware",
"format": "binary",
"url": "https://raw.githubusercontent.com/Chocolate4U/Iran-sing-box-rules/rule-set/geosite-malware.srs",
"download_detour": "direct",
"update_interval": "72h0m0s"
},
{
"type": "remote",
"tag": "geosite-phishing",
"format": "binary",
"url": "https://raw.githubusercontent.com/Chocolate4U/Iran-sing-box-rules/rule-set/geosite-phishing.srs",
"download_detour": "direct",
"update_interval": "72h0m0s"
},
{
"type": "remote",
"tag": "geosite-cryptominers",
"format": "binary",
"url": "https://raw.githubusercontent.com/Chocolate4U/Iran-sing-box-rules/rule-set/geosite-cryptominers.srs",
"download_detour": "direct",
"update_interval": "72h0m0s"
}, },
{ {
"type": "remote", "type": "remote",
"tag": "geoip-ir", "tag": "geoip-ir",
"format": "binary", "format": "binary",
"url": "https://raw.githubusercontent.com/Chocolate4U/Iran-sing-box-rules/rule-set/geoip-ir.srs", "url": "https://raw.githubusercontent.com/Chocolate4U/Iran-sing-box-rules/rule-set/geoip-ir.srs",
"download_detour": "direct", "update_interval": "120h0m0s"
"update_interval": "72h0m0s"
}, },
{ {
"type": "remote", "type": "remote",
"tag": "geoip-malware", "tag": "geosite-ir",
"format": "binary", "format": "binary",
"url": "https://raw.githubusercontent.com/Chocolate4U/Iran-sing-box-rules/rule-set/geoip-malware.srs", "url": "https://raw.githubusercontent.com/Chocolate4U/Iran-sing-box-rules/rule-set/geosite-ir.srs",
"download_detour": "direct", "update_interval": "120h0m0s"
"update_interval": "72h0m0s"
},
{
"type": "remote",
"tag": "geoip-phishing",
"format": "binary",
"url": "https://raw.githubusercontent.com/Chocolate4U/Iran-sing-box-rules/rule-set/geoip-phishing.srs",
"download_detour": "direct",
"update_interval": "72h0m0s"
} }
], ]
"auto_detect_interface": true,
"override_android_vpn": true
} }
} }