Proxy to bypass G.F.W

前言

包含nginx 4层代理实现443端口共用

ssl证书

参考 https://yanyong.cc/post/certbot-cloudflare-letsencrypt/

安装nginx

1
sudo apt -y install nginx libnginx-mod-stream

v2ray

config.json

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
{
    "log": {
        "loglevel": "warning"
    },
    "routing": {
        "domainStrategy": "AsIs",
        "rules": [
            {
                "type": "field",
                "ip": [
                    "geoip:private"
                ],
                "outboundTag": "block"
            }
        ]
    },
    "inbounds": [
        {
            "port": 16800,
            "listen": "127.0.0.1",
            "protocol": "vmess",
            "settings": {
                "clients": [
                    {
                        "id": "uuiduuid-uuid-uuid-uuid-uuiduuiduuid"
                    }
                ]
            },
            "streamSettings": {
                "network": "ws",
                "security": "none",  // TLS已经交给nginx处理
                "wsSettings": {
                    "path": "/abcdefg"  // 复杂点避免嗅探
                }
            },
            "sniffing": {
                "enabled": false
            },
            "allocate": {
                "strategy": "always"
            }
        }
    ],
    "outbounds": [
        {
            "protocol": "freedom",
            "tag": "direct"
        },
        {
            "protocol": "blackhole",
            "tag": "block"
        }
    ]
}

运行

1
sudo docker run -d --name v2ray --network=host --restart=always -v /etc/v2ray/:/etc/v2ray/ -e TZ=Asia/Shanghai v2fly/v2fly-core:v4.45.2

nginx配置

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
server {
    listen                  127.0.0.1:20350 ssl http2;
    server_name             v2ray.yanyong.cc;

    # SSL
    ssl_certificate         /etc/letsencrypt/live/yanyong.cc/fullchain.pem;
    ssl_certificate_key     /etc/letsencrypt/live/yanyong.cc/privkey.pem;
    ssl_trusted_certificate /etc/letsencrypt/live/yanyong.cc/chain.pem;

    # security
    include                 nginxconfig.io/security.conf;

    # WebSocket reverse proxy
    location /abcdefg {
        proxy_pass            http://127.0.0.1:16800;
        include               nginxconfig.io/proxy.conf;
    }

    location / {
        return 301 https://yanyong.cc;
    }

    # additional config
    include nginxconfig.io/general.conf;
}

参考链接:

https://www.v2fly.org/

https://github.com/v2fly/v2ray-core

https://github.com/v2fly/v2ray-examples

https://hub.docker.com/r/v2fly/v2fly-core

xray

config.json

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
{
    "log": {
        "loglevel": "warning"
    },
    "routing": {
        "domainStrategy": "AsIs",
        "rules": [
            {
                "type": "field",
                "ip": [
                    "geoip:private"
                ],
                "outboundTag": "block"
            }
        ]
    },
    "inbounds": [
        {
            "port": 20351,
            "listen": "127.0.0.1",
            "protocol": "vless",
            "settings": {
                "clients": [
                    {
                        "id": "uuiduuid-uuid-uuid-uuid-uuiduuiduuid", // 填写你的 UUID
                        "level": 0,
                        "email": "[email protected]"
                    }
                ],
                "decryption": "none",
                "fallbacks": [
                    {
                        "dest": 80
                    },
                    {
                        "path": "/abcdefg", // 必须换成自定义的 PATH
                        "dest": 16801,
                        "xver": 1
                    }
                ]
            },
            "streamSettings": {
                "network": "tcp",
                "security": "tls",
                "tlsSettings": {
                    "alpn": [
                        "http/1.1"
                    ],
                    "certificates": [
                        {
                            "certificateFile": "/etc/xray/ssl/fullchain.pem", // 换成你的证书,绝对路径
                            "keyFile": "/etc/xray/ssl/privkey.pem" // 换成你的私钥,绝对路径
                        }
                    ]
                }
            }
        },
        {
            "port": 16801,
            "listen": "127.0.0.1",
            "protocol": "vless",
            "settings": {
                "clients": [
                    {
                        "id": "uuiduuid-uuid-uuid-uuid-uuiduuiduuid", // 填写你的 UUID
                        "level": 0,
                        "email": "[email protected]"
                    }
                ],
                "decryption": "none"
            },
            "streamSettings": {
                "network": "ws",
                "security": "none",
                "wsSettings": {
                    "acceptProxyProtocol": true, // 提醒:若你用 Nginx/Caddy 等反代 WS,需要删掉这行
                    "path": "/abcdefg" // 必须换成自定义的 PATH,需要和上面的一致
                }
            }
        }
    ],
    "outbounds": [
        {
            "protocol": "freedom",
            "tag": "direct"
        },
        {
            "protocol": "blackhole",
            "tag": "block"
        }
    ]
}

运行

1
sudo docker run -d --name xray --network=host --restart=always -v /etc/xray:/etc/xray -e TZ=Asia/Shanghai ghcr.io/xtls/xray-core:25.3.6

自动更新证书,编辑/etc/letsencrypt/renewal-hooks/deploy/xray.sh

1
2
3
4
5
6
7
#!/bin/bash
if [ ! -d /etc/xray/ssl ]; then
    mkdir /etc/xray/ssl
fi
cp /etc/letsencrypt/live/yanyong.cc/{privkey.pem,fullchain.pem} /etc/xray/ssl/
chmod 400 /etc/xray/ssl/*
docker restart xray

参考链接:

https://xtls.github.io/

https://github.com/XTLS/Xray-core

https://github.com/XTLS/Xray-examples

镜像1: https://github.com/xtls/Xray-core/pkgs/container/xray-core

镜像2: https://hub.docker.com/r/teddysun/xray

trojan

config.json

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
{
    "run_type": "server",
    "local_addr": "127.0.0.1",
    "local_port": 20352,
    "remote_addr": "127.0.0.1",
    "remote_port": 80,
    "password": [
        "123456"
    ],
    "log_level": 2,
    "ssl": {
        "cert": "/config/ssl/fullchain.pem",
        "key": "/config/ssl/privkey.pem",
        "key_password": "",
        "cipher": "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384",
        "cipher_tls13": "TLS_AES_128_GCM_SHA256:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_256_GCM_SHA384",
        "prefer_server_cipher": true,
        "alpn": [
            "http/1.1"
        ],
        "alpn_port_override": {
            "h2": 81
        },
        "reuse_session": true,
        "session_ticket": false,
        "session_timeout": 600,
        "plain_http_response": "",
        "curves": "",
        "dhparam": ""
    },
    "tcp": {
        "prefer_ipv4": false,
        "no_delay": true,
        "keep_alive": true,
        "reuse_port": false,
        "fast_open": false,
        "fast_open_qlen": 20
    },
    "mysql": {
        "enabled": false,
        "server_addr": "127.0.0.1",
        "server_port": 3306,
        "database": "trojan",
        "username": "trojan",
        "password": "",
        "key": "",
        "cert": "",
        "ca": ""
    }
}

运行

latest版本其实就是v1.16.0版本,docker仓库没有v1.16.0的tag,v1.16.0是目前最后一个版本,上一次更新时间是2020.6.10

1
sudo docker run -d --name trojan --network=host --restart=always -v /etc/trojan:/config trojangfw/trojan

自动更新证书,编辑/etc/letsencrypt/renewal-hooks/deploy/trojan.sh

1
2
3
4
5
6
7
#!/bin/bash
if [ ! -d /etc/trojan/ssl ]; then
    mkdir /etc/trojan/ssl
fi
cp /etc/letsencrypt/live/yanyong.cc/{privkey.pem,fullchain.pem} /etc/trojan/ssl/
chmod 400 /etc/trojan/ssl/*
docker restart trojan

参考链接:

https://trojan-gfw.github.io/trojan/

https://github.com/trojan-gfw/trojan

https://github.com/trojan-gfw/trojan/tree/master/examples

https://hub.docker.com/r/trojangfw/trojan

trojan-go

config.json

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
{
    "run_type": "server",
    "local_addr": "127.0.0.1",
    "local_port": 20353,
    "remote_addr": "127.0.0.1",
    "remote_port": 80,
    "log_level": 2,
    "password": [
        "123456"
    ],
    "ssl": {
        "cert": "/etc/trojan-go/ssl/fullchain.pem",
        "key": "/etc/trojan-go/ssl/privkey.pem"
    },
    "router": {
        "enabled": true,
        "block": [
            "geoip:private"
        ]
    },
    "websocket": {
        "enabled": true,
        "path": "/abcdefg"
    }
}

运行

v0.10.6,上一次更新时间是2021.9.14

1
sudo docker run --name trojan-go -d -v /etc/trojan-go/:/etc/trojan-go --network=host --restart=always -e TZ=Asia/Shanghai p4gefau1t/trojan-go:v0.10.6

自动更新证书,编辑/etc/letsencrypt/renewal-hooks/deploy/trojan-go.sh

1
2
3
4
5
6
7
#!/bin/bash
if [ ! -d /etc/trojan-go/ssl ]; then
    mkdir /etc/trojan-go/ssl
fi
cp /etc/letsencrypt/live/yanyong.cc/{privkey.pem,fullchain.pem} /etc/trojan-go/ssl/
chmod 400 /etc/trojan-go/ssl/*
docker restart trojan-go

参考链接:

https://p4gefau1t.github.io/trojan-go/

https://github.com/p4gefau1t/trojan-go

https://github.com/p4gefau1t/trojan-go/tree/master/example

https://p4gefau1t.github.io/trojan-go/basic/full-config/

https://hub.docker.com/r/p4gefau1t/trojan-go

配置443端口共用

启用stream模块

1
sudo ln -s /usr/share/nginx/modules-available/mod-stream.conf /etc/nginx/modules-enabled/mod-stream.conf

编辑nginx.conf中添加以下内容

1
2
3
stream {
    include /etc/nginx/stream.d/*.conf;
}

编辑/etc/nginx/stream.d/sni.conf

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
map $ssl_preread_server_name $backend_name {
    v2ray.yanyong.cc     v2ray;
    xray.yanyong.cc      xray;
    trojan.yanyong.cc    trojan;
    trojan-go.yanyong.cc trojan-go;
    default              web;
}

upstream v2ray {
    server 127.0.0.1:20350;
}

upstream xray {
    server 127.0.0.1:20351;
}

upstream trojan {
    server 127.0.0.1:20352;
}

upstream trojan-go {
    server 127.0.0.1:20353;
}

upstream web {
    server 127.0.0.1:80;
}

server {
    listen      443 reuseport;
    proxy_pass  $backend_name;
    ssl_preread on;
}

建议

如何选择:安全性 > 稳定性 > 速度

https://www.chengxiaobai.com/essays/v2ray-trojan-xray

不建议开启mux,不一定会提高网速有可能反而更慢

https://p4gefau1t.github.io/trojan-go/advance/mux/

https://www.v2fly.org/config/outbounds.html#muxobject

不建议开启tcp fast open,更容易被识别?

https://github.com/trojan-gfw/trojan/issues/388

参考链接:

http://nginx.org/en/docs/stream/ngx_stream_ssl_preread_module.html

https://www.chengxiaobai.com/trouble-maker/trojan-shared-443-port-scheme#more

IKEv2

此次安装版本为5.9.8

1
2
3
4
5
$ apt-cache madison charon-systemd
charon-systemd | 5.9.8-5+deb12u1 | http://deb.debian.org/debian bookworm/main amd64 Packages
charon-systemd | 5.9.8-5+deb12u1 | http://security.debian.org/debian-security bookworm-security/main amd64 Packages
strongswan | 5.9.8-5+deb12u1 | http://deb.debian.org/debian bookworm/main Sources
strongswan | 5.9.8-5+deb12u1 | http://security.debian.org/debian-security bookworm-security/main Sources

安装charon-systemd

1
sudo apt -y install charon-systemd libstrongswan-extra-plugins libcharon-extra-plugins

配置nginx,用于webroot模式获取证书

1
2
3
4
5
6
7
8
server {
    listen      80;
    server_name strongswan.yanyong.cc;

    location ^~ /.well-known/acme-challenge/ {
        root /srv/www/_letsencrypt;
    }
}

获取ssl证书

1
2
3
4
5
6
7
sudo certbot certonly --webroot -w /srv/www/_letsencrypt \
    -d strongswan.yanyong.cc \
    --key-type rsa \
    --email [email protected] \
    --agree-tos \
    --no-eff-email \
    --deploy-hook 'systemctl reload nginx'

自动更新证书,编辑/etc/letsencrypt/renewal-hooks/deploy/strongswan.sh

1
2
3
4
5
6
7
8
#!/bin/bash
cp /etc/letsencrypt/live/strongswan.yanyong.cc/cert.pem /etc/swanctl/x509/
cp /etc/letsencrypt/live/strongswan.yanyong.cc/chain.pem /etc/swanctl/x509ca/
cp /etc/letsencrypt/live/strongswan.yanyong.cc/privkey.pem /etc/swanctl/private/
chmod 400 /etc/swanctl/x509/cert.pem
chmod 400 /etc/swanctl/x509ca/chain.pem
chmod 400 /etc/swanctl/private/privkey.pem
swanctl --load-all

编辑/etc/swanctl/conf.d/strongswan.conf

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
authorities {
    letsencrypt {
        cacert = chain.pem
    }
}

connections {
    ikev2-eap-mschapv2 {
        version = 2
        proposals = aes192gcm16-aes128gcm16-prfsha256-ecp256-ecp521,aes192-sha256-modp3072,aes256-sha384-modp2048-modp1024,default
        rekey_time = 0s
        pools = primary-pool-ipv4
        fragmentation = yes
        dpd_delay = 30s
        # dpd_timeout doesn't do anything for IKEv2. The general IKEv2 packet timeouts are used.
        send_cert = always
        unique = never
        local-1 {
            certs = cert.pem
            id = strongswan.yanyong.cc
        }
        remote-1 {
            auth = eap-mschapv2
            # go ask the client for its eap identity.
            eap_id = %any
        }
        children {
            ikev2-eap-mschapv2 {
                local_ts = 0.0.0.0/0
                rekey_time = 0s
                dpd_action = clear
                esp_proposals = aes192gcm16-aes128gcm16-prfsha256-ecp256-modp3072,aes192-sha256-ecp256-modp3072,default
            }
        }
    }
}

pools {
    primary-pool-ipv4 {
        addrs = 172.16.255.0/24
        dns = 1.1.1.1, 8.8.8.8
    }
}

secrets {
    eap-carol {
        id = carol
        secret = "carolspassword" 
    }
}

重载配置

1
sudo swanctl --load-all

常用命令

1
2
sudo systemctl status strongswan
sudo journalctl -u strongswan

编辑/etc/sysctl.d/strongswan.conf

1
2
net.ipv4.ip_forward=1
net.ipv4.ip_no_pmtu_disc=1

生效配置

1
sudo sysctl -p /etc/sysctl.d/strongswan.conf

配置iptables

打开ssh、http、https等端口

1
2
3
4
5
sudo iptables -A INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
sudo iptables -A INPUT -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT
sudo iptables -A INPUT -i lo -j ACCEPT
sudo iptables -A INPUT -p icmp --icmp-type echo-request -j ACCEPT
sudo iptables -A INPUT -p tcp -m multiport --dports 80,443 -m conntrack --ctstate NEW -j ACCEPT

strongswan部分

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
# IKE & MobIKE
sudo iptables -A INPUT -p udp --dport 500 -m conntrack --ctstate NEW -j ACCEPT
sudo iptables -A INPUT -p udp --dport 4500 -m conntrack --ctstate NEW -j ACCEPT
# NAT
sudo iptables -t nat -A POSTROUTING -s 172.16.255.0/24 -o eth0 -m policy --dir out --pol ipsec -j ACCEPT
sudo iptables -t nat -A POSTROUTING -s 172.16.255.0/24 -o eth0 -j MASQUERADE
# MTU/MSS
sudo iptables -t mangle -A FORWARD -s 172.16.255.0/24 -o eth0 -m policy --pol ipsec --dir in  -p tcp -m tcp --tcp-flags SYN,RST SYN -m tcpmss --mss 1361:1536 -j TCPMSS --set-mss 1360
sudo iptables -t mangle -A FORWARD -s 172.16.255.0/24 -o eth0 -m policy --pol ipsec --dir out -p tcp -m tcp --tcp-flags SYN,RST SYN -m tcpmss --mss 1361:1536 -j TCPMSS --set-mss 1360
# forward ESP-tunneled traffic
sudo iptables -A FORWARD --match policy --pol ipsec --dir in  --proto esp -s 172.16.255.0/24 -j ACCEPT
sudo iptables -A FORWARD --match policy --pol ipsec --dir out --proto esp -d 172.16.255.0/24 -j ACCEPT

默认DROP

1
2
sudo iptables -P INPUT DROP
sudo iptables -P FORWARD DROP

安装iptables-persistent

1
2
3
4
5
echo 'iptables-persistent iptables-persistent/autosave_v4 boolean true' | sudo debconf-set-selections
echo 'iptables-persistent iptables-persistent/autosave_v6 boolean false' | sudo debconf-set-selections
sudo apt -y install iptables-persistent
sudo netfilter-persistent save
sudo rm /etc/iptables/rules.v6

编辑/etc/iptables/rules.v4

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
*mangle
:PREROUTING ACCEPT [0:0]
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]
-A FORWARD -s 172.16.255.0/24 -o eth0 -p tcp -m policy --dir in --pol ipsec -m tcp --tcp-flags SYN,RST SYN -m tcpmss --mss 1361:1536 -j TCPMSS --set-mss 1360
-A FORWARD -s 172.16.255.0/24 -o eth0 -p tcp -m policy --dir out --pol ipsec -m tcp --tcp-flags SYN,RST SYN -m tcpmss --mss 1361:1536 -j TCPMSS --set-mss 1360
COMMIT

*filter
:INPUT DROP [0:0]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [0:0]
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A INPUT -p tcp -m tcp --dport 23422 -m conntrack --ctstate NEW -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -p icmp -m icmp --icmp-type 8 -j ACCEPT
-A INPUT -p tcp -m multiport --dports 80,443 -m conntrack --ctstate NEW -j ACCEPT
-A INPUT -p udp -m udp --dport 500 -m conntrack --ctstate NEW -j ACCEPT
-A INPUT -p udp -m udp --dport 4500 -m conntrack --ctstate NEW -j ACCEPT
-A FORWARD -s 172.16.255.0/24 -m policy --dir in --pol ipsec --proto esp -j ACCEPT
-A FORWARD -d 172.16.255.0/24 -m policy --dir out --pol ipsec --proto esp -j ACCEPT
COMMIT

*nat
:PREROUTING ACCEPT [0:0]
:INPUT ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]
-A POSTROUTING -s 172.16.255.0/24 -o eth0 -m policy --dir out --pol ipsec -j ACCEPT
-A POSTROUTING -s 172.16.255.0/24 -o eth0 -j MASQUERADE
COMMIT

参考链接:

https://github.com/strongswan/strongswan

https://docs.strongswan.org/docs/5.9/index.html

https://wiki.strongswan.org/projects/strongswan/wiki/UsableExamples

https://docs.strongswan.org/docs/5.9/swanctl/swanctlConf.html

https://docs.strongswan.org/docs/5.9/swanctl/swanctlDir.html

https://docs.strongswan.org/docs/5.9/howtos/forwarding.html

https://docs.strongswan.org/docs/5.9/features/mobike.html

https://www.digitalocean.com/community/tutorials/how-to-set-up-an-ikev2-vpn-server-with-strongswan-on-ubuntu-16-04#step-6-configuring-the-firewall-kernel-ip-forwarding

https://github.com/strongswan/strongswan/blob/master/testing/tests/ha/both-active/hosts/alice/etc/iptables.rules

https://lists.strongswan.org/pipermail/users/2015-November/008999.html