-
From the documentation on mKCP transport:
It states that |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 2 replies
-
Just use Vmess inside mKCP, it can provide a secure encryption for your connection. |
Beta Was this translation helpful? Give feedback.
-
I ended up with these configs. They are the same as in the examples, but with TLS. Hope it is secure enough now. client.json
{
"log": {
"loglevel": "warning"
},
"inbounds": [
{
"port": 1080,
"listen": "127.0.0.1",
"protocol": "socks",
"settings": {
"udp": true
}
}
],
"outbounds": [
{
"protocol": "vless",
"settings": {
"vnext": [
{
"address": "{{ host }}",
"port": {{ port }},
"users": [
{
"id": "{{ uuid }}",
"encryption": "none"
}
]
}
]
},
"streamSettings": {
"network": "kcp",
"kcpSettings": {
"seed": "{{ seed }}"
},
"security": "tls",
"tlsSettings": {
"serverName": "some.domain",
"certificates": [
{
"certificate": [...],
"usage": "verify"
}
]
}
}
}
]
} server.json
{
"log": {
"loglevel": "warning"
},
"inbounds": [
{
"protocol": "vless",
"port": {{ port }},
"settings": {
"decryption":"none",
"clients": [
{
"id": "{{ uuid }}"
}
]
},
"streamSettings": {
"network": "kcp",
"kcpSettings": {
"seed": "{{ seed }}"
},
"security": "tls",
"tlsSettings": {
"certificates": [
{
"certificate": [...],
"key": [...]
}
]
}
}
}
],
"outbounds": [
{
"protocol": "freedom"
}
]
} Certificate/key pair is generated using this command (certificate will expire in 10 years): xray tls cert -domain some.domain -expire 87600h |
Beta Was this translation helpful? Give feedback.
I ended up with these configs. They are the same as in the examples, but with TLS. Hope it is secure enough now.
client.json