Skip to content

Listen Fields

Structure

{
  "listen": "::",
  "listen_port": 5353,
  "tcp_fast_open": false,
  "udp_fragment": false,
  "sniff": false,
  "sniff_override_destination": false,
  "sniff_timeout": "300ms",
  "domain_strategy": "prefer_ipv6",
  "udp_timeout": 300,
  "proxy_protocol": false,
  "proxy_protocol_accept_no_header": false,
  "detour": "another-in"
}

Fields

Field Available Context
listen Needs to listen on TCP or UDP.
listen_port Needs to listen on TCP or UDP.
tcp_fast_open Needs to listen on TCP.
udp_timeout Needs to assemble UDP connections, currently Tun and Shadowsocks.
proxy_protocol Needs to listen on TCP.
proxy_protocol_accept_no_header When proxy_protocol enabled

listen

Required

Listen address.

listen_port

Listen port.

tcp_fast_open

Enable TCP Fast Open.

udp_fragment

Enable UDP fragmentation.

sniff

Enable sniffing.

See Protocol Sniff for details.

sniff_override_destination

Override the connection destination address with the sniffed domain.

If the domain name is invalid (like tor), this will not work.

sniff_timeout

Timeout for sniffing.

300ms is used by default.

domain_strategy

One of prefer_ipv4 prefer_ipv6 ipv4_only ipv6_only.

If set, the requested domain name will be resolved to IP before routing.

If sniff_override_destination is in effect, its value will be taken as a fallback.

udp_timeout

UDP NAT expiration time in seconds, default is 300 (5 minutes).

proxy_protocol

Parse Proxy Protocol in the connection header.

proxy_protocol_accept_no_header

Accept connections without Proxy Protocol header.

detour

If set, connections will be forwarded to the specified inbound.

Requires target inbound support, see Injectable.