mixed-port: 7890 allow-lan: false bind-address: '*' mode: rule log-level: info external-controller: '127.0.0.1:9090' dns: enable: true ipv6: false default-nameserver: [223.5.5.5, 223.6.6.6] enhanced-mode: fake-ip fake-ip-range: 198.18.0.1/16 use-hosts: true nameserver: ['https://dns.alidns.com/dns-query'] fallback: ['https://dns.alidns.com/dns-query', 'https://dns.cloudflare.com/dns-query', 'tls://8.8.4.4:853'] fallback-filter: { geoip: true, ipcidr: [240.0.0.0/4, 0.0.0.0/32] } proxies: - name: vless-ws-tls-2 type: vless server: icook.hk port: 8443 uuid: 73b6dbd5-a27a-4c76-9ad1-42a82380dddb udp: true tls: true network: ws servername: worker.ariesver.online ws-opts: path: "/?ed=2048" headers: Host: worker.ariesver.online - name: warp-1 type: wireguard server: 188.114.98.244 port: 987 ip: 172.16.0.2/32 ipv6: 2606:4700:110:86f7:4d4c:8ad2:7372:41b9/128 public-key: bmXOC+F1FxEMF9dyiK2H5/1SUtzH0JuVo51h2wPfgyo= private-key: gOt0GSXgyRM89twzV2UE/hTDVBT/NWwZwq1Rx03KE3M= udp: true reserved: [174,236,8] keepalive: 45 mtu: 1280 - name: warp-2 type: wireguard server: 188.114.98.244 port: 987 ip: 172.16.0.2/32 ipv6: 2606:4700:110:846a:1a0d:7c22:6aea:6fb1/128 public-key: bmXOC+F1FxEMF9dyiK2H5/1SUtzH0JuVo51h2wPfgyo= private-key: yBqdZrWsTfbO1/oQAJklJO3ikWJKZ+s79UX8wdSf+0k= udp: true reserved: [60,80,230] keepalive: 45 mtu: 1280 proxy-providers: {WARP: {type: http, path: ./warp.yaml, url: 'https://neko-warp.nloli.xyz/neko_warp.yaml', interval: 3600, health-check: {enable: true, url: 'https://www.gstatic.com/generate_204', interval: 300}}} proxy-groups: - { name: PROXY, type: select, proxies: [vless-ws-tls-2, warp-1, warp-2], use: [WARP] } rule-providers: reject: { type: http, behavior: domain, url: 'https://mirror.ghproxy.com/https://raw.githubusercontent.com/Loyalsoldier/clash-rules/release/reject.txt', path: ./ruleset/reject.yaml, interval: 86400 } icloud: { type: http, behavior: domain, url: 'https://mirror.ghproxy.com/https://raw.githubusercontent.com/Loyalsoldier/clash-rules/release/icloud.txt', path: ./ruleset/icloud.yaml, interval: 86400 } apple: { type: http, behavior: domain, url: 'https://mirror.ghproxy.com/https://raw.githubusercontent.com/Loyalsoldier/clash-rules/release/apple.txt', path: ./ruleset/apple.yaml, interval: 86400 } proxy: { type: http, behavior: domain, url: 'https://mirror.ghproxy.com/https://raw.githubusercontent.com/Loyalsoldier/clash-rules/release/proxy.txt', path: ./ruleset/proxy.yaml, interval: 86400 } direct: { type: http, behavior: domain, url: 'https://mirror.ghproxy.com/https://raw.githubusercontent.com/Loyalsoldier/clash-rules/release/direct.txt', path: ./ruleset/direct.yaml, interval: 86400 } private: { type: http, behavior: domain, url: 'https://mirror.ghproxy.com/https://raw.githubusercontent.com/Loyalsoldier/clash-rules/release/private.txt', path: ./ruleset/private.yaml, interval: 86400 } telegramcidr: { type: http, behavior: ipcidr, url: 'https://mirror.ghproxy.com/https://raw.githubusercontent.com/Loyalsoldier/clash-rules/release/telegramcidr.txt', path: ./ruleset/telegramcidr.yaml, interval: 86400 } cncidr: { type: http, behavior: ipcidr, url: 'https://mirror.ghproxy.com/https://raw.githubusercontent.com/Loyalsoldier/clash-rules/release/cncidr.txt', path: ./ruleset/cncidr.yaml, interval: 86400 } lancidr: { type: http, behavior: ipcidr, url: 'https://mirror.ghproxy.com/https://raw.githubusercontent.com/Loyalsoldier/clash-rules/release/lancidr.txt', path: ./ruleset/lancidr.yaml, interval: 86400 } applications: { type: http, behavior: classical, url: 'https://mirror.ghproxy.com/https://raw.githubusercontent.com/Loyalsoldier/clash-rules/release/applications.txt', path: ./ruleset/applications.yaml, interval: 86400 } rules: - 'RULE-SET,applications,DIRECT' - 'RULE-SET,private,DIRECT' - 'RULE-SET,reject,REJECT' - 'RULE-SET,icloud,DIRECT' - 'RULE-SET,apple,DIRECT' - 'RULE-SET,proxy,PROXY' - 'RULE-SET,direct,DIRECT' - 'RULE-SET,lancidr,DIRECT' - 'RULE-SET,cncidr,DIRECT' - 'RULE-SET,telegramcidr,PROXY' - 'GEOIP,LAN,DIRECT' - 'GEOIP,CN,DIRECT' - 'MATCH,PROXY'