Skip to content

Instantly share code, notes, and snippets.

@sitsh
Created September 27, 2022 12:19
Show Gist options
  • Save sitsh/638783950d958bca2ddd5efec11e7815 to your computer and use it in GitHub Desktop.
Save sitsh/638783950d958bca2ddd5efec11e7815 to your computer and use it in GitHub Desktop.
Xray中转观看Netflix
这个说过很多次了。ray系的锅,因为内置DNS只能解析A/AAAA,非A/AAAA会放行走默认outbound(不经内置路由)
,ios14+因为率先支持http3,其会优先查询HTTPS记录(type65),ray不支持。iOS的Netflix app也会不定时主动向dns.google发起查询
,你也要拦截下来,将HTTPS的查询转发到第三方DNS(比如官网说的coredns),将type65拦截拒绝查询。说难不难,说简单但也要有一定动手能力。
这个说过很多次了。ray系的锅,因为内置DNS只能解析A/AAAA,非A/AAAA会放行走默认outbound(不经内置路由) ...
有没有教程,谢谢
没有教程,会折腾v2的都不难。
基本思路:udp 53 iptables/nftables可拦截,也就是官网的透明代理教程。ray的dokodemo-door的setttings里添加个默认转发地址(或者在DNS outbound添加也行)
给非A/AAAA查询指明条路,转发至上游coredns,coredns增加一条acl block type HTTPS net *
对于局域网来的DNS over https(DoH)流量,你只能用v2的sniffing对dns.google或8.8.8.8/8.8.4.4的访问路由至黑洞,
路由器本身发起的DoH就没必要做此限制了(用v2路由规则的source来指定)
iOS如何正确食用Xray中转观看Netflix,防止IP被封?
https://369369.xyz/host/topic/1053477.html
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment