mirror of
https://github.com/MetaCubeX/mihomo.git
synced 2025-12-24 13:38:05 +08:00
a1c7881229d69a04a5e2ca3ccfa7b88ed802ddaa
The DNS resolution of the overall UDP part has been delayed to the connection initiation stage. During the rule matching process, it will only be triggered when the IP rule without no-resolve is matched. For direct and wireguard outbound, the same logic as the TCP part will be followed, that is, when direct-nameserver (or DNS configured by wireguard) exists, the result of the matching process will be discarded and the domain name will be re-resolved. This re-resolution logic is only effective for fakeip. For reject and DNS outbound, no resolution is required. For other outbound, resolution will still be performed when the connection is initiated, and the domain name will not be sent directly to the remote server at present.
Meta Kernel
Another Mihomo Kernel.
Features
- Local HTTP/HTTPS/SOCKS server with authentication support
- VMess, VLESS, Shadowsocks, Trojan, Snell, TUIC, Hysteria protocol support
- Built-in DNS server that aims to minimize DNS pollution attack impact, supports DoH/DoT upstream and fake IP.
- Rules based off domains, GEOIP, IPCIDR or Process to forward packets to different nodes
- Remote groups allow users to implement powerful rules. Supports automatic fallback, load balancing or auto select node based off latency
- Remote providers, allowing users to get node lists remotely instead of hard-coding in config
- Netfilter TCP redirecting. Deploy Mihomo on your Internet gateway with
iptables. - Comprehensive HTTP RESTful API controller
Dashboard
A web dashboard with first-class support for this project has been created; it can be checked out at metacubexd.
Configration example
Configuration example is located at /docs/config.yaml.
Docs
Documentation can be found in mihomo Docs.
For development
Requirements: Go 1.20 or newer
Build mihomo:
git clone https://github.com/MetaCubeX/mihomo.git
cd mihomo && go mod download
go build
Set go proxy if a connection to GitHub is not possible:
go env -w GOPROXY=https://goproxy.io,direct
Build with gvisor tun stack:
go build -tags with_gvisor
IPTABLES configuration
Work on Linux OS which supported iptables
# Enable the TPROXY listener
tproxy-port: 9898
iptables:
enable: true # default is false
inbound-interface: eth0 # detect the inbound interface, default is 'lo'
Debugging
Check wiki to get an instruction on using debug API.
Credits
- Dreamacro/clash
- SagerNet/sing-box
- riobard/go-shadowsocks2
- v2ray/v2ray-core
- WireGuard/wireguard-go
- yaling888/clash-plus-pro
License
This software is released under the GPL-3.0 license.
In addition, any downstream projects not affiliated with MetaCubeX shall not contain the word mihomo in their names.
Languages
Python
100%