forked from clowwindy/ShadowVPN
-
Notifications
You must be signed in to change notification settings - Fork 89
/
Copy pathclient.conf
52 lines (38 loc) · 1.55 KB
/
client.conf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
# ShadowVPN config example
# Notice: do not put space before or after "="
# Server listen address
server=127.0.0.1
# Server listen port
port=1123
# Identify a user. Must be HEX of 8 bytes. You can generate on by running:
# xxd -l 8 -p /dev/random
# See `net` for more information.
# user_token=7e335d67f1dc2c01
# Password to use to encrypt traffic. You can generate one by running:
# dd if=/dev/urandom bs=64 count=1 | md5sum
password=my_password
# Server or client mode
mode=client
# Max source ports. Must be the SAME with server or VPN won't work properly.
concurrency=1
# MTU of VPN tunnel device. Use the following formula to calculate:
# 1492 (Ethernet) - 20 (IPv4, or 40 for IPv6) - 8 (UDP) - 32 (ShadowVPN)
mtu=1432
# Tunnel device name. tunX for Linux or BSD, utunX for Darwin.
intf=tun0
# Local IP and subnet of the VPN tunnel.
# If user_token is specified, NAT mode will be enabled on server side, and
# the client does not need to have the same network with the server.
net=10.7.0.2/24
# Script to run after VPN is created. All key-value pairs (except password) in
# this file will be passed to the script as environment variables. Use this
# script to set up routes, turn on NAT, etc.
up=/etc/shadowvpn/client_up.sh
# Script to run before stopping VPN. All key-value pairs (except password) in
# this file will be passed to the script as environment variables. Use this
# script to restore routes, turn off NAT, etc.
down=/etc/shadowvpn/client_down.sh
# PID file path
pidfile=/var/run/shadowvpn.pid
# Log file path
logfile=/var/log/shadowvpn.log