WARNING: THIS SITE IS A MIRROR OF GITHUB.COM / IT CANNOT LOGIN OR REGISTER ACCOUNTS / THE CONTENTS ARE PROVIDED AS-IS / THIS SITE ASSUMES NO RESPONSIBILITY FOR ANY DISPLAYED CONTENT OR LINKS / IF YOU FOUND SOMETHING MAY NOT GOOD FOR EVERYONE, CONTACT ADMIN AT ilovescratch@foxmail.com
You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hello, I apologize in advance if my question is too stupid, but I couldn't find the answer anywhere... When I connect to a proxy, every request in the logs starts with "tcp request ip," and only after that does an attempt to access DNS occur. If I understand correctly, this is a leak. Fake DNS doesn't work for me at all. If the configuration is made in the app and the checkbox is enabled, there is no mention of fake DNS in the logs. If I create a custom configuration, fake DNS responds with an empty response. And again, sniffing occurs after the DNS leak and the TCP request. Applications like Exclave or V2box handle the same configuration correctly, starting with:
DNS capture and then
activating fake DNS and look for domain name.
Only after this step routing rules
But here in my logs i see what dns request fly somewhere in first seconds ignoring all my settings.
Feature like additional HTTP server is disabled in all cases and in other proxy applications because UDP applications don't work in it. Is it possible to make my configuration work without leaks? Thank you so much.
This discussion was converted from issue #5001 on November 03, 2025 10:14.
Heading
Bold
Italic
Quote
Code
Link
Numbered list
Unordered list
Task list
Attach files
Mention
Reference
Menu
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Hello, I apologize in advance if my question is too stupid, but I couldn't find the answer anywhere... When I connect to a proxy, every request in the logs starts with "tcp request ip," and only after that does an attempt to access DNS occur. If I understand correctly, this is a leak. Fake DNS doesn't work for me at all. If the configuration is made in the app and the checkbox is enabled, there is no mention of fake DNS in the logs. If I create a custom configuration, fake DNS responds with an empty response. And again, sniffing occurs after the DNS leak and the TCP request. Applications like Exclave or V2box handle the same configuration correctly, starting with:
But here in my logs i see what dns request fly somewhere in first seconds ignoring all my settings.
Feature like additional HTTP server is disabled in all cases and in other proxy applications because UDP applications don't work in it. Is it possible to make my configuration work without leaks? Thank you so much.
日志信息
11-02 22:43:41.284 I/GoLog (15604): [Info] [287993682] proxy/vless/outbound: tunneling request to tcp:alive.github.com:443 via site:443
11-02 22:43:40.895 I/GoLog (15604): [Debug] [287993682] transport/internet: dialing to tcp:ip:443
11-02 22:43:40.895 I/GoLog (15604): [Info] [287993682] transport/internet: replace destination with tcp:ip:443
11-02 22:43:40.895 I/GoLog (15604): [Info] app/dns: returning 1 IP(s) for domain site -> [ip]
11-02 22:43:40.895 I/GoLog (15604): [Info] [287993682] transport/internet/websocket: creating connection to tcp:site:443
11-02 22:43:40.895 I/GoLog (15604): [Info] [287993682] app/dispatcher: default route for tcp:alive.github.com:443
11-02 22:43:40.895 I/GoLog (15604): [Info] features/routing/dns: resolve ip for alive.github.com > features/dns: empty response
11-02 22:43:40.895 I/GoLog (15604): from tcp:127.0.0.1:49306 accepted tcp:140.82.113.26:443 [proxy]
11-02 22:43:40.895 I/GoLog (15604): [Debug] app/dns: skip DNS resolution for domain alive.github.com at server FakeDNS
11-02 22:43:40.895 I/GoLog (15604): [Debug] app/dns: domain alive.github.com will use DNS in order: [FakeDNS]
11-02 22:43:40.895 I/GoLog (15604): [Info] [287993682] app/dispatcher: sniffed domain: alive.github.com
11-02 22:43:40.882 I/GoLog (15604): [Info] [287993682] proxy/socks: TCP Connect request to tcp:140.82.113.26:443
--------- beginning of main
My custom config
{
"dns": {
"hosts": {
"mysite": "ip",
"www.mysite": "ip"
},
"servers": [
"fakedns",
{
"address": "https://8.8.8.8/dns-query",
"domains": [
"geosite:category-ru",
"geosite:ru-available-only-inside",
"geosite:yandex",
"geosite:mailru",
"geosite:vk",
"domain:xn--p1ai",
"domain:su"
],
"skipFallback": true,
"tag": "domestic-dns"
}
],
"queryStrategy": "UseIPv4"
},
"fakedns": [
{
"ipPool": "198.18.0.0/15",
"poolSize": 65535
}
],
"inbounds": [
{
"listen": "0.0.0.0",
"port": 10853,
"protocol": "dokodemo-door",
"settings":
{
"address": "0.0.0.0",
"network": "tcp,udp",
"port": 53
},
"tag": "dns-in"
},
{
"listen": "0.0.0.0",
"port": 10808,
"protocol": "socks",
"settings": {
{
"listen": "0.0.0.0",
"port": 10809,
"protocol": "http",
"settings": {
"auth": "noauth",
"udp": true,
"userLevel": 8
},
"sniffing": {
"enabled": true,
"destOverride": [
"http",
"tls",
"fakedns"
]
},
"tag": "http"
}
],
"log": {
"loglevel": "debug",
"dnsLog": true
},
"outbounds": [
{
"mux": {
"concurrency": -1,
"enabled": false
},
"protocol": "vless",
"settings": {
"vnext": [
{
"address": "site",
"port": 443,
"users": [
{
"encryption": "none",
"flow": "",
"id": "id",
"level": 8
}
]
}
]
},
"streamSettings": {
"network": "ws",
"security": "tls",
"sockopt": {
"domainStrategy": "UseIP",
"happyEyeballs": {
"interleave": 2,
"maxConcurrentTry": 4,
"prioritizeIPv6": false,
"tryDelayMs": 250
}
},
"tlsSettings": {
"allowInsecure": false,
"alpn": [
"h3",
"h2"
],
"fingerprint": "chrome",
"serverName": "site",
"show": false
},
"wsSettings": {
"headers": {
"Host": "site"
},
"path": "/path"
}
},
"tag": "proxy"
},
{
"protocol": "freedom",
"settings": {
"domainStrategy": "UseIP"
},
"tag": "direct"
},
{
"protocol": "blackhole",
"settings": {
"response": {
"type": "http"
}
},
"tag": "block"
},
{
"protocol": "dns",
"tag": "dns-out"
}
],
"remarks": "fjd67o13",
"routing": {
"domainStrategy": "IPIfNonMatch",
"rules": [
{
"inboundTag": [
"dns-in"
],
"outboundTag": "dns-out"
},
{
"inboundTag": [
"socks"
],
"port": 53,
"outboundTag": "dns-out"
},
{
"inboundTag": [
"domestic-dns"
],
"outboundTag": "direct",
"type": "field"
},
{
"domain": [
"geosite:cn",
"geosite:geolocation-cn"
],
"ip": [
"geoip:cn"
],
"outboundTag": "proxy",
"type": "field"
},
{
"domain": [
"geosite:category-ru",
"geosite:ru-available-only-inside",
"geosite:yandex",
"geosite:mailru",
"geosite:vk",
"domain:xn--p1ai",
"domain:su"
],
"outboundTag": "direct",
"type": "field"
},
{
"ip": [
"geoip:ru"
],
"outboundTag": "direct",
"type": "field"
},
{
"ip": [
"geoip:private"
],
"outboundTag": "direct",
"type": "field"
},
{
"domain": [
"geosite:private"
],
"outboundTag": "direct",
"type": "field"
},
{
"ip": [
"192.168.0.0/16"
],
"outboundTag": "direct",
"type": "field"
}
]
}
}
Beta Was this translation helpful? Give feedback.
All reactions