|
|
发表于 2023-1-5 17:48:17
|
显示全部楼层
本帖最后由 squalll 于 2023-1-5 17:55 编辑
测试解锁脚本
bash <(curl -L -s https://raw.githubusercontent.com/lmc999/RegionRestrictionCheck/main/check.sh)
我这里PING,通的,估计没被墙吧,联通。
套CF很简单的。
伪装脚本
下面是NGINX伪装脚本,然后正常去套CF就行了。套完测试正常,就可以自选IP劫持自己HOSTS,或者CF的SAAS自选IP到DNSPOD
NGINX:
server {
listen 443 ssl http2;
server_name 你的域名.com;
# index index.html index.htm index.php;
# root /data/wwwroot/example;
ssl_certificate /www/server/nginx/SSL/你的域名.com/full_chain.pem;
ssl_certificate_key /www/server/nginx/SSL/你的域名.com/private.key;
ssl_session_cache shared:SSL:10m;
ssl_session_timeout 5m;
ssl_protocols TLSv1.2 TLSv1.3;
ssl_prefer_server_ciphers on;
ssl_ciphers EECDH+AESGCM:EDH+AESGCM;
# location ~ [^/]\.php(/|$) {
# fastcgi_pass unix:/dev/shm/php-cgi.sock;
# fastcgi_index index.php;
# include fastcgi.conf;
location / {
#gzip off;
proxy_ssl_name liyafly.com;
proxy_ssl_server_name on;
#开启gzip
gzip on;
gzip_min_length 1k;
gzip_buffers 4 16k;
#gzip_http_version 1.0;
gzip_comp_level 5;
gzip_types text/plain application/javascript application/x-javascript text/css application/xml text/javascript application/x-httpd-php image/jpeg image/gif image/png;
gzip_vary off;
proxy_redirect off;
proxy_set_header Host liyafly.com;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
# proxy_pass $request;
#proxy_pass https://etc.ethermine.org;
proxy_pass https://liyafly.com;#反代的域名,伪装用。
proxy_set_header Accept-Encoding "";
}
location /伪装目录名,比如web123 {
if ($http_upgrade != "websocket") { # WebSocket协商失败时返回404
return 404;
}
proxy_redirect off;
proxy_pass http://127.0.0.1:8080; # 假设WebSocket监听在环回地址的14400端口上
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_set_header Host $host;
# Show real IP in v2ray access.log
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
}
} |
|