Introduction
V2Ray is one of the tools under Project V. Project V is a program that contains the tools necessary to build specific networks, and V2Ray is the most fundamental of them all. The Project V manual said Project V is an array of tools that aid you in building your private network using the internet. The foundation part of Project V, named V2Ray, is responsible for the network protocols and communications. It is a stand-alone application and also alongside other applications. In terms of time to launch, Project V is before V2Ray. If you’re still confused about what we mean, we suggest that V2Ray is a proxy program for Shadowsocks. V2Ray allows you to connect to websites (under the restriction of censorship) to study the latest science and technology on the internet’s free access.
What is V2Ray?
V2Ray is a sub-section of Project V responsible for network protocols and communications. It shares some similarities with proxy software Shadowsocks. However, it’s designed to be more of a platform for any developer who wants to utilize the modules provided to develop their proxy software.
V2Ray and its VMess Protocol were designed to enhance the features and performance of Shadowsocks and help detect. With V2Ray, it is possible to modify the port dynamically, use advanced routing capabilities, utilize methods of obfuscation chains, proxy servers, and many more. While this can make V2Ray more complex compared to a single proxy protocol such as Shadowsocks, it does mean that it can be utilized to create more specific configurations and situations.
V2Ray Protocols Explained
Contrary to Shadowsocks, V2ray can be used with various protocols. Both inbound and outbound are used. As we’ve mentioned, VMess is chief among the protocols, offering output and inbound proxy that can be used in encrypted communications. There are some other options to think about:
Blackhole: A Protocol for connections to outbound networks that block all connections with pre-defined responses. While V2Ray’s function is as an anti-censorship tool, it can be combined by routing to prevent access to specific websites when necessary.
Dockodemo-door: Dockodemo-door forwards connections inbound to a particular destination and is utilized as an anonymous proxy.
Freedom: Passes each inbound TCP and UDP connection to the original destinations. It is often used to route traffic to the correct destination.
HTTP: A ubiquitous protocol for inbound connections for distributed systems of information.
The MT Proto: Used in Telegram, an app focused on privacy. A pair of outbound and outbound proxy servers can be utilized via V2Ray to create the proxy needed for a Telegram server.
Shadowsocks: A earlier mentioned technology that is a secure proxy built on SOCKS5.
Socks: is the standard SOCKS protocol that has compatibility with SOCKS5, SOCKS4, and SOCKS 4. A.
V2Ray Subscription Parse
- Published: 2019-11-08
- Markdown
- Simplified Chinese
Preface
V2Ray core cannot offer subscription features, which is excellent since it’s unneeded for people who own only one or a few V2Ray services. If you are using services purchased via websites, you may need to choose a vendor with subscription services to enjoy a more extraordinary user experience.
There are many subscription models, and I’m planning the possibility of resolving some by myself with Python or perhaps other languages.
V2RayN Format
source documentation
- Subscription URL: a regular URL (HTTP / HTTPS);
- The content of the subscription URL A list of share link that are separated by a newline and encoded with Base64;
- Support schemes: mess socks and ss.
Example:
vmess://base64(Configuration)
ss://base64(Configuration)
socks://base64(Configuration)
Find Content on Subscription Url
How to Retrieve Internet Resources Using the Urllib package — Python 3.8.0 document
taken from urllib.request import URLopen
subscribe_url = ‘https://input-your-own-v2rayn-format-subscribe-url-here’
return_content = urlopen(subscribe_url).read()
print(return_content)
Conclusion
The V2Ray model offers an abundance of flexibility. It is possible to create an unauthenticated SOCKS proxy without securitybecause for instanceand configure VMess to be open only to authorized users and tunneled via WebSocket using TLS.