架设好 shadowsocks 服务端,在路由器上安装 shadowsocks 客户端,并配置 config.json ,假设本地监听端口为 1080 。启动 shadowsocks
/etc/init.d/shadowsocks start
安装 privoxy openwrt 版。
<?xml version="1.0" encoding="UTF-8"?> | |
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
<plist version="1.0"> | |
<dict> | |
<key>PayloadContent</key> | |
<array> | |
<dict> | |
<key>PayloadContent</key> | |
<dict> | |
<key>com.google.Chrome</key> |
#!/bin/zsh | |
# Needs https://github.com/lukas2511/letsencrypt.sh in dns-01 mode | |
/opt/letsencrypt/ilo/letsencrypt.sh -c -s /opt/letsencrypt/ilo/ilo.csr -k /opt/letsencrypt/ilo/hook.sh -t dns-01 > /opt/letsencrypt/ilo/ilo.crt | |
cert=$(cat /opt/letsencrypt/ilo/ilo.crt) | |
curl --cacert /opt/letsencrypt/intermediate.pem -H "Accept: application/json" -H "Content-Type: application/json" -H "Authorization: Basic [FILL_IN_HERE]" -X POST -d "{\"Action\": \"ImportCertificate\", \"Certificate\": \"$cert\"}" https://ilo.home.vaucher.org/rest/v1/Managers/1/SecurityService/HttpsCert |
[General] | |
skip-proxy = 192.168.0.0/16, 10.0.0.0/8, 172.16.0.0/12, localhost, *.local | |
bypass-tun = 192.168.0.0/16, 10.0.0.0/8, 172.16.0.0/12 | |
dns-server = 119.29.29.29, 223.5.5.5, 114.114.114.114 | |
loglevel = notify | |
[Proxy] | |
Proxy = custom | |
[Rule] |
/* | |
* A white-list based PAC without regexp, by @janlay | |
* It's just simple and fast. | |
* Last update: Dec 3, 2013 | |
* Special thanks to @Paveo | |
*/ | |
function FindProxyForURL(url, host) { | |
var PROXY = "PROXY 127.0.0.1:8800"; | |
var DEFAULT = "DIRECT"; |