Skip to content

Set up an Xray-core VLESS proxy to access blocked websites and apps

Notifications You must be signed in to change notification settings

wpdevelopment11/xray-tutorial

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 

Repository files navigation

Introduction

Note from the author: This tutorial was written for community.hetzner.com and was published by them, but then it was deleted. Thus, I am publishing it here. Hope it helps.

Xray is a proxy with support for multiple network protocols. It's commonly used to penetrate firewalls to access blocked websites and apps. Xray is created by Chinese developers and is a fork of V2Ray. This is why some documentation is only available in Chinese. There are many ways to configure Xray, depending on a use case and blocking that you want to circumvent. I will show you a simple configuration that works well for me.

Prerequisites

  • A user with sudo privileges

Step 1 - Installing Xray-core on the server

Connect to your server via SSH.

Install the unzip package using your package manager. Run the command below to download and install xray to the /usr/local/xray directory:

cd ~ \
&& curl -fLo xray.zip "https://github.com/XTLS/Xray-core/releases/latest/download/Xray-linux-$(uname -m | sed -e s/x86_64/64/ -e s/aarch64/arm64-v8a/).zip" \
&& sudo unzip -d /usr/local/xray xray.zip \
&& rm xray.zip

Add xray to your PATH by executing:

export PATH=$PATH:/usr/local/xray

You need to add the line above to your ~/.profile to preserve the change between logins.

Run the following command to check that xray is installed properly:

xray version

If you need to update xray, run sudo rm -r /usr/local/xray and repeat step 1 again.

Step 2 - Server configuration

You need to create a configuration file for your Xray server.

First, create the directory where the configuration file will be stored:

sudo mkdir -p /usr/local/etc/xray

The skeleton of the server configuration (e.g. /usr/local/etc/xray/config.json) looks like this:

{
    "log": {
        "loglevel": "warning"
    },
    "inbounds": [
        {
            "port": 443,
            "protocol": "vless",
            "settings": {
                "clients": [],
                "decryption": "none"
            },
            "streamSettings": {
                "network": "tcp",
                "security": "tls",
                "tlsSettings": {
                    "certificates": []
                }
            }
        }
    ],
    "outbounds": [
        {
            "protocol": "freedom"
        }
    ]
}
  • 443 (https) port is used by xray here. It's a privileged port (less than 1024) and some additional configuration will be needed to run xray as a non-root user. You can choose some other port if you want.
  • inbounds define which protocols are accepted for incoming requests (only VLESS in this case), and outbounds define how the request is proxied ("freedom" means that Xray sends it to the appropriate destination).
  • To be able to accept requests from clients, you need to add them to inbounds[].settings.clients, which will be shown later.
  • inbounds[].streamSettings specify how the data gets sent over the wire. Protocols that you define here are used to penetrate the firewall. TCP with TLS encryption is used here. Other protocols are available, for example WebSockets.
  • inbounds[].streamSettings.tlsSettings.certificates is empty for now. In the steps below, you will create a certificate and add it here.

Now, let's add the first client. The client object looks like this:

  • id is used for client authentication. You can think of it like the user password.
  • email is used to distinguish clients in the logs. This doesn't need to be a valid email address. You can just put the name of the person for which you want to add a client.
{
    "id": "<User UUID>",
    "email": "<Name or email>"
}

To generate the user ID (UUID) run the following command:

xray uuid

Put the result into the id field.

Now, put your client configuration into the inbounds[].settings.clients array in the server configuration.

After you added the client, the configuration will look like this:
  • Don't forget to replace the client ID with your own.
{
    "log": {
        "loglevel": "warning"
    },
    "inbounds": [
        {
            "port": 443,
            "protocol": "vless",
            "settings": {
                "clients": [
                    {
                        "id": "4d6e0338-f67a-4187-bca3-902e232466bc",
                        "email": "John"
                    }
                ],
                "decryption": "none"
            },
            "streamSettings": {
                "network": "tcp",
                "security": "tls",
                "tlsSettings": {
                    "certificates": []
                }
            }
        }
    ],
    "outbounds": [
        {
            "protocol": "freedom"
        }
    ]
}

Additional clients can be added in the same way.

You need to generate the TLS certificate. It will be used to establish an encrypted connection between client and server. There are two ways to do it. You can generate a self-signed certificate, this way you don't need a domain attached to your server. Alternatively, you can obtain a certificate from Let's Encrypt for your domain.

Generate a self-signed certificate.

Run the following command:

sudo /usr/local/xray/xray tls cert -file /usr/local/etc/xray/my > /dev/null

Two files will be created:

  • /usr/local/etc/xray/my_cert.pem is your self-signed certificate.
  • /usr/local/etc/xray/my_key.pem is your private key.

Now you need to create a JSON object for the certificate and add it to your Xray server configuration.

The certificate object will look like this:

{
    "certificateFile": "/usr/local/etc/xray/my_cert.pem",
    "keyFile": "/usr/local/etc/xray/my_key.pem"
}

Put it into the inbounds[].streamSettings.tlsSettings.certificates array in the server configuration.

After you added self-signed certificate, the configuration will look like this:
{
    "log": {
        "loglevel": "warning"
    },
    "inbounds": [
        {
            "port": 443,
            "protocol": "vless",
            "settings": {
                "clients": [
                    {
                        "id": "4d6e0338-f67a-4187-bca3-902e232466bc",
                        "email": "John"
                    }
                ],
                "decryption": "none"
            },
            "streamSettings": {
                "network": "tcp",
                "security": "tls",
                "tlsSettings": {
                    "certificates": [
                        {
                            "certificateFile": "/usr/local/etc/xray/my_cert.pem",
                            "keyFile": "/usr/local/etc/xray/my_key.pem"
                        }
                    ]
                }
            }
        }
    ],
    "outbounds": [
        {
            "protocol": "freedom"
        }
    ]
}



Obtain a certificate from Let's Encrypt for your domain.

Prerequisites

  • A domain name, e.g. example.com with an A and optionally an AAAA DNS record pointing to your server.
  • certbot package is installed using Snap (preferred) or package manager of your distribution.

Run the following command to get a certificate for your domain:

  • Replace [email protected] with your email.
  • Replace example.com with your domain for which you want to generate a certificate.
sudo certbot certonly --standalone --agree-tos -m [email protected] -d example.com

Note: Xray supports hot reloading of certificates, that is you don't need to do anything when your certificate is renewed by Certbot.

Certificate and private key will be saved into the /etc/letsencrypt/live/example.com directory, where example.com is your domain.

You will need two files:

  • /etc/letsencrypt/live/example.com/fullchain.pem is your certificate issued by Let's Encrypt.
  • /etc/letsencrypt/live/example.com/privkey.pem is your private key.

You need to change permissions if you want to run xray as a non-root user.

  • Replace example.com with your domain.
mydomain=example.com
sudo chmod a+rx /etc/letsencrypt/{live,archive}
sudo chgrp $USER "/etc/letsencrypt/live/$mydomain/privkey.pem"
sudo chmod g+r "/etc/letsencrypt/live/$mydomain/privkey.pem"

Now you need to create a JSON object for the certificate and add it to your Xray server configuration.

The certificate object will look like this:

  • Replace example.com with your domain.
{
    "certificateFile": "/etc/letsencrypt/live/example.com/fullchain.pem",
    "keyFile": "/etc/letsencrypt/live/example.com/privkey.pem"
}

Put it into the inbounds[].streamSettings.tlsSettings.certificates array in the server configuration.

After you added your Let's Encrypt certificate, the configuration will look like this:
{
    "log": {
        "loglevel": "warning"
    },
    "inbounds": [
        {
            "port": 443,
            "protocol": "vless",
            "settings": {
                "clients": [
                    {
                        "id": "4d6e0338-f67a-4187-bca3-902e232466bc",
                        "email": "John"
                    }
                ],
                "decryption": "none"
            },
            "streamSettings": {
                "network": "tcp",
                "security": "tls",
                "tlsSettings": {
                    "certificates": [
                        {
                            "certificateFile": "/etc/letsencrypt/live/example.com/fullchain.pem",
                            "keyFile": "/etc/letsencrypt/live/example.com/privkey.pem"
                        }
                    ]
                }
            }
        }
    ],
    "outbounds": [
        {
            "protocol": "freedom"
        }
    ]
}



The configuration is complete and you can put it into the file:

sudo nano /usr/local/etc/xray/config.json

You can test your configuration for errors using the following command:

xray run -test -c /usr/local/etc/xray/config.json

If you're using port 443 (https) in your configuration, you need to run the following command. This will allow xray to bind the port without requiring root privileges.

sudo setcap cap_net_bind_service=+ep /usr/local/xray/xray

You can run xray in the foreground for testing, logs will be printed to your terminal:

xray run -c /usr/local/etc/xray/config.json

When you are sure that your configuration is correct, you can run the following command to create a systemd service file to run xray in the background:

  • xray starts with the permissions of your current user.
  • Restart directive is used to restart the server if xray exits unexpectedly.
  • [Install] section is used to automatically start the service on system boot.
echo "[Unit]
Description=xray-core
After=network-online.target
Wants=network-online.target

[Service]
User=$USER
Type=exec
ExecStart=/usr/local/xray/xray -c /usr/local/etc/xray/config.json
Restart=on-failure

[Install]
WantedBy=multi-user.target" | sudo tee /etc/systemd/system/xray.service

Now you can start up xray and configure it to always start up on system boot:

sudo systemctl start xray && sudo systemctl enable xray

Step 3 - Client configuration

In step 2 you created a client object and added it to your server configuration. The client ID from this object is used to configure your Xray client device to prevent unauthorized access to your Xray server.

Step 3.1 - Android client

This step will show you how to configure an Xray client on an Android device.

Install v2rayNG on your Android device.

  1. Open v2rayNG and tap +:

  2. Choose Type manually[VLESS]:

  3. Fill in fields in the configuration:

    • Replace example.com in address with your domain. If you're using a self-signed certificate, fill in address with an IP address of your server.
    • Put your client ID into the id field. It should be the same client ID that you added in the server configuration.

  4. Scroll and change TLS settings:

    Open TLS menu and select tls.

  5. If you're using a self-signed certificate, open the allowInsecure menu and select true.

  6. Save your configuration:

  7. Tap the play button to connect to your Xray server:

  8. Tap to check the connection, it should be successful:

Try to access blocked websites and apps. They should work now.

Step 3.2 - Windows client

You need to download the latest Xray release for Windows for your architecture. Most likely you will need Xray-windows-64.zip.

You can do it manually or open PowerShell and execute the commands below. Xray will be downloaded and extracted to your home directory.

cd ~
curl.exe -fLo xray.zip https://github.com/XTLS/Xray-core/releases/latest/download/Xray-windows-64.zip
Expand-Archive xray.zip xray
rm xray.zip
cd xray
pwd

Path to directory with xray.exe binary is printed to your terminal. Add it to your system PATH. How to modify your system PATH is explained here.

Open PowerShell and run the following command to check that PATH is updated properly:

xray version

There are two ways to configure Xray on Windows.

The first one is to use it as a SOCKS proxy, which is supported by Firefox, Chrome and other apps. Only apps that are specifically configured to use that SOCKS proxy will be routed through Xray.

Alternatively, you can configure Xray to work like VPN to route all your traffic through Xray. In this case you don't need to configure individual apps to use proxy.

Step 3.2.1 - SOCKS proxy

To configure your Xray client as a SOCKS proxy, use the following configuration.

  • Replace example.com with your domain.

    If you're using a self-signed certificate, replace example.com with your server IP. Additionally set "allowInsecure": true.

  • Replace id with your client id from the server configuration.

  • 443 is the port on which the Xray server listens. It's the same port that is used in the server configuration.

  • 1080 is the port on which the local SOCKS proxy server listens. It will accept connections from your apps that are configured to use it.

    Apps that want to use the SOCKS proxy need to set 127.0.0.1 as a host, and 1080 as a port.

{
    "log": {
        "loglevel": "warning"
    },
    "inbounds": [
        {
            "listen": "127.0.0.1",
            "port": "1080",
            "protocol": "socks",
            "settings": {
                "udp": true,
                "ip": "127.0.0.1"
            }
        }
    ],
    "outbounds": [
        {
            "protocol": "vless",
            "settings": {
                "vnext": [
                    {
                        "address": "example.com",
                        "port": 443,
                        "users": [
                            {
                                "id": "4d6e0338-f67a-4187-bca3-902e232466bc",
                                "encryption": "none",
                                "level": 0
                            }
                        ]
                    }
                ]
            },
            "streamSettings": {
                "network": "tcp",
                "security": "tls",
                "tlsSettings": {
                    "allowInsecure": false
                }
            }
        }
    ]
}

Run the commands below to put it into the file xray_config.json in your HOME directory and run xray with that configuration.

notepad "$env:USERPROFILE\xray_config.json"
xray run -c "$env:USERPROFILE\xray_config.json"

Now, xray is running and you can configure your apps to use a SOCKS proxy.

  • Use a SOCKS proxy with Google Chrome

    Find the Google Chrome shortcut and open its Properties.

    Change Target from

    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    

    to

    "C:\Program Files\Google\Chrome\Application\chrome.exe" --proxy-server="socks5://127.0.0.1:1080"
    

    Click Apply and then OK.

    Close all Chrome windows to apply your change. Open Chrome and try to browse the web, it should be using the Xray SOCKS proxy now.

    Alternatively, instead of changing the existing shortcut you can copy it, and configure the copy to use the SOCKS proxy. This way you can have one Chrome shortcut that uses proxy, and one that doesn't.


  • Use a SOCKS proxy with Firefox

    Consult the official documentation. Fill in SOCKS Host with 127.0.0.1 and corresponding Port with 1080. Click SOCKS v5 and select Proxy DNS when using SOCKS v5.

    Many other programs support SOCKS as well. Consult their documentation to learn how to configure it.

Step 3.2.2 - Route all your traffic through the proxy

You need to download the zz_v2rayN-With-Core-SelfContained.7z archive from the latest release of v2rayN. Extract it using 7-Zip.

  1. Open the extracted directory and run the v2rayN.exe binary as Administrator.

  2. Click Servers:

  3. Click Add [VLESS] server:

  4. Fill in the fields in the same way as described for an Android client and click Confirm. Restart v2rayN.

  5. Click Enable Tun:

After that all your traffic should go through the Xray proxy.

Note: Sometimes the Enable Tun doesn't work from the first try. In the log, you will see errors like these:

WARN inbound/tun[tun-in]: open tun interface take too much time to finish!
FATAL[0016] start service: initialize inbound/tun[tun-in]: configure tun interface: Cannot create a file when that file already exists.

Try to switch Enable Tun on and off a few times. Take a look at your network connections in the Windows settings. After Enable Tun is activated, the singbox_tun network connection should be present there.

Step 3.3 - Linux client

Xray on a Linux client can be installed in the same way as on a Linux server in step 1. You can run Xray as a service which is described at the end of step 2. Except the configuration file will be different.

Create the configuration file.

sudo mkdir -p /usr/local/etc/xray
sudo nano /usr/local/etc/xray/config.json

Configuration will be the same as in step 3.2.1 for the Windows client. Adjust the configuration as described there. Save the file and run the command below to start Xray.

xray run -c /usr/local/etc/xray/config.json

Now, xray is running and you can configure your apps to use a SOCKS proxy.

Step 3.3.1 - Use a SOCKS proxy with Google Chrome (Chromium)

Close all Chrome windows and run the following command:

  • In this case the name of the binary is google-chrome, on your system it may be different. For example, it can be called chromium.
google-chrome --proxy-server="socks5://127.0.0.1:1080"

Step 3.3.2 - Use a SOCKS proxy with Firefox

It's configured in the same way as on Windows.

Step 3.3.3 - Set Network Proxy in GNOME

In GNOME you can set a system-wide SOCKS proxy which will be used by all apps that support it automatically. Follow the steps below.

  1. Open the network settings and click the gear symbol in Network Proxy:

  2. Click Manual:

  3. Fill in Socks Host with 127.0.0.1 and port with 1080:

Open the browser and test your Internet connection, it should go through the proxy now.

Conclusion

Xray is a good solution when your primary use case is to access blocked websites and apps. Contrary to popular VPN protocols it's not easy to block. The drawback is obviously its documentation, which is Chinese oriented.

Now, when you have a basic idea how to configure Xray, you can tweak its configuration for your own needs. Depending on what kind of blocking you want to circumvent, you may need to employ different techniques. Read the Xray config reference and check the repository full of configuration examples to learn more.

Hopefully you now have your Xray server running and your Internet browsing is free from artificial restrictions. At least until a new kind of blocking is rolled out :)

License: MIT

About

Set up an Xray-core VLESS proxy to access blocked websites and apps

Topics

Resources

Stars

Watchers

Forks