分析 xray 代码 DNS解析
书接上文, 我们通过测试, 知道了xray在一定的条件下会调用系统的getaddrinfo 分析 Xray 的代码, 在哪里进行DNS解析 分析 xray 日志 [Debug] app/log: Logger started [Debug] app/proxyman/inbound: creating stream worker on 127.0.0.1:1080 [Info] transport/internet/tcp: listening TCP on 127.0.0.1:1080 [Warning] core: Xray 25.10.15 started [Info] [304315699] proxy/socks: TCP Connect request to tcp:api.myip.la:80 [Info] [304315699] app/dispatcher: default route for tcp:api.myip.la:80 [Info] [304315699] transport/internet/tcp: dialing TCP to tcp:api.myip.la:80 [Debug] [304315699] transport/internet: dialing to tcp:api.myip.la:80 [Info] [304315699] proxy/freedom: connection opened to tcp:api.myip.la:80, local endpoint 198.23.254.247:57912, remote endpoint 149.28.31.24:80 [Info] [304315699] proxy: CopyRawConn splice 可以发现一些关键词, 比如 dialing TCP to 我们打开xray源码 https://github. dev /XTLS/Xray-core/ * 对, 就是把 Xray 项目的 github.com 改为 .dev ** 当然, 我这是图省事的操作. 你愿意下载源码再用M$ VS打开也是一样的. 搜索 dialing TCP to 这就是xray打印日志的地方了. https:...