Skip to content

Routing Switch

🛡️ File Information

Property Value
Binary Name routing-switch
Version 9.0.1
File Size 9.5MB
Author Warith Al Maawali
License Proprietary
Category Network & Routing
Description System-wide traffic routing through various proxy protocols
JSON Data View Raw JSON

SHA256 Checksum

7a0b69a7803f567bca0b6bc4c59f176bed863ac398bf229f3afd1315dad23bbc

🛡️ Key Features

Multi-Protocol Support

Protocol Type Description
Traditional VPNs OpenVPN and WireGuard with native kernel routing
Tor Integration Routes through Tor using redsocks transparent proxy
SOCKS5 Proxies Dante for generic SOCKS5 proxy support
Shadowsocks High-performance encrypted proxy
V2Ray Advanced proxy with multiple transport protocols
Xray Variants VLESS, VLESS-Reality, Trojan, VMess protocols
Mieru/Mita Censorship-resistant proxy protocol
Hysteria2 QUIC-based proxy for unreliable networks
Auto-Selection Intelligently chooses best protocol based on availability

Why Routing Switch is Essential

Feature Description
System-Wide Protection Routes ALL traffic, not just browser
Protocol Flexibility Switch between protocols based on needs
Authentication Required Works with online-auth for secure access
Zero Configuration Protocols are pre-configured from authentication cards

🛡️ ⚡ TL;DR - Essential Commands

Important: Requires authentication via online-auth before use. Use sudo for connection commands.

# Auto-select and connect to best protocol (requires auth)
sudo routing-switch auto-select

# Connect to specific protocol examples
sudo routing-switch connect openvpn
sudo routing-switch connect wireguard
sudo routing-switch connect tor
sudo routing-switch connect dante
sudo routing-switch connect shadowsocks
sudo routing-switch connect v2ray
sudo routing-switch connect xray-vless
sudo routing-switch connect xray-vless-reality
sudo routing-switch connect xray-trojan
sudo routing-switch connect xray-vmess
sudo routing-switch connect mita
sudo routing-switch connect hysteria2

# Check connection status
routing-switch status

# Disconnect current connection
sudo routing-switch disconnect

# List available protocols
routing-switch list-protocols

🛡️ Understanding Protocol Support

How Routing Works

Routing Switch requires authentication through online-auth to access server configurations. The routing-switch automatically fetches your "card" containing all server details:

# Step 1: Authenticate first (required)
sudo online-auth authenticate

# Step 2: Connect using routing-switch (automatically fetches card)
sudo routing-switch auto-select

Available Protocols

# List all available protocols with scores
routing-switch list-protocols

# List protocols sorted by speed (fastest first)
routing-switch list-protocols --sort-by-speed

# List protocols sorted by reliability
routing-switch list-protocols --sort-by-reliability

# Test specific protocol connectivity
routing-switch test-protocol openvpn
routing-switch test-protocol wireguard

# Benchmark all protocols
routing-switch benchmark

Protocol Categories:

Category Protocols Description
Native Routing OpenVPN, WireGuard Direct kernel-level routing
Redsocks Proxy Tor Transparent SOCKS proxy redirection
SOCKS5 Proxies Dante Generic SOCKS5 proxy support
Tun2socks Shadowsocks, V2Ray, Xray-VLESS, Xray-VLESS-Reality, Xray-Trojan, Xray-VMess, Mieru/Mita, Hysteria2 TUN interface proxy routing

Connection Management

# Connect to best available protocol
sudo routing-switch auto-select

# Connect to specific protocol
sudo routing-switch connect openvpn
sudo routing-switch connect wireguard
sudo routing-switch connect shadowsocks
sudo routing-switch connect v2ray
sudo routing-switch connect xray-vmess

# Check current status
routing-switch status

# Check DNS configuration
routing-switch dns-info
# Optional: verify no DNS leaks with the dedicated tester
dns-leak test --json

# Disconnect current connection
sudo routing-switch disconnect

# Reset all routing to defaults
sudo routing-switch reset

Configuration Export

# Export all protocol configurations
routing-switch export-config

# Export specific protocol configuration
sudo routing-switch export-config wireguard
sudo routing-switch export-config shadowsocks
sudo routing-switch export-config v2ray

# Show configuration for current protocol
routing-switch showconfig

# Show configuration as URL
routing-switch showconfigurl

# Show configuration as QR code
routing-switch showconfigqr

Mobile Device Integration

Connect your mobile devices using QR codes generated by routing-switch. Different protocols work with different mobile apps:

WireGuard (Official App)

# Generate WireGuard QR code
routing-switch showconfigqr wireguard
Scan with: WireGuard official app (iOS/Android)

Shadowsocks, V2Ray, and Xray Protocols

# Generate QR codes for various protocols
routing-switch showconfigqr shadowsocks
routing-switch showconfigqr v2ray
routing-switch showconfigqr xray-vmess
routing-switch showconfigqr xray-trojan
routing-switch showconfigqr xray-vless

Recommended Mobile Apps:

Platform App Name Supported Protocols
Android V2RayNG V2Ray, Xray (all variants), Shadowsocks
Android Matsuri V2Ray, Xray, Shadowsocks, Trojan
Android Clash for Android Multi-protocol support with rule-based routing
Android Surfboard Shadowsocks, V2Ray, Trojan
iOS Shadowrocket Shadowsocks, V2Ray, Trojan, VMess, VLESS
iOS Quantumult X Advanced proxy client with multiple protocol support
iOS Surge Professional networking tool supporting various protocols
iOS Stash Clash-compatible client for iOS

How to Connect:

Step Action
1 Generate the QR code for your desired protocol
2 Open your chosen mobile app
3 Scan the QR code using the app's import feature
4 The app will automatically configure the connection
5 Enable the VPN/proxy in the app to connect

Recovery and Cleanup

# Clean up orphaned processes
sudo routing-switch cleanup

# Recover from partial failure
sudo routing-switch recover

# Reset all routing tables
sudo routing-switch reset

For advanced users who need access to all available commands and options, please refer to the auto-generated command reference which includes:

Feature Description
Protocol Testing Protocol testing and benchmarking
Configuration Management Configuration export and import
Mobile Integration QR code generation for mobile
Custom Config Custom configuration files
Recovery Tools Recovery and cleanup operations
CLI Reference All command-line flags and parameters

🛡️ Security Notes

Important Security Practices:

Practice Description
Authentication Always authenticate with online-auth first
Verification Verify connection status after connecting
DNS Security Test for DNS leaks after connection
Auto-Selection Use auto-select for optimal security
Proper Disconnection Disconnect properly to restore routing
Monitoring Monitor connection status regularly

🛡️ Performance

Metric Value Description
Connection Time 2-10 seconds Depending on protocol
Memory Usage (VPN) ~40MB For VPN protocols
Memory Usage (Proxy) ~60MB For proxy protocols
CPU Usage (VPN) < 10% For VPN protocols
CPU Usage (Proxy) < 15% For proxy protocols
WireGuard Speed 90-95% Of line speed
OpenVPN Speed 70-80% Of line speed
Tor Speed 1-10 Mbps Typical speeds

🛡️ Support

Resource Link
Website digi77.com
Anonymity Verifier kodachi.cloud
Discord Support discord.gg/KEFErEx
GitHub github.com/WMAL

Back to top