Censorship-resistant VLESS+Reality proxy server management
Project description
Meridian
Deploy a censorship-resistant proxy server in one command.
Invisible to DPI, active probing, and TLS fingerprinting.
What is this
Meridian deploys a private, undetectable VPN server in minutes. Share secure internet access with family and friends — they scan a QR code and connect. When your IP gets blocked, spin up a new server and be back online in minutes. No technical knowledge required on the client side.
Whether you're the "tech friend" setting up VPN for people you care about, a power user managing multiple servers, or an NGO providing access in a censored region — Meridian handles the complexity so you can focus on staying connected.
See SECURITY.md for the threat model and what Meridian protects against (and what it doesn't).
Install
Works on macOS and Linux. Windows users: use WSL.
curl -sSf https://meridian.msu.rocks/install.sh | bash
Or install directly from PyPI:
uv tool install meridian-vpn # recommended
pipx install meridian-vpn # alternative
Quick start
meridian setup # interactive wizard
meridian setup 1.2.3.4 # deploy to server
meridian setup 1.2.3.4 --domain d.io # with CDN fallback
After setup, your server is a fully functional proxy. Share access:
meridian client add alice # generate keys for a friend
meridian client list # see all clients
meridian client remove alice # revoke access
Each client gets an HTML page with QR codes and one-tap deep links. In domain mode, the page is also hosted on the server with live usage stats.
How it works
Meridian deploys VLESS+Reality — a protocol that makes your server indistinguishable from a legitimate website:
| Censorship method | How Meridian beats it |
|---|---|
| Deep Packet Inspection | Traffic is byte-for-byte identical to normal HTTPS. No proxy signatures. |
| Active probing | Censors connecting to your server get a real TLS certificate from microsoft.com. Only clients with your private key reach the proxy. |
| TLS fingerprinting | uTLS impersonates Chrome's exact Client Hello, matching billions of real devices. |
| IP blocking | Domain mode routes through Cloudflare CDN as a fallback — no direct IP exposure. |
What you need
- A VPS (Debian/Ubuntu) with root SSH key access — $3–5/month from any provider
- Recommended: Finland, Netherlands, Sweden, Germany (low latency, not flagged)
- Optional: a domain pointed to the server (for CDN fallback via Cloudflare)
Commands
| Command | Description |
|---|---|
meridian setup [IP] |
Deploy proxy server (interactive wizard if no IP) |
meridian setup IP --xhttp |
Deploy with XHTTP transport (enhanced stealth) |
meridian client add NAME |
Add a named client key |
meridian client list |
List all clients |
meridian client remove NAME |
Remove a client key |
meridian server list |
List managed servers |
meridian check [IP] |
Pre-flight validation (ports, SNI, ASN, DNS) |
meridian scan [IP] |
Find optimal SNI targets on server's network |
meridian ping [IP] |
Test proxy reachability from this device |
meridian diagnostics [IP] |
Collect info for bug reports |
meridian uninstall [IP] |
Remove proxy from server |
meridian self-update |
Update CLI |
Architecture
Standalone mode — Xray on port 443. No domain needed.
Domain mode — HAProxy routes by SNI: Reality traffic goes to Xray, everything else to Caddy (auto-TLS). Adds VLESS+WSS through Cloudflare CDN as a fallback.
Client apps
After setup, connect with any of these apps:
| Platform | App |
|---|---|
| iOS | v2RayTun |
| Android | v2rayNG |
| Windows | v2rayN |
| All platforms | Hiddify |
Common scenarios
My IP got blocked — The most common scenario in censored regions. Get a new VPS, run meridian setup NEW_IP, then re-add clients with meridian client add. If you're in domain mode, update the DNS A record to point at the new IP and re-run setup. If you're not using domain mode yet, consider switching (--domain) to get a CDN fallback through Cloudflare — when the IP is blocked, the WSS/CDN link still works.
Sharing with family — After meridian client add alice, you get an HTML file. Send it by email, iMessage, or AirDrop. They open it on their phone, install the app (one tap), scan the QR code, and connect. In domain mode, the page is also hosted at a URL (https://yourdomain/connection) you can share as a link — no file transfer needed.
First-time VPS setup — Rent a VPS from any provider (DigitalOcean, Hetzner, Vultr — $4–6/month). Choose Debian 12 or Ubuntu 22.04+. Make sure you have SSH key access (not just password). Then run meridian setup YOUR_SERVER_IP.
Troubleshooting
Not connecting? Run meridian ping to check if the server is reachable, or use the web-based ping tool.
Something else not working? Get instant AI-powered help:
meridian diagnostics --ai # copies an AI-ready prompt to clipboard
Paste the prompt into ChatGPT, Claude, or any AI assistant for personalized troubleshooting.
Or open an issue with meridian diagnostics output.
Docs
Full documentation, interactive command builder, and setup guides:
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file meridian_vpn-3.1.0.tar.gz.
File metadata
- Download URL: meridian_vpn-3.1.0.tar.gz
- Upload date:
- Size: 222.2 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
f6a4c3a36f077d7916d11a8be6320604def985c58ebea4deb342d75b5c0093a4
|
|
| MD5 |
e14d24cbee52f10c7b2c472cfcb1d7e8
|
|
| BLAKE2b-256 |
9b7b50eaa458efa9824bc9428fdf0a4c0011b6e7c578824ad2c0137eaf69d57b
|
Provenance
The following attestation bundles were made for meridian_vpn-3.1.0.tar.gz:
Publisher:
release.yml on uburuntu/meridian
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
meridian_vpn-3.1.0.tar.gz -
Subject digest:
f6a4c3a36f077d7916d11a8be6320604def985c58ebea4deb342d75b5c0093a4 - Sigstore transparency entry: 1154519216
- Sigstore integration time:
-
Permalink:
uburuntu/meridian@eaffc34a71fb094af64a208c2cc4740a32356793 -
Branch / Tag:
refs/heads/main - Owner: https://github.com/uburuntu
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@eaffc34a71fb094af64a208c2cc4740a32356793 -
Trigger Event:
workflow_run
-
Statement type:
File details
Details for the file meridian_vpn-3.1.0-py3-none-any.whl.
File metadata
- Download URL: meridian_vpn-3.1.0-py3-none-any.whl
- Upload date:
- Size: 138.3 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
0e9ff0896a9541e3c4a4b9427c88bd2f5e8944ed0bf5a7f0834b3940f5e90a9e
|
|
| MD5 |
be416d05c2447cf6791af7b6b41c1be9
|
|
| BLAKE2b-256 |
826c08093b54610aa03e22adf242b7de488f9410bd2e16306eb991e402615a91
|
Provenance
The following attestation bundles were made for meridian_vpn-3.1.0-py3-none-any.whl:
Publisher:
release.yml on uburuntu/meridian
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
meridian_vpn-3.1.0-py3-none-any.whl -
Subject digest:
0e9ff0896a9541e3c4a4b9427c88bd2f5e8944ed0bf5a7f0834b3940f5e90a9e - Sigstore transparency entry: 1154519221
- Sigstore integration time:
-
Permalink:
uburuntu/meridian@eaffc34a71fb094af64a208c2cc4740a32356793 -
Branch / Tag:
refs/heads/main - Owner: https://github.com/uburuntu
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@eaffc34a71fb094af64a208c2cc4740a32356793 -
Trigger Event:
workflow_run
-
Statement type: