Open yqs112358 opened 3 hours ago
这是模块和VPN应用均启动后的路由表:
0: from all lookup local
7000: from all lookup main
8000: from all iif tun9 lookup main suppress_prefixlength 0
9000: from all fwmark 0x0/0x20000 goto 9010
9001: from all iif tun9 goto 9010
9002: not from all iif lo lookup 2022
9002: from 0.0.0.0 iif lo lookup 2022
9002: from 198.18.0.0/30 iif lo lookup 2022
9010: from all nop
10000: from all fwmark 0xc0000/0xd0000 lookup legacy_system
11000: from all iif lo oif dummy0 uidrange 0-0 lookup dummy0
11000: from all iif lo oif rmnet_data0 uidrange 0-0 lookup rmnet_data0
11000: from all iif lo oif rmnet_data2 uidrange 0-0 lookup rmnet_data2
11000: from all iif lo oif rmnet_data3 uidrange 0-0 lookup rmnet_data3
11000: from all iif lo oif wlan0 uidrange 0-0 lookup wlan0
12000: from all iif tun0 lookup local_network
13000: from all fwmark 0x0/0x20000 iif lo uidrange 0-99999 lookup tun0
13000: from all fwmark 0x0/0x20000 iif lo uidrange 99900000-99999999 lookup tun0
13000: from all fwmark 0xc0068/0xcffff lookup tun0
16000: from all fwmark 0x10063/0x1ffff iif lo lookup local_network
16000: from all fwmark 0xd0001/0xdffff iif lo lookup rmnet_data0
16000: from all fwmark 0x10068/0x1ffff iif lo uidrange 0-99999 lookup tun0
16000: from all fwmark 0x10068/0x1ffff iif lo uidrange 99900000-99999999 lookup tun0
16000: from all fwmark 0x10068/0x1ffff iif lo uidrange 0-0 lookup tun0
16000: from all fwmark 0xd0071/0xdffff iif lo lookup rmnet_data2
16000: from all fwmark 0x10072/0x1ffff iif lo lookup rmnet_data3
16000: from all fwmark 0x10074/0x1ffff iif lo lookup wlan0
17000: from all iif lo oif dummy0 lookup dummy0
17000: from all fwmark 0xc0000/0xc0000 iif lo oif rmnet_data0 lookup rmnet_data0
17000: from all iif lo oif tun0 uidrange 0-99999 lookup tun0
17000: from all iif lo oif tun0 uidrange 99900000-99999999 lookup tun0
17000: from all fwmark 0xc0000/0xc0000 iif lo oif rmnet_data2 lookup rmnet_data2
17000: from all iif lo oif rmnet_data3 lookup rmnet_data3
17000: from all iif lo oif wlan0 lookup wlan0
18000: from all fwmark 0x0/0x10000 lookup legacy_system
19000: from all fwmark 0x0/0x10000 lookup legacy_network
20000: from all fwmark 0x0/0x10000 lookup local_network
23000: from all fwmark 0x72/0x1ffff iif lo lookup rmnet_data3
23000: from all fwmark 0x74/0x1ffff iif lo lookup wlan0
26000: from all fwmark 0x0/0x10000 iif lo lookup wlan0_local
28000: from all fwmark 0x68/0xffff lookup wlan0
30000: from all fwmark 0x5e lookup 60
30000: from all fwmark 0x5f lookup 60
31000: from all fwmark 0x0/0xffff iif lo lookup wlan0
32000: from all unreachable
其中含有tun9的条目是mihomo&模块添加的,含有tun0的条目应该是vpn service添加的
如题,最近在尝试把模块和普通VPN应用(我这边的例子是Tailscale APP)一起使用,但是发现存在一些DNS方面的问题
具体而言,不管是使用redir-host还是fake-ip,当安卓VPN Service启动的时候,mihomo的DNS劫持都会失效,用wireshark抓包可以看到所有的DNS查询都直接走
wlan0
查询,不再经过mihomo dns。请教一下,为什么会出现这样的问题?模块配置中不管使用tproxy模式还是core模式(直接用内核的tun)都会遇到相同的情况
模块配置
mihomo最简配置
mihomo使用的是最新Github Actions版本