Closed Hossein383 closed 8 months ago
Too little information to judge the problem.
The script specifically adds WARP network interface for VPS, detailed:[https://github.com/fscarmen/warp-sh]
Features:
• Support WARP+ account. Third-party scripts are use to increase WARP+ quota or upgrade kernel.
• Not only menus, but commands with option.
• Support system: Ubuntu 16.04、18.04、20.04、22.04,Debian 9、10、11,CentOS 7、8、9, Alpine, Arch Linux 3.
• Support architecture: AMD,ARM and s390x
• Automatically select four WireGuard solutions. Performance: Kernel with WireGuard integration > Install kernel module > wireguard-go
• Suppert WARP Linux client.
• Output WARP status, IP region and asn
======================================================================================================================
Version:3.02
New features:To check if the WireGuard kernel module is already loaded. If not, attempt to load it and recheck.
System infomation:
Operating System:Ubuntu 20.04.5 LTS
Kernel:5.4.0-131-generic
Architecture:amd64
Virtualization:kvm
IPv4: 148.113.6.18 India OVH SAS
IPv6:
WARP Interface is off
Client is not installed.
WireProxy is not installed.
======================================================================================================================
1. Add WARP IPv4 interface to IPv4 only VPS (bash menu.sh 4)
2. Add WARP IPv6 interface to IPv4 only VPS (bash menu.sh 6)
3. Add WARP dualstack interface to IPv4 only VPS (bash menu.sh d)
4. Turn on WARP (warp o)
5. Install CloudFlare Client and set mode to Proxy (bash menu.sh c)
6. Change the WARP IP to support Netflix (warp i)
7. Turn off, uninstall WARP interface, Linux Client and WireProxy (warp u)
8. Getting WARP+ quota by scripts (warp p)
9. Upgrade kernel, turn on BBR, change Linux system (warp b)
10. Sync the latest version (warp v)
11. Professional one-click script for WARP to unblock streaming media (Supports multi-platform, multi-mode and TG push)
12. Install iptable + dnsmasq + ipset. Let WARP only take over the streaming media traffic (Not available for ipv6 only) (bash menu.sh e)
13. Install wireproxy. Wireguard client that exposes itself as a socks5 proxy or tunnels (bash menu.sh w)
14. Install CloudFlare Client and set mode to WARP (bash menu.sh l)
0. Exit
Choose: 3
Can only be run using wireguard-go with reserved .
Working mode:
1. Global (default)
2. Non-global
Choose:
Is there a WARP+ or Teams account?
1. Use free account (default)
2. WARP+
3. Teams
Choose:
Please choose the priority:
1. IPv4
2. IPv6
3. Use initial settings (default)
Choose:
Step 1/3: Install dependencies...
Hit:1 http://security.ubuntu.com/ubuntu focal-security InRelease
Hit:2 http://archive.ubuntu.com/ubuntu focal InRelease
Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [114 kB]
0% [3 InRelease 14.2 kB/114 kB 12%]
Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease
Fetched 114 kB in 2s (56.9 kB/s)
Reading package lists... 4%
Step 2/3: WARP is ready
Reading package lists... Done
Building dependency tree
Reading state information... Done
168 packages can be upgraded. Run 'apt list --upgradable' to see them.
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following additional packages will be installed:
libip4tc2 libip6tc2 libxtables12
Suggested packages:
firewalld nftables
The following NEW packages will be installed:
dnsutils net-tools openresolv
The following packages will be upgraded:
iptables libip4tc2 libip6tc2 libxtables12
4 upgraded, 3 newly installed, 0 to remove and 164 not upgraded.
Need to get 681 kB of archives.
After this operation, 1009 kB of additional disk space will be used.
Get:1 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 iptables amd64 1.8.4-3ubuntu2.1 [390 kB]
Get:2 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libxtables12 amd64 1.8.4-3ubuntu2.1 [28.7 kB]
Get:3 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libip6tc2 amd64 1.8.4-3ubuntu2.1 [19.4 kB]
Get:4 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libip4tc2 amd64 1.8.4-3ubuntu2.1 [19.1 kB]
Get:5 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 dnsutils all 1:9.16.1-0ubuntu2.16 [2760 B]
Get:6 http://archive.ubuntu.com/ubuntu focal/main amd64 net-tools amd64 1.60+git20180626.aebd88e-1ubuntu1 [196 kB]
Get:7 http://archive.ubuntu.com/ubuntu focal/universe amd64 openresolv amd64 3.10.0-1 [24.1 kB]
Fetched 681 kB in 2s (279 kB/s)
(Reading database ... 72824 files and directories currently installed.)
Preparing to unpack .../0-iptables_1.8.4-3ubuntu2.1_amd64.deb ...
Unpacking iptables (1.8.4-3ubuntu2.1) over (1.8.4-3ubuntu2) ...
Preparing to unpack .../1-libxtables12_1.8.4-3ubuntu2.1_amd64.deb ...
Unpacking libxtables12:amd64 (1.8.4-3ubuntu2.1) over (1.8.4-3ubuntu2) ...
Preparing to unpack .../2-libip6tc2_1.8.4-3ubuntu2.1_amd64.deb ...
Unpacking libip6tc2:amd64 (1.8.4-3ubuntu2.1) over (1.8.4-3ubuntu2) ...
Preparing to unpack .../3-libip4tc2_1.8.4-3ubuntu2.1_amd64.deb ...
Unpacking libip4tc2:amd64 (1.8.4-3ubuntu2.1) over (1.8.4-3ubuntu2) ...
Selecting previously unselected package dnsutils.
Preparing to unpack .../4-dnsutils_1%3a9.16.1-0ubuntu2.16_all.deb ...
Unpacking dnsutils (1:9.16.1-0ubuntu2.16) ...
Selecting previously unselected package net-tools.
Preparing to unpack .../5-net-tools_1.60+git20180626.aebd88e-1ubuntu1_amd64.deb ...
Unpacking net-tools (1.60+git20180626.aebd88e-1ubuntu1) ...
Selecting previously unselected package openresolv:amd64.
Preparing to unpack .../6-openresolv_3.10.0-1_amd64.deb ...
Unpacking openresolv:amd64 (3.10.0-1) ...
Setting up libip4tc2:amd64 (1.8.4-3ubuntu2.1) ...
Setting up net-tools (1.60+git20180626.aebd88e-1ubuntu1) ...
Setting up libip6tc2:amd64 (1.8.4-3ubuntu2.1) ...
Setting up dnsutils (1:9.16.1-0ubuntu2.16) ...
Setting up libxtables12:amd64 (1.8.4-3ubuntu2.1) ...
Setting up openresolv:amd64 (3.10.0-1) ...
Setting up iptables (1.8.4-3ubuntu2.1) ...
Processing triggers for man-db (2.9.1-1) ...
Processing triggers for libc-bin (2.31-0ubuntu9.9) ...
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following NEW packages will be installed:
wireguard-tools
0 upgraded, 1 newly installed, 0 to remove and 164 not upgraded.
Need to get 83.3 kB of archives.
After this operation, 327 kB of additional disk space will be used.
Get:1 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 wireguard-tools amd64 1.0.20200513-1~20.04.2 [83.3 kB]
14% [1 wireguard-tools 14.2 kB/83.3 kB 17%]
Step 3/3: Searching for the best MTU value and endpoint address are ready.
Fetched 83.3 kB in 1s (68.0 kB/s)
Selecting previously unselected package wireguard-tools.
(Reading database ... 72901 files and directories currently installed.)
Preparing to unpack .../wireguard-tools_1.0.20200513-1~20.04.2_amd64.deb ...
Unpacking wireguard-tools (1.0.20200513-1~20.04.2) ...
Setting up wireguard-tools (1.0.20200513-1~20.04.2) ...
wg-quick.target is a disabled or a static unit, not starting it.
Processing triggers for man-db (2.9.1-1) ...
--2024-02-15 17:49:26-- https://cdn3.cloudflare.now.cc/?url=https://gitlab.com/fscarmen/warp/-/raw/main/wireguard-go/wireguard-go-linux-amd64-20201118
Resolving cdn3.cloudflare.now.cc (cdn3.cloudflare.now.cc)... 104.21.48.202, 172.67.156.44
Connecting to cdn3.cloudflare.now.cc (cdn3.cloudflare.now.cc)|104.21.48.202|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 2523136 (2.4M) [application/octet-stream]
Saving to: ‘/usr/bin/wireguard-go’
/usr/bin/wireguard-go 100%[==================================================================>] 2.41M 4.58MB/s in 0.5s
2024-02-15 17:49:27 (4.58 MB/s) - ‘/usr/bin/wireguard-go’ saved [2523136/2523136]
Create shortcut [warp] successfully
Running WARP
Maximum 5 attempts to get WARP IP...
Try 1
Got the WARP Free IP successfully, Working mode: Global
==============================================================
IPv4: 104.28.200.96 India Cloudflare, Inc.
IPv6: 2a09:bac5:3afc:16b4::243:4b India Cloudflare Warp
Congratulations! WARP Free is turned on. Spend time:27 seconds.
The script runs today: 161273. Total:17023168
IPv6 priority , Working mode: Global
==============================================================
Run again with warp [option] [lisence], such as
warp h (help)
warp n (Get the WARP IP)
warp o (Turn off WARP temporarily)
warp u (Turn off and uninstall WARP interface and Socks5 Linux Client)
warp b (Upgrade kernel, turn on BBR, change Linux system)
warp a (Change account to Free, WARP+ or Teams)
warp p (Getting WARP+ quota by scripts)
warp v (Sync the latest version)
warp r (Connect/Disconnect WARP Linux Client)
warp 4/6 (Add WARP IPv4/IPv6 interface)
warp d (Add WARP dualstack interface IPv4 + IPv6)
warp c (Install WARP Linux Client and set to proxy mode)
warp l (Install WARP Linux Client and set to WARP mode)
warp i (Change the WARP IP to support Netflix)
warp e (Install Iptables + dnsmasq + ipset solution)
warp w (Install WireProxy solution)
warp y (Connect/Disconnect WireProxy socks5)
warp k (Switch between kernel and wireguard-go-reserved)
warp g (Switch between warp global and non-global)
warp s 4/6/d (Set stack proiority: IPv4 / IPv6 / VPS default)
ubuntu $
试了五次,可惜他拿不到IP,我又试了几次,都拿不到IP。
请选择: 4 后台获取 WARP IP 中,最大尝试5次…… 第1次尝试 第2次尝试 第3次尝试 第4次尝试 第5次尝试 失败已超过5次,脚本中止,问题反馈:[https://github.com/fscarmen/warp-sh/issues]
运行 wg-quick up warp
看看
It tried five times, but unfortunately he couldn't get the IP, I tried several times and none of them could get the IP.