Closed yujchn closed 6 years ago
Please skip to the English section below if you don't write Chinese.
中文: 提交 Issue 之前请先阅读 Issue 指引,然后回答下面的问题,谢谢。 除非特殊情况,请完整填写所有问题。不按模板发的 issue 将直接被关闭。
1) 你正在使用哪个版本的 V2Ray?(如果服务器和客户端使用了不同版本,请注明)
3.35,客户端使用手机端的shadowRocket
2) 你的使用场景是什么?比如使用 Chrome 通过 Socks/VMess 代理观看 YouTube 视频。
主机游戏代理
3) 你看到的不正常的现象是什么?(请描述具体现象,比如访问超时,TLS 证书错误等)
root@vultr:~# netstat -naupl Active Internet connections (servers and established) Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name udp 0 0 0.0.0.0:68 0.0.0.0:* 505/dhclient udp 0 0 服务器ip:123 0.0.0.0:* 586/ntpd udp 0 0 127.0.0.1:123 0.0.0.0:* 586/ntpd udp 0 0 0.0.0.0:123 0.0.0.0:* 586/ntpd udp 0 0 0.0.0.0:30367 0.0.0.0:* 505/dhclient udp 0 0 127.0.0.1:8388 0.0.0.0:* 553/ss-server udp6 0 0 :::888 :::* 797/v2ray udp6 0 0 :::1081 :::* 505/dhclient udp6 0 0 服务器ip :::* 586/ntpd udp6 0 0 不知道什么ip :::* 586/ntpd udp6 0 0 ::1:123 :::* 586/ntpd udp6 0 0 :::123 :::* 586/ntpd udp6 0 0 :::8838 :::* 603/game-server
shadowsocks配置的888端口,v6的监听起来了,v4的没起来。tcp的太多了,不贴了。 vmess协议tcp部分运行正常,udp没起来。shadowsocks的tcp和udp的ipv4转发都没起来,ipv6没有环境未测试,从netstat看来应该正常。
4) 你期待看到的正确表现是怎样的?
shadowsocks监听该端口
5) 请附上你的配置(提交 Issue 前请隐藏服务器端IP地址)。
服务器端配置:
{ "log" : { "access": "/var/log/v2ray/access.log", "error": "/var/log/v2ray/error.log", "loglevel": "warning" }, "inbound": { "port": 443, "protocol": "vmess", "settings": { "clients": [ { "id": "-------", "level": 0, "alterId": 64 }, { "id": "------", "level": 1, "alterId": 100 } ] } }, "inboundDetour": [ { "protocol": "shadowsocks", "port": 888, //有尝试过手动listen 0.0.0.0,一样结果 "settings": { "method": "aes-128-gcm", "password": "-------", "network": "tcp,udp" } } ], "outbound": { "protocol": "freedom", "settings": {}, "tag": "direct" },"outboundDetour": [ { "protocol": "blackhole", "settings": {}, "tag": "blocked" } ], "routing": { "strategy": "rules", "settings": { "rules": [ { "type": "field", "ip": [ "0.0.0.0/8", "10.0.0.0/8", "100.64.0.0/10", "127.0.0.0/8", "169.254.0.0/16", "172.16.0.0/12", "192.0.0.0/24", "192.0.2.0/24", "192.168.0.0/16", "198.18.0.0/15", "198.51.100.0/24", "203.0.113.0/24", "::1/128", "fc00::/7", "fe80::/10" ], "outboundTag": "blocked" } ] } } }
客户端配置:
{用的shadowsocks协议连接}
6) 请附上出错时软件输出的错误日志。在 Linux 中,日志通常在 /var/log/v2ray/error.log 文件中。
/var/log/v2ray/error.log
服务器端错误日志:
2018/03/01 18:41:50 [Warning] Core: V2Ray started 2018/03/01 18:43:53 [Warning] Core: V2Ray started 2018/03/01 18:58:30 [Warning] Core: V2Ray started 2018/03/01 20:54:32 [Warning] Core: V2Ray started 2018/03/01 22:00:01 [Warning] Core: V2Ray started 2018/03/02 23:55:14 [Warning] Core: V2Ray v3.11 started 2018/03/02 23:55:14 [Warning] Core: V2Ray v3.11 started 2018/03/07 01:29:06 [Warning] Core: V2Ray v3.12 started 2018/03/08 22:46:04 [Warning] Core: V2Ray v3.12 started 2018/03/16 18:23:21 [Warning] Core: V2Ray v3.14 started 2018/03/18 22:17:03 [Warning] Core: V2Ray v3.14 started 2018/03/18 22:19:00 [Warning] Core: V2Ray v3.14 started 2018/08/13 16:53:11 [Warning] Core: V2Ray v3.14 started 2018/08/13 17:03:43 [Warning] Core: V2Ray v3.35 started 2018/08/13 17:11:39 [Warning] Core: V2Ray v3.35 started 2018/08/13 17:20:18 [Warning] Core: V2Ray v3.35 started 2018/08/13 17:21:08 [Warning] Core: V2Ray v3.35 started 2018/08/13 17:32:40 [Warning] Core: V2Ray v3.35 started 2018/08/13 17:33:22 [Warning] Transport|Internet|WebSocket: failed to serve http for WebSocket > accept tcp [::]:443: use of closed network connection //此处在用vultr的snapshot功能保存服务器快照 2018/08/13 17:33:22 [Warning] Core: V2Ray v3.35 started 2018/08/13 17:36:10 [Warning] Core: V2Ray v3.35 started // 在这里附上服务器端日志
客户端错误日志:
// 在这里附上客户端日志
7) 请附上访问日志。在 Linux 中,日志通常在 /var/log/v2ray/access.log 文件中。
/var/log/v2ray/access.log
2018/08/13 17:52:23 58.246.106.162:49066 accepted tcp:avatars0.githubusercontent.com:443 2018/08/13 17:52:23 58.246.106.162:1193 accepted tcp:avatars2.githubusercontent.com:443 2018/08/13 17:52:23 58.246.106.162:48349 accepted tcp:collector.githubapp.com:443 2018/08/13 17:52:23 58.246.106.162:50018 accepted tcp:avatars0.githubusercontent.com:443 2018/08/13 17:52:23 58.246.106.162:53315 accepted tcp:avatars2.githubusercontent.com:443 2018/08/13 17:52:23 58.246.106.162:42155 accepted tcp:avatars3.githubusercontent.com:443 2018/08/13 17:52:23 58.246.106.162:31378 accepted tcp:avatars3.githubusercontent.com:443 2018/08/13 17:52:23 58.246.106.162:29624 accepted tcp:lp-push-server-528.lastpass.com:443 2018/08/13 17:52:23 58.246.106.162:49962 accepted tcp:collector.githubapp.com:443 2018/08/13 17:52:24 58.246.106.162:32029 accepted tcp:avatars2.githubusercontent.com:443 2018/08/13 17:52:26 58.246.106.162:4326 rejected Proxy|VMess|Encoding: invalid user 2018/08/13 17:52:26 58.246.106.162:22961 rejected Proxy|VMess|Encoding: invalid user 2018/08/13 17:53:09 58.246.106.162:30427 accepted tcp:oss.mail.qq.com:80 2018/08/13 17:53:13 58.246.106.162:21793 accepted tcp:github.com:443 2018/08/13 17:53:13 58.246.106.162:24859 rejected Proxy|VMess|Encoding: invalid user 2018/08/13 17:53:14 58.246.106.162:46934 rejected Proxy|VMess|Encoding: invalid user 2018/08/13 17:53:14 58.246.106.162:20392 accepted tcp:api.github.com:443 2018/08/13 17:53:15 58.246.106.162:45750 accepted tcp:assets-cdn.github.com:443 2018/08/13 17:53:15 58.246.106.162:21311 rejected Proxy|VMess|Encoding: invalid user 2018/08/13 17:53:15 58.246.106.162:23456 accepted tcp:loglogin.lastpass.com:443 2018/08/13 17:53:17 58.246.106.162:20354 accepted tcp:avatars1.githubusercontent.com:443 2018/08/13 17:53:17 58.246.106.162:42309 rejected Proxy|VMess|Encoding: invalid user 2018/08/13 17:53:17 58.246.106.162:6657 accepted tcp:avatars1.githubusercontent.com:443 2018/08/13 17:53:17 58.246.106.162:38893 accepted tcp:avatars1.githubusercontent.com:443 2018/08/13 17:53:17 58.246.106.162:5093 accepted tcp:avatars1.githubusercontent.com:443 2018/08/13 17:53:17 58.246.106.162:41137 rejected Proxy|VMess|Encoding: invalid user 2018/08/13 17:53:17 58.246.106.162:47017 rejected Proxy|VMess|Encoding: invalid user 2018/08/13 17:53:17 58.246.106.162:10776 accepted tcp:live.github.com:443 2018/08/13 17:53:19 58.246.106.162:14500 rejected Proxy|VMess|Encoding: invalid user 2018/08/13 17:53:19 58.246.106.162:4388 accepted tcp:api.github.com:443 2018/08/13 17:53:22 58.246.106.162:19369 accepted tcp:api.github.com:443 2018/08/13 17:53:22 58.246.106.162:34877 accepted tcp:lp-push-server-528.lastpass.com:443 2018/08/13 17:54:00 58.246.106.162:17364 accepted tcp:assets-cdn.github.com:443 2018/08/13 17:54:00 58.246.106.162:45873 rejected Proxy|VMess|Encoding: invalid user 2018/08/13 17:54:00 58.246.106.162:51021 rejected Proxy|VMess|Encoding: invalid user 2018/08/13 17:54:00 58.246.106.162:55614 accepted tcp:assets-cdn.github.com:443 2018/08/13 17:54:00 58.246.106.162:63882 rejected Proxy|VMess|Encoding: invalid user 2018/08/13 17:54:00 58.246.106.162:59967 rejected Proxy|VMess|Encoding: invalid user 2018/08/13 17:54:00 58.246.106.162:27276 accepted tcp:assets-cdn.github.com:443 2018/08/13 17:54:00 58.246.106.162:58561 accepted tcp:assets-cdn.github.com:443 2018/08/13 17:54:00 58.246.106.162:53279 accepted tcp:assets-cdn.github.com:443 2018/08/13 17:54:00 58.246.106.162:3311 rejected Proxy|VMess|Encoding: invalid user 2018/08/13 17:54:00 58.246.106.162:40357 accepted tcp:assets-cdn.github.com:443 2018/08/13 17:54:01 58.246.106.162:11274 accepted tcp:assets-cdn.github.com:443 2018/08/13 17:54:01 58.246.106.162:37617 accepted tcp:assets-cdn.github.com:443 2018/08/13 17:54:01 58.246.106.162:48639 accepted tcp:assets-cdn.github.com:443 2018/08/13 17:54:01 58.246.106.162:47710 rejected Proxy|VMess|Encoding: invalid user 2018/08/13 17:54:02 58.246.106.162:12761 rejected Proxy|VMess|Encoding: invalid user 2018/08/13 17:54:23 58.246.106.162:46145 rejected Proxy|VMess|Encoding: invalid user 2018/08/13 17:54:23 58.246.106.162:60006 accepted tcp:lp-push-server-528.lastpass.com:443 2018/08/13 17:54:44 58.246.106.162:24581 accepted tcp:www.v2ray.com:443 2018/08/13 17:55:21 58.246.106.162:48546 rejected Proxy|VMess|Encoding: invalid user 2018/08/13 17:55:21 58.246.106.162:13040 accepted tcp:safebrowsing.googleapis.com:443 2018/08/13 17:55:23 58.246.106.162:4145 rejected Proxy|VMess|Encoding: invalid user 2018/08/13 17:55:23 58.246.106.162:31701 accepted tcp:lp-push-server-528.lastpass.com:443 2018/08/13 17:55:32 58.246.106.162:64073 rejected Proxy|VMess|Encoding: invalid user 2018/08/13 17:55:32 58.246.106.162:24877 rejected Proxy|VMess|Encoding: invalid user 2018/08/13 17:55:32 58.246.106.162:40456 accepted tcp:user-images.githubusercontent.com:443 2018/08/13 17:55:32 58.246.106.162:60459 rejected Proxy|VMess|Encoding: invalid user 2018/08/13 17:55:33 58.246.106.162:40276 accepted tcp:github.com:443 2018/08/13 17:55:33 58.246.106.162:50722 accepted tcp:github.com:443 2018/08/13 17:55:33 58.246.106.162:30680 accepted tcp:github.com:443 2018/08/13 17:55:35 58.246.106.162:30350 accepted tcp:collector.githubapp.com:443 2018/08/13 17:55:35 58.246.106.162:57501 accepted tcp:live.github.com:443 2018/08/13 17:55:37 58.246.106.162:64477 accepted tcp:api.github.com:443 2018/08/13 17:55:44 58.246.106.162:60300 rejected Proxy|VMess|Encoding: invalid user 2018/08/13 17:56:24 58.246.106.162:18856 rejected Proxy|VMess|Encoding: invalid user 2018/08/13 17:56:24 58.246.106.162:14811 accepted tcp:lp-push-server-528.lastpass.com:443 2018/08/13 17:57:23 58.246.106.162:49102 rejected Proxy|VMess|Encoding: invalid user 2018/08/13 17:57:23 58.246.106.162:17208 accepted tcp:lp-push-server-528.lastpass.com:443 2018/08/13 17:57:55 58.246.106.162:16602 rejected Proxy|VMess|Encoding: invalid user 2018/08/13 17:58:19 58.246.106.162:29246 accepted tcp:hm.baidu.com:443 2018/08/13 17:58:23 58.246.106.162:36051 accepted tcp:lp-push-server-528.lastpass.com:443 2018/08/13 17:59:03 58.246.106.162:27173 accepted tcp:lp-push-server-528.lastpass.com:443 2018/08/13 17:59:07 121.239.226.148:64563 accepted tcp:mtalk.google.com:5228 2018/08/13 17:59:07 121.239.226.148:64565 accepted tcp:www.googleapis.com:443 2018/08/13 17:59:09 121.239.226.148:64579 accepted tcp:youtubei.googleapis.com:443 2018/08/13 17:59:23 58.246.106.162:60510 rejected Proxy|VMess|Encoding: invalid user 2018/08/13 17:59:23 58.246.106.162:59718 accepted tcp:lp-push-server-528.lastpass.com:443 2018/08/13 17:59:35 58.246.106.162:18370 rejected Proxy|VMess|Encoding: invalid user 2018/08/13 17:59:36 58.246.106.162:44318 accepted tcp:wx.qlogo.cn:80 2018/08/13 18:00:03 58.246.106.162:62281 rejected Proxy|VMess|Encoding: invalid user 2018/08/13 18:00:03 58.246.106.162:58002 accepted tcp:lp-push-server-528.lastpass.com:443 2018/08/13 18:00:05 58.246.106.162:53498 accepted tcp:get.sogou.com:80 2018/08/13 18:00:23 58.246.106.162:51033 accepted tcp:lp-push-server-528.lastpass.com:443 2018/08/13 18:01:03 58.246.106.162:30023 accepted tcp:lp-push-server-528.lastpass.com:443 2018/08/13 18:01:10 58.246.106.162:12798 accepted tcp:get.sogou.com:80 2018/08/13 18:01:15 58.246.106.162:27596 accepted tcp:clients4.google.com:443 2018/08/13 18:03:10 58.246.106.162:46547 rejected Proxy|VMess|Encoding: invalid user 2018/08/13 18:04:16 58.246.106.162:61942 rejected Proxy|VMess|Encoding: invalid user 2018/08/13 18:05:37 58.246.106.162:60582 rejected Proxy|VMess|Encoding: invalid user 2018/08/13 18:05:38 58.246.106.162:56225 accepted tcp:wx.qlogo.cn:80 2018/08/13 18:06:34 58.246.106.162:12579 accepted tcp:pollserver.lastpass.com:443 2018/08/13 18:06:43 58.246.106.162:65381 rejected Proxy|VMess|Encoding: invalid user 2018/08/13 18:07:22 58.246.106.162:31078 rejected Proxy|VMess|Encoding: invalid user 2018/08/13 18:07:22 58.246.106.162:58474 accepted tcp:clients4.google.com:443 2018/08/13 18:07:38 58.246.106.162:37893 accepted tcp:clients4.google.com:443 2018/08/13 18:07:39 58.246.106.162:38847 accepted tcp:mtalk.google.com:443 2018/08/13 18:08:19 58.246.106.162:24776 rejected Proxy|VMess|Encoding: invalid user 2018/08/13 18:08:19 58.246.106.162:13373 accepted tcp:hm.baidu.com:443 // 在这里附上服务器端日志
8) 其它相关的配置文件(如 Nginx)和相关日志。 iptables -L -n
Chain INPUT (policy DROP) target prot opt source destination ACCEPT tcp -- 108.61.10.10 0.0.0.0/0 tcp dpt:53 ACCEPT udp -- 108.61.10.10 0.0.0.0/0 udp dpt:53 ACCEPT tcp -- 108.61.10.10 0.0.0.0/0 tcp spt:53 ACCEPT udp -- 108.61.10.10 0.0.0.0/0 udp spt:53 LOCALINPUT all -- 0.0.0.0/0 0.0.0.0/0 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 INVALID tcp -- 0.0.0.0/0 0.0.0.0/0 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:22 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:53 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:80 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:123 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:443 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:999 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:53 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:80 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:123 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:3478 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:19364 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8 limit: avg 1/sec burst 5 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 0 limit: avg 1/sec burst 5 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 11 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 3 LOGDROPIN all -- 0.0.0.0/0 0.0.0.0/0 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:8838 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:8838 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:888 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:888 Chain FORWARD (policy DROP) target prot opt source destination Chain OUTPUT (policy DROP) target prot opt source destination ACCEPT tcp -- 0.0.0.0/0 108.61.10.10 tcp dpt:53 ACCEPT udp -- 0.0.0.0/0 108.61.10.10 udp dpt:53 ACCEPT tcp -- 0.0.0.0/0 108.61.10.10 tcp spt:53 ACCEPT udp -- 0.0.0.0/0 108.61.10.10 udp spt:53 LOCALOUTPUT all -- 0.0.0.0/0 0.0.0.0/0 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:53 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:53 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spt:53 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp spt:53 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 INVALID tcp -- 0.0.0.0/0 0.0.0.0/0 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:22 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:53 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:80 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:123 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:443 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:999 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:53 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:80 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:123 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:3478 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:19364 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 0 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 11 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 3 LOGDROPOUT all -- 0.0.0.0/0 0.0.0.0/0 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spt:8838 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp spt:8838 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spt:888 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp spt:888 Chain ALLOWIN (1 references) target prot opt source destination Chain ALLOWOUT (1 references) target prot opt source destination Chain DENYIN (1 references) target prot opt source destination Chain DENYOUT (1 references) target prot opt source destination Chain INVALID (2 references) target prot opt source destination INVDROP all -- 0.0.0.0/0 0.0.0.0/0 state INVALID INVDROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp flags:0x3F/0x00 INVDROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp flags:0x3F/0x3F INVDROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp flags:0x03/0x03 INVDROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x06 INVDROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp flags:0x05/0x05 INVDROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp flags:0x11/0x01 INVDROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp flags:0x18/0x08 INVDROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp flags:0x30/0x20 INVDROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp flags:!0x17/0x02 state NEW Chain INVDROP (10 references) target prot opt source destination DROP all -- 0.0.0.0/0 0.0.0.0/0 Chain LOCALINPUT (1 references) target prot opt source destination ALLOWIN all -- 0.0.0.0/0 0.0.0.0/0 DENYIN all -- 0.0.0.0/0 0.0.0.0/0 Chain LOCALOUTPUT (1 references) target prot opt source destination ALLOWOUT all -- 0.0.0.0/0 0.0.0.0/0 DENYOUT all -- 0.0.0.0/0 0.0.0.0/0 Chain LOGDROPIN (1 references) target prot opt source destination DROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:23 DROP udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:23 DROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:67 DROP udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:67 DROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:68 DROP udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:68 DROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:111 DROP udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:111 DROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:113 DROP udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:113 DROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpts:135:139 DROP udp -- 0.0.0.0/0 0.0.0.0/0 udp dpts:135:139 DROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:445 DROP udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:445 DROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:500 DROP udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:500 DROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:513 DROP udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:513 DROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:520 DROP udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:520 LOG tcp -- 0.0.0.0/0 0.0.0.0/0 limit: avg 30/min burst 5 LOG flags 0 level 4 prefix "Firewall: *TCP_IN Blocked* " LOG udp -- 0.0.0.0/0 0.0.0.0/0 limit: avg 30/min burst 5 LOG flags 0 level 4 prefix "Firewall: *UDP_IN Blocked* " LOG icmp -- 0.0.0.0/0 0.0.0.0/0 limit: avg 30/min burst 5 LOG flags 0 level 4 prefix "Firewall: *ICMP_IN Blocked* " DROP all -- 0.0.0.0/0 0.0.0.0/0 Chain LOGDROPOUT (1 references) target prot opt source destination LOG tcp -- 0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x02 limit: avg 30/min burst 5 LOG flags 8 level 4 prefix "Firewall: *TCP_OUT Blocked* " LOG udp -- 0.0.0.0/0 0.0.0.0/0 limit: avg 30/min burst 5 LOG flags 8 level 4 prefix "Firewall: *UDP_OUT Blocked* " LOG icmp -- 0.0.0.0/0 0.0.0.0/0 limit: avg 30/min burst 5 LOG flags 8 level 4 prefix "Firewall: *ICMP_OUT Blocked* " REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
9) 如果 V2Ray 无法启动,请附上 --test 输出。
--test
通常的命令为 /usr/bin/v2ray/v2ray --test --config /etc/v2ray/config.json。请按实际情况修改。
/usr/bin/v2ray/v2ray --test --config /etc/v2ray/config.json
10) 如果 V2Ray 服务运行不正常,请附上 journal 日志。
通常的命令为 journalctl -u v2ray。
journalctl -u v2ray
请预览一下你填的内容再提交。
如果你已经填完上面的问卷,请把下面的英文部份删除,再提交 Issue。
v4和v6同时监听的话,部分系统会只显示v6的状态。另外vmess不会监听UDP。如果连不上的话,请检查防火墙设置。
Please skip to the English section below if you don't write Chinese.
中文: 提交 Issue 之前请先阅读 Issue 指引,然后回答下面的问题,谢谢。 除非特殊情况,请完整填写所有问题。不按模板发的 issue 将直接被关闭。
1) 你正在使用哪个版本的 V2Ray?(如果服务器和客户端使用了不同版本,请注明)
2) 你的使用场景是什么?比如使用 Chrome 通过 Socks/VMess 代理观看 YouTube 视频。
3) 你看到的不正常的现象是什么?(请描述具体现象,比如访问超时,TLS 证书错误等)
shadowsocks配置的888端口,v6的监听起来了,v4的没起来。tcp的太多了,不贴了。 vmess协议tcp部分运行正常,udp没起来。shadowsocks的tcp和udp的ipv4转发都没起来,ipv6没有环境未测试,从netstat看来应该正常。
4) 你期待看到的正确表现是怎样的?
5) 请附上你的配置(提交 Issue 前请隐藏服务器端IP地址)。
客户端配置:
6) 请附上出错时软件输出的错误日志。在 Linux 中,日志通常在
/var/log/v2ray/error.log
文件中。客户端错误日志:
7) 请附上访问日志。在 Linux 中,日志通常在
/var/log/v2ray/access.log
文件中。8) 其它相关的配置文件(如 Nginx)和相关日志。 iptables -L -n
9) 如果 V2Ray 无法启动,请附上
--test
输出。通常的命令为
/usr/bin/v2ray/v2ray --test --config /etc/v2ray/config.json
。请按实际情况修改。10) 如果 V2Ray 服务运行不正常,请附上 journal 日志。
通常的命令为
journalctl -u v2ray
。请预览一下你填的内容再提交。
如果你已经填完上面的问卷,请把下面的英文部份删除,再提交 Issue。