v2ray / v2ray-core

A platform for building proxies to bypass network restrictions.
https://www.v2ray.com/
MIT License
45.44k stars 8.95k forks source link

shadowsocks的ipv4起不来 #1232

Closed yujchn closed 6 years ago

yujchn commented 6 years ago

Please skip to the English section below if you don't write Chinese.

中文: 提交 Issue 之前请先阅读 Issue 指引,然后回答下面的问题,谢谢。 除非特殊情况,请完整填写所有问题。不按模板发的 issue 将直接被关闭。

1) 你正在使用哪个版本的 V2Ray?(如果服务器和客户端使用了不同版本,请注明)

3.35,客户端使用手机端的shadowRocket

2) 你的使用场景是什么?比如使用 Chrome 通过 Socks/VMess 代理观看 YouTube 视频。

主机游戏代理

3) 你看到的不正常的现象是什么?(请描述具体现象,比如访问超时,TLS 证书错误等)

root@vultr:~# netstat -naupl
Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address           Foreign Address         State       PID/Program name
udp        0      0 0.0.0.0:68              0.0.0.0:*                           505/dhclient    
udp        0      0 服务器ip:123       0.0.0.0:*                           586/ntpd        
udp        0      0 127.0.0.1:123           0.0.0.0:*                           586/ntpd        
udp        0      0 0.0.0.0:123             0.0.0.0:*                           586/ntpd        
udp        0      0 0.0.0.0:30367           0.0.0.0:*                           505/dhclient    
udp        0      0 127.0.0.1:8388          0.0.0.0:*                           553/ss-server   
udp6       0      0 :::888                  :::*                                797/v2ray       
udp6       0      0 :::1081                 :::*                                505/dhclient    
udp6       0      0 服务器ip :::*                                586/ntpd        
udp6       0      0 不知道什么ip :::*                                586/ntpd        
udp6       0      0 ::1:123                 :::*                                586/ntpd        
udp6       0      0 :::123                  :::*                                586/ntpd        
udp6       0      0 :::8838                 :::*                                603/game-server 

shadowsocks配置的888端口,v6的监听起来了,v4的没起来。tcp的太多了,不贴了。 vmess协议tcp部分运行正常,udp没起来。shadowsocks的tcp和udp的ipv4转发都没起来,ipv6没有环境未测试,从netstat看来应该正常。

4) 你期待看到的正确表现是怎样的?

shadowsocks监听该端口

5) 请附上你的配置(提交 Issue 前请隐藏服务器端IP地址)。

服务器端配置:
{
  "log" : {
    "access": "/var/log/v2ray/access.log",
    "error": "/var/log/v2ray/error.log",
    "loglevel": "warning"
  },
  "inbound": {
    "port": 443,
    "protocol": "vmess",
    "settings": {
      "clients": [
        {
          "id": "-------",
          "level": 0,
          "alterId": 64
        },
        {
          "id": "------",
          "level": 1,
          "alterId": 100
        }
      ]
    }
  },
  "inboundDetour": [
    {
    "protocol": "shadowsocks",
    "port": 888,  //有尝试过手动listen 0.0.0.0,一样结果
    "settings": {
      "method": "aes-128-gcm",
      "password": "-------",
      "network": "tcp,udp"
      }
    }
  ],
  "outbound": {
    "protocol": "freedom",
    "settings": {},
    "tag": "direct"
  },"outboundDetour": [
    {
      "protocol": "blackhole",
      "settings": {},
      "tag": "blocked"
    }
  ],
  "routing": {
    "strategy": "rules",
    "settings": {
      "rules": [
        {
          "type": "field",
          "ip": [
            "0.0.0.0/8",
            "10.0.0.0/8",
            "100.64.0.0/10",
            "127.0.0.0/8",
            "169.254.0.0/16",
            "172.16.0.0/12",
            "192.0.0.0/24",
            "192.0.2.0/24",
            "192.168.0.0/16",
            "198.18.0.0/15",
            "198.51.100.0/24",
            "203.0.113.0/24",
            "::1/128",
            "fc00::/7",
            "fe80::/10"
          ],
          "outboundTag": "blocked"
        }
      ]
    }
  }
}

客户端配置:

{用的shadowsocks协议连接}

6) 请附上出错时软件输出的错误日志。在 Linux 中,日志通常在 /var/log/v2ray/error.log 文件中。

服务器端错误日志:
2018/03/01 18:41:50 [Warning] Core: V2Ray started
2018/03/01 18:43:53 [Warning] Core: V2Ray started
2018/03/01 18:58:30 [Warning] Core: V2Ray started
2018/03/01 20:54:32 [Warning] Core: V2Ray started
2018/03/01 22:00:01 [Warning] Core: V2Ray started
2018/03/02 23:55:14 [Warning] Core: V2Ray v3.11 started
2018/03/02 23:55:14 [Warning] Core: V2Ray v3.11 started
2018/03/07 01:29:06 [Warning] Core: V2Ray v3.12 started
2018/03/08 22:46:04 [Warning] Core: V2Ray v3.12 started
2018/03/16 18:23:21 [Warning] Core: V2Ray v3.14 started
2018/03/18 22:17:03 [Warning] Core: V2Ray v3.14 started
2018/03/18 22:19:00 [Warning] Core: V2Ray v3.14 started
2018/08/13 16:53:11 [Warning] Core: V2Ray v3.14 started
2018/08/13 17:03:43 [Warning] Core: V2Ray v3.35 started
2018/08/13 17:11:39 [Warning] Core: V2Ray v3.35 started
2018/08/13 17:20:18 [Warning] Core: V2Ray v3.35 started
2018/08/13 17:21:08 [Warning] Core: V2Ray v3.35 started
2018/08/13 17:32:40 [Warning] Core: V2Ray v3.35 started
2018/08/13 17:33:22 [Warning] Transport|Internet|WebSocket: failed to serve http for WebSocket > accept tcp [::]:443: use of closed network connection    //此处在用vultr的snapshot功能保存服务器快照
2018/08/13 17:33:22 [Warning] Core: V2Ray v3.35 started
2018/08/13 17:36:10 [Warning] Core: V2Ray v3.35 started
    // 在这里附上服务器端日志

客户端错误日志:

    // 在这里附上客户端日志

7) 请附上访问日志。在 Linux 中,日志通常在 /var/log/v2ray/access.log 文件中。

2018/08/13 17:52:23 58.246.106.162:49066 accepted tcp:avatars0.githubusercontent.com:443 
2018/08/13 17:52:23 58.246.106.162:1193 accepted tcp:avatars2.githubusercontent.com:443 
2018/08/13 17:52:23 58.246.106.162:48349 accepted tcp:collector.githubapp.com:443 
2018/08/13 17:52:23 58.246.106.162:50018 accepted tcp:avatars0.githubusercontent.com:443 
2018/08/13 17:52:23 58.246.106.162:53315 accepted tcp:avatars2.githubusercontent.com:443 
2018/08/13 17:52:23 58.246.106.162:42155 accepted tcp:avatars3.githubusercontent.com:443 
2018/08/13 17:52:23 58.246.106.162:31378 accepted tcp:avatars3.githubusercontent.com:443 
2018/08/13 17:52:23 58.246.106.162:29624 accepted tcp:lp-push-server-528.lastpass.com:443 
2018/08/13 17:52:23 58.246.106.162:49962 accepted tcp:collector.githubapp.com:443 
2018/08/13 17:52:24 58.246.106.162:32029 accepted tcp:avatars2.githubusercontent.com:443 
2018/08/13 17:52:26 58.246.106.162:4326 rejected  Proxy|VMess|Encoding: invalid user
2018/08/13 17:52:26 58.246.106.162:22961 rejected  Proxy|VMess|Encoding: invalid user
2018/08/13 17:53:09 58.246.106.162:30427 accepted tcp:oss.mail.qq.com:80 
2018/08/13 17:53:13 58.246.106.162:21793 accepted tcp:github.com:443 
2018/08/13 17:53:13 58.246.106.162:24859 rejected  Proxy|VMess|Encoding: invalid user
2018/08/13 17:53:14 58.246.106.162:46934 rejected  Proxy|VMess|Encoding: invalid user
2018/08/13 17:53:14 58.246.106.162:20392 accepted tcp:api.github.com:443 
2018/08/13 17:53:15 58.246.106.162:45750 accepted tcp:assets-cdn.github.com:443 
2018/08/13 17:53:15 58.246.106.162:21311 rejected  Proxy|VMess|Encoding: invalid user
2018/08/13 17:53:15 58.246.106.162:23456 accepted tcp:loglogin.lastpass.com:443 
2018/08/13 17:53:17 58.246.106.162:20354 accepted tcp:avatars1.githubusercontent.com:443 
2018/08/13 17:53:17 58.246.106.162:42309 rejected  Proxy|VMess|Encoding: invalid user
2018/08/13 17:53:17 58.246.106.162:6657 accepted tcp:avatars1.githubusercontent.com:443 
2018/08/13 17:53:17 58.246.106.162:38893 accepted tcp:avatars1.githubusercontent.com:443 
2018/08/13 17:53:17 58.246.106.162:5093 accepted tcp:avatars1.githubusercontent.com:443 
2018/08/13 17:53:17 58.246.106.162:41137 rejected  Proxy|VMess|Encoding: invalid user
2018/08/13 17:53:17 58.246.106.162:47017 rejected  Proxy|VMess|Encoding: invalid user
2018/08/13 17:53:17 58.246.106.162:10776 accepted tcp:live.github.com:443 
2018/08/13 17:53:19 58.246.106.162:14500 rejected  Proxy|VMess|Encoding: invalid user
2018/08/13 17:53:19 58.246.106.162:4388 accepted tcp:api.github.com:443 
2018/08/13 17:53:22 58.246.106.162:19369 accepted tcp:api.github.com:443 
2018/08/13 17:53:22 58.246.106.162:34877 accepted tcp:lp-push-server-528.lastpass.com:443 
2018/08/13 17:54:00 58.246.106.162:17364 accepted tcp:assets-cdn.github.com:443 
2018/08/13 17:54:00 58.246.106.162:45873 rejected  Proxy|VMess|Encoding: invalid user
2018/08/13 17:54:00 58.246.106.162:51021 rejected  Proxy|VMess|Encoding: invalid user
2018/08/13 17:54:00 58.246.106.162:55614 accepted tcp:assets-cdn.github.com:443 
2018/08/13 17:54:00 58.246.106.162:63882 rejected  Proxy|VMess|Encoding: invalid user
2018/08/13 17:54:00 58.246.106.162:59967 rejected  Proxy|VMess|Encoding: invalid user
2018/08/13 17:54:00 58.246.106.162:27276 accepted tcp:assets-cdn.github.com:443 
2018/08/13 17:54:00 58.246.106.162:58561 accepted tcp:assets-cdn.github.com:443 
2018/08/13 17:54:00 58.246.106.162:53279 accepted tcp:assets-cdn.github.com:443 
2018/08/13 17:54:00 58.246.106.162:3311 rejected  Proxy|VMess|Encoding: invalid user
2018/08/13 17:54:00 58.246.106.162:40357 accepted tcp:assets-cdn.github.com:443 
2018/08/13 17:54:01 58.246.106.162:11274 accepted tcp:assets-cdn.github.com:443 
2018/08/13 17:54:01 58.246.106.162:37617 accepted tcp:assets-cdn.github.com:443 
2018/08/13 17:54:01 58.246.106.162:48639 accepted tcp:assets-cdn.github.com:443 
2018/08/13 17:54:01 58.246.106.162:47710 rejected  Proxy|VMess|Encoding: invalid user
2018/08/13 17:54:02 58.246.106.162:12761 rejected  Proxy|VMess|Encoding: invalid user
2018/08/13 17:54:23 58.246.106.162:46145 rejected  Proxy|VMess|Encoding: invalid user
2018/08/13 17:54:23 58.246.106.162:60006 accepted tcp:lp-push-server-528.lastpass.com:443 
2018/08/13 17:54:44 58.246.106.162:24581 accepted tcp:www.v2ray.com:443 
2018/08/13 17:55:21 58.246.106.162:48546 rejected  Proxy|VMess|Encoding: invalid user
2018/08/13 17:55:21 58.246.106.162:13040 accepted tcp:safebrowsing.googleapis.com:443 
2018/08/13 17:55:23 58.246.106.162:4145 rejected  Proxy|VMess|Encoding: invalid user
2018/08/13 17:55:23 58.246.106.162:31701 accepted tcp:lp-push-server-528.lastpass.com:443 
2018/08/13 17:55:32 58.246.106.162:64073 rejected  Proxy|VMess|Encoding: invalid user
2018/08/13 17:55:32 58.246.106.162:24877 rejected  Proxy|VMess|Encoding: invalid user
2018/08/13 17:55:32 58.246.106.162:40456 accepted tcp:user-images.githubusercontent.com:443 
2018/08/13 17:55:32 58.246.106.162:60459 rejected  Proxy|VMess|Encoding: invalid user
2018/08/13 17:55:33 58.246.106.162:40276 accepted tcp:github.com:443 
2018/08/13 17:55:33 58.246.106.162:50722 accepted tcp:github.com:443 
2018/08/13 17:55:33 58.246.106.162:30680 accepted tcp:github.com:443 
2018/08/13 17:55:35 58.246.106.162:30350 accepted tcp:collector.githubapp.com:443 
2018/08/13 17:55:35 58.246.106.162:57501 accepted tcp:live.github.com:443 
2018/08/13 17:55:37 58.246.106.162:64477 accepted tcp:api.github.com:443 
2018/08/13 17:55:44 58.246.106.162:60300 rejected  Proxy|VMess|Encoding: invalid user
2018/08/13 17:56:24 58.246.106.162:18856 rejected  Proxy|VMess|Encoding: invalid user
2018/08/13 17:56:24 58.246.106.162:14811 accepted tcp:lp-push-server-528.lastpass.com:443 
2018/08/13 17:57:23 58.246.106.162:49102 rejected  Proxy|VMess|Encoding: invalid user
2018/08/13 17:57:23 58.246.106.162:17208 accepted tcp:lp-push-server-528.lastpass.com:443 
2018/08/13 17:57:55 58.246.106.162:16602 rejected  Proxy|VMess|Encoding: invalid user
2018/08/13 17:58:19 58.246.106.162:29246 accepted tcp:hm.baidu.com:443 
2018/08/13 17:58:23 58.246.106.162:36051 accepted tcp:lp-push-server-528.lastpass.com:443 
2018/08/13 17:59:03 58.246.106.162:27173 accepted tcp:lp-push-server-528.lastpass.com:443 
2018/08/13 17:59:07 121.239.226.148:64563 accepted tcp:mtalk.google.com:5228 
2018/08/13 17:59:07 121.239.226.148:64565 accepted tcp:www.googleapis.com:443 
2018/08/13 17:59:09 121.239.226.148:64579 accepted tcp:youtubei.googleapis.com:443 
2018/08/13 17:59:23 58.246.106.162:60510 rejected  Proxy|VMess|Encoding: invalid user
2018/08/13 17:59:23 58.246.106.162:59718 accepted tcp:lp-push-server-528.lastpass.com:443 
2018/08/13 17:59:35 58.246.106.162:18370 rejected  Proxy|VMess|Encoding: invalid user
2018/08/13 17:59:36 58.246.106.162:44318 accepted tcp:wx.qlogo.cn:80 
2018/08/13 18:00:03 58.246.106.162:62281 rejected  Proxy|VMess|Encoding: invalid user
2018/08/13 18:00:03 58.246.106.162:58002 accepted tcp:lp-push-server-528.lastpass.com:443 
2018/08/13 18:00:05 58.246.106.162:53498 accepted tcp:get.sogou.com:80 
2018/08/13 18:00:23 58.246.106.162:51033 accepted tcp:lp-push-server-528.lastpass.com:443 
2018/08/13 18:01:03 58.246.106.162:30023 accepted tcp:lp-push-server-528.lastpass.com:443 
2018/08/13 18:01:10 58.246.106.162:12798 accepted tcp:get.sogou.com:80 
2018/08/13 18:01:15 58.246.106.162:27596 accepted tcp:clients4.google.com:443 
2018/08/13 18:03:10 58.246.106.162:46547 rejected  Proxy|VMess|Encoding: invalid user
2018/08/13 18:04:16 58.246.106.162:61942 rejected  Proxy|VMess|Encoding: invalid user
2018/08/13 18:05:37 58.246.106.162:60582 rejected  Proxy|VMess|Encoding: invalid user
2018/08/13 18:05:38 58.246.106.162:56225 accepted tcp:wx.qlogo.cn:80 
2018/08/13 18:06:34 58.246.106.162:12579 accepted tcp:pollserver.lastpass.com:443 
2018/08/13 18:06:43 58.246.106.162:65381 rejected  Proxy|VMess|Encoding: invalid user
2018/08/13 18:07:22 58.246.106.162:31078 rejected  Proxy|VMess|Encoding: invalid user
2018/08/13 18:07:22 58.246.106.162:58474 accepted tcp:clients4.google.com:443 
2018/08/13 18:07:38 58.246.106.162:37893 accepted tcp:clients4.google.com:443 
2018/08/13 18:07:39 58.246.106.162:38847 accepted tcp:mtalk.google.com:443 
2018/08/13 18:08:19 58.246.106.162:24776 rejected  Proxy|VMess|Encoding: invalid user
2018/08/13 18:08:19 58.246.106.162:13373 accepted tcp:hm.baidu.com:443 
    // 在这里附上服务器端日志

8) 其它相关的配置文件(如 Nginx)和相关日志。 iptables -L -n

Chain INPUT (policy DROP)
target     prot opt source               destination         
ACCEPT     tcp  --  108.61.10.10         0.0.0.0/0            tcp dpt:53
ACCEPT     udp  --  108.61.10.10         0.0.0.0/0            udp dpt:53
ACCEPT     tcp  --  108.61.10.10         0.0.0.0/0            tcp spt:53
ACCEPT     udp  --  108.61.10.10         0.0.0.0/0            udp spt:53
LOCALINPUT  all  --  0.0.0.0/0            0.0.0.0/0           
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0           
INVALID    tcp  --  0.0.0.0/0            0.0.0.0/0           
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0            state RELATED,ESTABLISHED
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:22
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:53
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:80
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:123
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:443
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:999
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0            state NEW udp dpt:53
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0            state NEW udp dpt:80
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0            state NEW udp dpt:123
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0            state NEW udp dpt:3478
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0            state NEW udp dpt:19364
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0            icmptype 8 limit: avg 1/sec burst 5
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0            icmptype 0 limit: avg 1/sec burst 5
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0            icmptype 11
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0            icmptype 3
LOGDROPIN  all  --  0.0.0.0/0            0.0.0.0/0           
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:8838
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0            udp dpt:8838
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:888
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0            udp dpt:888

Chain FORWARD (policy DROP)
target     prot opt source               destination  

Chain OUTPUT (policy DROP)
target     prot opt source               destination         
ACCEPT     tcp  --  0.0.0.0/0            108.61.10.10         tcp dpt:53
ACCEPT     udp  --  0.0.0.0/0            108.61.10.10         udp dpt:53
ACCEPT     tcp  --  0.0.0.0/0            108.61.10.10         tcp spt:53
ACCEPT     udp  --  0.0.0.0/0            108.61.10.10         udp spt:53
LOCALOUTPUT  all  --  0.0.0.0/0            0.0.0.0/0           
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:53
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0            udp dpt:53
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0            tcp spt:53
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0            udp spt:53
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0           
INVALID    tcp  --  0.0.0.0/0            0.0.0.0/0           
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0            state RELATED,ESTABLISHED
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:22
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:53
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:80
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:123
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:443
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:999
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0            state NEW udp dpt:53
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0            state NEW udp dpt:80
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0            state NEW udp dpt:123
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0            state NEW udp dpt:3478
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0            state NEW udp dpt:19364
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0            icmptype 0
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0            icmptype 8
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0            icmptype 11
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0            icmptype 3
LOGDROPOUT  all  --  0.0.0.0/0            0.0.0.0/0           
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0            tcp spt:8838
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0            udp spt:8838
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0            tcp spt:888
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0            udp spt:888

Chain ALLOWIN (1 references)
target     prot opt source               destination         

Chain ALLOWOUT (1 references)
target     prot opt source               destination         

Chain DENYIN (1 references)
target     prot opt source               destination         

Chain DENYOUT (1 references)
target     prot opt source               destination         

Chain INVALID (2 references)
target     prot opt source               destination         
INVDROP    all  --  0.0.0.0/0            0.0.0.0/0            state INVALID
INVDROP    tcp  --  0.0.0.0/0            0.0.0.0/0            tcp flags:0x3F/0x00
INVDROP    tcp  --  0.0.0.0/0            0.0.0.0/0            tcp flags:0x3F/0x3F
INVDROP    tcp  --  0.0.0.0/0            0.0.0.0/0            tcp flags:0x03/0x03
INVDROP    tcp  --  0.0.0.0/0            0.0.0.0/0            tcp flags:0x06/0x06
INVDROP    tcp  --  0.0.0.0/0            0.0.0.0/0            tcp flags:0x05/0x05
INVDROP    tcp  --  0.0.0.0/0            0.0.0.0/0            tcp flags:0x11/0x01
INVDROP    tcp  --  0.0.0.0/0            0.0.0.0/0            tcp flags:0x18/0x08
INVDROP    tcp  --  0.0.0.0/0            0.0.0.0/0            tcp flags:0x30/0x20
INVDROP    tcp  --  0.0.0.0/0            0.0.0.0/0            tcp flags:!0x17/0x02 state NEW

Chain INVDROP (10 references)
target     prot opt source               destination         
DROP       all  --  0.0.0.0/0            0.0.0.0/0           

Chain LOCALINPUT (1 references)
target     prot opt source               destination         
ALLOWIN    all  --  0.0.0.0/0            0.0.0.0/0           
DENYIN     all  --  0.0.0.0/0            0.0.0.0/0           

Chain LOCALOUTPUT (1 references)
target     prot opt source               destination         
ALLOWOUT   all  --  0.0.0.0/0            0.0.0.0/0           
DENYOUT    all  --  0.0.0.0/0            0.0.0.0/0           

Chain LOGDROPIN (1 references)
target     prot opt source               destination         
DROP       tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:23
DROP       udp  --  0.0.0.0/0            0.0.0.0/0            udp dpt:23
DROP       tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:67
DROP       udp  --  0.0.0.0/0            0.0.0.0/0            udp dpt:67
DROP       tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:68
DROP       udp  --  0.0.0.0/0            0.0.0.0/0            udp dpt:68
DROP       tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:111
DROP       udp  --  0.0.0.0/0            0.0.0.0/0            udp dpt:111
DROP       tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:113
DROP       udp  --  0.0.0.0/0            0.0.0.0/0            udp dpt:113
DROP       tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpts:135:139
DROP       udp  --  0.0.0.0/0            0.0.0.0/0            udp dpts:135:139
DROP       tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:445
DROP       udp  --  0.0.0.0/0            0.0.0.0/0            udp dpt:445
DROP       tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:500
DROP       udp  --  0.0.0.0/0            0.0.0.0/0            udp dpt:500
DROP       tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:513
DROP       udp  --  0.0.0.0/0            0.0.0.0/0            udp dpt:513
DROP       tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:520
DROP       udp  --  0.0.0.0/0            0.0.0.0/0            udp dpt:520
LOG        tcp  --  0.0.0.0/0            0.0.0.0/0            limit: avg 30/min burst 5 LOG flags 0 level 4 prefix "Firewall: *TCP_IN Blocked* "
LOG        udp  --  0.0.0.0/0            0.0.0.0/0            limit: avg 30/min burst 5 LOG flags 0 level 4 prefix "Firewall: *UDP_IN Blocked* "
LOG        icmp --  0.0.0.0/0            0.0.0.0/0            limit: avg 30/min burst 5 LOG flags 0 level 4 prefix "Firewall: *ICMP_IN Blocked* "
DROP       all  --  0.0.0.0/0            0.0.0.0/0           

Chain LOGDROPOUT (1 references)
target     prot opt source               destination         
LOG        tcp  --  0.0.0.0/0            0.0.0.0/0            tcp flags:0x17/0x02 limit: avg 30/min burst 5 LOG flags 8 level 4 prefix "Firewall: *TCP_OUT Blocked* "
LOG        udp  --  0.0.0.0/0            0.0.0.0/0            limit: avg 30/min burst 5 LOG flags 8 level 4 prefix "Firewall: *UDP_OUT Blocked* "
LOG        icmp --  0.0.0.0/0            0.0.0.0/0            limit: avg 30/min burst 5 LOG flags 8 level 4 prefix "Firewall: *ICMP_OUT Blocked* "
REJECT     all  --  0.0.0.0/0            0.0.0.0/0            reject-with icmp-port-unreachable

9) 如果 V2Ray 无法启动,请附上 --test 输出。

通常的命令为 /usr/bin/v2ray/v2ray --test --config /etc/v2ray/config.json。请按实际情况修改。

10) 如果 V2Ray 服务运行不正常,请附上 journal 日志。

通常的命令为 journalctl -u v2ray

请预览一下你填的内容再提交。

如果你已经填完上面的问卷,请把下面的英文部份删除,再提交 Issue。

VictoriaRaymond commented 6 years ago

v4和v6同时监听的话,部分系统会只显示v6的状态。另外vmess不会监听UDP。如果连不上的话,请检查防火墙设置。