vernesong / OpenClash

A Clash Client For OpenWrt
MIT License
15.96k stars 2.96k forks source link

启用UDP流量转发时,无法进行UDP连接 #1129

Closed LarkinZero closed 3 years ago

LarkinZero commented 3 years ago
OpenClash 调试日志

生成时间: 2020-12-30 23:29:45
插件版本: v0.41.13-beta
隐私提示: 上传此日志前请注意检查、屏蔽公网IP、节点、密码等相关敏感信息

===================== 系统信息 =====================

主机型号: OEM Default string 固件版本: Openwrt Koolshare mod V2.36 r14941-67f6fa0a30 LuCI版本: git-20.074.84698-ead5e81 内核版本: 5.4.52 处理器架构: x86_64

此项在使用Tun模式时应为ACCEPT

防火墙转发: ACCEPT

此项有值时建议到网络-接口-lan的设置中禁用IPV6的DHCP

IPV6-DHCP: hybrid

此项结果应仅有配置文件的DNS监听地址

Dnsmasq转发设置: 127.0.0.1#7874

===================== 依赖检查 =====================

dnsmasq-full: 已安装 coreutils: 已安装 coreutils-nohup: 已安装 bash: 已安装 curl: 已安装 jsonfilter: 已安装 ca-certificates: 已安装 ipset: 已安装 ip-full: 已安装 iptables-mod-tproxy: 已安装 kmod-ipt-tproxy: 已安装 iptables-mod-extra: 已安装 kmod-ipt-extra: 已安装 libcap: 已安装 libcap-bin: 已安装 ruby: 已安装 ruby-yaml: 已安装 ruby-psych: 已安装 ruby-pstore: 已安装 ruby-dbm: 已安装 kmod-tun(TUN模式): 已安装 luci-compat(Luci-19.07): 已安装

===================== 内核检查 =====================

运行状态: 运行中 进程pid: 2978 运行权限: 2978: cap_dac_override,cap_net_bind_service,cap_net_admin,cap_net_raw,cap_sys_resource=i 运行用户: nobody 已选择的架构: linux-amd64

下方无法显示内核版本号时请确认您的内核版本是否正确或者有无权限

Tun内核版本: 2020.12.24.gb05bba1 Tun内核文件: 存在 Tun内核运行权限: 正常

Game内核版本: Game内核文件: 不存在 Game内核运行权限: 否

Dev内核版本: v1.3.5-2-g02d029d Dev内核文件: 存在 Dev内核运行权限: 正常

===================== 插件设置 =====================

当前配置文件: /etc/openclash/config/config_new.yaml 启动配置文件: /etc/openclash/config_new.yaml 运行模式: redir-host 默认代理模式: rule UDP流量转发(tproxy): 启用 DNS劫持: 启用 自定义DNS: 启用 IPV6-DNS解析: 停用 禁用Dnsmasq缓存: 启用 自定义规则: 停用 仅允许内网: 停用 仅代理命中规则流量: 停用 仅允许常用端口流量: 停用 绕过中国大陆IP: 启用

启动异常时建议关闭此项后重试

混合节点: 停用 保留配置: 停用

启动异常时建议关闭此项后重试

第三方规则: 停用

===================== 配置文件 =====================

port: 7890 socks-port: 7891 redir-port: 7892 interface-name: pppoe-wan allow-lan: true bind-address: "*" ipv6: false mode: rule log-level: silent external-controller: 0.0.0.0:9090 external-ui: "/usr/share/openclash/dashboard" tun: {} hosts: dns: use-hosts: true enable: true ipv6: false enhanced-mode: redir-host listen: 127.0.0.1:7874 nameserver:

===================== 防火墙设置 =====================

NAT chain

Generated by iptables-save v1.8.4 on Wed Dec 30 23:29:46 2020

*nat :PREROUTING ACCEPT [36:2804] :INPUT ACCEPT [19:1508] :OUTPUT ACCEPT [34:2426] :POSTROUTING ACCEPT [9:775] :MINIUPNPD - [0:0] :MINIUPNPD-POSTROUTING - [0:0] :openclash - [0:0] :openclash_output - [0:0] :postrouting_IPTV51_rule - [0:0] :postrouting_IPTV85_rule - [0:0] :postrouting_lan_rule - [0:0] :postrouting_rule - [0:0] :postrouting_wan_rule - [0:0] :prerouting_IPTV51_rule - [0:0] :prerouting_IPTV85_rule - [0:0] :prerouting_lan_rule - [0:0] :prerouting_rule - [0:0] :prerouting_wan_rule - [0:0] :zone_IPTV51_postrouting - [0:0] :zone_IPTV51_prerouting - [0:0] :zone_IPTV85_postrouting - [0:0] :zone_IPTV85_prerouting - [0:0] :zone_lan_postrouting - [0:0] :zone_lan_prerouting - [0:0] :zone_wan_postrouting - [0:0] :zone_wan_prerouting - [0:0] -A PREROUTING -d 8.8.4.4/32 -p tcp -m tcp --dport 53 -j REDIRECT --to-ports 7892 -A PREROUTING -d 8.8.8.8/32 -p tcp -m tcp --dport 53 -j REDIRECT --to-ports 7892 -A PREROUTING -d 8.8.4.4/32 -p tcp -m tcp --dport 53 -j REDIRECT --to-ports 7892 -A PREROUTING -d 8.8.8.8/32 -p tcp -m tcp --dport 53 -j REDIRECT --to-ports 7892 -A PREROUTING -m comment --comment "!fw3: Custom prerouting rule chain" -j prerouting_rule -A PREROUTING -i br-lan -m comment --comment "!fw3" -j zone_lan_prerouting -A PREROUTING -i eth0 -m comment --comment "!fw3" -j zone_wan_prerouting -A PREROUTING -i pppoe-wan -m comment --comment "!fw3" -j zone_wan_prerouting -A PREROUTING -p udp -m udp --dport 53 -j REDIRECT --to-ports 53 -A PREROUTING -p tcp -m tcp --dport 53 -j REDIRECT --to-ports 53 -A PREROUTING -p tcp -j openclash -A PREROUTING -p tcp -j openclash -A OUTPUT -j openclash_output -A OUTPUT -j openclash_output -A POSTROUTING -m comment --comment "!fw3: Custom postrouting rule chain" -j postrouting_rule -A POSTROUTING -o br-lan -m comment --comment "!fw3" -j zone_lan_postrouting -A POSTROUTING -o eth0 -m comment --comment "!fw3" -j zone_wan_postrouting -A POSTROUTING -o pppoe-wan -m comment --comment "!fw3" -j zone_wan_postrouting -A openclash -m set --match-set localnetwork dst -j RETURN -A openclash -m set --match-set lan_ac_black_ips src -j RETURN -A openclash -p tcp -j REDIRECT --to-ports 7892 -A openclash_output -p tcp -m tcp --sport 51414 -j RETURN -A openclash_output -p tcp -m tcp --sport 3377 -j RETURN -A openclash_output -p tcp -m tcp --sport 19132 -j RETURN -A openclash_output -p tcp -m tcp --sport 3366 -j RETURN -A openclash_output -p tcp -m tcp --sport 51413 -j RETURN -A openclash_output -p tcp -m tcp --sport 1096 -j RETURN -A openclash_output -p tcp -m tcp --sport 8060 -j RETURN -A openclash_output -p tcp -m tcp --sport 7000 -j RETURN -A openclash_output -p tcp -m tcp --sport 6000 -j RETURN -A openclash_output -p tcp -m tcp --sport 4411 -j RETURN -A openclash_output -p tcp -m tcp --sport 5001 -j RETURN -A openclash_output -m set --match-set localnetwork dst -j RETURN -A openclash_output -m owner ! --uid-owner 65534 -m set ! --match-set common_ports dst -j RETURN -A openclash_output -p tcp -m owner ! --uid-owner 65534 -j REDIRECT --to-ports 7892 -A zone_IPTV51_postrouting -m comment --comment "!fw3: Custom IPTV51 postrouting rule chain" -j postrouting_IPTV51_rule -A zone_IPTV51_prerouting -m comment --comment "!fw3: Custom IPTV51 prerouting rule chain" -j prerouting_IPTV51_rule -A zone_IPTV85_postrouting -m comment --comment "!fw3: Custom IPTV85 postrouting rule chain" -j postrouting_IPTV85_rule -A zone_IPTV85_prerouting -m comment --comment "!fw3: Custom IPTV85 prerouting rule chain" -j prerouting_IPTV85_rule -A zone_lan_postrouting -m comment --comment "!fw3: Custom lan postrouting rule chain" -j postrouting_lan_rule -A zone_lan_postrouting -s 10.0.0.0/24 -d 10.0.0.10/32 -p tcp -m tcp --dport 4411 -m comment --comment "!fw3: SS (reflection)" -j SNAT --to-source 10.0.0.1 -A zone_lan_postrouting -s 10.0.0.0/24 -d 10.0.0.10/32 -p udp -m udp --dport 4411 -m comment --comment "!fw3: SS (reflection)" -j SNAT --to-source 10.0.0.1 -A zone_lan_postrouting -s 10.0.0.0/24 -d 10.0.0.200/32 -p tcp -m tcp --dport 22 -m comment --comment "!fw3: SSH (reflection)" -j SNAT --to-source 10.0.0.1 -A zone_lan_postrouting -s 10.0.0.0/24 -d 10.0.0.200/32 -p udp -m udp --dport 22 -m comment --comment "!fw3: SSH (reflection)" -j SNAT --to-source 10.0.0.1 -A zone_lan_postrouting -s 10.0.0.0/24 -d 10.0.0.99/32 -p tcp -m tcp --dport 51413 -m comment --comment "!fw3: Transmission (reflection)" -j SNAT --to-source 10.0.0.1 -A zone_lan_postrouting -s 10.0.0.0/24 -d 10.0.0.99/32 -p udp -m udp --dport 51413 -m comment --comment "!fw3: Transmission (reflection)" -j SNAT --to-source 10.0.0.1 -A zone_lan_postrouting -s 10.0.0.0/24 -d 10.0.0.112/32 -p tcp -m tcp --dport 3389 -m comment --comment "!fw3: rdp (reflection)" -j SNAT --to-source 10.0.0.1 -A zone_lan_postrouting -s 10.0.0.0/24 -d 10.0.0.112/32 -p udp -m udp --dport 3389 -m comment --comment "!fw3: rdp (reflection)" -j SNAT --to-source 10.0.0.1 -A zone_lan_postrouting -s 10.0.0.0/24 -d 10.0.0.200/32 -p tcp -m tcp --dport 19132 -m comment --comment "!fw3: MC (reflection)" -j SNAT --to-source 10.0.0.1 -A zone_lan_postrouting -s 10.0.0.0/24 -d 10.0.0.200/32 -p udp -m udp --dport 19132 -m comment --comment "!fw3: MC (reflection)" -j SNAT --to-source 10.0.0.1 -A zone_lan_postrouting -s 10.0.0.0/24 -d 10.0.0.198/32 -p tcp -m tcp --dport 3389 -m comment --comment "!fw3: rpd2 (reflection)" -j SNAT --to-source 10.0.0.1 -A zone_lan_postrouting -s 10.0.0.0/24 -d 10.0.0.198/32 -p udp -m udp --dport 3389 -m comment --comment "!fw3: rpd2 (reflection)" -j SNAT --to-source 10.0.0.1 -A zone_lan_postrouting -s 10.0.0.0/24 -d 10.0.0.11/32 -p tcp -m tcp --dport 51414 -m comment --comment "!fw3: 51414 (reflection)" -j SNAT --to-source 10.0.0.1 -A zone_lan_postrouting -s 10.0.0.0/24 -d 10.0.0.11/32 -p udp -m udp --dport 51414 -m comment --comment "!fw3: 51414 (reflection)" -j SNAT --to-source 10.0.0.1 -A zone_lan_prerouting -m comment --comment "!fw3: Custom lan prerouting rule chain" -j prerouting_lan_rule -A zone_lan_prerouting -s 10.0.0.0/24 -d 101.83.185.253/32 -p tcp -m tcp --dport 4411 -m comment --comment "!fw3: SS (reflection)" -j DNAT --to-destination 10.0.0.10:4411 -A zone_lan_prerouting -s 10.0.0.0/24 -d 101.83.185.253/32 -p udp -m udp --dport 4411 -m comment --comment "!fw3: SS (reflection)" -j DNAT --to-destination 10.0.0.10:4411 -A zone_lan_prerouting -s 10.0.0.0/24 -d 192.168.1.100/32 -p tcp -m tcp --dport 4411 -m comment --comment "!fw3: SS (reflection)" -j DNAT --to-destination 10.0.0.10:4411 -A zone_lan_prerouting -s 10.0.0.0/24 -d 192.168.1.100/32 -p udp -m udp --dport 4411 -m comment --comment "!fw3: SS (reflection)" -j DNAT --to-destination 10.0.0.10:4411 -A zone_lan_prerouting -s 10.0.0.0/24 -d 101.83.185.253/32 -p tcp -m tcp --dport 1096 -m comment --comment "!fw3: SSH (reflection)" -j DNAT --to-destination 10.0.0.200:22 -A zone_lan_prerouting -s 10.0.0.0/24 -d 101.83.185.253/32 -p udp -m udp --dport 1096 -m comment --comment "!fw3: SSH (reflection)" -j DNAT --to-destination 10.0.0.200:22 -A zone_lan_prerouting -s 10.0.0.0/24 -d 192.168.1.100/32 -p tcp -m tcp --dport 1096 -m comment --comment "!fw3: SSH (reflection)" -j DNAT --to-destination 10.0.0.200:22 -A zone_lan_prerouting -s 10.0.0.0/24 -d 192.168.1.100/32 -p udp -m udp --dport 1096 -m comment --comment "!fw3: SSH (reflection)" -j DNAT --to-destination 10.0.0.200:22 -A zone_lan_prerouting -s 10.0.0.0/24 -d 101.83.185.253/32 -p tcp -m tcp --dport 51413 -m comment --comment "!fw3: Transmission (reflection)" -j DNAT --to-destination 10.0.0.99:51413 -A zone_lan_prerouting -s 10.0.0.0/24 -d 101.83.185.253/32 -p udp -m udp --dport 51413 -m comment --comment "!fw3: Transmission (reflection)" -j DNAT --to-destination 10.0.0.99:51413 -A zone_lan_prerouting -s 10.0.0.0/24 -d 192.168.1.100/32 -p tcp -m tcp --dport 51413 -m comment --comment "!fw3: Transmission (reflection)" -j DNAT --to-destination 10.0.0.99:51413 -A zone_lan_prerouting -s 10.0.0.0/24 -d 192.168.1.100/32 -p udp -m udp --dport 51413 -m comment --comment "!fw3: Transmission (reflection)" -j DNAT --to-destination 10.0.0.99:51413 -A zone_lan_prerouting -s 10.0.0.0/24 -d 101.83.185.253/32 -p tcp -m tcp --dport 3366 -m comment --comment "!fw3: rdp (reflection)" -j DNAT --to-destination 10.0.0.112:3389 -A zone_lan_prerouting -s 10.0.0.0/24 -d 101.83.185.253/32 -p udp -m udp --dport 3366 -m comment --comment "!fw3: rdp (reflection)" -j DNAT --to-destination 10.0.0.112:3389 -A zone_lan_prerouting -s 10.0.0.0/24 -d 192.168.1.100/32 -p tcp -m tcp --dport 3366 -m comment --comment "!fw3: rdp (reflection)" -j DNAT --to-destination 10.0.0.112:3389 -A zone_lan_prerouting -s 10.0.0.0/24 -d 192.168.1.100/32 -p udp -m udp --dport 3366 -m comment --comment "!fw3: rdp (reflection)" -j DNAT --to-destination 10.0.0.112:3389 -A zone_lan_prerouting -s 10.0.0.0/24 -d 101.83.185.253/32 -p tcp -m tcp --dport 19132 -m comment --comment "!fw3: MC (reflection)" -j DNAT --to-destination 10.0.0.200:19132 -A zone_lan_prerouting -s 10.0.0.0/24 -d 101.83.185.253/32 -p udp -m udp --dport 19132 -m comment --comment "!fw3: MC (reflection)" -j DNAT --to-destination 10.0.0.200:19132 -A zone_lan_prerouting -s 10.0.0.0/24 -d 192.168.1.100/32 -p tcp -m tcp --dport 19132 -m comment --comment "!fw3: MC (reflection)" -j DNAT --to-destination 10.0.0.200:19132 -A zone_lan_prerouting -s 10.0.0.0/24 -d 192.168.1.100/32 -p udp -m udp --dport 19132 -m comment --comment "!fw3: MC (reflection)" -j DNAT --to-destination 10.0.0.200:19132 -A zone_lan_prerouting -s 10.0.0.0/24 -d 101.83.185.253/32 -p tcp -m tcp --dport 3377 -m comment --comment "!fw3: rpd2 (reflection)" -j DNAT --to-destination 10.0.0.198:3389 -A zone_lan_prerouting -s 10.0.0.0/24 -d 101.83.185.253/32 -p udp -m udp --dport 3377 -m comment --comment "!fw3: rpd2 (reflection)" -j DNAT --to-destination 10.0.0.198:3389 -A zone_lan_prerouting -s 10.0.0.0/24 -d 192.168.1.100/32 -p tcp -m tcp --dport 3377 -m comment --comment "!fw3: rpd2 (reflection)" -j DNAT --to-destination 10.0.0.198:3389 -A zone_lan_prerouting -s 10.0.0.0/24 -d 192.168.1.100/32 -p udp -m udp --dport 3377 -m comment --comment "!fw3: rpd2 (reflection)" -j DNAT --to-destination 10.0.0.198:3389 -A zone_lan_prerouting -s 10.0.0.0/24 -d 101.83.185.253/32 -p tcp -m tcp --dport 51414 -m comment --comment "!fw3: 51414 (reflection)" -j DNAT --to-destination 10.0.0.11:51414 -A zone_lan_prerouting -s 10.0.0.0/24 -d 101.83.185.253/32 -p udp -m udp --dport 51414 -m comment --comment "!fw3: 51414 (reflection)" -j DNAT --to-destination 10.0.0.11:51414 -A zone_lan_prerouting -s 10.0.0.0/24 -d 192.168.1.100/32 -p tcp -m tcp --dport 51414 -m comment --comment "!fw3: 51414 (reflection)" -j DNAT --to-destination 10.0.0.11:51414 -A zone_lan_prerouting -s 10.0.0.0/24 -d 192.168.1.100/32 -p udp -m udp --dport 51414 -m comment --comment "!fw3: 51414 (reflection)" -j DNAT --to-destination 10.0.0.11:51414 -A zone_wan_postrouting -m comment --comment "!fw3: Custom wan postrouting rule chain" -j postrouting_wan_rule -A zone_wan_postrouting -j MINIUPNPD-POSTROUTING -A zone_wan_postrouting -j MINIUPNPD-POSTROUTING -A zone_wan_postrouting -m comment --comment "!fw3" -j FULLCONENAT -A zone_wan_prerouting -m comment --comment "!fw3: Custom wan prerouting rule chain" -j prerouting_wan_rule -A zone_wan_prerouting -p tcp -m tcp --dport 4411 -m comment --comment "!fw3: SS" -j DNAT --to-destination 10.0.0.10:4411 -A zone_wan_prerouting -p udp -m udp --dport 4411 -m comment --comment "!fw3: SS" -j DNAT --to-destination 10.0.0.10:4411 -A zone_wan_prerouting -p tcp -m tcp --dport 1096 -m comment --comment "!fw3: SSH" -j DNAT --to-destination 10.0.0.200:22 -A zone_wan_prerouting -p udp -m udp --dport 1096 -m comment --comment "!fw3: SSH" -j DNAT --to-destination 10.0.0.200:22 -A zone_wan_prerouting -p tcp -m tcp --dport 51413 -m comment --comment "!fw3: Transmission" -j DNAT --to-destination 10.0.0.99:51413 -A zone_wan_prerouting -p udp -m udp --dport 51413 -m comment --comment "!fw3: Transmission" -j DNAT --to-destination 10.0.0.99:51413 -A zone_wan_prerouting -p tcp -m tcp --dport 3366 -m comment --comment "!fw3: rdp" -j DNAT --to-destination 10.0.0.112:3389 -A zone_wan_prerouting -p udp -m udp --dport 3366 -m comment --comment "!fw3: rdp" -j DNAT --to-destination 10.0.0.112:3389 -A zone_wan_prerouting -p tcp -m tcp --dport 19132 -m comment --comment "!fw3: MC" -j DNAT --to-destination 10.0.0.200:19132 -A zone_wan_prerouting -p udp -m udp --dport 19132 -m comment --comment "!fw3: MC" -j DNAT --to-destination 10.0.0.200:19132 -A zone_wan_prerouting -p tcp -m tcp --dport 3377 -m comment --comment "!fw3: rpd2" -j DNAT --to-destination 10.0.0.198:3389 -A zone_wan_prerouting -p udp -m udp --dport 3377 -m comment --comment "!fw3: rpd2" -j DNAT --to-destination 10.0.0.198:3389 -A zone_wan_prerouting -p tcp -m tcp --dport 51414 -m comment --comment "!fw3: 51414" -j DNAT --to-destination 10.0.0.11:51414 -A zone_wan_prerouting -p udp -m udp --dport 51414 -m comment --comment "!fw3: 51414" -j DNAT --to-destination 10.0.0.11:51414 -A zone_wan_prerouting -m comment --comment "!fw3" -j FULLCONENAT -A zone_wan_prerouting -j MINIUPNPD -A zone_wan_prerouting -j MINIUPNPD COMMIT

Completed on Wed Dec 30 23:29:46 2020

Mangle chain

Generated by iptables-save v1.8.4 on Wed Dec 30 23:29:46 2020

*mangle :PREROUTING ACCEPT [53785:31814220] :INPUT ACCEPT [39523:30546894] :FORWARD ACCEPT [13930:1237265] :OUTPUT ACCEPT [36121:30746780] :POSTROUTING ACCEPT [49849:31975240] :openclash - [0:0] -A PREROUTING -p udp -j openclash -A PREROUTING -p udp -j openclash -A FORWARD -o eth0 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu -A FORWARD -o pppoe-wan -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu -A openclash -p udp -m udp --dport 500 -j RETURN -A openclash -p udp -m udp --dport 546 -j RETURN -A openclash -p udp -m udp --dport 68 -j RETURN -A openclash -p udp -m udp --dport 51414 -j RETURN -A openclash -p udp -m udp --dport 3377 -j RETURN -A openclash -p udp -m udp --dport 19132 -j RETURN -A openclash -p udp -m udp --dport 3366 -j RETURN -A openclash -p udp -m udp --dport 51413 -j RETURN -A openclash -p udp -m udp --dport 1096 -j RETURN -A openclash -p udp -m udp --dport 8060 -j RETURN -A openclash -p udp -m udp --dport 7000 -j RETURN -A openclash -p udp -m udp --dport 6000 -j RETURN -A openclash -p udp -m udp --dport 4411 -j RETURN -A openclash -p udp -m udp --dport 5001 -j RETURN -A openclash -m set --match-set localnetwork dst -j RETURN -A openclash -m set --match-set lan_ac_black_ips src -j RETURN -A openclash -p udp -m udp --dport 53 -j RETURN -A openclash -p udp -j TPROXY --on-port 7892 --on-ip 0.0.0.0 --tproxy-mark 0x162/0xffffffff COMMIT

Completed on Wed Dec 30 23:29:46 2020

===================== IPSET状态 =====================

Name: lan_ac_black_ips Name: localnetwork Name: common_ports

===================== 路由表状态 =====================

route -n

Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 0.0.0.0 114.95.108.1 0.0.0.0 UG 0 0 0 pppoe-wan 10.0.0.0 0.0.0.0 255.255.255.0 U 0 0 0 br-lan 114.95.108.1 0.0.0.0 255.255.255.255 UH 0 0 0 pppoe-wan 192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0

ip route list

default via 114.95.108.1 dev pppoe-wan proto static 10.0.0.0/24 dev br-lan proto kernel scope link src 10.0.0.1 114.95.108.1 dev pppoe-wan proto kernel scope link src 101.83.185.253 192.168.1.0/24 dev eth0 proto kernel scope link src 192.168.1.100

ip rule show

0: from all lookup local 32764: from all fwmark 0x162 lookup 354 32765: from all fwmark 0x162 lookup 354 32766: from all lookup main 32767: from all lookup default

===================== 端口占用状态 =====================

tcp 0 0 :::9090 ::: LISTEN 2978/clash tcp 0 0 :::7890 ::: LISTEN 2978/clash tcp 0 0 :::7891 ::: LISTEN 2978/clash tcp 0 0 :::7892 ::: LISTEN 2978/clash tcp 0 0 :::7893 ::: LISTEN 2978/clash udp 0 0 127.0.0.1:7874 0.0.0.0: 2978/clash udp 0 0 :::7891 ::: 2978/clash udp 0 0 :::7893 ::: 2978/clash

===================== 测试本机DNS查询 =====================

Name: www.baidu.com Address 1: 180.101.49.11

===================== resolv.conf.d =====================

Interface lan

nameserver 114.114.114.114

Interface wan

nameserver 223.5.5.5

Interface wan_6

===================== 测试本机网络连接 =====================

HTTP/1.1 200 OK Accept-Ranges: bytes Cache-Control: private, no-cache, no-store, proxy-revalidate, no-transform Connection: keep-alive Content-Length: 277 Content-Type: text/html Date: Wed, 30 Dec 2020 15:29:46 GMT Etag: "575e1f60-115" Last-Modified: Mon, 13 Jun 2016 02:50:08 GMT Pragma: no-cache Server: bfe/1.0.8.18

===================== 测试本机网络下载 =====================

HTTP/1.1 200 OK Connection: keep-alive Content-Length: 80 Cache-Control: max-age=300 Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox Content-Type: text/plain; charset=utf-8 ETag: "549bddd7cb641fe9050935528320d001fc602448ba2771cc93f376d0c25a91c9" Strict-Transport-Security: max-age=31536000 X-Content-Type-Options: nosniff X-Frame-Options: deny X-XSS-Protection: 1; mode=block Via: 1.1 varnish (Varnish/6.0), 1.1 varnish X-GitHub-Request-Id: 29E2:1779:D00BE5:EF65E6:5FEC85DB Accept-Ranges: bytes Date: Wed, 30 Dec 2020 15:29:47 GMT X-Served-By: cache-hkg17925-HKG X-Cache: HIT, HIT X-Cache-Hits: 1, 1 X-Timer: S1609342187.266486,VS0,VE1 Vary: Authorization,Accept-Encoding Access-Control-Allow-Origin: * X-Fastly-Request-ID: a639a14c565eab18c54ea276c76552b43e9b2653 Expires: Wed, 30 Dec 2020 15:34:47 GMT Source-Age: 257

===================== 最近运行日志 =====================

2020-12-30 23:16:22 Warning: OpenClash Now Disabled, Need Start From Luci Page, Exit... time="2020-12-30T23:19:28+08:00" level=info msg="Start initial compatible provider Domestic" time="2020-12-30T23:19:28+08:00" level=info msg="Start initial compatible provider Download" time="2020-12-30T23:19:28+08:00" level=info msg="Start initial compatible provider Apple Services" time="2020-12-30T23:19:28+08:00" level=info msg="Start initial compatible provider Stream Services" time="2020-12-30T23:19:28+08:00" level=info msg="Start initial compatible provider Nexitally" time="2020-12-30T23:19:28+08:00" level=info msg="Start initial compatible provider PROXY" time="2020-12-30T23:19:28+08:00" level=info msg="DNS server listening at: 127.0.0.1:7874" 2020-12-30 23:19:40 History:【config_new.yaml】 Restore Faild 2020-12-30 23:19:23 Warning: OpenClash Start Successful, Please Note That Network May Abnormal With IPV6's DHCP Server 2020-12-30 23:19:40 History:【config_new.yaml】 Update Successful 2020-12-30 23:20:40 History:【config_new.yaml】 Update Successful 2020-12-30 23:21:29 Reload OpenClash Firewall Rules time="2020-12-30T23:21:34+08:00" level=info msg="Start initial compatible provider Download" time="2020-12-30T23:21:34+08:00" level=info msg="Start initial compatible provider Nexitally" time="2020-12-30T23:21:34+08:00" level=info msg="Start initial compatible provider PROXY" time="2020-12-30T23:21:34+08:00" level=info msg="Start initial compatible provider Domestic" time="2020-12-30T23:21:34+08:00" level=info msg="Start initial compatible provider Stream Services" time="2020-12-30T23:21:34+08:00" level=info msg="Start initial compatible provider Apple Services" time="2020-12-30T23:21:34+08:00" level=info msg="DNS server listening at: 127.0.0.1:7874" 2020-12-30 23:21:46 History:【config_new.yaml】 Restore Successful 2020-12-30 23:21:28 Warning: OpenClash Start Successful, Please Note That Network May Abnormal With IPV6's DHCP Server 2020-12-30 23:23:27 Reload OpenClash Firewall Rules 2020-12-30 23:23:28 History:【config_new.yaml】 Update Faild 2020-12-30 23:23:29 Reload OpenClash Firewall Rules time="2020-12-30T23:23:34+08:00" level=info msg="Start initial compatible provider Stream Services" time="2020-12-30T23:23:34+08:00" level=info msg="Start initial compatible provider Nexitally" time="2020-12-30T23:23:34+08:00" level=info msg="Start initial compatible provider PROXY" time="2020-12-30T23:23:34+08:00" level=info msg="Start initial compatible provider Domestic" time="2020-12-30T23:23:34+08:00" level=info msg="Start initial compatible provider Download" time="2020-12-30T23:23:34+08:00" level=info msg="Start initial compatible provider Apple Services" 2020-12-30 23:23:38 History:【config_new.yaml】 Restore Successful 2020-12-30 23:23:28 Warning: OpenClash Start Successful, Please Note That Network May Abnormal With IPV6's DHCP Server 2020-12-30 23:23:40 Watchdog: Reset Firewall For Enabling Redirect. 2020-12-30 23:24:40 Watchdog: Reset Firewall For Enabling Redirect. 2020-12-30 23:25:41 Watchdog: Reset Firewall For Enabling Redirect. 2020-12-30 23:26:41 Watchdog: Reset Firewall For Enabling Redirect. 2020-12-30 23:27:41 Watchdog: Reset Firewall For Enabling Redirect. 2020-12-30 23:28:41 Watchdog: Reset Firewall For Enabling Redirect. 2020-12-30 23:29:41 Watchdog: Reset Firewall For Enabling Redirect.

vernesong commented 3 years ago

koolshare固件libcap无法正常赋权,建议降级40.7或者用openwrt