vernesong / OpenClash

A Clash Client For OpenWrt
MIT License
16.8k stars 3.1k forks source link

网站直连无法连接,关闭openclash后正常 #1625

Closed a76yyyy closed 2 years ago

a76yyyy commented 3 years ago

调试日志:

OpenClash 调试日志

生成时间: 2021-09-12 17:52:23
插件版本: v0.43.05-beta
隐私提示: 上传此日志前请注意检查、屏蔽公网IP、节点、密码等相关敏感信息

#===================== 系统信息 =====================#

主机型号: Raspberry Pi 4 Model B Rev 1.2
固件版本: OpenWrt SNAPSHOT r0-4a06bf6
LuCI版本: git-21.181.13804-f7b5f6d-1
内核版本: 5.4.128
处理器架构: aarch64_cortex-a72

#此项有值时,如不使用IPv6,建议到网络-接口-lan的设置中禁用IPV6的DHCP
IPV6-DHCP: 

#此项结果应仅有配置文件的DNS监听地址
Dnsmasq转发设置: 127.0.0.1#7874

#===================== 依赖检查 =====================#

dnsmasq-full: 已安装
coreutils: 已安装
coreutils-nohup: 已安装
bash: 已安装
curl: 已安装
ca-certificates: 已安装
ipset: 已安装
ip-full: 已安装
iptables-mod-tproxy: 已安装
kmod-ipt-tproxy: 已安装
iptables-mod-extra: 已安装
kmod-ipt-extra: 已安装
libcap: 已安装
libcap-bin: 已安装
ruby: 已安装
ruby-yaml: 已安装
ruby-psych: 已安装
ruby-pstore: 已安装
ruby-dbm: 已安装
kmod-tun(TUN模式): 已安装
luci-compat(Luci-19.07): 已安装

#===================== 内核检查 =====================#

运行状态: 运行中
进程pid: 9149
运行权限: 9149: cap_dac_override,cap_net_bind_service,cap_net_admin,cap_net_raw,cap_sys_resource=eip
运行用户: nobody
已选择的架构: linux-armv8

#下方无法显示内核版本号时请确认您的内核版本是否正确或者有无权限
Tun内核版本: 2021.09.07
Tun内核文件: 存在
Tun内核运行权限: 正常

Game内核版本: 20210310-101-g00184a0
Game内核文件: 存在
Game内核运行权限: 正常

Dev内核版本: v1.7.0-2-g0c79d12
Dev内核文件: 存在
Dev内核运行权限: 正常

#===================== 插件设置 =====================#

当前配置文件: /etc/openclash/config/default.yaml
启动配置文件: /etc/openclash/default.yaml
运行模式: redir-host
默认代理模式: rule
UDP流量转发(tproxy): 启用
DNS劫持: 启用
自定义DNS: 启用
IPV6代理: 启用
IPV6-DNS解析: 启用
禁用Dnsmasq缓存: 启用
自定义规则: 停用
仅允许内网: 停用
仅代理命中规则流量: 启用
仅允许常用端口流量: 启用
绕过中国大陆IP: 停用

#启动异常时建议关闭此项后重试
混合节点: 停用
保留配置: 停用

#启动异常时建议关闭此项后重试
第三方规则: 停用

#===================== 配置文件 =====================#

port: 7890
socks-port: 7891
allow-lan: true
mode: rule
log-level: warning
external-controller: 0.0.0.0:9090
proxy-groups:***省略***

dns:
  nameserver:
  - 192.168.123.1
  - "[fe80::2ad1:27ff:feb9:b7ee]:53"
  - dhcp://"eth0"
  - 127.0.0.1:5553
  fallback:
  - https://cloudflare-dns.com/dns-query
  - https://dns.rubyfish.cn/dns-query
  - https://1.1.1.1/dns-query
  - tls://8.8.8.8:853
  enable: true
  ipv6: true
  enhanced-mode: redir-host
  listen: 0.0.0.0:7874
  default-nameserver:
  - 192.168.123.1
redir-port: 7892
tproxy-port: 7895
mixed-port: 7893
bind-address: "*"
external-ui: "/usr/share/openclash/dashboard"
ipv6: true
profile:
  store-selected: true

#===================== 防火墙设置 =====================#

#IPv4 NAT chain

# Generated by iptables-save v1.8.7 on Sun Sep 12 17:52:27 2021
*nat
:PREROUTING ACCEPT [394:65298]
:INPUT ACCEPT [1168:115291]
:OUTPUT ACCEPT [6667:489726]
:POSTROUTING ACCEPT [6863:506011]
:DOCKER - [0:0]
:MINIUPNPD - [0:0]
:MINIUPNPD-POSTROUTING - [0:0]
:openclash - [0:0]
:openclash_output - [0:0]
:postrouting_docker_rule - [0:0]
:postrouting_lan_rule - [0:0]
:postrouting_rule - [0:0]
:postrouting_vpn_rule - [0:0]
:postrouting_wan_rule - [0:0]
:prerouting_docker_rule - [0:0]
:prerouting_lan_rule - [0:0]
:prerouting_rule - [0:0]
:prerouting_vpn_rule - [0:0]
:prerouting_wan_rule - [0:0]
:zone_docker_postrouting - [0:0]
:zone_docker_prerouting - [0:0]
:zone_lan_postrouting - [0:0]
:zone_lan_prerouting - [0:0]
:zone_vpn_postrouting - [0:0]
:zone_vpn_prerouting - [0:0]
:zone_wan_postrouting - [0:0]
:zone_wan_prerouting - [0:0]
-A PREROUTING -d 8.8.4.4/32 -p tcp -m tcp --dport 53 -j REDIRECT --to-ports 7892
-A PREROUTING -d 8.8.8.8/32 -p tcp -m tcp --dport 53 -j REDIRECT --to-ports 7892
-A PREROUTING -p tcp -m tcp --dport 53 -m comment --comment "DNS Hijack" -j REDIRECT --to-ports 53
-A PREROUTING -p udp -m udp --dport 53 -m comment --comment "DNS Hijack" -j REDIRECT --to-ports 53
-A PREROUTING -p udp -m udp --dport 53 -j REDIRECT --to-ports 53
-A PREROUTING -p tcp -m tcp --dport 53 -j REDIRECT --to-ports 53
-A PREROUTING -m addrtype --dst-type LOCAL -j DOCKER
-A PREROUTING -m comment --comment "!fw3: Custom prerouting rule chain" -j prerouting_rule
-A PREROUTING -i eth0 -m comment --comment "!fw3" -j zone_lan_prerouting
-A PREROUTING -i tun0 -m comment --comment "!fw3" -j zone_vpn_prerouting
-A PREROUTING -i docker0 -m comment --comment "!fw3" -j zone_docker_prerouting
-A PREROUTING -p tcp -j openclash
-A OUTPUT -j openclash_output
-A OUTPUT ! -d 127.0.0.0/8 -m addrtype --dst-type LOCAL -j DOCKER
-A POSTROUTING -s 172.17.0.0/16 ! -o docker0 -j MASQUERADE
-A POSTROUTING -m comment --comment "!fw3: Custom postrouting rule chain" -j postrouting_rule
-A POSTROUTING -o eth0 -m comment --comment "!fw3" -j zone_lan_postrouting
-A POSTROUTING -o tun0 -m comment --comment "!fw3" -j zone_vpn_postrouting
-A POSTROUTING -o docker0 -m comment --comment "!fw3" -j zone_docker_postrouting
-A DOCKER -i docker0 -j RETURN
-A openclash -m set --match-set localnetwork dst -j RETURN
-A openclash -m set ! --match-set common_ports dst -j RETURN
-A openclash -p tcp -j REDIRECT --to-ports 7892
-A openclash_output -p tcp -m tcp --sport 1688 -j RETURN
-A openclash_output -p tcp -m tcp --sport 1194 -j RETURN
-A openclash_output -m set --match-set localnetwork dst -j RETURN
-A openclash_output -m owner ! --uid-owner 65534 -m set ! --match-set common_ports dst -j RETURN
-A openclash_output -p tcp -m owner ! --uid-owner 65534 -j REDIRECT --to-ports 7892
-A zone_docker_postrouting -m comment --comment "!fw3: Custom docker postrouting rule chain" -j postrouting_docker_rule
-A zone_docker_prerouting -m comment --comment "!fw3: Custom docker prerouting rule chain" -j prerouting_docker_rule
-A zone_lan_postrouting -j MINIUPNPD-POSTROUTING
-A zone_lan_postrouting -j MINIUPNPD-POSTROUTING
-A zone_lan_postrouting -m comment --comment "!fw3: Custom lan postrouting rule chain" -j postrouting_lan_rule
-A zone_lan_prerouting -j MINIUPNPD
-A zone_lan_prerouting -j MINIUPNPD
-A zone_lan_prerouting -m comment --comment "!fw3: Custom lan prerouting rule chain" -j prerouting_lan_rule
-A zone_vpn_postrouting -m comment --comment "!fw3: Custom vpn postrouting rule chain" -j postrouting_vpn_rule
-A zone_vpn_postrouting -m comment --comment "!fw3" -j MASQUERADE
-A zone_vpn_prerouting -m comment --comment "!fw3: Custom vpn prerouting rule chain" -j prerouting_vpn_rule
-A zone_wan_postrouting -m comment --comment "!fw3: Custom wan postrouting rule chain" -j postrouting_wan_rule
-A zone_wan_postrouting -m comment --comment "!fw3" -j MASQUERADE
-A zone_wan_prerouting -m comment --comment "!fw3: Custom wan prerouting rule chain" -j prerouting_wan_rule
COMMIT
# Completed on Sun Sep 12 17:52:27 2021

#IPv4 Mangle chain

# Generated by iptables-save v1.8.7 on Sun Sep 12 17:52:27 2021
*mangle
:PREROUTING ACCEPT [271214:236963459]
:INPUT ACCEPT [261347:231428369]
:FORWARD ACCEPT [10216:5563448]
:OUTPUT ACCEPT [119388:233176247]
:POSTROUTING ACCEPT [129598:238739088]
:RRDIPT_FORWARD - [0:0]
:RRDIPT_INPUT - [0:0]
:RRDIPT_OUTPUT - [0:0]
:openclash - [0:0]
-A PREROUTING -p udp -j openclash
-A INPUT -j RRDIPT_INPUT
-A FORWARD -j RRDIPT_FORWARD
-A OUTPUT -j RRDIPT_OUTPUT
-A RRDIPT_FORWARD -s 192.168.123.1/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.123.1/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.123.157/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.123.157/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.123.3/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.123.3/32 -j RETURN
-A RRDIPT_INPUT -i eth0 -j RETURN
-A RRDIPT_OUTPUT -o eth0 -j RETURN
-A openclash -p udp -m udp --dport 1194 -j RETURN
-A openclash -p udp -m udp --dport 500 -j RETURN
-A openclash -p udp -m udp --dport 68 -j RETURN
-A openclash -m set --match-set localnetwork dst -j RETURN
-A openclash -m set ! --match-set common_ports dst -j RETURN
-A openclash -p udp -m udp --dport 53 -j RETURN
-A openclash -p udp -j TPROXY --on-port 7892 --on-ip 0.0.0.0 --tproxy-mark 0x162/0xffffffff
COMMIT
# Completed on Sun Sep 12 17:52:27 2021

#IPv6 NAT chain

# Generated by ip6tables-save v1.8.7 on Sun Sep 12 17:52:27 2021
*nat
:PREROUTING ACCEPT [88:8078]
:INPUT ACCEPT [551:47095]
:OUTPUT ACCEPT [89:7120]
:POSTROUTING ACCEPT [89:7120]
-A PREROUTING -d 2001:4860:4860::8844/128 -p tcp -m tcp --dport 53 -j ACCEPT
-A PREROUTING -d 2001:4860:4860::8888/128 -p tcp -m tcp --dport 53 -j ACCEPT
-A PREROUTING -p tcp -m tcp --dport 53 -m comment --comment "DNS Hijack" -j REDIRECT --to-ports 53
-A PREROUTING -p udp -m udp --dport 53 -m comment --comment "DNS Hijack" -j REDIRECT --to-ports 53
-A PREROUTING -p udp -m udp --dport 53 -j REDIRECT --to-ports 53
-A PREROUTING -p tcp -m tcp --dport 53 -j REDIRECT --to-ports 53
COMMIT
# Completed on Sun Sep 12 17:52:27 2021

#IPv6 Mangle chain

# Generated by ip6tables-save v1.8.7 on Sun Sep 12 17:52:27 2021
*mangle
:PREROUTING ACCEPT [3441:1357173]
:INPUT ACCEPT [5681:1708427]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [4535:1163638]
:POSTROUTING ACCEPT [4555:1165078]
:openclash - [0:0]
:openclash_output - [0:0]
-A PREROUTING -j openclash
-A OUTPUT -j openclash_output
-A openclash -p tcp -m tcp --sport 1688 -j RETURN
-A openclash -p udp -m udp --sport 1194 -j RETURN
-A openclash -p tcp -m tcp --sport 1194 -j RETURN
-A openclash -p udp -m udp --sport 500 -j RETURN
-A openclash -p udp -m udp --sport 546 -j RETURN
-A openclash -m set --match-set localnetwork6 dst -j RETURN
-A openclash -m set ! --match-set common_ports dst -j RETURN
-A openclash -p tcp -m comment --comment OpenClash -j TPROXY --on-port 7895 --on-ip :: --tproxy-mark 0x162/0xffffffff
-A openclash -p udp -m comment --comment OpenClash -j TPROXY --on-port 7895 --on-ip :: --tproxy-mark 0x162/0xffffffff
-A openclash_output -p tcp -m tcp --sport 1688 -j RETURN
-A openclash_output -p udp -m udp --sport 1194 -j RETURN
-A openclash_output -p tcp -m tcp --sport 1194 -j RETURN
-A openclash_output -p udp -m udp --sport 500 -j RETURN
-A openclash_output -p udp -m udp --sport 546 -j RETURN
-A openclash_output -m set --match-set localnetwork6 dst -j RETURN
-A openclash_output -m owner ! --uid-owner 65534 -m set ! --match-set common_ports dst -j RETURN
-A openclash_output -p tcp -m owner ! --uid-owner 65534 -j MARK --set-xmark 0x162/0xffffffff
-A openclash_output -p udp -m owner ! --uid-owner 65534 -j MARK --set-xmark 0x162/0xffffffff
COMMIT
# Completed on Sun Sep 12 17:52:27 2021

#===================== IPSET状态 =====================#

Name: cn
Name: ct
Name: cnc
Name: cmcc
Name: crtc
Name: cernet
Name: gwbn
Name: othernet
Name: music
Name: mwan3_connected_v4
Name: mwan3_connected_v6
Name: mwan3_source_v6
Name: mwan3_dynamic_v4
Name: mwan3_dynamic_v6
Name: mwan3_custom_v4
Name: mwan3_custom_v6
Name: china_ip_route
Name: localnetwork
Name: common_ports
Name: china_ip6_route
Name: localnetwork6
Name: mwan3_connected

#===================== 路由表状态 =====================#

#route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
0.0.0.0         192.168.123.1   0.0.0.0         UG    0      0        0 eth0
172.17.0.0      0.0.0.0         255.255.0.0     U     0      0        0 docker0
192.168.123.0   0.0.0.0         255.255.255.0   U     0      0        0 eth0
#ip route list
default via 192.168.123.1 dev eth0 proto static 
172.17.0.0/16 dev docker0 proto kernel scope link src 172.17.0.1 linkdown 
192.168.123.0/24 dev eth0 proto kernel scope link src 192.168.123.100 
#ip rule show
0:  from all lookup local
32765:  from all fwmark 0x162 lookup 354
32766:  from all lookup main
32767:  from all lookup default

#===================== 端口占用状态 =====================#

tcp        0      0 :::7890                 :::*                    LISTEN      9149/clash
tcp        0      0 :::7891                 :::*                    LISTEN      9149/clash
tcp        0      0 :::7892                 :::*                    LISTEN      9149/clash
tcp        0      0 :::7893                 :::*                    LISTEN      9149/clash
tcp        0      0 :::7895                 :::*                    LISTEN      9149/clash
tcp        0      0 :::9090                 :::*                    LISTEN      9149/clash
udp        0      0 :::42264                :::*                                9149/clash
udp        0      0 :::56847                :::*                                9149/clash
udp        0      0 :::48692                :::*                                9149/clash
udp        0      0 :::46651                :::*                                9149/clash
udp        0      0 :::38553                :::*                                9149/clash
udp        0      0 :::7874                 :::*                                9149/clash
udp        0      0 :::7891                 :::*                                9149/clash
udp        0      0 :::7892                 :::*                                9149/clash
udp        0      0 :::7893                 :::*                                9149/clash
udp        0      0 :::7895                 :::*                                9149/clash
udp        0      0 :::45082                :::*                                9149/clash
udp        0      0 :::45193                :::*                                9149/clash
udp        0      0 :::53447                :::*                                9149/clash
udp        0      0 :::47413                :::*                                9149/clash
udp        0      0 :::51639                :::*                                9149/clash
udp        0      0 :::45640                :::*                                9149/clash
udp        0      0 :::37814                :::*                                9149/clash
udp        0      0 :::56459                :::*                                9149/clash

#===================== 测试本机DNS查询 =====================#

Server:     127.0.0.1
Address:    127.0.0.1:53

www.baidu.com   canonical name = www.a.shifen.com
Name:   www.a.shifen.com
Address: 182.61.200.7
Name:   www.a.shifen.com
Address: 182.61.200.6

www.baidu.com   canonical name = www.a.shifen.com
www.a.shifen.com    canonical name = www.wshifen.com

#===================== resolv.conf.d =====================#

# Interface lan
nameserver 192.168.123.1
# Interface lan6
nameserver fc00:101:101::1
search lan

#===================== 测试本机网络连接 =====================#

HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: private, no-cache, no-store, proxy-revalidate, no-transform
Connection: keep-alive
Content-Length: 277
Content-Type: text/html
Date: Sun, 12 Sep 2021 09:52:30 GMT
Etag: "575e1f60-115"
Last-Modified: Mon, 13 Jun 2016 02:50:08 GMT
Pragma: no-cache
Server: bfe/1.0.8.18

#===================== 测试本机网络下载 =====================#

HTTP/1.1 200 OK
Connection: keep-alive
Content-Length: 80
Cache-Control: max-age=300
Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
Content-Type: text/plain; charset=utf-8
ETag: "8ff790eec875f63046229028d039a0d25cc0992af45d94e93bad646a0c1aaedf"
Strict-Transport-Security: max-age=31536000
X-Content-Type-Options: nosniff
X-Frame-Options: deny
X-XSS-Protection: 1; mode=block
X-GitHub-Request-Id: ECB4:68D6:2EEED0:38FA71:613D95EA
Accept-Ranges: bytes
Date: Sun, 12 Sep 2021 09:52:30 GMT
Via: 1.1 varnish
X-Served-By: cache-hkg17931-HKG
X-Cache: HIT
X-Cache-Hits: 1
X-Timer: S1631440351.525002,VS0,VE0
Vary: Authorization,Accept-Encoding
Access-Control-Allow-Origin: *
X-Fastly-Request-ID: b53c775f15a8d65ce95f09426ed549a60a9d8708
Expires: Sun, 12 Sep 2021 09:57:30 GMT
Source-Age: 74

#===================== 最近运行日志 =====================#

2021-09-12 17:44:28 Step 10: Add Cron Rules, Start Daemons...
2021-09-12 17:44:28 OpenClash Start Successful!
time="2021-09-12T17:45:06+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to rssfinder.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:45:06+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to rssfinder.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:45:48+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to rssfinder.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:45:48+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to rssfinder.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:45:49+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to rssfinder.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:45:49+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to rssfinder.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:45:51+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to rssfinder.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:45:51+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to rssfinder.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:47:19+08:00" level=warning msg="[TCP] dial 🎯 全球直连 (match DomainSuffix/qq.com) to dns.weixin.qq.com:443 error: dial tcp4 109.244.169.60:443: i/o timeout"
time="2021-09-12T17:47:22+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to rssfinder.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:47:23+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to rssfinder.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:47:38+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to rssfinder.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:47:38+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to rssfinder.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:47:44+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to rssfinder.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:47:44+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to rssfinder.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:50:03+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to rssfinder.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:50:03+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to rssfinder.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:50:07+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to rssfinder.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:50:08+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to rssfinder.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:50:10+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to rssfinder.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:50:10+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to rssfinder.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:50:42+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to rssfinder.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:50:42+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to rssfinder.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:50:59+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to rssfinder.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:50:59+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to rssfinder.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:51:00+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to rssfinder.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:51:00+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to rssfinder.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:51:06+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:51:06+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:51:06+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:51:06+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:51:07+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:51:07+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:51:07+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:51:07+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:51:20+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to rssfinder.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:51:20+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to rssfinder.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:51:28+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to rssfinder.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:51:28+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to rssfinder.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:51:29+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to rssfinder.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:51:29+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to rssfinder.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:51:37+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to rssfinder.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:51:37+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to rssfinder.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:51:45+08:00" level=warning msg="[TCP] dial 🎯 全球直连 (match DomainSuffix/qq.com) to dns.weixin.qq.com:443 error: dial tcp4 109.244.169.60:443: i/o timeout"
time="2021-09-12T17:52:02+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to rssfinder.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:52:03+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to rssfinder.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:52:09+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to www.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
time="2021-09-12T17:52:09+08:00" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match DstPort/443) to www.vercel.app:443 error: dial tcp4 76.76.21.21:443: connect: connection refused"
kxdn3 commented 3 years ago

俺也一样

fantasyroot commented 3 years ago

我也 v0.43.05、04 都有问题,上不了网。 客户端 ping ip 是通的,但是 dns 解析不到。 回退到 0.43.01 才正常。

github-actions[bot] commented 2 years ago

This issue is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 5 days