Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
0.0.0.0 192.168.1.1 0.0.0.0 UG 0 0 0 eth3
0.0.0.0 123.118.0.1 0.0.0.0 UG 40 0 0 pppoe-wan
123.118.0.1 0.0.0.0 255.255.255.255 UH 0 0 0 pppoe-wan
172.17.0.0 0.0.0.0 255.255.0.0 U 0 0 0 docker0
192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0 eth3
192.168.5.0 0.0.0.0 255.255.255.0 U 0 0 0 br-lan
198.18.0.0 0.0.0.0 255.255.0.0 U 0 0 0 utun
ip route list
default via 192.168.1.1 dev eth3 proto static src 192.168.1.3
default via 123.118.0.1 dev pppoe-wan proto static metric 40
123.118.0.1 dev pppoe-wan proto kernel scope link src 123.118..
172.17.0.0/16 dev docker0 proto kernel scope link src 172.17.0.1 linkdown
192.168.1.0/24 dev eth3 proto kernel scope link src 192.168.1.3
192.168.5.0/24 dev br-lan proto kernel scope link src 192.168.5.1
198.18.0.0/16 dev utun proto kernel scope link src 198.18.0.1
ip rule show
0: from all lookup local
1000: from all fwmark 0x162 lookup 354
1001: from all iif pppoe-wan lookup 1
1002: from all iif pppoe-vwan1 [detached] lookup 2
2001: from all fwmark 0x100/0x3f00 lookup 1
2002: from all fwmark 0x200/0x3f00 lookup 2
2061: from all fwmark 0x3d00/0x3f00 blackhole
2062: from all fwmark 0x3e00/0x3f00 unreachable
32766: from all lookup main
32767: from all lookup default
x86 tun模式无法联网 兼容模式正常 请帮忙看看
OpenClash 调试日志
生成时间: 2021-11-19 18:41:15 插件版本: v0.43.09-beta 隐私提示: 上传此日志前请注意检查、屏蔽公网IP、节点、密码等相关敏感信息
===================== 系统信息 =====================
主机型号: Intel(R) Atom(TM) CPU E3845 @ 1.91GHz : 4 Core 4 Thread 固件版本: OpenWrt GDQ v9-1[2021] LuCI版本: git-21.238.35254-83494a9-1 内核版本: 5.4.132 处理器架构: x86_64
此项有值时,如不使用IPv6,建议到网络-接口-lan的设置中禁用IPV6的DHCP
IPV6-DHCP:
此项结果应仅有配置文件的DNS监听地址
Dnsmasq转发设置: 127.0.0.1#7874
===================== 依赖检查 =====================
dnsmasq-full: 已安装 coreutils: 已安装 coreutils-nohup: 已安装 bash: 已安装 curl: 已安装 ca-certificates: 已安装 ipset: 已安装 ip-full: 已安装 iptables-mod-tproxy: 已安装 kmod-ipt-tproxy: 已安装 iptables-mod-extra: 已安装 kmod-ipt-extra: 已安装 libcap: 已安装 libcap-bin: 已安装 ruby: 已安装 ruby-yaml: 已安装 ruby-psych: 已安装 ruby-pstore: 已安装 ruby-dbm: 已安装 kmod-tun(TUN模式): 已安装 luci-compat(Luci-19.07): 已安装
===================== 内核检查 =====================
运行状态: 运行中 进程pid: 10745 8734 运行权限: 10745: =ep 8734: cap_dac_override,cap_net_bind_service,cap_net_admin,cap_net_raw,cap_sys_resource=eip 运行用户: nobody 已选择的架构: 未选择架构
下方无法显示内核版本号时请确认您的内核版本是否正确或者有无权限
Tun内核版本: 2021.09.15 Tun内核文件: 存在 Tun内核运行权限: 正常
Game内核版本: 20210310-122-g48a4641 Game内核文件: 存在 Game内核运行权限: 正常
Dev内核版本: v1.7.1-24-gebbc960 Dev内核文件: 存在 Dev内核运行权限: 正常
===================== 插件设置 =====================
当前配置文件: /etc/openclash/config/aaaa.yaml 启动配置文件: /etc/openclash/aaaa.yaml 运行模式: redir-host-tun 默认代理模式: rule UDP流量转发(tproxy): 停用 DNS劫持: 启用 自定义DNS: 停用 IPV6代理: 停用 IPV6-DNS解析: 停用 禁用Dnsmasq缓存: 停用 自定义规则: 停用 仅允许内网: 停用 仅代理命中规则流量: 启用 仅允许常用端口流量: 启用 绕过中国大陆IP: 停用
启动异常时建议关闭此项后重试
混合节点: 停用 保留配置: 停用
启动异常时建议关闭此项后重试
第三方规则: 启用
===================== 配置文件 =====================
port: 7890 socks-port: 7891 allow-lan: true mode: rule log-level: debug external-controller: 0.0.0.0:9090 proxy-groups:
name: Auto - UrlTest type: url-test url: http://cp.cloudflare.com/generate_204 interval: 1800 proxies:
tcp://8.8.4.4:53 profile: store-selected: true store-fakeip: true rule-providers: Reject: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Reject.yaml path: "./rule_provider/Reject" interval: 86400 Special: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Special.yaml path: "./rule_provider/Special" interval: 86400 Netflix: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/Netflix.yaml path: "./rule_provider/Netflix" interval: 86400 Spotify: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/Spotify.yaml path: "./rule_provider/Spotify" interval: 86400 YouTube: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/YouTube.yaml path: "./rule_provider/YouTube" interval: 86400 Bilibili: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/Bilibili.yaml path: "./rule_provider/Bilibili" interval: 86400 iQiyi: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/iQiyi.yaml path: "./rule_provider/iQiyi" interval: 86400 Letv: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/Letv.yaml path: "./rule_provider/Letv" interval: 86400 Netease Music: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/Netease%20Music.yaml path: "./rule_provider/Netease_Music" interval: 86400 Tencent Video: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/Tencent%20Video.yaml path: "./rule_provider/Tencent_Video" interval: 86400 Youku: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/Youku.yaml path: "./rule_provider/Youku" interval: 86400 WeTV: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/WeTV.yaml path: "./rule_provider/WeTV" interval: 86400 ABC: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/ABC.yaml path: "./rule_provider/ABC" interval: 86400 Abema TV: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/Abema%20TV.yaml path: "./rule_provider/Abema_TV" interval: 86400 Amazon: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/Amazon.yaml path: "./rule_provider/Amazon" interval: 86400 Apple News: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/Apple%20News.yaml path: "./rule_provider/Apple_News" interval: 86400 Apple TV: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/Apple%20TV.yaml path: "./rule_provider/Apple_TV" interval: 86400 Bahamut: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/Bahamut.yaml path: "./rule_provider/Bahamut" interval: 86400 BBC iPlayer: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/BBC%20iPlayer.yaml path: "./rule_provider/BBC_iPlayer" interval: 86400 DAZN: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/DAZN.yaml path: "./rule_provider/DAZN" interval: 86400 Discovery Plus: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/Discovery%20Plus.yaml path: "./rule_provider/Discovery_Plus" interval: 86400 Disney Plus: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/Disney%20Plus.yaml path: "./rule_provider/Disney_Plus" interval: 86400 encoreTVB: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/encoreTVB.yaml path: "./rule_provider/encoreTVB" interval: 86400 Fox Now: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/Fox%20Now.yaml path: "./rule_provider/Fox_Now" interval: 86400 Fox+: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/Fox%2B.yaml path: "./rule_provider/Fox+" interval: 86400 HBO: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/HBO.yaml path: "./rule_provider/HBO" interval: 86400 Hulu Japan: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/Hulu%20Japan.yaml path: "./rule_provider/Hulu_Japan" interval: 86400 Hulu: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/Hulu.yaml path: "./rule_provider/Hulu" interval: 86400 Japonx: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/Japonx.yaml path: "./rule_provider/Japonx" interval: 86400 JOOX: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/JOOX.yaml path: "./rule_provider/JOOX" interval: 86400 KKBOX: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/KKBOX.yaml path: "./rule_provider/KKBOX" interval: 86400 KKTV: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/KKTV.yaml path: "./rule_provider/KKTV" interval: 86400 Line TV: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/Line%20TV.yaml path: "./rule_provider/Line_TV" interval: 86400 myTV SUPER: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/myTV%20SUPER.yaml path: "./rule_provider/myTV_SUPER" interval: 86400 Pandora: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/Pandora.yaml path: "./rule_provider/Pandora" interval: 86400 PBS: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/PBS.yaml path: "./rule_provider/PBS" interval: 86400 Pornhub: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/Pornhub.yaml path: "./rule_provider/Pornhub" interval: 86400 Soundcloud: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/Soundcloud.yaml path: "./rule_provider/Soundcloud" interval: 86400 ViuTV: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Media/ViuTV.yaml path: "./rule_provider/ViuTV" interval: 86400 Telegram: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Telegram.yaml path: "./rule_provider/Telegram" interval: 86400 Steam: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Steam.yaml path: "./rule_provider/Steam" interval: 86400 Speedtest: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Speedtest.yaml path: "./rule_provider/Speedtest" interval: 86400 PayPal: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/PayPal.yaml path: "./rule_provider/PayPal" interval: 86400 Microsoft: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Microsoft.yaml path: "./rule_provider/Microsoft" interval: 86400 PROXY: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Proxy.yaml path: "./rule_provider/Proxy" interval: 86400 Domestic: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Domestic.yaml path: "./rule_provider/Domestic" interval: 86400 Apple: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Apple.yaml path: "./rule_provider/Apple" interval: 86400 Scholar: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Scholar.yaml path: "./rule_provider/Scholar" interval: 86400 Domestic IPs: type: http behavior: ipcidr url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/Domestic%20IPs.yaml path: "./rule_provider/Domestic_IPs" interval: 86400 LAN: type: http behavior: classical url: https://cdn.jsdelivr.net/gh/lhie1/Rules@master/Clash/Provider/LAN.yaml path: "./rule_provider/LAN" interval: 86400 script: code: | def main(ctx, metadata): ruleset_action = {"Reject": "REJECT", "Special": "DIRECT", "Netflix": "Proxies", "Spotify": "Proxies", "YouTube": "Proxies", "Disney Plus": "Proxies", "Bilibili": "Domestic", "iQiyi": "Domestic", "Letv": "Domestic", "Netease Music": "Domestic", "Tencent Video": "Domestic", "Youku": "Domestic", "WeTV": "Domestic", "ABC": "Proxies", "Abema TV": "Proxies", "Amazon": "Proxies", "Apple News": "Proxies", "Apple TV": "Proxies", "Bahamut": "Proxies", "BBC iPlayer": "Proxies", "DAZN": "Proxies", "Discovery Plus": "Proxies", "encoreTVB": "Proxies", "Fox Now": "Proxies", "Fox+": "Proxies", "HBO": "Proxies", "Hulu Japan": "Proxies", "Hulu": "Proxies", "Japonx": "Proxies", "JOOX": "Proxies", "KKBOX": "Proxies", "KKTV": "Proxies", "Line TV": "Proxies", "myTV SUPER": "Proxies", "Pandora": "Proxies", "PBS": "Proxies", "Pornhub": "Proxies", "Soundcloud": "Proxies", "ViuTV": "Proxies", "Telegram": "Proxies", "Steam": "Proxies", "Speedtest": "Proxies", "PayPal": "Proxies", "Microsoft": "Domestic", "PROXY": "Auto - UrlTest", "Apple": "Domestic", "Scholar": "Proxies", "Domestic": "DIRECT", "Domestic IPs": "DIRECT", "LAN": "DIRECT" }
port = int(metadata["dst_port"])
if metadata["network"] == "UDP": if port == 443: ctx.log('[Script] matched QUIC traffic use reject') return "REJECT"
port_list = [21, 22, 23, 53, 80, 123, 143, 194, 443, 465, 587, 853, 993, 995, 998, 2052, 2053, 2082, 2083, 2086, 2095, 2096, 5222, 5228, 5229, 5230, 8080, 8443, 8880, 8888, 8889] if port not in port_list: ctx.log('[Script] not common port use direct') return "DIRECT"
if metadata["dst_ip"] == "": metadata["dst_ip"] = ctx.resolve_ip(metadata["host"])
for ruleset in ruleset_action: if ctx.rule_providers[ruleset].match(metadata): return ruleset_action[ruleset]
if metadata["dst_ip"] == "": return "DIRECT"
code = ctx.geoip(metadata["dst_ip"]) if code == "CN": ctx.log('[Script] Geoip CN') return "DIRECT"
ctx.log('[Script] FINAL') return "Proxies" rules:
===================== 防火墙设置 =====================
IPv4 NAT chain
Generated by iptables-save v1.8.7 on Fri Nov 19 18:41:18 2021
nat :PREROUTING ACCEPT [451:27615] :INPUT ACCEPT [58:3669] :OUTPUT ACCEPT [80:4982] :POSTROUTING ACCEPT [472:22548] :MINIUPNPD - [0:0] :MINIUPNPD-POSTROUTING - [0:0] :postrouting_VPN_rule - [0:0] :postrouting_docker_rule - [0:0] :postrouting_iptv_rule - [0:0] :postrouting_lan_rule - [0:0] :postrouting_rule - [0:0] :postrouting_vpn_rule - [0:0] :postrouting_wan_rule - [0:0] :prerouting_VPN_rule - [0:0] :prerouting_docker_rule - [0:0] :prerouting_iptv_rule - [0:0] :prerouting_lan_rule - [0:0] :prerouting_rule - [0:0] :prerouting_vpn_rule - [0:0] :prerouting_wan_rule - [0:0] :zone_VPN_postrouting - [0:0] :zone_VPN_prerouting - [0:0] :zone_docker_postrouting - [0:0] :zone_docker_prerouting - [0:0] :zone_iptv_postrouting - [0:0] :zone_iptv_prerouting - [0:0] :zone_lan_postrouting - [0:0] :zone_lan_prerouting - [0:0] :zone_vpn_postrouting - [0:0] :zone_vpn_prerouting - [0:0] :zone_wan_postrouting - [0:0] :zone_wan_prerouting - [0:0] -A PREROUTING -p tcp -m comment --comment "OpenClash TCP DNS Hijack" -m tcp --dport 53 -j ACCEPT -A PREROUTING -p tcp -m tcp --dport 53 -m comment --comment "DNS Hijack" -j REDIRECT --to-ports 53 -A PREROUTING -p udp -m udp --dport 53 -m comment --comment "DNS Hijack" -j REDIRECT --to-ports 53 -A PREROUTING -p tcp -m tcp --dport 53 -j ACCEPT -A PREROUTING -p udp -m udp --dport 53 -j REDIRECT --to-ports 53 -A PREROUTING -m comment --comment "!fw3: Custom prerouting rule chain" -j prerouting_rule -A PREROUTING -i br-lan -m comment --comment "!fw3" -j zone_lan_prerouting -A PREROUTING -i pppoe-wan -m comment --comment "!fw3" -j zone_wan_prerouting -A PREROUTING -i eth1 -m comment --comment "!fw3" -j zone_wan_prerouting -A PREROUTING -i ipsec0 -m comment --comment "!fw3" -j zone_VPN_prerouting -A PREROUTING -i tun0 -m comment --comment "!fw3" -j zone_vpn_prerouting -A PREROUTING -i docker0 -m comment --comment "!fw3" -j zone_docker_prerouting -A PREROUTING -i eth3 -m comment --comment "!fw3" -j zone_iptv_prerouting -A POSTROUTING -m comment --comment "!fw3: Custom postrouting rule chain" -j postrouting_rule -A POSTROUTING -o br-lan -m comment --comment "!fw3" -j zone_lan_postrouting -A POSTROUTING -o pppoe-wan -m comment --comment "!fw3" -j zone_wan_postrouting -A POSTROUTING -o eth1 -m comment --comment "!fw3" -j zone_wan_postrouting -A POSTROUTING -o ipsec0 -m comment --comment "!fw3" -j zone_VPN_postrouting -A POSTROUTING -o tun0 -m comment --comment "!fw3" -j zone_vpn_postrouting -A POSTROUTING -o docker0 -m comment --comment "!fw3" -j zone_docker_postrouting -A POSTROUTING -o eth3 -m comment --comment "!fw3" -j zone_iptv_postrouting -A MINIUPNPD -p tcp -m tcp --dport 13931 -j DNAT --to-destination 192.168.5.219:1080 -A MINIUPNPD -p udp -m udp --dport 13931 -j DNAT --to-destination 192.168.5.219:3027 -A MINIUPNPD-POSTROUTING -s 192.168.5.219/32 -p tcp -m tcp --sport 1080 -j MASQUERADE --to-ports 13931 -A MINIUPNPD-POSTROUTING -s 192.168.5.219/32 -p udp -m udp --sport 3027 -j MASQUERADE --to-ports 13931 -A zone_VPN_postrouting -m comment --comment "!fw3: Custom VPN postrouting rule chain" -j postrouting_VPN_rule -A zone_VPN_prerouting -m comment --comment "!fw3: Custom VPN prerouting rule chain" -j prerouting_VPN_rule -A zone_docker_postrouting -m comment --comment "!fw3: Custom docker postrouting rule chain" -j postrouting_docker_rule -A zone_docker_prerouting -m comment --comment "!fw3: Custom docker prerouting rule chain" -j prerouting_docker_rule -A zone_iptv_postrouting -j MINIUPNPD-POSTROUTING -A zone_iptv_postrouting -m comment --comment "!fw3: Custom iptv postrouting rule chain" -j postrouting_iptv_rule -A zone_iptv_prerouting -j MINIUPNPD -A zone_iptv_prerouting -m comment --comment "!fw3: Custom iptv prerouting rule chain" -j prerouting_iptv_rule -A zone_lan_postrouting -m comment --comment "!fw3: Custom lan postrouting rule chain" -j postrouting_lan_rule -A zone_lan_postrouting -s 192.168.5.0/24 -d 192.168.5.1/32 -p tcp -m tcp --dport 7681 -m comment --comment "!fw3: Forward7681 (reflection)" -j SNAT --to-source 192.168.5.1 -A zone_lan_postrouting -s 192.168.5.0/24 -d 192.168.5.1/32 -p udp -m udp --dport 7681 -m comment --comment "!fw3: Forward7681 (reflection)" -j SNAT --to-source 192.168.5.1 -A zone_lan_prerouting -m comment --comment "!fw3: Custom lan prerouting rule chain" -j prerouting_lan_rule -A zone_lan_prerouting -s 192.168.5.0/24 -d 123.118../32 -p tcp -m tcp --dport 7681 -m comment --comment "!fw3: Forward7681 (reflection)" -j DNAT --to-destination 192.168.5.1:7681 -A zone_lan_prerouting -s 192.168.5.0/24 -d 123.118..*/32 -p udp -m udp --dport 7681 -m comment --comment "!fw3: Forward7681 (reflection)" -j DNAT --to-destination 192.168.5.1:7681 -A zone_vpn_postrouting -m comment --comment "!fw3: Custom vpn postrouting rule chain" -j postrouting_vpn_rule -A zone_vpn_postrouting -m comment --comment "!fw3" -j FULLCONENAT -A zone_vpn_prerouting -m comment --comment "!fw3: Custom vpn prerouting rule chain" -j prerouting_vpn_rule -A zone_vpn_prerouting -m comment --comment "!fw3" -j FULLCONENAT -A zone_wan_postrouting -j MINIUPNPD-POSTROUTING -A zone_wan_postrouting -m comment --comment "!fw3: Custom wan postrouting rule chain" -j postrouting_wan_rule -A zone_wan_postrouting -m comment --comment "!fw3" -j FULLCONENAT -A zone_wan_prerouting -j MINIUPNPD -A zone_wan_prerouting -m comment --comment "!fw3: Custom wan prerouting rule chain" -j prerouting_wan_rule -A zone_wan_prerouting -p tcp -m tcp --dport 7681 -m comment --comment "!fw3: Forward7681" -j DNAT --to-destination 192.168.5.1:7681 -A zone_wan_prerouting -p udp -m udp --dport 7681 -m comment --comment "!fw3: Forward7681" -j DNAT --to-destination 192.168.5.1:7681 -A zone_wan_prerouting -m comment --comment "!fw3" -j FULLCONENAT COMMIT
Completed on Fri Nov 19 18:41:18 2021
IPv4 Mangle chain
Generated by iptables-save v1.8.7 on Fri Nov 19 18:41:18 2021
*mangle :PREROUTING ACCEPT [1442:111481] :INPUT ACCEPT [885:78347] :FORWARD ACCEPT [552:32754] :OUTPUT ACCEPT [1020:277011] :POSTROUTING ACCEPT [1578:311211] :RRDIPT_FORWARD - [0:0] :RRDIPT_INPUT - [0:0] :RRDIPT_OUTPUT - [0:0] :mwan3_connected - [0:0] :mwan3_hook - [0:0] :mwan3_iface_in_vwan1 - [0:0] :mwan3_iface_in_wan - [0:0] :mwan3_ifaces_in - [0:0] :mwan3_policy_balanced - [0:0] :mwan3_rule_https - [0:0] :mwan3_rules - [0:0] :openclash - [0:0] :openclash_dns_hijack - [0:0] :openclash_output - [0:0] -A PREROUTING -j openclash -A PREROUTING -j mwan3_hook -A INPUT -j RRDIPT_INPUT -A FORWARD -j RRDIPT_FORWARD -A FORWARD -o pppoe-wan -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu -A FORWARD -i pppoe-wan -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu -A FORWARD -o eth1 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu -A FORWARD -i eth1 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu -A OUTPUT -j openclash_output -A OUTPUT -j RRDIPT_OUTPUT -A OUTPUT -j mwan3_hook -A RRDIPT_FORWARD -s 192.168.5.101/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.5.101/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.5.200/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.5.200/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.5.112/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.5.112/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.5.121/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.5.121/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.5.113/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.5.113/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.5.202/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.5.202/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.5.106/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.5.106/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.5.220/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.5.220/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.5.205/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.5.205/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.5.142/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.5.142/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.1.1/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.1.1/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.5.215/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.5.215/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.5.208/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.5.208/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.5.137/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.5.137/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.5.161/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.5.161/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.5.162/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.5.162/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.5.173/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.5.173/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.5.167/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.5.167/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.2.244/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.2.244/32 -j RETURN -A RRDIPT_INPUT -i eth0 -j RETURN -A RRDIPT_INPUT -i pppoe-wan -j RETURN -A RRDIPT_OUTPUT -o eth0 -j RETURN -A RRDIPT_OUTPUT -o pppoe-wan -j RETURN -A mwan3_connected -m set --match-set mwan3_connected dst -j MARK --set-xmark 0x3f00/0x3f00 -A mwan3_hook -j CONNMARK --restore-mark --nfmask 0x3f00 --ctmask 0x3f00 -A mwan3_hook -m mark --mark 0x0/0x3f00 -j mwan3_ifaces_in -A mwan3_hook -m mark --mark 0x0/0x3f00 -j mwan3_connected -A mwan3_hook -m mark --mark 0x0/0x3f00 -j mwan3_rules -A mwan3_hook -j CONNMARK --save-mark --nfmask 0x3f00 --ctmask 0x3f00 -A mwan3_hook -m mark ! --mark 0x3f00/0x3f00 -j mwan3_connected -A mwan3_iface_in_vwan1 -i pppoe-vwan1 -m set --match-set mwan3_connected src -m mark --mark 0x0/0x3f00 -m comment --comment default -j MARK --set-xmark 0x3f00/0x3f00 -A mwan3_iface_in_vwan1 -i pppoe-vwan1 -m mark --mark 0x0/0x3f00 -m comment --comment vwan1 -j MARK --set-xmark 0x200/0x3f00 -A mwan3_iface_in_wan -i pppoe-wan -m set --match-set mwan3_connected src -m mark --mark 0x0/0x3f00 -m comment --comment default -j MARK --set-xmark 0x3f00/0x3f00 -A mwan3_iface_in_wan -i pppoe-wan -m mark --mark 0x0/0x3f00 -m comment --comment wan -j MARK --set-xmark 0x100/0x3f00 -A mwan3_ifaces_in -m mark --mark 0x0/0x3f00 -j mwan3_iface_in_vwan1 -A mwan3_ifaces_in -m mark --mark 0x0/0x3f00 -j mwan3_iface_in_wan -A mwan3_policy_balanced -m mark --mark 0x0/0x3f00 -m comment --comment "wan 1 1" -j MARK --set-xmark 0x100/0x3f00 -A mwan3_rule_https -m mark --mark 0x0/0x3f00 -j MARK --set-xmark 0x100/0x3f00 -A mwan3_rule_https -m mark --mark 0x100/0x3f00 -m set ! --match-set mwan3_sticky_https src,src -j MARK --set-xmark 0x0/0x3f00 -A mwan3_rule_https -m mark --mark 0x0/0x3f00 -j mwan3_policy_balanced -A mwan3_rule_https -m mark ! --mark 0xfc00/0xfc00 -j SET --del-set mwan3_sticky_https src,src -A mwan3_rule_https -m mark ! --mark 0xfc00/0xfc00 -j SET --add-set mwan3_sticky_https src,src -A mwan3_rules -p tcp -m multiport --dports 443 -m mark --mark 0x0/0x3f00 -j mwan3_rule_https -A mwan3_rules -m mark --mark 0x0/0x3f00 -j mwan3_policy_balanced -A openclash -p udp -m udp --sport 1024 -j RETURN -A openclash -p tcp -m tcp --sport 1024 -j RETURN -A openclash -p udp -m udp --sport 9090 -j RETURN -A openclash -p tcp -m tcp --sport 9090 -j RETURN -A openclash -p tcp -m tcp --sport 1723 -j RETURN -A openclash -p tcp -m tcp --sport 1688 -j RETURN -A openclash -p udp -m udp --sport 1194 -j RETURN -A openclash -p tcp -m tcp --sport 1194 -j RETURN -A openclash -p udp -m udp --sport 4500 -j RETURN -A openclash -p udp -m udp --sport 500 -j RETURN -A openclash -p tcp -m tcp --sport 8897 -j RETURN -A openclash -p udp -m udp --sport 500 -j RETURN -A openclash -p udp -m udp --sport 68 -j RETURN -A openclash -p tcp -m tcp --sport 8081 -j RETURN -A openclash -p tcp -m tcp --sport 4022 -j RETURN -A openclash -p udp -m udp --sport 888 -j RETURN -A openclash -p tcp -m tcp --sport 888 -j RETURN -A openclash -s 192.168.5.1/32 -p udp -m udp --sport 7681 -j RETURN -A openclash -s 192.168.5.1/32 -p tcp -m tcp --sport 7681 -j RETURN -A openclash -p udp -m udp --dport 7681 -j RETURN -A openclash -p tcp -m tcp --dport 7681 -j RETURN -A openclash -m set --match-set localnetwork dst -j RETURN -A openclash -m set ! --match-set common_ports dst -j RETURN -A openclash -j MARK --set-xmark 0x162/0xffffffff -A openclash_output -p udp -m udp --sport 1024 -j RETURN -A openclash_output -p tcp -m tcp --sport 1024 -j RETURN -A openclash_output -p udp -m udp --sport 9090 -j RETURN -A openclash_output -p tcp -m tcp --sport 9090 -j RETURN -A openclash_output -p tcp -m tcp --sport 1723 -j RETURN -A openclash_output -p tcp -m tcp --sport 1688 -j RETURN -A openclash_output -p udp -m udp --sport 1194 -j RETURN -A openclash_output -p tcp -m tcp --sport 1194 -j RETURN -A openclash_output -p udp -m udp --sport 4500 -j RETURN -A openclash_output -p udp -m udp --sport 500 -j RETURN -A openclash_output -p tcp -m tcp --sport 8897 -j RETURN -A openclash_output -p udp -m udp --sport 500 -j RETURN -A openclash_output -p udp -m udp --sport 68 -j RETURN -A openclash_output -p tcp -m tcp --sport 8081 -j RETURN -A openclash_output -p tcp -m tcp --sport 4022 -j RETURN -A openclash_output -p udp -m udp --sport 888 -j RETURN -A openclash_output -p tcp -m tcp --sport 888 -j RETURN -A openclash_output -p udp -m udp --sport 7681 -j RETURN -A openclash_output -p tcp -m tcp --sport 7681 -j RETURN -A openclash_output -m set --match-set localnetwork dst -j RETURN -A openclash_output -m owner ! --uid-owner 65534 -m set ! --match-set common_ports dst -j RETURN -A openclash_output -p tcp -m owner ! --uid-owner 65534 -j MARK --set-xmark 0x162/0xffffffff COMMIT
Completed on Fri Nov 19 18:41:18 2021
IPv6 NAT chain
Generated by ip6tables-save v1.8.7 on Fri Nov 19 18:41:18 2021
*nat :PREROUTING ACCEPT [5568:730440] :INPUT ACCEPT [22012:1955219] :OUTPUT ACCEPT [52200:4459525] :POSTROUTING ACCEPT [55600:4805721] -A PREROUTING -p udp -m udp --dport 53 -j REDIRECT --to-ports 53 -A PREROUTING -p tcp -m tcp --dport 53 -j REDIRECT --to-ports 53 COMMIT
Completed on Fri Nov 19 18:41:18 2021
IPv6 Mangle chain
Generated by ip6tables-save v1.8.7 on Fri Nov 19 18:41:18 2021
*mangle :PREROUTING ACCEPT [23866:2997162] :INPUT ACCEPT [21044:2786381] :FORWARD ACCEPT [66:5348] :OUTPUT ACCEPT [17931:2220612] :POSTROUTING ACCEPT [20117:2379476] :mwan3_connected - [0:0] :mwan3_hook - [0:0] :mwan3_ifaces_in - [0:0] :mwan3_policy_balanced - [0:0] :mwan3_rule_https - [0:0] :mwan3_rules - [0:0] -A PREROUTING -j mwan3_hook -A FORWARD -o pppoe-wan -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu -A FORWARD -i pppoe-wan -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu -A FORWARD -o eth1 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu -A FORWARD -i eth1 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu -A OUTPUT -j mwan3_hook -A mwan3_connected -m set --match-set mwan3_connected dst -j MARK --set-xmark 0x3f00/0x3f00 -A mwan3_hook -p ipv6-icmp -m icmp6 --icmpv6-type 133 -j RETURN -A mwan3_hook -p ipv6-icmp -m icmp6 --icmpv6-type 134 -j RETURN -A mwan3_hook -p ipv6-icmp -m icmp6 --icmpv6-type 135 -j RETURN -A mwan3_hook -p ipv6-icmp -m icmp6 --icmpv6-type 136 -j RETURN -A mwan3_hook -p ipv6-icmp -m icmp6 --icmpv6-type 137 -j RETURN -A mwan3_hook -p ipv6-icmp -m set --match-set mwan3_source_v6 src -m icmp6 --icmpv6-type 128 -j RETURN -A mwan3_hook -j CONNMARK --restore-mark --nfmask 0x3f00 --ctmask 0x3f00 -A mwan3_hook -m mark --mark 0x0/0x3f00 -j mwan3_ifaces_in -A mwan3_hook -m mark --mark 0x0/0x3f00 -j mwan3_connected -A mwan3_hook -m mark --mark 0x0/0x3f00 -j mwan3_rules -A mwan3_hook -j CONNMARK --save-mark --nfmask 0x3f00 --ctmask 0x3f00 -A mwan3_hook -m mark ! --mark 0x3f00/0x3f00 -j mwan3_connected -A mwan3_policy_balanced -m mark --mark 0x0/0x3f00 -m comment --comment default -j MARK --set-xmark 0x3f00/0x3f00 -A mwan3_rule_https -m mark --mark 0x0/0x3f00 -j mwan3_policy_balanced -A mwan3_rule_https -m mark ! --mark 0xfc00/0xfc00 -j SET --del-set mwan3_sticky_https src,src -A mwan3_rule_https -m mark ! --mark 0xfc00/0xfc00 -j SET --add-set mwan3_sticky_https src,src -A mwan3_rules -p tcp -m multiport --dports 443 -m mark --mark 0x0/0x3f00 -j mwan3_rule_https -A mwan3_rules -m mark --mark 0x0/0x3f00 -j mwan3_policy_balanced COMMIT
Completed on Fri Nov 19 18:41:18 2021
===================== IPSET状态 =====================
Name: cn Name: ct Name: cnc Name: cmcc Name: crtc Name: cernet Name: gwbn Name: othernet Name: music Name: mwan3_connected_v4 Name: mwan3_connected_v6 Name: mwan3_source_v6 Name: mwan3_dynamic_v4 Name: mwan3_dynamic_v6 Name: mwan3_custom_v4 Name: mwan3_custom_v6 Name: china_ip_route Name: localnetwork Name: china Name: common_ports Name: mwan3_sticky_v4_https Name: mwan3_sticky_v6_https Name: mwan3_connected Name: mwan3_sticky_https
===================== 路由表状态 =====================
route -n
Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 0.0.0.0 192.168.1.1 0.0.0.0 UG 0 0 0 eth3 0.0.0.0 123.118.0.1 0.0.0.0 UG 40 0 0 pppoe-wan 123.118.0.1 0.0.0.0 255.255.255.255 UH 0 0 0 pppoe-wan 172.17.0.0 0.0.0.0 255.255.0.0 U 0 0 0 docker0 192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0 eth3 192.168.5.0 0.0.0.0 255.255.255.0 U 0 0 0 br-lan 198.18.0.0 0.0.0.0 255.255.0.0 U 0 0 0 utun
ip route list
default via 192.168.1.1 dev eth3 proto static src 192.168.1.3 default via 123.118.0.1 dev pppoe-wan proto static metric 40 123.118.0.1 dev pppoe-wan proto kernel scope link src 123.118.. 172.17.0.0/16 dev docker0 proto kernel scope link src 172.17.0.1 linkdown 192.168.1.0/24 dev eth3 proto kernel scope link src 192.168.1.3 192.168.5.0/24 dev br-lan proto kernel scope link src 192.168.5.1 198.18.0.0/16 dev utun proto kernel scope link src 198.18.0.1
ip rule show
0: from all lookup local 1000: from all fwmark 0x162 lookup 354 1001: from all iif pppoe-wan lookup 1 1002: from all iif pppoe-vwan1 [detached] lookup 2 2001: from all fwmark 0x100/0x3f00 lookup 1 2002: from all fwmark 0x200/0x3f00 lookup 2 2061: from all fwmark 0x3d00/0x3f00 blackhole 2062: from all fwmark 0x3e00/0x3f00 unreachable 32766: from all lookup main 32767: from all lookup default
===================== Tun设备状态 =====================
utun: tun
===================== 端口占用状态 =====================
tcp 0 0 198.18.0.1:7777 0.0.0.0: LISTEN 8734/clash tcp 0 0 :::9090 ::: LISTEN 8734/clash tcp 0 0 :::7890 ::: LISTEN 8734/clash tcp 0 0 :::7891 ::: LISTEN 8734/clash tcp 0 0 :::7892 ::: LISTEN 8734/clash tcp 0 0 :::7893 ::: LISTEN 8734/clash tcp 0 0 :::7895 ::: LISTEN 8734/clash udp 0 0 198.18.0.1:7777 0.0.0.0: 8734/clash udp 0 0 127.0.0.1:7874 0.0.0.0: 8734/clash udp 0 0 :::7891 ::: 8734/clash udp 0 0 :::7892 ::: 8734/clash udp 0 0 :::7893 ::: 8734/clash udp 0 0 :::7895 :::* 8734/clash
===================== 测试本机DNS查询 =====================
Server: 127.0.0.1 Address: 127.0.0.1#53
Non-authoritative answer: www.baidu.com canonical name = www.a.shifen.com. Name: www.a.shifen.com Address: 110.242.68.4 Name: www.a.shifen.com Address: 110.242.68.3
===================== resolv.conf.d =====================
Interface iptv
nameserver 192.168.1.1 search Home
Interface wan_6
nameserver 2408:8000:1010:1::8 nameserver 2408:8000:1010:2::8
Interface wan
nameserver 202.106.46.151
===================== 测试本机网络连接 =====================
===================== 测试本机网络下载 =====================
===================== 最近运行日志 =====================
time="2021-11-19T18:40:54+08:00" level=info msg="Start initial rule provider ABC" time="2021-11-19T18:40:54+08:00" level=info msg="Start initial rule provider encoreTVB" time="2021-11-19T18:40:54+08:00" level=info msg="Start initial rule provider Hulu" time="2021-11-19T18:40:54+08:00" level=info msg="Start initial rule provider PROXY" time="2021-11-19T18:40:54+08:00" level=info msg="Start initial rule provider Apple News" time="2021-11-19T18:40:54+08:00" level=info msg="Start initial rule provider BBC iPlayer" time="2021-11-19T18:40:54+08:00" level=info msg="Start initial rule provider Line TV" time="2021-11-19T18:40:54+08:00" level=info msg="Start initial rule provider Special" time="2021-11-19T18:40:54+08:00" level=info msg="Start initial rule provider Spotify" time="2021-11-19T18:40:54+08:00" level=info msg="Start initial rule provider Japonx" time="2021-11-19T18:40:54+08:00" level=info msg="Start initial rule provider Microsoft" time="2021-11-19T18:40:54+08:00" level=info msg="Start initial rule provider Domestic IPs" time="2021-11-19T18:40:54+08:00" level=info msg="Start initial rule provider iQiyi" time="2021-11-19T18:40:54+08:00" level=info msg="Start initial rule provider Pornhub" time="2021-11-19T18:40:54+08:00" level=info msg="Start initial rule provider Discovery Plus" time="2021-11-19T18:40:54+08:00" level=info msg="Start initial rule provider Youku" time="2021-11-19T18:40:54+08:00" level=info msg="Start initial rule provider Scholar" time="2021-11-19T18:40:54+08:00" level=info msg="Start initial rule provider Pandora" time="2021-11-19T18:40:54+08:00" level=info msg="Start initial rule provider Tencent Video" time="2021-11-19T18:40:54+08:00" level=info msg="Start initial rule provider DAZN" time="2021-11-19T18:40:54+08:00" level=info msg="Start initial rule provider Letv" time="2021-11-19T18:40:54+08:00" level=info msg="Start initial rule provider WeTV" time="2021-11-19T18:40:54+08:00" level=info msg="Start initial rule provider JOOX" time="2021-11-19T18:40:54+08:00" level=info msg="Start initial rule provider Netflix" time="2021-11-19T18:40:54+08:00" level=info msg="Start initial rule provider myTV SUPER" time="2021-11-19T18:40:54+08:00" level=info msg="Start initial rule provider Hulu Japan" time="2021-11-19T18:40:54+08:00" level=info msg="Start initial rule provider KKBOX" time="2021-11-19T18:40:54+08:00" level=info msg="Start initial rule provider Reject" time="2021-11-19T18:40:54+08:00" level=info msg="Start initial rule provider Apple" time="2021-11-19T18:40:54+08:00" level=info msg="Start initial rule provider YouTube" time="2021-11-19T18:40:54+08:00" level=info msg="Start initial rule provider Steam" time="2021-11-19T18:40:54+08:00" level=info msg="Start initial rule provider Apple TV" time="2021-11-19T18:40:54+08:00" level=info msg="Start initial rule provider Speedtest" time="2021-11-19T18:40:54+08:00" level=info msg="Start initial rule provider Soundcloud" time="2021-11-19T18:40:54+08:00" level=info msg="Start initial rule provider Fox Now" time="2021-11-19T18:40:54+08:00" level=info msg="Start initial rule provider LAN" time="2021-11-19T18:40:54+08:00" level=info msg="DNS server listening at: 127.0.0.1:7874" time="2021-11-19T18:40:54+08:00" level=info msg="HTTP proxy listening at: [::]:7890" time="2021-11-19T18:40:54+08:00" level=info msg="SOCKS proxy listening at: [::]:7891" time="2021-11-19T18:40:54+08:00" level=info msg="Redirect proxy listening at: [::]:7892" time="2021-11-19T18:40:54+08:00" level=info msg="TProxy server listening at: [::]:7895" time="2021-11-19T18:40:54+08:00" level=info msg="Mixed(http+socks) proxy listening at: [::]:7893" time="2021-11-19T18:40:54+08:00" level=info msg="RESTful API listening at: [::]:9090" time="2021-11-19T18:40:54+08:00" level=info msg="Tun Proxy listening at: utun(198.18.0.1)" 2021-11-19 18:40:56 Step 6: Wait For The File Downloading... 2021-11-19 18:40:58 Step 7: Set Control Panel... 2021-11-19 18:40:58 Step 8: Set Firewall Rules... 2021-11-19 18:41:04 Step 9: Restart Dnsmasq... 2021-11-19 18:41:05 Step 10: Add Cron Rules, Start Daemons... 2021-11-19 18:41:05 OpenClash Start Successful!
===================== 活动连接信息 =====================