Closed michaelchen644 closed 2 years ago
全局设置 -> 版本更新界面下,tun内核可以更新,下载成功后显示[TUN]当前版本查询失败,core下有clash_tun文件且权限正常。openclash也可以正常调用内核。。。 以下是调试日志!祝大大虎年虎虎生威牛牛比老虎大!
OpenClash 调试日志
生成时间: 2022-02-03 12:25:53 插件版本: v0.44.07-beta 隐私提示: 上传此日志前请注意检查、屏蔽公网IP、节点、密码等相关敏感信息
#===================== 系统信息 =====================# 主机型号: Intel(R) Core(TM) i5-9400T CPU @ 1.80GHz : 6 Core 6 Thread 固件版本: ImmortalWrt 21.02-SNAPSHOT r19086-29c9109246 LuCI版本: git-22.006.19684-abf6f3c 内核版本: 5.4.163 处理器架构: x86_64 #此项有值时,如不使用IPv6,建议到网络-接口-lan的设置中禁用IPV6的DHCP IPV6-DHCP: hybrid #此项结果应仅有配置文件的DNS监听地址 Dnsmasq转发设置: #===================== 依赖检查 =====================# dnsmasq-full: 已安装 coreutils: 已安装 coreutils-nohup: 已安装 bash: 已安装 curl: 已安装 ca-certificates: 已安装 ipset: 已安装 ip-full: 已安装 iptables-mod-tproxy: 已安装 kmod-ipt-tproxy: 已安装 iptables-mod-extra: 已安装 kmod-ipt-extra: 已安装 libcap: 已安装 libcap-bin: 已安装 ruby: 已安装 ruby-yaml: 已安装 ruby-psych: 已安装 ruby-pstore: 已安装 ruby-dbm: 已安装 kmod-tun(TUN模式): 已安装 luci-compat(Luci-19.07): 已安装 #===================== 内核检查 =====================# 运行状态: 运行中 进程pid: 11223 运行权限: 11223: cap_dac_override,cap_net_bind_service,cap_net_admin,cap_net_raw,cap_sys_resource=eip 运行用户: nobody 已选择的架构: linux-amd64 #下方无法显示内核版本号时请确认您的内核版本是否正确或者有无权限 Tun内核版本: Tun内核文件: 存在 Tun内核运行权限: 正常 Dev内核版本: v1.8.0-7-g075d8ed Dev内核文件: 存在 Dev内核运行权限: 正常 #===================== 插件设置 =====================# 当前配置文件: /etc/openclash/config/config.yaml 启动配置文件: /etc/openclash/config.yaml 运行模式: redir-host-mix 默认代理模式: rule UDP流量转发(tproxy): 停用 DNS劫持: 停用 自定义DNS: 启用 IPV6代理: 启用 IPV6-DNS解析: 启用 禁用Dnsmasq缓存: 启用 自定义规则: 启用 仅允许内网: 停用 仅代理命中规则流量: 停用 仅允许常用端口流量: 停用 绕过中国大陆IP: 启用 DNS远程解析: 停用 #启动异常时建议关闭此项后重试 混合节点: 停用 保留配置: 启用 #启动异常时建议关闭此项后重试 第三方规则: 停用 #===================== 自定义规则 一 =====================# script: ## shortcuts: ## quic: network == 'udp' and dst_port == 443 and (geoip(resolve_ip(host)) != 'CN' or geoip(dst_ip) != 'CN') ## time-limit: in_cidr(src_ip,'192.168.1.2/32') and time.now().hour < 20 or time.now().hour > 21 ## time-limit: src_ip == '192.168.1.2' and time.now().hour < 20 or time.now().hour > 21 rules: ##- SCRIPT,quic,REJECT #shortcuts rule ##- SCRIPT,time-limit,REJECT #shortcuts rule ##- DOMAIN-SUFFIX,google.com,Proxy #匹配域名后缀(交由Proxy代理服务器组) ##- DOMAIN-KEYWORD,google,Proxy #匹配域名关键字(交由Proxy代理服务器组) ##- DOMAIN,google.com,Proxy #匹配域名(交由Proxy代理服务器组) ##- DOMAIN-SUFFIX,ad.com,REJECT #匹配域名后缀(拒绝) ##- IP-CIDR,127.0.0.0/8,DIRECT #匹配数据目标IP(直连) ##- SRC-IP-CIDR,192.168.1.201/32,DIRECT #匹配数据发起IP(直连) ##- DST-PORT,80,DIRECT #匹配数据目标端口(直连) ##- SRC-PORT,7777,DIRECT #匹配数据源端口(直连) ##排序在上的规则优先生效,如添加(去除规则前的#号): ##IP段:192.168.1.2-192.168.1.200 直连 ##- SRC-IP-CIDR,192.168.1.2/31,DIRECT ##- SRC-IP-CIDR,192.168.1.4/30,DIRECT ##- SRC-IP-CIDR,192.168.1.8/29,DIRECT ##- SRC-IP-CIDR,192.168.1.16/28,DIRECT ##- SRC-IP-CIDR,192.168.1.32/27,DIRECT ##- SRC-IP-CIDR,192.168.1.64/26,DIRECT ##- SRC-IP-CIDR,192.168.1.128/26,DIRECT ##- SRC-IP-CIDR,192.168.1.192/29,DIRECT ##- SRC-IP-CIDR,192.168.1.200/32,DIRECT ##IP段:192.168.1.202-192.168.1.255 直连 ##- SRC-IP-CIDR,192.168.1.202/31,DIRECT ##- SRC-IP-CIDR,192.168.1.204/30,DIRECT ##- SRC-IP-CIDR,192.168.1.208/28,DIRECT ##- SRC-IP-CIDR,192.168.1.224/27,DIRECT ##此时IP为192.168.1.1和192.168.1.201的客户端流量走代理(策略),其余客户端不走代理 ##因为Fake-IP模式下,IP地址为192.168.1.1的路由器自身流量可走代理(策略),所以需要排除 ##仅设置路由器自身直连: ##- SRC-IP-CIDR,192.168.1.1/32,DIRECT ##- SRC-IP-CIDR,198.18.0.1/32,DIRECT ##DDNS - DOMAIN-SUFFIX,checkip.dyndns.org,DIRECT - DOMAIN-SUFFIX,checkipv6.dyndns.org,DIRECT - DOMAIN-SUFFIX,checkip.synology.com,DIRECT - DOMAIN-SUFFIX,ifconfig.co,DIRECT - DOMAIN-SUFFIX,api.myip.com,DIRECT - DOMAIN-SUFFIX,ip-api.com,DIRECT - DOMAIN-SUFFIX,ipapi.co,DIRECT - DOMAIN-SUFFIX,ip6.seeip.org,DIRECT - DOMAIN-SUFFIX,members.3322.org,DIRECT - DOMAIN-SUFFIX,www.test-ipv6.com,DIRECT ##自定义白名单域名 ##Cloudflare - DOMAIN-SUFFIX,dash.cloudflare.com,DIRECT ##自定义黑名单域名 ##自定义黑名单IP ##在线IP段转CIDR地址:http://ip2cidr.com #===================== 自定义规则 二 =====================# script: ## shortcuts: ## common_port: dst_port not in [21, 22, 23, 53, 80, 123, 143, 194, 443, 465, 587, 853, 993, 995, 998, 2052, 2053, 2082, 2083, 2086, 2095, 2096, 5222, 5228, 5229, 5230, 8080, 8443, 8880, 8888, 8889] rules: ##- SCRIPT,common_port,DIRECT #shortcuts rule ##- DOMAIN-SUFFIX,google.com,Proxy #匹配域名后缀(交由Proxy代理服务器组) ##- DOMAIN-KEYWORD,google,Proxy #匹配域名关键字(交由Proxy代理服务器组) ##- DOMAIN,google.com,Proxy #匹配域名(交由Proxy代理服务器组) ##- DOMAIN-SUFFIX,ad.com,REJECT #匹配域名后缀(拒绝) ##- IP-CIDR,127.0.0.0/8,DIRECT #匹配数据目标IP(直连) ##- SRC-IP-CIDR,192.168.1.201/32,DIRECT #匹配数据发起IP(直连) ##- DST-PORT,80,DIRECT #匹配数据目标端口(直连) ##- SRC-PORT,7777,DIRECT #匹配数据源端口(直连) #===================== 配置文件 =====================# port: 7890 socks-port: 7891 redir-port: 7892 mixed-port: 7893 allow-lan: true bind-address: "*" mode: rule log-level: silent ipv6: true external-controller: 0.0.0.0:9090 external-ui: "/usr/share/openclash/dashboard" tun: enable: true stack: system dns-hijack: - tcp://8.8.8.8:53 - tcp://8.8.4.4:53 hosts: profile: store-selected: true tracing: true store-fake-ip: true dns: enable: true ipv6: true listen: 0.0.0.0:7874 default-nameserver: - 127.0.0.1:6053 - "[::1]:6053" - 127.0.0.1:5335 - "[::1]:5335" enhanced-mode: fake-ip fake-ip-range: 198.18.0.1/16 use-hosts: true fallback-filter: geoip: true ipcidr: - 240.0.0.0/4 nameserver: - 127.0.0.1:6053 - "[::1]:6053" fallback: - 127.0.0.1:5335 - "[::1]:5335" fake-ip-filter: - "+.*" proxy-groups: - name: Main type: select proxies: **** #===================== 防火墙设置 =====================# #IPv4 NAT chain # Generated by iptables-save v1.8.7 on Thu Feb 3 12:25:54 2022 *nat :PREROUTING ACCEPT [302:114499] :INPUT ACCEPT [28:3327] :OUTPUT ACCEPT [723:49509] :POSTROUTING ACCEPT [941:62900] :openclash - [0:0] :openclash_output - [0:0] :postrouting_lan_rule - [0:0] :postrouting_rule - [0:0] :postrouting_wan_rule - [0:0] :prerouting_lan_rule - [0:0] :prerouting_rule - [0:0] :prerouting_wan_rule - [0:0] :zone_lan_postrouting - [0:0] :zone_lan_prerouting - [0:0] :zone_wan_postrouting - [0:0] :zone_wan_prerouting - [0:0] -A PREROUTING -d 8.8.4.4/32 -p tcp -m comment --comment "OpenClash Google DNS Hijack" -m tcp --dport 53 -j ACCEPT -A PREROUTING -d 8.8.8.8/32 -p tcp -m comment --comment "OpenClash Google DNS Hijack" -m tcp --dport 53 -j ACCEPT -A PREROUTING -m comment --comment "!fw3: Custom prerouting rule chain" -j prerouting_rule -A PREROUTING -i br-lan -m comment --comment "!fw3" -j zone_lan_prerouting -A PREROUTING -p tcp -j openclash -A OUTPUT -j openclash_output -A POSTROUTING -m comment --comment "!fw3: Custom postrouting rule chain" -j postrouting_rule -A POSTROUTING -o br-lan -m comment --comment "!fw3" -j zone_lan_postrouting -A openclash -m set --match-set localnetwork dst -j RETURN -A openclash -m set --match-set china_ip_route dst -j RETURN -A openclash -p tcp -j REDIRECT --to-ports 7892 -A openclash_output -m set --match-set localnetwork dst -j RETURN -A openclash_output -m owner ! --uid-owner 65534 -m set --match-set china_ip_route dst -j RETURN -A openclash_output -p tcp -m owner ! --uid-owner 65534 -j REDIRECT --to-ports 7892 -A zone_lan_postrouting -m comment --comment "!fw3: Custom lan postrouting rule chain" -j postrouting_lan_rule -A zone_lan_prerouting -m comment --comment "!fw3: Custom lan prerouting rule chain" -j prerouting_lan_rule -A zone_wan_postrouting -m comment --comment "!fw3: Custom wan postrouting rule chain" -j postrouting_wan_rule -A zone_wan_postrouting -m comment --comment "!fw3" -j FULLCONENAT -A zone_wan_prerouting -m comment --comment "!fw3: Custom wan prerouting rule chain" -j prerouting_wan_rule -A zone_wan_prerouting -m comment --comment "!fw3" -j FULLCONENAT COMMIT # Completed on Thu Feb 3 12:25:54 2022 #IPv4 Mangle chain # Generated by iptables-save v1.8.7 on Thu Feb 3 12:25:54 2022 *mangle :PREROUTING ACCEPT [9888:3315948] :INPUT ACCEPT [9611:3204580] :FORWARD ACCEPT [16:1279] :OUTPUT ACCEPT [9548:2362653] :POSTROUTING ACCEPT [9551:2362503] :RRDIPT_FORWARD - [0:0] :RRDIPT_INPUT - [0:0] :RRDIPT_OUTPUT - [0:0] :openclash - [0:0] :openclash_dns_hijack - [0:0] -A PREROUTING -p udp -j openclash -A PREROUTING -p tcp -m tcp --dport 53 -j openclash_dns_hijack -A INPUT -j RRDIPT_INPUT -A FORWARD -j RRDIPT_FORWARD -A OUTPUT -j RRDIPT_OUTPUT -A RRDIPT_FORWARD -s 192.168.1.102/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.1.102/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.1.1/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.1.1/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.1.2/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.1.2/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.1.7/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.1.7/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.1.183/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.1.183/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.1.8/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.1.8/32 -j RETURN -A RRDIPT_INPUT -i eth0 -j RETURN -A RRDIPT_INPUT -i br-lan -j RETURN -A RRDIPT_OUTPUT -o eth0 -j RETURN -A RRDIPT_OUTPUT -o br-lan -j RETURN -A openclash -p udp -m udp --sport 500 -j RETURN -A openclash -p udp -m udp --sport 68 -j RETURN -A openclash -m set --match-set localnetwork dst -j RETURN -A openclash -m set --match-set china_ip_route dst -j RETURN -A openclash -j MARK --set-xmark 0x162/0xffffffff -A openclash_dns_hijack -d 8.8.8.8/32 -m comment --comment "OpenClash Google DNS Hijack" -j MARK --set-xmark 0x162/0xffffffff -A openclash_dns_hijack -d 8.8.4.4/32 -m comment --comment "OpenClash Google DNS Hijack" -j MARK --set-xmark 0x162/0xffffffff COMMIT # Completed on Thu Feb 3 12:25:54 2022 #IPv6 NAT chain # Generated by ip6tables-save v1.8.7 on Thu Feb 3 12:25:54 2022 *nat :PREROUTING ACCEPT [48:5155] :INPUT ACCEPT [31:3401] :OUTPUT ACCEPT [686:61907] :POSTROUTING ACCEPT [686:61907] -A PREROUTING -d 2001:4860:4860::8844/128 -p tcp -m comment --comment "OpenClash Google DNS Hijack" -m tcp --dport 53 -j ACCEPT -A PREROUTING -d 2001:4860:4860::8888/128 -p tcp -m comment --comment "OpenClash Google DNS Hijack" -m tcp --dport 53 -j ACCEPT COMMIT # Completed on Thu Feb 3 12:25:54 2022 #IPv6 Mangle chain # Generated by ip6tables-save v1.8.7 on Thu Feb 3 12:25:54 2022 *mangle :PREROUTING ACCEPT [2339:348013] :INPUT ACCEPT [3552:471213] :FORWARD ACCEPT [0:0] :OUTPUT ACCEPT [4205:545144] :POSTROUTING ACCEPT [4205:545144] :openclash - [0:0] :openclash_output - [0:0] -A PREROUTING -j openclash -A OUTPUT -j openclash_output -A openclash -p udp -m udp --sport 500 -j RETURN -A openclash -s fc00::/6 -p udp -m udp --sport 546 -j RETURN -A openclash -m set --match-set localnetwork6 dst -j RETURN -A openclash -m set --match-set china_ip6_route dst -j RETURN -A openclash -p tcp -m comment --comment OpenClash -j TPROXY --on-port 7895 --on-ip :: --tproxy-mark 0x162/0xffffffff -A openclash -p udp -m comment --comment OpenClash -j TPROXY --on-port 7895 --on-ip :: --tproxy-mark 0x162/0xffffffff -A openclash_output -p udp -m udp --sport 500 -j RETURN -A openclash_output -p udp -m udp --sport 546 -j RETURN -A openclash_output -m set --match-set localnetwork6 dst -j RETURN -A openclash_output -m owner ! --uid-owner 65534 -m set --match-set china_ip6_route dst -j RETURN -A openclash_output -p tcp -m owner ! --uid-owner 65534 -j MARK --set-xmark 0x162/0xffffffff -A openclash_output -p udp -m owner ! --uid-owner 65534 -j MARK --set-xmark 0x162/0xffffffff COMMIT # Completed on Thu Feb 3 12:25:54 2022 #===================== IPSET状态 =====================# Name: china_ip_route Name: localnetwork Name: china_ip6_route Name: localnetwork6 #===================== 路由表状态 =====================# #route -n Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 0.0.0.0 192.168.1.1 0.0.0.0 UG 0 0 0 br-lan 192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0 br-lan 198.18.0.0 0.0.0.0 255.255.0.0 U 0 0 0 utun #ip route list default via 192.168.1.1 dev br-lan proto static 192.168.1.0/24 dev br-lan proto kernel scope link src 192.168.1.22 198.18.0.0/16 dev utun proto kernel scope link src 198.18.0.1 #ip rule show 0: from all lookup local 32765: from all fwmark 0x162 lookup 354 32766: from all lookup main 32767: from all lookup default #===================== Tun设备状态 =====================# utun: tun #===================== 端口占用状态 =====================# tcp 0 0 198.18.0.1:7777 0.0.0.0:* LISTEN 11223/clash tcp 0 0 :::7890 :::* LISTEN 11223/clash tcp 0 0 :::7891 :::* LISTEN 11223/clash tcp 0 0 :::7892 :::* LISTEN 11223/clash tcp 0 0 :::7893 :::* LISTEN 11223/clash tcp 0 0 :::7895 :::* LISTEN 11223/clash tcp 0 0 :::9090 :::* LISTEN 11223/clash udp 0 0 198.18.0.1:7777 0.0.0.0:* 11223/clash udp 0 0 :::7874 :::* 11223/clash udp 0 0 :::7891 :::* 11223/clash udp 0 0 :::7892 :::* 11223/clash udp 0 0 :::7893 :::* 11223/clash udp 0 0 :::7895 :::* 11223/clash udp 0 0 :::57800 :::* 11223/clash #===================== 测试本机DNS查询 =====================# Server: 127.0.0.1 Address: 127.0.0.1#53 Name: www.baidu.com www.baidu.com canonical name = www.a.shifen.com Name: www.a.shifen.com Address 1: 14.215.177.38 www.baidu.com canonical name = www.wshifen.com #===================== resolv.conf.auto =====================# # Interface lan nameserver 127.0.0.1 nameserver ::1 # Interface lan6 nameserver fd6c:f779:79c7::22 nameserver 2408:826c:5755:36d4::1 search RT-AC66U-B1 #===================== resolv.conf.d =====================# # Interface lan nameserver 127.0.0.1 nameserver ::1 # Interface lan6 nameserver fd6c:f779:79c7::22 nameserver 2408:826c:5755:36d4::1 search RT-AC66U-B1 #===================== 测试本机网络连接 =====================# HTTP/1.1 200 OK Accept-Ranges: bytes Cache-Control: private, no-cache, no-store, proxy-revalidate, no-transform Connection: keep-alive Content-Length: 277 Content-Type: text/html Date: Thu, 03 Feb 2022 04:25:55 GMT Etag: "575e1f72-115" Last-Modified: Mon, 13 Jun 2016 02:50:26 GMT Pragma: no-cache Server: bfe/1.0.8.18 #===================== 测试本机网络下载 =====================# HTTP/2 200 cache-control: max-age=300 content-security-policy: default-src 'none'; style-src 'unsafe-inline'; sandbox content-type: text/plain; charset=utf-8 etag: "e7c45e69dc43ff82ad5d9737a8236bcb2a366c4941b2a4e072cc810cafce3c9a" strict-transport-security: max-age=31536000 x-content-type-options: nosniff x-frame-options: deny x-xss-protection: 1; mode=block x-github-request-id: 8034:1AC1:17D5D1:3DC4CF:61F8064B accept-ranges: bytes date: Thu, 03 Feb 2022 04:25:56 GMT via: 1.1 varnish x-served-by: cache-hkg17921-HKG x-cache: HIT x-cache-hits: 2 x-timer: S1643862356.071209,VS0,VE0 vary: Authorization,Accept-Encoding,Origin access-control-allow-origin: * x-fastly-request-id: 67e3459dbe1cfcaaad0a3c3ba11f9eb8b6082b48 expires: Thu, 03 Feb 2022 04:30:56 GMT source-age: 100 content-length: 80 #===================== 最近运行日志 =====================# time="2022-02-03T03:19:22Z" level=info msg="Start initial compatible provider Prime Video" time="2022-02-03T03:19:22Z" level=info msg="Start initial compatible provider HK-Loadbalance" time="2022-02-03T03:19:22Z" level=info msg="Start initial compatible provider Games" time="2022-02-03T03:19:22Z" level=info msg="Start initial compatible provider Steam" time="2022-02-03T03:19:22Z" level=info msg="Start initial compatible provider Google" time="2022-02-03T03:19:22Z" level=info msg="Start initial compatible provider Twitter" time="2022-02-03T03:19:22Z" level=info msg="Start initial compatible provider Netflix" time="2022-02-03T03:19:22Z" level=info msg="Start initial compatible provider US-Original" time="2022-02-03T03:19:22Z" level=info msg="Start initial compatible provider Main" time="2022-02-03T03:19:22Z" level=info msg="Start initial compatible provider Instagram" time="2022-02-03T03:19:22Z" level=info msg="Start initial compatible provider Microsoft" time="2022-02-03T03:19:22Z" level=info msg="Start initial compatible provider HK-Original" time="2022-02-03T03:19:22Z" level=info msg="Start initial compatible provider Apple TV" time="2022-02-03T03:19:22Z" level=info msg="Start initial rule provider Telegram" time="2022-02-03T03:19:22Z" level=info msg="Start initial rule provider 放行规则-lhie1(建议置顶并直连)" time="2022-02-03T03:19:22Z" level=info msg="Start initial rule provider Apple" time="2022-02-03T03:19:22Z" level=info msg="Start initial rule provider Twitter" time="2022-02-03T03:19:22Z" level=info msg="Start initial rule provider *****" time="2022-02-03T03:19:22Z" level=info msg="Start initial rule provider 微软服务" time="2022-02-03T03:19:22Z" level=info msg="Start initial rule provider 国外常用网站合集" time="2022-02-03T03:19:22Z" level=info msg="Start initial rule provider Facebook" time="2022-02-03T03:19:22Z" level=info msg="Start initial rule provider Download" time="2022-02-03T03:19:22Z" level=info msg="Start initial rule provider TikTok" time="2022-02-03T03:19:22Z" level=info msg="Start initial rule provider 国内IP白名单" time="2022-02-03T03:19:22Z" level=info msg="Start initial rule provider 学术网站" time="2022-02-03T03:19:22Z" level=info msg="Start initial rule provider 国内流媒体合集" time="2022-02-03T03:19:22Z" level=info msg="Start initial rule provider YouTube" time="2022-02-03T03:19:22Z" level=info msg="Start initial rule provider Prime-Video" time="2022-02-03T03:19:22Z" level=info msg="Start initial rule provider Netflix" time="2022-02-03T03:19:22Z" level=info msg="Start initial rule provider FallbackDNS" time="2022-02-03T03:19:22Z" level=info msg="Start initial rule provider Instagram" time="2022-02-03T03:19:22Z" level=info msg="Start initial rule provider Apple TV" time="2022-02-03T03:19:22Z" level=info msg="Start initial rule provider ****白名单" time="2022-02-03T03:19:22Z" level=info msg="Start initial rule provider GitHub" time="2022-02-03T03:19:22Z" level=info msg="Start initial rule provider Bilibili" time="2022-02-03T03:19:22Z" level=info msg="Start initial rule provider Apple Music" time="2022-02-03T03:19:22Z" level=info msg="Start initial rule provider GoogleVoice" time="2022-02-03T03:19:22Z" level=info msg="Start initial rule provider GoogleCN" time="2022-02-03T03:19:22Z" level=info msg="Start initial rule provider ***地址" time="2022-02-03T03:19:22Z" level=info msg="Start initial rule provider SteamCN" time="2022-02-03T03:19:22Z" level=info msg="DNS server listening at: [::]:7874" 2022-02-03 11:19:25 Step 6: Wait For The File Downloading... 2022-02-03 11:19:25 Step 7: Set Control Panel... 2022-02-03 11:19:25 Step 8: Set Firewall Rules... 2022-02-03 11:19:32 Step 9: Restart Dnsmasq... 2022-02-03 11:19:37 Step 10: Add Cron Rules, Start Daemons... 2022-02-03 11:57:18 Reload OpenClash Firewall Rules... 2022-02-03 11:57:26 Reload OpenClash Firewall Rules... 2022-02-03 12:14:58 Reload OpenClash Firewall Rules... 2022-02-03 12:16:16 Reload OpenClash Firewall Rules... #===================== 活动连接信息 =====================# 1. SourceIP:【192.168.1.22】 - Host:【Empty】 - DestinationIP:【*****】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【DIRECT】 2. SourceIP:【192.168.1.22】 - Host:【Empty】 - DestinationIP:【*****】 - Network:【tcp】 - RulePayload:【FallbackDNS】 - Lastchain:【******】 3. SourceIP:【192.168.1.2】 - Host:【Empty】 - DestinationIP:【*****】 - Network:【udp】 - RulePayload:【】 - Lastchain:【DIRECT】 4. SourceIP:【****:826c:5755:36d4:250:56ff:fe9e:****】 - Host:【Empty】 - DestinationIP:【2606:4700:4700::1111】 - Network:【udp】 - RulePayload:【】 - Lastchain:【DIRECT】 5. SourceIP:【****:826c:5755:36d4:250:56ff:fe9e:****】 - Host:【Empty】 - DestinationIP:【2606:4700:4700::1001】 - Network:【udp】 - RulePayload:【】 - Lastchain:【DIRECT】
没法复现
This issue is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 5 days
全局设置 -> 版本更新界面下,tun内核可以更新,下载成功后显示[TUN]当前版本查询失败,core下有clash_tun文件且权限正常。openclash也可以正常调用内核。。。 以下是调试日志!祝大大虎年虎虎生威牛牛比老虎大!
OpenClash 调试日志
生成时间: 2022-02-03 12:25:53 插件版本: v0.44.07-beta 隐私提示: 上传此日志前请注意检查、屏蔽公网IP、节点、密码等相关敏感信息