vernesong / OpenClash

A Clash Client For OpenWrt
MIT License
17.54k stars 3.18k forks source link

N1软路由开启Fake IP-Tun模式就不能上外网了 #2013

Closed SamZig closed 2 years ago

SamZig commented 2 years ago

N1的openclash开启fakeip-tun模式就不能上外网了,可以访问国内网络,google打不开,youtube页面只有头部可以显示,视频都打不开。

但是,切换到【Fake IP-增强模式】或者【Fake IP-tun混合模式】又可以上外网。选择的是全局代理模式。

请问大佬是什么问题哈?vps服务器端用的是x-ui面板搭的节点trojan和shadowsocks。

OpenClash 调试日志

生成时间: 2022-02-03 17:27:34 插件版本: v0.44.16-beta 隐私提示: 上传此日志前请注意检查、屏蔽公网IP、节点、密码等相关敏感信息


#===================== 系统信息 =====================#

主机型号: Phicomm N1
固件版本: OpenWrt SNAPSHOT r4023-b143589cf
LuCI版本: git-21.335.48743-5f363d9-1
内核版本: 5.4.173-flippy-69+o
处理器架构: 

#此项有值时,如不使用IPv6,建议到网络-接口-lan的设置中禁用IPV6的DHCP
IPV6-DHCP: 

#此项结果应仅有配置文件的DNS监听地址
Dnsmasq转发设置: 127.0.0.1#7874

#===================== 依赖检查 =====================#

dnsmasq-full: 已安装
coreutils: 已安装
coreutils-nohup: 已安装
bash: 已安装
curl: 已安装
ca-certificates: 已安装
ipset: 已安装
ip-full: 已安装
iptables-mod-tproxy: 已安装
kmod-ipt-tproxy: 已安装
iptables-mod-extra: 已安装
kmod-ipt-extra: 已安装
libcap: 已安装
libcap-bin: 已安装
ruby: 已安装
ruby-yaml: 已安装
ruby-psych: 已安装
ruby-pstore: 已安装
ruby-dbm: 已安装
kmod-tun(TUN模式): 已安装
luci-compat(Luci-19.07): 已安装

#===================== 内核检查 =====================#

运行状态: 运行中
进程pid: 18526
运行权限: 18526: cap_dac_override,cap_net_bind_service,cap_net_admin,cap_net_raw,cap_sys_resource=eip
运行用户: nobody
已选择的架构: 未选择架构

#下方无法显示内核版本号时请确认您的内核版本是否正确或者有无权限
Tun内核版本: 2022.01.27
Tun内核文件: 存在
Tun内核运行权限: 正常

Dev内核版本: v1.9.0-7-gb1a639f
Dev内核文件: 存在
Dev内核运行权限: 正常

#===================== 插件设置 =====================#

当前配置文件: /etc/openclash/config/config.yaml
启动配置文件: /etc/openclash/config.yaml
运行模式: fake-ip-tun
默认代理模式: global
UDP流量转发(tproxy): 停用
DNS劫持: 启用
自定义DNS: 启用
IPV6代理: 停用
IPV6-DNS解析: 停用
禁用Dnsmasq缓存: 启用
自定义规则: 停用
仅允许内网: 停用
仅代理命中规则流量: 停用
仅允许常用端口流量: 停用
绕过中国大陆IP: 停用
DNS远程解析: 启用

#启动异常时建议关闭此项后重试
混合节点: 停用
保留配置: 停用

#启动异常时建议关闭此项后重试
第三方规则: 启用

#===================== 配置文件 =====================#

proxy-groups:
- name: Auto - UrlTest
  type: url-test
  proxies:
  - xxx_trojan
  - xxx_shadowsocks
  url: https://cp.cloudflare.com/generate_20x
  interval: '600'
  tolerance: '150'
- name: Proxy
  type: select
  proxies:
  - Auto - UrlTest
  - DIRECT
  - xxx_trojan
  - xxx_shadowsocks
- name: Domestic
  type: select
  proxies:
  - DIRECT
  - Proxy
- name: Others
  type: select
  proxies:
  - Proxy
  - DIRECT
  - Domestic
- name: Asian TV
  type: select
  proxies:
  - DIRECT
  - Proxy
  - xxx_trojan
  - xxx_shadowsocks
- name: Global TV
  type: select
  proxies:
  - Proxy
  - DIRECT
  - xxx_trojan
  - xxx_shadowsocks
rules:
- IP-CIDR,198.18.0.1/16,REJECT,no-resolve
- RULE-SET,Unbreak,DIRECT
- RULE-SET,Streaming,Global TV
- RULE-SET,StreamingSE,Asian TV
- RULE-SET,Global,Proxy
- RULE-SET,China,Domestic
- IP-CIDR,192.168.0.0/16,DIRECT
- IP-CIDR,10.0.0.0/8,DIRECT
- IP-CIDR,172.16.0.0/12,DIRECT
- IP-CIDR,127.0.0.0/8,DIRECT
- IP-CIDR,100.64.0.0/10,DIRECT
- IP-CIDR,224.0.0.0/4,DIRECT
- IP-CIDR,fe80::/10,DIRECT
- IP-CIDR,119.28.28.28/32,DIRECT
- IP-CIDR,182.254.116.0/24,DIRECT
- MATCH,Others
dns:
  nameserver:
  - 192.168.0.1
  - 114.114.114.114
  - 119.29.29.29
  - https://doh.pub/dns-query
  - https://dns.alidns.com/dns-query
  fallback:
  - https://dns.cloudflare.com/dns-query
  - "[2001:da8::666]:53"
  - https://public.dns.iij.jp/dns-query
  - https://jp.tiar.app/dns-query
  - https://jp.tiarap.org/dns-query
  - tls://dot.tiar.app
  enable: true
  ipv6: false
  enhanced-mode: fake-ip
  fake-ip-range: 198.18.0.1/16
  listen: 127.0.0.1:7874
  fake-ip-filter:
  - "*.lan"
  - "*.localdomain"
  - "*.example"
  - "*.invalid"
  - "*.localhost"
  - "*.test"
  - "*.local"
  - "*.home.arpa"
  - time.*.com
  - time.*.gov
  - time.*.edu.cn
  - time.*.apple.com
  - time1.*.com
  - time2.*.com
  - time3.*.com
  - time4.*.com
  - time5.*.com
  - time6.*.com
  - time7.*.com
  - ntp.*.com
  - ntp1.*.com
  - ntp2.*.com
  - ntp3.*.com
  - ntp4.*.com
  - ntp5.*.com
  - ntp6.*.com
  - ntp7.*.com
  - "*.time.edu.cn"
  - "*.ntp.org.cn"
  - "+.pool.ntp.org"
  - time1.cloud.tencent.com
  - music.163.com
  - "*.music.163.com"
  - "*.126.net"
  - musicapi.taihe.com
  - music.taihe.com
  - songsearch.kugou.com
  - trackercdn.kugou.com
  - "*.kuwo.cn"
  - api-jooxtt.sanook.com
  - api.joox.com
  - joox.com
  - y.qq.com
  - "*.y.qq.com"
  - streamoc.music.tc.qq.com
  - mobileoc.music.tc.qq.com
  - isure.stream.qqmusic.qq.com
  - dl.stream.qqmusic.qq.com
  - aqqmusic.tc.qq.com
  - amobile.music.tc.qq.com
  - "*.xiami.com"
  - "*.music.migu.cn"
  - music.migu.cn
  - "+.msftconnecttest.com"
  - "+.msftncsi.com"
  - msftconnecttest.com
  - msftncsi.com
  - localhost.ptlogin2.qq.com
  - localhost.sec.qq.com
  - "+.srv.nintendo.net"
  - "+.stun.playstation.net"
  - xbox.*.microsoft.com
  - xnotify.xboxlive.com
  - "+.battlenet.com.cn"
  - "+.wotgame.cn"
  - "+.wggames.cn"
  - "+.wowsgame.cn"
  - "+.wargaming.net"
  - proxy.golang.org
  - stun.*.*
  - stun.*.*.*
  - "+.stun.*.*"
  - "+.stun.*.*.*"
  - "+.stun.*.*.*.*"
  - heartbeat.belkin.com
  - "*.linksys.com"
  - "*.linksyssmartwifi.com"
  - "*.router.asus.com"
  - mesu.apple.com
  - swscan.apple.com
  - swquery.apple.com
  - swdownload.apple.com
  - swcdn.apple.com
  - swdist.apple.com
  - lens.l.google.com
  - stun.l.google.com
  - "+.nflxvideo.net"
  - "*.square-enix.com"
  - "*.finalfantasyxiv.com"
  - "*.ffxiv.com"
  - "*.ff14.sdo.com"
  - ff.dorado.sdo.com
  - "*.mcdn.bilivideo.cn"
  - "+.media.dssott.com"
  default-nameserver:
  - 192.168.0.1
  - 114.114.114.114
  - 119.29.29.29
  - "[2001:da8::666]:53"
redir-port: 7892
tproxy-port: 7895
port: 7890
socks-port: 7891
mixed-port: 7893
mode: global
log-level: silent
allow-lan: true
external-controller: 0.0.0.0:9090
bind-address: "*"
external-ui: "/usr/share/openclash/dashboard"
ipv6: false
tun:
  enable: true
  stack: system
  dns-hijack:
  - tcp://8.8.8.8:53
  - tcp://8.8.4.4:53
profile:
  store-selected: true
  store-fake-ip: true
rule-providers:
  Unbreak:
    type: http
    behavior: classical
    path: "./rule_provider/Unbreak.yaml"
    url: https://cdn.jsdelivr.net/gh/DivineEngine/Profiles@master/Clash/RuleSet/Unbreak.yaml
    interval: 86400
  Streaming:
    type: http
    behavior: classical
    path: "./rule_provider/Streaming.yaml"
    url: https://cdn.jsdelivr.net/gh/DivineEngine/Profiles@master/Clash/RuleSet/StreamingMedia/Streaming.yaml
    interval: 86400
  StreamingSE:
    type: http
    behavior: classical
    path: "./rule_provider/StreamingSE.yaml"
    url: https://cdn.jsdelivr.net/gh/DivineEngine/Profiles@master/Clash/RuleSet/StreamingMedia/StreamingSE.yaml
    interval: 86400
  Global:
    type: http
    behavior: classical
    path: "./rule_provider/Global.yaml"
    url: https://cdn.jsdelivr.net/gh/DivineEngine/Profiles@master/Clash/RuleSet/Global.yaml
    interval: 86400
  China:
    type: http
    behavior: classical
    path: "./rule_provider/China.yaml"
    url: https://cdn.jsdelivr.net/gh/DivineEngine/Profiles@master/Clash/RuleSet/China.yaml
    interval: 86400

#===================== 防火墙设置 =====================#

#IPv4 NAT chain

# Generated by iptables-save v1.8.7 on Thu Feb  3 17:27:37 2022
*nat
:PREROUTING ACCEPT [67:4093]
:INPUT ACCEPT [26:1613]
:OUTPUT ACCEPT [30:1917]
:POSTROUTING ACCEPT [92:5750]
:MINIUPNPD - [0:0]
:MINIUPNPD-POSTROUTING - [0:0]
:postrouting_VPN_rule - [0:0]
:postrouting_docker_rule - [0:0]
:postrouting_lan_rule - [0:0]
:postrouting_rule - [0:0]
:postrouting_vpn_rule - [0:0]
:postrouting_wan_rule - [0:0]
:prerouting_VPN_rule - [0:0]
:prerouting_docker_rule - [0:0]
:prerouting_lan_rule - [0:0]
:prerouting_rule - [0:0]
:prerouting_vpn_rule - [0:0]
:prerouting_wan_rule - [0:0]
:zone_VPN_postrouting - [0:0]
:zone_VPN_prerouting - [0:0]
:zone_docker_postrouting - [0:0]
:zone_docker_prerouting - [0:0]
:zone_lan_postrouting - [0:0]
:zone_lan_prerouting - [0:0]
:zone_vpn_postrouting - [0:0]
:zone_vpn_prerouting - [0:0]
:zone_wan_postrouting - [0:0]
:zone_wan_prerouting - [0:0]
-A PREROUTING -d 8.8.4.4/32 -p tcp -m comment --comment "OpenClash Google DNS Hijack" -m tcp --dport 53 -j ACCEPT
-A PREROUTING -d 8.8.8.8/32 -p tcp -m comment --comment "OpenClash Google DNS Hijack" -m tcp --dport 53 -j ACCEPT
-A PREROUTING -p tcp -m tcp --dport 53 -m comment --comment "DNS Hijack" -j REDIRECT --to-ports 53
-A PREROUTING -p udp -m udp --dport 53 -m comment --comment "DNS Hijack" -j REDIRECT --to-ports 53
-A PREROUTING -m comment --comment "!fw3: Custom prerouting rule chain" -j prerouting_rule
-A PREROUTING -i br-lan -m comment --comment "!fw3" -j zone_lan_prerouting
-A PREROUTING -i ipsec0 -m comment --comment "!fw3" -j zone_VPN_prerouting
-A PREROUTING -i tun0 -m comment --comment "!fw3" -j zone_vpn_prerouting
-A PREROUTING -i docker0 -m comment --comment "!fw3" -j zone_docker_prerouting
-A PREROUTING -p udp -m udp --dport 53 -j REDIRECT --to-ports 53
-A PREROUTING -p tcp -m tcp --dport 53 -j REDIRECT --to-ports 53
-A POSTROUTING -m comment --comment "!fw3: Custom postrouting rule chain" -j postrouting_rule
-A POSTROUTING -o br-lan -m comment --comment "!fw3" -j zone_lan_postrouting
-A POSTROUTING -o ipsec0 -m comment --comment "!fw3" -j zone_VPN_postrouting
-A POSTROUTING -o tun0 -m comment --comment "!fw3" -j zone_vpn_postrouting
-A POSTROUTING -o docker0 -m comment --comment "!fw3" -j zone_docker_postrouting
-A zone_VPN_postrouting -m comment --comment "!fw3: Custom VPN postrouting rule chain" -j postrouting_VPN_rule
-A zone_VPN_prerouting -m comment --comment "!fw3: Custom VPN prerouting rule chain" -j prerouting_VPN_rule
-A zone_docker_postrouting -m comment --comment "!fw3: Custom docker postrouting rule chain" -j postrouting_docker_rule
-A zone_docker_prerouting -m comment --comment "!fw3: Custom docker prerouting rule chain" -j prerouting_docker_rule
-A zone_lan_postrouting -j MINIUPNPD-POSTROUTING
-A zone_lan_postrouting -m comment --comment "!fw3: Custom lan postrouting rule chain" -j postrouting_lan_rule
-A zone_lan_prerouting -j MINIUPNPD
-A zone_lan_prerouting -m comment --comment "!fw3: Custom lan prerouting rule chain" -j prerouting_lan_rule
-A zone_vpn_postrouting -m comment --comment "!fw3: Custom vpn postrouting rule chain" -j postrouting_vpn_rule
-A zone_vpn_postrouting -m comment --comment "!fw3" -j FULLCONENAT
-A zone_vpn_prerouting -m comment --comment "!fw3: Custom vpn prerouting rule chain" -j prerouting_vpn_rule
-A zone_vpn_prerouting -m comment --comment "!fw3" -j FULLCONENAT
-A zone_wan_postrouting -m comment --comment "!fw3: Custom wan postrouting rule chain" -j postrouting_wan_rule
-A zone_wan_postrouting -m comment --comment "!fw3" -j FULLCONENAT
-A zone_wan_prerouting -m comment --comment "!fw3: Custom wan prerouting rule chain" -j prerouting_wan_rule
-A zone_wan_prerouting -m comment --comment "!fw3" -j FULLCONENAT
COMMIT
# Completed on Thu Feb  3 17:27:37 2022

#IPv4 Mangle chain

# Generated by iptables-save v1.8.7 on Thu Feb  3 17:27:37 2022
*mangle
:PREROUTING ACCEPT [2045:539908]
:INPUT ACCEPT [1314:325827]
:FORWARD ACCEPT [1232:451259]
:OUTPUT ACCEPT [914:357595]
:POSTROUTING ACCEPT [2152:809819]
:openclash - [0:0]
:openclash_dns_hijack - [0:0]
:openclash_output - [0:0]
-A PREROUTING -j openclash
-A OUTPUT -j openclash_output
-A openclash -p tcp -m tcp --sport 1688 -j RETURN
-A openclash -p tcp -m tcp --sport 10240 -j RETURN
-A openclash -p tcp -m tcp --sport 1723 -j RETURN
-A openclash -p udp -m udp --sport 1194 -j RETURN
-A openclash -p tcp -m tcp --sport 1194 -j RETURN
-A openclash -p udp -m udp --sport 4500 -j RETURN
-A openclash -p udp -m udp --sport 500 -j RETURN
-A openclash -p udp -m udp --sport 500 -j RETURN
-A openclash -p udp -m udp --sport 68 -j RETURN
-A openclash -m set --match-set localnetwork dst -j RETURN
-A openclash -j MARK --set-xmark 0x162/0xffffffff
-A openclash_output -p tcp -m tcp --sport 1688 -j RETURN
-A openclash_output -p tcp -m tcp --sport 10240 -j RETURN
-A openclash_output -p tcp -m tcp --sport 1723 -j RETURN
-A openclash_output -p udp -m udp --sport 1194 -j RETURN
-A openclash_output -p tcp -m tcp --sport 1194 -j RETURN
-A openclash_output -p udp -m udp --sport 4500 -j RETURN
-A openclash_output -p udp -m udp --sport 500 -j RETURN
-A openclash_output -p udp -m udp --sport 500 -j RETURN
-A openclash_output -p udp -m udp --sport 68 -j RETURN
-A openclash_output -m set --match-set localnetwork dst -j RETURN
-A openclash_output -d 198.18.0.0/16 -m owner ! --uid-owner 65534 -j MARK --set-xmark 0x162/0xffffffff
-A openclash_output -p tcp -m owner ! --uid-owner 65534 -j MARK --set-xmark 0x162/0xffffffff
COMMIT
# Completed on Thu Feb  3 17:27:37 2022

#IPv6 NAT chain

# Generated by ip6tables-save v1.8.7 on Thu Feb  3 17:27:37 2022
*nat
:PREROUTING ACCEPT [486:68204]
:INPUT ACCEPT [0:0]
:OUTPUT ACCEPT [100:16408]
:POSTROUTING ACCEPT [586:84612]
-A PREROUTING -p udp -m udp --dport 53 -j REDIRECT --to-ports 53
-A PREROUTING -p tcp -m tcp --dport 53 -j REDIRECT --to-ports 53
COMMIT
# Completed on Thu Feb  3 17:27:37 2022

#IPv6 Mangle chain

# Generated by ip6tables-save v1.8.7 on Thu Feb  3 17:27:37 2022
*mangle
:PREROUTING ACCEPT [4218:739613]
:INPUT ACCEPT [3766:703079]
:FORWARD ACCEPT [4815:872265]
:OUTPUT ACCEPT [573:103218]
:POSTROUTING ACCEPT [5450:995580]
COMMIT
# Completed on Thu Feb  3 17:27:37 2022

#===================== IPSET状态 =====================#

Name: cn
Name: ct
Name: cnc
Name: cmcc
Name: crtc
Name: cernet
Name: gwbn
Name: othernet
Name: music
Name: mwan3_connected_v4
Name: mwan3_connected_v6
Name: mwan3_source_v6
Name: mwan3_dynamic_v4
Name: mwan3_dynamic_v6
Name: mwan3_custom_v4
Name: mwan3_custom_v6
Name: china_ip_route
Name: localnetwork
Name: china
Name: mwan3_connected

#===================== 路由表状态 =====================#

#route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
0.0.0.0         192.168.0.1     0.0.0.0         UG    0      0        0 br-lan
172.31.0.0      0.0.0.0         255.255.255.0   U     0      0        0 docker0
192.168.0.0     0.0.0.0         255.255.255.0   U     0      0        0 br-lan
198.18.0.0      0.0.0.0         255.255.0.0     U     0      0        0 utun
#ip route list
default via 192.168.0.1 dev br-lan proto static 
172.31.0.0/24 dev docker0 proto kernel scope link src 172.31.0.1 linkdown 
192.168.0.0/24 dev br-lan proto kernel scope link src 192.168.0.188 
198.18.0.0/16 dev utun proto kernel scope link src 198.18.0.1 
#ip rule show
0:  from all lookup local
32765:  from all fwmark 0x162 lookup 354
32766:  from all lookup main
32767:  from all lookup default

#===================== Tun设备状态 =====================#

utun: tun

#===================== 端口占用状态 =====================#

tcp        0      0 198.18.0.1:7777         0.0.0.0:*               LISTEN      18526/clash
tcp        0      0 :::7890                 :::*                    LISTEN      18526/clash
tcp        0      0 :::7891                 :::*                    LISTEN      18526/clash
tcp        0      0 :::7892                 :::*                    LISTEN      18526/clash
tcp        0      0 :::7893                 :::*                    LISTEN      18526/clash
tcp        0      0 :::7895                 :::*                    LISTEN      18526/clash
tcp        0      0 :::9090                 :::*                    LISTEN      18526/clash
udp        0      0 127.0.0.1:7874          0.0.0.0:*                           18526/clash
udp        0      0 198.18.0.1:7777         0.0.0.0:*                           18526/clash
udp        0      0 :::7891                 :::*                                18526/clash
udp        0      0 :::7892                 :::*                                18526/clash
udp        0      0 :::7893                 :::*                                18526/clash
udp        0      0 :::7895                 :::*                                18526/clash

#===================== 测试本机DNS查询 =====================#

Server:     127.0.0.1
Address:    127.0.0.1:53

*** Can't find www.baidu.com: No answer

Name:   www.baidu.com
Address: 198.18.0.34

#===================== resolv.conf.d =====================#

# Interface lan
nameserver 192.168.0.1

#===================== 测试本机网络连接 =====================#

HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: private, no-cache, no-store, proxy-revalidate, no-transform
Connection: keep-alive
Content-Length: 277
Content-Type: text/html
Date: Thu, 03 Feb 2022 09:27:38 GMT
Etag: "575e1f6f-115"
Last-Modified: Mon, 13 Jun 2016 02:50:23 GMT
Pragma: no-cache
Server: bfe/1.0.8.18

#===================== 测试本机网络下载 =====================#

HTTP/1.1 200 OK
Connection: keep-alive
Content-Length: 80
Cache-Control: max-age=300
Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
Content-Type: text/plain; charset=utf-8
ETag: "e7c45e69dc43ff82ad5d9737a8236bcb2a366c4941b2a4e072cc810cafce3xxx"
Strict-Transport-Security: max-age=31536000
X-Content-Type-Options: nosniff
X-Frame-Options: deny
X-XSS-Protection: 1; mode=block
X-GitHub-Request-Id: 7128:7B51:215CFD:2CE813:61FB9xxx
Accept-Ranges: bytes
Date: Thu, 03 Feb 2022 09:27:39 GMT
Via: 1.1 varnish
X-Served-By: cache-pao17451-PAO
X-Cache: HIT
X-Cache-Hits: 1
X-Timer: S1643880460.727158,VS0,VE139
Vary: Authorization,Accept-Encoding,Origin
Access-Control-Allow-Origin: *
X-Fastly-Request-ID: a8e4983aee276b3e43b8133f7a10937b52741xxx
Expires: Thu, 03 Feb 2022 09:32:39 GMT
Source-Age: 0

#===================== 最近运行日志 =====================#

time="2022-02-03T16:31:55+08:00" level=info msg="Start initial compatible provider Domestic"
time="2022-02-03T16:31:55+08:00" level=info msg="Start initial compatible provider Asian TV"
time="2022-02-03T16:31:55+08:00" level=info msg="Start initial compatible provider Global TV"
time="2022-02-03T16:31:55+08:00" level=info msg="Start initial compatible provider Others"
time="2022-02-03T16:31:55+08:00" level=info msg="Start initial rule provider Unbreak"
time="2022-02-03T16:31:55+08:00" level=info msg="Start initial rule provider Streaming"
time="2022-02-03T16:31:55+08:00" level=info msg="Start initial rule provider StreamingSE"
time="2022-02-03T16:31:55+08:00" level=info msg="Start initial rule provider Global"
time="2022-02-03T16:31:55+08:00" level=info msg="Start initial rule provider China"
time="2022-02-03T16:31:55+08:00" level=info msg="DNS server listening at: 127.0.0.1:7874"
2022-02-03 16:31:57 Step 6: Wait For The File Downloading...
2022-02-03 16:31:58 Step 7: Set Control Panel...
2022-02-03 16:31:58 Step 8: Set Firewall Rules...
2022-02-03 16:31:59 Step 9: Restart Dnsmasq...
2022-02-03 16:31:59 Step 10: Add Cron Rules, Start Daemons...
2022-02-03 16:31:59 OpenClash Start Successful!
2022-02-03 17:26:47 OpenClash Stoping...
2022-02-03 17:26:47 Step 1: Backup The Current Groups State...
2022-02-03 17:26:47 Step 2: Delete OpenClash Firewall Rules...
2022-02-03 17:26:48 Step 3: Close The OpenClash Daemons...
2022-02-03 17:26:48 Step 4: Close The Clash Core Process...
2022-02-03 17:26:48 Step 5: Restart Dnsmasq...
2022-02-03 17:26:48 Step 6: Delete OpenClash Residue File...
2022-02-03 17:26:48 OpenClash Start Running...
2022-02-03 17:26:48 Step 1: Get The Configuration...
2022-02-03 17:26:49 Step 2: Check The Components...
2022-02-03 17:26:49 Setting Fake IP Filter...
2022-02-03 17:26:50 Tip: Because of the file【 /etc/config/openclash 】modificated, Pause quick start...
2022-02-03 17:26:50 Step 3: Modify The Config File...
2022-02-03 17:26:56 Step 4: Start Running The Clash Core...
2022-02-03 17:26:56 Tip: Detected The Exclusive Function of The TUN Core, Use TUN Core to Start...
2022-02-03 17:26:56 Step 5: Check The Core Status...
time="2022-02-03T17:26:57+08:00" level=info msg="Start initial compatible provider Others"
time="2022-02-03T17:26:57+08:00" level=info msg="Start initial compatible provider Auto - UrlTest"
time="2022-02-03T17:26:57+08:00" level=info msg="Start initial compatible provider Proxy"
time="2022-02-03T17:26:57+08:00" level=info msg="Start initial compatible provider Domestic"
time="2022-02-03T17:26:57+08:00" level=info msg="Start initial compatible provider Global TV"
time="2022-02-03T17:26:57+08:00" level=info msg="Start initial compatible provider Asian TV"
time="2022-02-03T17:26:57+08:00" level=info msg="Start initial rule provider Streaming"
time="2022-02-03T17:26:57+08:00" level=info msg="Start initial rule provider StreamingSE"
time="2022-02-03T17:26:57+08:00" level=info msg="Start initial rule provider Global"
time="2022-02-03T17:26:57+08:00" level=info msg="Start initial rule provider China"
time="2022-02-03T17:26:57+08:00" level=info msg="Start initial rule provider Unbreak"
time="2022-02-03T17:26:57+08:00" level=info msg="DNS server listening at: 127.0.0.1:7874"
2022-02-03 17:26:59 Step 6: Wait For The File Downloading...
2022-02-03 17:27:00 Step 7: Set Control Panel...
2022-02-03 17:27:00 Step 8: Set Firewall Rules...
2022-02-03 17:27:00 Step 9: Restart Dnsmasq...
2022-02-03 17:27:01 Step 10: Add Cron Rules, Start Daemons...
2022-02-03 17:27:01 OpenClash Start Successful!

#===================== 活动连接信息 =====================#
vernesong commented 2 years ago

日志开debug,控制面板看下连接和日志

abigchopstick commented 2 years ago

TUN模式我就没成功过。

我现在是在REDIR模式下(默认)跟你一样,换FAKEIP增强就正常。

vernesong commented 2 years ago

看看浏览器是不是开了安全DNS,还有host

github-actions[bot] commented 2 years ago

This issue is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 5 days