vernesong / OpenClash

A Clash Client For OpenWrt
MIT License
17.44k stars 3.18k forks source link

订阅转换服务器不能转换 #2163

Closed xzhqhfe closed 2 years ago

xzhqhfe commented 2 years ago

订阅转换服务器不能转换

hellcatjack commented 2 years ago

同样的问题,看日志发现报了一大堆以下日志: Sun Mar 20 10:37:38 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:474: Failed to execute call dispatcher target for entry '/admin/services/openclash/startlog'. Sun Mar 20 10:37:38 2022 daemon.err uhttpd[3140]: The called action terminated with an exception: Sun Mar 20 10:37:38 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/controller/openclash.lua:1362: bad argument #1 to 'find' (string expected, got nil) Sun Mar 20 10:37:38 2022 daemon.err uhttpd[3140]: stack traceback: Sun Mar 20 10:37:38 2022 daemon.err uhttpd[3140]: [C]: in function 'assert' Sun Mar 20 10:37:38 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:474: in function 'dispatch' Sun Mar 20 10:37:38 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:126: in function </usr/lib/lua/luci/dispatcher.lua:125> Sun Mar 20 10:37:39 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:474: Failed to execute call dispatcher target for entry '/admin/services/openclash/startlog'. Sun Mar 20 10:37:39 2022 daemon.err uhttpd[3140]: The called action terminated with an exception: Sun Mar 20 10:37:39 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/controller/openclash.lua:1362: bad argument #1 to 'find' (string expected, got nil) Sun Mar 20 10:37:39 2022 daemon.err uhttpd[3140]: stack traceback: Sun Mar 20 10:37:39 2022 daemon.err uhttpd[3140]: [C]: in function 'assert' Sun Mar 20 10:37:39 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:474: in function 'dispatch' Sun Mar 20 10:37:39 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:126: in function </usr/lib/lua/luci/dispatcher.lua:125> Sun Mar 20 10:37:40 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:474: Failed to execute call dispatcher target for entry '/admin/services/openclash/startlog'. Sun Mar 20 10:37:40 2022 daemon.err uhttpd[3140]: The called action terminated with an exception: Sun Mar 20 10:37:40 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/controller/openclash.lua:1362: bad argument #1 to 'find' (string expected, got nil) Sun Mar 20 10:37:40 2022 daemon.err uhttpd[3140]: stack traceback: Sun Mar 20 10:37:40 2022 daemon.err uhttpd[3140]: [C]: in function 'assert' Sun Mar 20 10:37:40 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:474: in function 'dispatch' Sun Mar 20 10:37:40 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:126: in function </usr/lib/lua/luci/dispatcher.lua:125> Sun Mar 20 10:37:41 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:474: Failed to execute call dispatcher target for entry '/admin/services/openclash/startlog'. Sun Mar 20 10:37:41 2022 daemon.err uhttpd[3140]: The called action terminated with an exception: Sun Mar 20 10:37:41 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/controller/openclash.lua:1362: bad argument #1 to 'find' (string expected, got nil) Sun Mar 20 10:37:41 2022 daemon.err uhttpd[3140]: stack traceback: Sun Mar 20 10:37:41 2022 daemon.err uhttpd[3140]: [C]: in function 'assert' Sun Mar 20 10:37:41 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:474: in function 'dispatch' Sun Mar 20 10:37:41 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:126: in function </usr/lib/lua/luci/dispatcher.lua:125> Sun Mar 20 10:37:42 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:474: Failed to execute call dispatcher target for entry '/admin/services/openclash/startlog'. Sun Mar 20 10:37:42 2022 daemon.err uhttpd[3140]: The called action terminated with an exception: Sun Mar 20 10:37:42 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/controller/openclash.lua:1362: bad argument #1 to 'find' (string expected, got nil) Sun Mar 20 10:37:42 2022 daemon.err uhttpd[3140]: stack traceback: Sun Mar 20 10:37:42 2022 daemon.err uhttpd[3140]: [C]: in function 'assert' Sun Mar 20 10:37:42 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:474: in function 'dispatch' Sun Mar 20 10:37:42 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:126: in function </usr/lib/lua/luci/dispatcher.lua:125> Sun Mar 20 10:37:43 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:474: Failed to execute call dispatcher target for entry '/admin/services/openclash/startlog'. Sun Mar 20 10:37:43 2022 daemon.err uhttpd[3140]: The called action terminated with an exception: Sun Mar 20 10:37:43 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/controller/openclash.lua:1362: bad argument #1 to 'find' (string expected, got nil) Sun Mar 20 10:37:43 2022 daemon.err uhttpd[3140]: stack traceback: Sun Mar 20 10:37:43 2022 daemon.err uhttpd[3140]: [C]: in function 'assert' Sun Mar 20 10:37:43 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:474: in function 'dispatch' Sun Mar 20 10:37:43 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:126: in function </usr/lib/lua/luci/dispatcher.lua:125> Sun Mar 20 10:37:43 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:474: Failed to execute call dispatcher target for entry '/admin/services/openclash/startlog'. Sun Mar 20 10:37:43 2022 daemon.err uhttpd[3140]: The called action terminated with an exception: Sun Mar 20 10:37:43 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/controller/openclash.lua:1362: bad argument #1 to 'find' (string expected, got nil) Sun Mar 20 10:37:43 2022 daemon.err uhttpd[3140]: stack traceback: Sun Mar 20 10:37:43 2022 daemon.err uhttpd[3140]: [C]: in function 'assert' Sun Mar 20 10:37:43 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:474: in function 'dispatch' Sun Mar 20 10:37:43 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:126: in function </usr/lib/lua/luci/dispatcher.lua:125> Sun Mar 20 10:37:44 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:474: Failed to execute call dispatcher target for entry '/admin/services/openclash/startlog'. Sun Mar 20 10:37:44 2022 daemon.err uhttpd[3140]: The called action terminated with an exception: Sun Mar 20 10:37:44 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/controller/openclash.lua:1362: bad argument #1 to 'find' (string expected, got nil) Sun Mar 20 10:37:44 2022 daemon.err uhttpd[3140]: stack traceback: Sun Mar 20 10:37:44 2022 daemon.err uhttpd[3140]: [C]: in function 'assert' Sun Mar 20 10:37:44 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:474: in function 'dispatch' Sun Mar 20 10:37:44 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:126: in function </usr/lib/lua/luci/dispatcher.lua:125> Sun Mar 20 10:37:45 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:474: Failed to execute call dispatcher target for entry '/admin/services/openclash/startlog'. Sun Mar 20 10:37:45 2022 daemon.err uhttpd[3140]: The called action terminated with an exception: Sun Mar 20 10:37:45 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/controller/openclash.lua:1362: bad argument #1 to 'find' (string expected, got nil) Sun Mar 20 10:37:45 2022 daemon.err uhttpd[3140]: stack traceback: Sun Mar 20 10:37:45 2022 daemon.err uhttpd[3140]: [C]: in function 'assert' Sun Mar 20 10:37:45 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:474: in function 'dispatch' Sun Mar 20 10:37:45 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:126: in function </usr/lib/lua/luci/dispatcher.lua:125> Sun Mar 20 10:37:46 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:474: Failed to execute call dispatcher target for entry '/admin/services/openclash/startlog'. Sun Mar 20 10:37:46 2022 daemon.err uhttpd[3140]: The called action terminated with an exception: Sun Mar 20 10:37:46 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/controller/openclash.lua:1362: bad argument #1 to 'find' (string expected, got nil) Sun Mar 20 10:37:46 2022 daemon.err uhttpd[3140]: stack traceback: Sun Mar 20 10:37:46 2022 daemon.err uhttpd[3140]: [C]: in function 'assert' Sun Mar 20 10:37:46 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:474: in function 'dispatch' Sun Mar 20 10:37:46 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:126: in function </usr/lib/lua/luci/dispatcher.lua:125> Sun Mar 20 10:37:47 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:474: Failed to execute call dispatcher target for entry '/admin/services/openclash/startlog'. Sun Mar 20 10:37:47 2022 daemon.err uhttpd[3140]: The called action terminated with an exception: Sun Mar 20 10:37:47 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/controller/openclash.lua:1362: bad argument #1 to 'find' (string expected, got nil) Sun Mar 20 10:37:47 2022 daemon.err uhttpd[3140]: stack traceback: Sun Mar 20 10:37:47 2022 daemon.err uhttpd[3140]: [C]: in function 'assert' Sun Mar 20 10:37:47 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:474: in function 'dispatch' Sun Mar 20 10:37:47 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:126: in function </usr/lib/lua/luci/dispatcher.lua:125> Sun Mar 20 10:37:48 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:474: Failed to execute call dispatcher target for entry '/admin/services/openclash/startlog'. Sun Mar 20 10:37:48 2022 daemon.err uhttpd[3140]: The called action terminated with an exception: Sun Mar 20 10:37:48 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/controller/openclash.lua:1362: bad argument #1 to 'find' (string expected, got nil) Sun Mar 20 10:37:48 2022 daemon.err uhttpd[3140]: stack traceback: Sun Mar 20 10:37:48 2022 daemon.err uhttpd[3140]: [C]: in function 'assert' Sun Mar 20 10:37:48 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:474: in function 'dispatch' Sun Mar 20 10:37:48 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:126: in function </usr/lib/lua/luci/dispatcher.lua:125> Sun Mar 20 10:37:49 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:474: Failed to execute call dispatcher target for entry '/admin/services/openclash/startlog'. Sun Mar 20 10:37:49 2022 daemon.err uhttpd[3140]: The called action terminated with an exception: Sun Mar 20 10:37:49 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/controller/openclash.lua:1362: bad argument #1 to 'find' (string expected, got nil) Sun Mar 20 10:37:49 2022 daemon.err uhttpd[3140]: stack traceback: Sun Mar 20 10:37:49 2022 daemon.err uhttpd[3140]: [C]: in function 'assert' Sun Mar 20 10:37:49 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:474: in function 'dispatch' Sun Mar 20 10:37:49 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:126: in function </usr/lib/lua/luci/dispatcher.lua:125> Sun Mar 20 10:37:49 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:474: Failed to execute call dispatcher target for entry '/admin/services/openclash/startlog'. Sun Mar 20 10:37:49 2022 daemon.err uhttpd[3140]: The called action terminated with an exception: Sun Mar 20 10:37:49 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/controller/openclash.lua:1362: bad argument #1 to 'find' (string expected, got nil) Sun Mar 20 10:37:49 2022 daemon.err uhttpd[3140]: stack traceback: Sun Mar 20 10:37:49 2022 daemon.err uhttpd[3140]: [C]: in function 'assert' Sun Mar 20 10:37:49 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:474: in function 'dispatch' Sun Mar 20 10:37:49 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:126: in function </usr/lib/lua/luci/dispatcher.lua:125> Sun Mar 20 10:37:50 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:474: Failed to execute call dispatcher target for entry '/admin/services/openclash/startlog'. Sun Mar 20 10:37:50 2022 daemon.err uhttpd[3140]: The called action terminated with an exception: Sun Mar 20 10:37:50 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/controller/openclash.lua:1362: bad argument #1 to 'find' (string expected, got nil) Sun Mar 20 10:37:50 2022 daemon.err uhttpd[3140]: stack traceback: Sun Mar 20 10:37:50 2022 daemon.err uhttpd[3140]: [C]: in function 'assert' Sun Mar 20 10:37:50 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:474: in function 'dispatch' Sun Mar 20 10:37:50 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:126: in function </usr/lib/lua/luci/dispatcher.lua:125> Sun Mar 20 10:37:51 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:474: Failed to execute call dispatcher target for entry '/admin/services/openclash/startlog'. Sun Mar 20 10:37:51 2022 daemon.err uhttpd[3140]: The called action terminated with an exception: Sun Mar 20 10:37:51 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/controller/openclash.lua:1362: bad argument #1 to 'find' (string expected, got nil) Sun Mar 20 10:37:51 2022 daemon.err uhttpd[3140]: stack traceback: Sun Mar 20 10:37:51 2022 daemon.err uhttpd[3140]: [C]: in function 'assert' Sun Mar 20 10:37:51 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:474: in function 'dispatch' Sun Mar 20 10:37:51 2022 daemon.err uhttpd[3140]: /usr/lib/lua/luci/dispatcher.lua:126: in function </usr/lib/lua/luci/dispatcher.lua:125> Sun Mar 20 10:38:13 2022 cron.err crond[1494]: crond (busybox 1.35.0) started, log level 8

hellcatjack commented 2 years ago

回滚到0.44.29后一切正常。

a76yyyy commented 2 years ago

@vernesong 同样在最新版出现此问题,请问是缺少哪个组件还是版本原因?

a76yyyy commented 2 years ago

OpenClash 调试日志

生成时间: 2022-03-26 21:27:50 插件版本: v0.44.34-beta


#===================== 系统信息 =====================#

主机型号: Phicomm N1
固件版本: OpenWrt SNAPSHOT r4360-04a6c950b
LuCI版本: git-22.068.45502-a50e601-1
内核版本: 5.4.186-flippy-71+o
处理器架构: aarch64_cortex-a53

#此项有值时,如不使用IPv6,建议到网络-接口-lan的设置中禁用IPV6的DHCP
IPV6-DHCP: server

#此项结果应仅有配置文件的DNS监听地址
Dnsmasq转发设置: 127.0.0.1#7874

#===================== 依赖检查 =====================#

dnsmasq-full: 已安装
coreutils: 已安装
coreutils-nohup: 已安装
bash: 已安装
curl: 已安装
ca-certificates: 已安装
ipset: 已安装
ip-full: 已安装
iptables-mod-tproxy: 已安装
kmod-ipt-tproxy: 已安装
iptables-mod-extra: 已安装
kmod-ipt-extra: 已安装
libcap: 已安装
libcap-bin: 已安装
ruby: 已安装
ruby-yaml: 已安装
ruby-psych: 已安装
ruby-pstore: 已安装
ruby-dbm: 已安装
kmod-tun(TUN模式): 已安装
luci-compat(Luci-19.07): 已安装

#===================== 内核检查 =====================#

运行状态: 运行中
进程pid: 18702
运行权限: 18702: cap_dac_override,cap_net_bind_service,cap_net_admin,cap_net_raw,cap_sys_ptrace,cap_sys_resource=eip
运行用户: nobody
已选择的架构: linux-armv8

#下方无法显示内核版本号时请确认您的内核版本是否正确或者有无权限
Tun内核版本: 2022.03.19
Tun内核文件: 存在
Tun内核运行权限: 正常

Dev内核版本: v1.10.0
Dev内核文件: 存在
Dev内核运行权限: 正常

#===================== 插件设置 =====================#

当前配置文件: /etc/openclash/config/default.yaml
启动配置文件: /etc/openclash/default.yaml
运行模式: redir-host-mix
默认代理模式: rule
UDP流量转发(tproxy): 停用
DNS劫持: 启用
自定义DNS: 停用
IPV6代理: 启用
IPV6-DNS解析: 启用
禁用Dnsmasq缓存: 启用
自定义规则: 启用
仅允许内网: 停用
仅代理命中规则流量: 启用
仅允许常用端口流量: 启用
绕过中国大陆IP: 停用
DNS远程解析: 停用

#启动异常时建议关闭此项后重试
混合节点: 停用
保留配置: 停用

#启动异常时建议关闭此项后重试
第三方规则: 停用

#===================== 自定义规则 一 =====================#
script:

rules:
- DOMAIN-SUFFIX,curl.se,🚀 手动切换
- DOMAIN-SUFFIX,zerotier.com,🚀 节点选择
- DST-PORT,22,DIRECT

#===================== 自定义规则 二 =====================#
script:
rules:

#===================== 配置文件 =====================#

port: 7890
socks-port: 7891
allow-lan: true
mode: rule
log-level: warning
external-controller: 0.0.0.0:9090
dns:
  nameserver:
  - dhcp://"eth0.100"
  - https://1.1.1.1/dns-query
  - tls://1.1.1.1:853
  - https://sm2.doh.pub/dns-query
  fallback:
  - https://cloudflare-dns.com/dns-query
  - https://dns.google/dns-query
  - https://1.1.1.1/dns-query
  - tls://1.1.1.1:853
  - https://dns.rubyfish.cn/dns-query:853
  - https://public.dns.iij.jp/dns-query
  - https://jp.tiar.app/dns-query
  - https://jp.tiarap.org/dns-query
  - tls://dot.tiar.app
  enable: true
  ipv6: true
  enhanced-mode: redir-host
  listen: 0.0.0.0:7874
redir-port: 7892
tproxy-port: 7895
mixed-port: 7893
bind-address: "*"
external-ui: "/usr/share/openclash/dashboard"
ipv6: true
tun:
  enable: true
  stack: system
  dns-hijack:
  - tcp://8.8.8.8:53
  - tcp://8.8.4.4:53
profile:
  store-selected: true
  store-fake-ip: true

#===================== 防火墙设置 =====================#

#IPv4 NAT chain

# Generated by iptables-save v1.8.7 on Sat Mar 26 21:27:54 2022
*nat
:PREROUTING ACCEPT [550:78716]
:INPUT ACCEPT [643:36805]
:OUTPUT ACCEPT [4121:250990]
:POSTROUTING ACCEPT [335:21884]
:MINIUPNPD - [0:0]
:MINIUPNPD-POSTROUTING - [0:0]
:openclash - [0:0]
:openclash_output - [0:0]
:postrouting_docker_rule - [0:0]
:postrouting_lan_rule - [0:0]
:postrouting_rule - [0:0]
:postrouting_vpn_rule - [0:0]
:postrouting_wan_rule - [0:0]
:prerouting_docker_rule - [0:0]
:prerouting_lan_rule - [0:0]
:prerouting_rule - [0:0]
:prerouting_vpn_rule - [0:0]
:prerouting_wan_rule - [0:0]
:zone_docker_postrouting - [0:0]
:zone_docker_prerouting - [0:0]
:zone_lan_postrouting - [0:0]
:zone_lan_prerouting - [0:0]
:zone_vpn_postrouting - [0:0]
:zone_vpn_prerouting - [0:0]
:zone_wan_postrouting - [0:0]
:zone_wan_prerouting - [0:0]
-A PREROUTING -d 8.8.4.4/32 -p tcp -m comment --comment "OpenClash Google DNS Hijack" -m tcp --dport 53 -j ACCEPT
-A PREROUTING -d 8.8.8.8/32 -p tcp -m comment --comment "OpenClash Google DNS Hijack" -m tcp --dport 53 -j ACCEPT
-A PREROUTING -p tcp -m tcp --dport 53 -m comment --comment "OpenClash DNS Hijack" -j REDIRECT --to-ports 53
-A PREROUTING -p udp -m udp --dport 53 -m comment --comment "OpenClash DNS Hijack" -j REDIRECT --to-ports 53
-A PREROUTING -m comment --comment "!fw3: Custom prerouting rule chain" -j prerouting_rule
-A PREROUTING -i eth0.10 -m comment --comment "!fw3" -j zone_lan_prerouting
-A PREROUTING -i eth0.100 -m comment --comment "!fw3" -j zone_wan_prerouting
-A PREROUTING -i tun0 -m comment --comment "!fw3" -j zone_vpn_prerouting
-A PREROUTING -i docker0 -m comment --comment "!fw3" -j zone_docker_prerouting
-A PREROUTING -p tcp -j openclash
-A OUTPUT -j openclash_output
-A POSTROUTING -s 172.25.0.0/16 -j MASQUERADE
-A POSTROUTING -o ztuku2crnt -j MASQUERADE
-A POSTROUTING -o eth0.100 -j MASQUERADE
-A POSTROUTING -m comment --comment "!fw3: Custom postrouting rule chain" -j postrouting_rule
-A POSTROUTING -o eth0.10 -m comment --comment "!fw3" -j zone_lan_postrouting
-A POSTROUTING -o eth0.100 -m comment --comment "!fw3" -j zone_wan_postrouting
-A POSTROUTING -o tun0 -m comment --comment "!fw3" -j zone_vpn_postrouting
-A POSTROUTING -o docker0 -m comment --comment "!fw3" -j zone_docker_postrouting
-A MINIUPNPD -p udp -m udp --dport 33671 -j DNAT --to-destination 192.168.123.14:33671
-A MINIUPNPD -p udp -m udp --dport 29995 -j DNAT --to-destination 192.168.123.13:29994
-A MINIUPNPD -p udp -m udp --dport 29996 -j DNAT --to-destination 192.168.123.72:29994
-A MINIUPNPD-POSTROUTING -s 192.168.123.13/32 -p udp -m udp --sport 29994 -j MASQUERADE --to-ports 29995
-A MINIUPNPD-POSTROUTING -s 192.168.123.72/32 -p udp -m udp --sport 29994 -j MASQUERADE --to-ports 29996
-A openclash -p tcp -m tcp --sport 1688 -j RETURN
-A openclash -p tcp -m tcp --sport 1194 -j RETURN
-A openclash -m set --match-set localnetwork dst -j RETURN
-A openclash -m set ! --match-set common_ports dst -j RETURN
-A openclash -p tcp -j REDIRECT --to-ports 7892
-A openclash_output -p tcp -m tcp --sport 1688 -j RETURN
-A openclash_output -p tcp -m tcp --sport 1194 -j RETURN
-A openclash_output -m set --match-set localnetwork dst -j RETURN
-A openclash_output -m owner ! --uid-owner 65534 -m set ! --match-set common_ports dst -j RETURN
-A openclash_output -p tcp -m owner ! --uid-owner 65534 -j REDIRECT --to-ports 7892
-A zone_docker_postrouting -m comment --comment "!fw3: Custom docker postrouting rule chain" -j postrouting_docker_rule
-A zone_docker_prerouting -m comment --comment "!fw3: Custom docker prerouting rule chain" -j prerouting_docker_rule
-A zone_lan_postrouting -m comment --comment "!fw3: Custom lan postrouting rule chain" -j postrouting_lan_rule
-A zone_lan_prerouting -m comment --comment "!fw3: Custom lan prerouting rule chain" -j prerouting_lan_rule
-A zone_vpn_postrouting -m comment --comment "!fw3: Custom vpn postrouting rule chain" -j postrouting_vpn_rule
-A zone_vpn_postrouting -m comment --comment "!fw3" -j FULLCONENAT
-A zone_vpn_prerouting -m comment --comment "!fw3: Custom vpn prerouting rule chain" -j prerouting_vpn_rule
-A zone_vpn_prerouting -m comment --comment "!fw3" -j FULLCONENAT
-A zone_wan_postrouting -j MINIUPNPD-POSTROUTING
-A zone_wan_postrouting -j MINIUPNPD-POSTROUTING
-A zone_wan_postrouting -m comment --comment "!fw3: Custom wan postrouting rule chain" -j postrouting_wan_rule
-A zone_wan_postrouting -m comment --comment "!fw3" -j FULLCONENAT
-A zone_wan_prerouting -j MINIUPNPD
-A zone_wan_prerouting -j MINIUPNPD
-A zone_wan_prerouting -m comment --comment "!fw3: Custom wan prerouting rule chain" -j prerouting_wan_rule
-A zone_wan_prerouting -m comment --comment "!fw3" -j FULLCONENAT
COMMIT
# Completed on Sat Mar 26 21:27:54 2022

#IPv4 Mangle chain

# Generated by iptables-save v1.8.7 on Sat Mar 26 21:27:54 2022
*mangle
:PREROUTING ACCEPT [5862:1605123]
:INPUT ACCEPT [5083:1494922]
:FORWARD ACCEPT [715:94288]
:OUTPUT ACCEPT [6519:4382435]
:POSTROUTING ACCEPT [7220:4475057]
:RRDIPT_FORWARD - [0:0]
:RRDIPT_INPUT - [0:0]
:RRDIPT_OUTPUT - [0:0]
:openclash - [0:0]
:openclash_dns_hijack - [0:0]
-A PREROUTING -p udp -j openclash
-A PREROUTING -p tcp -m tcp --dport 53 -j openclash_dns_hijack
-A INPUT -j RRDIPT_INPUT
-A FORWARD -j RRDIPT_FORWARD
-A FORWARD -o eth0.100 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -i eth0.100 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A OUTPUT -j RRDIPT_OUTPUT
-A RRDIPT_FORWARD -s 192.168.123.100/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.123.100/32 -j RETURN
-A RRDIPT_INPUT -i eth0 -j RETURN
-A RRDIPT_INPUT -i eth0.100 -j RETURN
-A RRDIPT_OUTPUT -o eth0 -j RETURN
-A RRDIPT_OUTPUT -o eth0.100 -j RETURN
-A openclash -p udp -m udp --sport 1194 -j RETURN
-A openclash -p udp -m udp --sport 500 -j RETURN
-A openclash -p udp -m udp --sport 68 -j RETURN
-A openclash -i utun -j RETURN
-A openclash -m set --match-set localnetwork dst -j RETURN
-A openclash -m set ! --match-set common_ports dst -j RETURN
-A openclash -j MARK --set-xmark 0x162/0xffffffff
-A openclash_dns_hijack -d 8.8.8.8/32 -m comment --comment "OpenClash Google DNS Hijack" -j MARK --set-xmark 0x162/0xffffffff
-A openclash_dns_hijack -d 8.8.4.4/32 -m comment --comment "OpenClash Google DNS Hijack" -j MARK --set-xmark 0x162/0xffffffff
COMMIT
# Completed on Sat Mar 26 21:27:54 2022

#IPv4 Filter chain

# Generated by iptables-save v1.8.7 on Sat Mar 26 21:27:54 2022
*filter
:INPUT ACCEPT [231:17383]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [0:0]
:MINIUPNPD - [0:0]
:forwarding_docker_rule - [0:0]
:forwarding_lan_rule - [0:0]
:forwarding_rule - [0:0]
:forwarding_vpn_rule - [0:0]
:forwarding_wan_rule - [0:0]
:input_docker_rule - [0:0]
:input_lan_rule - [0:0]
:input_rule - [0:0]
:input_vpn_rule - [0:0]
:input_wan_rule - [0:0]
:output_docker_rule - [0:0]
:output_lan_rule - [0:0]
:output_rule - [0:0]
:output_vpn_rule - [0:0]
:output_wan_rule - [0:0]
:reject - [0:0]
:syn_flood - [0:0]
:zone_docker_dest_ACCEPT - [0:0]
:zone_docker_forward - [0:0]
:zone_docker_input - [0:0]
:zone_docker_output - [0:0]
:zone_docker_src_ACCEPT - [0:0]
:zone_lan_dest_ACCEPT - [0:0]
:zone_lan_forward - [0:0]
:zone_lan_input - [0:0]
:zone_lan_output - [0:0]
:zone_lan_src_ACCEPT - [0:0]
:zone_vpn_dest_ACCEPT - [0:0]
:zone_vpn_forward - [0:0]
:zone_vpn_input - [0:0]
:zone_vpn_output - [0:0]
:zone_vpn_src_ACCEPT - [0:0]
:zone_wan_dest_ACCEPT - [0:0]
:zone_wan_dest_DROP - [0:0]
:zone_wan_forward - [0:0]
:zone_wan_input - [0:0]
:zone_wan_output - [0:0]
:zone_wan_src_ACCEPT - [0:0]
-A INPUT -i lo -m comment --comment "!fw3" -j ACCEPT
-A INPUT -m comment --comment "!fw3: Custom input rule chain" -j input_rule
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m comment --comment "!fw3" -j syn_flood
-A INPUT -i eth0.10 -m comment --comment "!fw3" -j zone_lan_input
-A INPUT -i eth0.100 -m comment --comment "!fw3" -j zone_wan_input
-A INPUT -i tun0 -m comment --comment "!fw3" -j zone_vpn_input
-A INPUT -i docker0 -m comment --comment "!fw3" -j zone_docker_input
-A FORWARD -o utun -p udp -m udp --dport 443 -m comment --comment "OpenClash QUIC REJECT" -m set ! --match-set china_ip_route dst -j REJECT --reject-with icmp-port-unreachable
-A FORWARD -o utun -m comment --comment "OpenClash TUN Forward" -j ACCEPT
-A FORWARD -o ztuku2crnt -j ACCEPT
-A FORWARD -i ztuku2crnt -j ACCEPT
-A FORWARD -m comment --comment "!fw3: Custom forwarding rule chain" -j forwarding_rule
-A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A FORWARD -p tcp -m tcp --dport 22 -m comment --comment "!fw3: drop-wan-ssh" -j zone_wan_dest_DROP
-A FORWARD -i eth0.10 -m comment --comment "!fw3" -j zone_lan_forward
-A FORWARD -i eth0.100 -m comment --comment "!fw3" -j zone_wan_forward
-A FORWARD -i tun0 -m comment --comment "!fw3" -j zone_vpn_forward
-A FORWARD -i docker0 -m comment --comment "!fw3" -j zone_docker_forward
-A FORWARD -m comment --comment "!fw3" -j reject
-A OUTPUT -o lo -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -m comment --comment "!fw3: Custom output rule chain" -j output_rule
-A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -o eth0.10 -m comment --comment "!fw3" -j zone_lan_output
-A OUTPUT -o eth0.100 -m comment --comment "!fw3" -j zone_wan_output
-A OUTPUT -o tun0 -m comment --comment "!fw3" -j zone_vpn_output
-A OUTPUT -o docker0 -m comment --comment "!fw3" -j zone_docker_output
-A MINIUPNPD -d 192.168.123.14/32 -p udp -m udp --dport 33671 -j ACCEPT
-A MINIUPNPD -d 192.168.123.13/32 -p udp -m udp --dport 29994 -j ACCEPT
-A MINIUPNPD -d 192.168.123.13/32 -p udp -m udp --dport 29994 -j ACCEPT
-A MINIUPNPD -d 192.168.123.72/32 -p udp -m udp --dport 29994 -j ACCEPT
-A reject -p tcp -m comment --comment "!fw3" -j REJECT --reject-with tcp-reset
-A reject -m comment --comment "!fw3" -j REJECT --reject-with icmp-port-unreachable
-A syn_flood -m limit --limit 25/sec --limit-burst 50 -m comment --comment "!fw3" -j RETURN
-A syn_flood -m comment --comment "!fw3" -j DROP
-A zone_docker_dest_ACCEPT -o docker0 -m comment --comment "!fw3" -j ACCEPT
-A zone_docker_forward -m comment --comment "!fw3: Custom docker forwarding rule chain" -j forwarding_docker_rule
-A zone_docker_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_docker_forward -m comment --comment "!fw3" -j zone_docker_dest_ACCEPT
-A zone_docker_input -m comment --comment "!fw3: Custom docker input rule chain" -j input_docker_rule
-A zone_docker_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_docker_input -m comment --comment "!fw3" -j zone_docker_src_ACCEPT
-A zone_docker_output -m comment --comment "!fw3: Custom docker output rule chain" -j output_docker_rule
-A zone_docker_output -m comment --comment "!fw3" -j zone_docker_dest_ACCEPT
-A zone_docker_src_ACCEPT -i docker0 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_dest_ACCEPT -o eth0.10 -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_forward -m comment --comment "!fw3: Custom lan forwarding rule chain" -j forwarding_lan_rule
-A zone_lan_forward -m comment --comment "!fw3: Zone lan to wan forwarding policy" -j zone_wan_dest_ACCEPT
-A zone_lan_forward -m comment --comment "!fw3: Zone lan to vpn forwarding policy" -j zone_vpn_dest_ACCEPT
-A zone_lan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_lan_forward -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_input -m comment --comment "!fw3: Custom lan input rule chain" -j input_lan_rule
-A zone_lan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_lan_input -m comment --comment "!fw3" -j zone_lan_src_ACCEPT
-A zone_lan_output -m comment --comment "!fw3: Custom lan output rule chain" -j output_lan_rule
-A zone_lan_output -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_src_ACCEPT -i eth0.10 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_vpn_dest_ACCEPT -o tun0 -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
-A zone_vpn_dest_ACCEPT -o tun0 -m comment --comment "!fw3" -j ACCEPT
-A zone_vpn_forward -m comment --comment "!fw3: Custom vpn forwarding rule chain" -j forwarding_vpn_rule
-A zone_vpn_forward -m comment --comment "!fw3: Zone vpn to wan forwarding policy" -j zone_wan_dest_ACCEPT
-A zone_vpn_forward -m comment --comment "!fw3: Zone vpn to lan forwarding policy" -j zone_lan_dest_ACCEPT
-A zone_vpn_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_vpn_forward -m comment --comment "!fw3" -j zone_vpn_dest_ACCEPT
-A zone_vpn_input -m comment --comment "!fw3: Custom vpn input rule chain" -j input_vpn_rule
-A zone_vpn_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_vpn_input -m comment --comment "!fw3" -j zone_vpn_src_ACCEPT
-A zone_vpn_output -m comment --comment "!fw3: Custom vpn output rule chain" -j output_vpn_rule
-A zone_vpn_output -m comment --comment "!fw3" -j zone_vpn_dest_ACCEPT
-A zone_vpn_src_ACCEPT -i tun0 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_ACCEPT -o eth0.100 -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
-A zone_wan_dest_ACCEPT -o eth0.100 -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_DROP -o eth0.100 -m comment --comment "!fw3" -j DROP
-A zone_wan_forward -j MINIUPNPD
-A zone_wan_forward -j MINIUPNPD
-A zone_wan_forward -m comment --comment "!fw3: Custom wan forwarding rule chain" -j forwarding_wan_rule
-A zone_wan_forward -p esp -m comment --comment "!fw3: Allow-IPSec-ESP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -p udp -m udp --dport 500 -m comment --comment "!fw3: Allow-ISAKMP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -m comment --comment "!fw3: Zone wan to lan forwarding policy" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_wan_forward -m comment --comment "!fw3" -j zone_wan_dest_ACCEPT
-A zone_wan_input -m comment --comment "!fw3: Custom wan input rule chain" -j input_wan_rule
-A zone_wan_input -p udp -m udp --dport 68 -m comment --comment "!fw3: Allow-DHCP-Renew" -j ACCEPT
-A zone_wan_input -p icmp -m icmp --icmp-type 8 -m comment --comment "!fw3: Allow-Ping" -j ACCEPT
-A zone_wan_input -p igmp -m comment --comment "!fw3: Allow-IGMP" -j ACCEPT
-A zone_wan_input -p tcp -m tcp --dport 8118 -m comment --comment "!fw3: adblock" -j DROP
-A zone_wan_input -p tcp -m tcp --dport 1194 -m comment --comment "!fw3: openvpn" -j ACCEPT
-A zone_wan_input -p udp -m udp --dport 1194 -m comment --comment "!fw3: openvpn" -j ACCEPT
-A zone_wan_input -p tcp -m tcp --dport 1688 -m comment --comment "!fw3: kms" -j ACCEPT
-A zone_wan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_wan_input -m comment --comment "!fw3" -j zone_wan_src_ACCEPT
-A zone_wan_output -m comment --comment "!fw3: Custom wan output rule chain" -j output_wan_rule
-A zone_wan_output -m comment --comment "!fw3" -j zone_wan_dest_ACCEPT
-A zone_wan_src_ACCEPT -i eth0.100 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
COMMIT
# Completed on Sat Mar 26 21:27:54 2022

#IPv6 NAT chain

# Generated by ip6tables-save v1.8.7 on Sat Mar 26 21:27:54 2022
*nat
:PREROUTING ACCEPT [847:184487]
:INPUT ACCEPT [1281:114554]
:OUTPUT ACCEPT [168:13763]
:POSTROUTING ACCEPT [179:15215]
-A PREROUTING -d 2001:4860:4860::8844/128 -p tcp -m comment --comment "OpenClash Google DNS Hijack" -m tcp --dport 53 -j ACCEPT
-A PREROUTING -d 2001:4860:4860::8888/128 -p tcp -m comment --comment "OpenClash Google DNS Hijack" -m tcp --dport 53 -j ACCEPT
-A PREROUTING -p tcp -m tcp --dport 53 -m comment --comment "OpenClash DNS Hijack" -j REDIRECT --to-ports 53
-A PREROUTING -p udp -m udp --dport 53 -m comment --comment "OpenClash DNS Hijack" -j REDIRECT --to-ports 53
COMMIT
# Completed on Sat Mar 26 21:27:54 2022

#IPv6 Mangle chain

# Generated by ip6tables-save v1.8.7 on Sat Mar 26 21:27:54 2022
*mangle
:PREROUTING ACCEPT [17106:3079925]
:INPUT ACCEPT [5536:610993]
:FORWARD ACCEPT [11315:2421732]
:OUTPUT ACCEPT [5693:941892]
:POSTROUTING ACCEPT [17075:3368448]
:openclash - [0:0]
:openclash_output - [0:0]
-A PREROUTING -j openclash
-A FORWARD -o eth0.100 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -i eth0.100 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A OUTPUT -j openclash_output
-A openclash -p tcp -m tcp --sport 1688 -j RETURN
-A openclash -p udp -m udp --sport 1194 -j RETURN
-A openclash -p tcp -m tcp --sport 1194 -j RETURN
-A openclash -p udp -m udp --sport 500 -j RETURN
-A openclash -s fc00::/6 -p udp -m udp --sport 546 -j RETURN
-A openclash -m set --match-set localnetwork6 dst -j RETURN
-A openclash -m set ! --match-set common_ports dst -j RETURN
-A openclash -p tcp -m comment --comment "OpenClash TCP Mark" -j TPROXY --on-port 7895 --on-ip :: --tproxy-mark 0x162/0xffffffff
-A openclash -p udp -m comment --comment OpenClash -j TPROXY --on-port 7895 --on-ip :: --tproxy-mark 0x162/0xffffffff
-A openclash_output -p tcp -m tcp --sport 1688 -j RETURN
-A openclash_output -p udp -m udp --sport 1194 -j RETURN
-A openclash_output -p tcp -m tcp --sport 1194 -j RETURN
-A openclash_output -p udp -m udp --sport 500 -j RETURN
-A openclash_output -p udp -m udp --sport 546 -j RETURN
-A openclash_output -m set --match-set localnetwork6 dst -j RETURN
-A openclash_output -m owner ! --uid-owner 65534 -m set ! --match-set common_ports dst -j RETURN
-A openclash_output -p tcp -m owner ! --uid-owner 65534 -j MARK --set-xmark 0x162/0xffffffff
-A openclash_output -p udp -m owner ! --uid-owner 65534 -j MARK --set-xmark 0x162/0xffffffff
COMMIT
# Completed on Sat Mar 26 21:27:54 2022

#IPv6 Filter chain

# Generated by ip6tables-save v1.8.7 on Sat Mar 26 21:27:55 2022
*filter
:INPUT ACCEPT [820:82224]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [8:392]
:MINIUPNPD - [0:0]
:forwarding_docker_rule - [0:0]
:forwarding_lan_rule - [0:0]
:forwarding_rule - [0:0]
:forwarding_vpn_rule - [0:0]
:forwarding_wan_rule - [0:0]
:input_docker_rule - [0:0]
:input_lan_rule - [0:0]
:input_rule - [0:0]
:input_vpn_rule - [0:0]
:input_wan_rule - [0:0]
:output_docker_rule - [0:0]
:output_lan_rule - [0:0]
:output_rule - [0:0]
:output_vpn_rule - [0:0]
:output_wan_rule - [0:0]
:reject - [0:0]
:syn_flood - [0:0]
:zone_docker_dest_ACCEPT - [0:0]
:zone_docker_forward - [0:0]
:zone_docker_input - [0:0]
:zone_docker_output - [0:0]
:zone_docker_src_ACCEPT - [0:0]
:zone_lan_dest_ACCEPT - [0:0]
:zone_lan_forward - [0:0]
:zone_lan_input - [0:0]
:zone_lan_output - [0:0]
:zone_lan_src_ACCEPT - [0:0]
:zone_vpn_dest_ACCEPT - [0:0]
:zone_vpn_forward - [0:0]
:zone_vpn_input - [0:0]
:zone_vpn_output - [0:0]
:zone_vpn_src_ACCEPT - [0:0]
:zone_wan_dest_ACCEPT - [0:0]
:zone_wan_dest_DROP - [0:0]
:zone_wan_forward - [0:0]
:zone_wan_input - [0:0]
:zone_wan_output - [0:0]
:zone_wan_src_ACCEPT - [0:0]
-A INPUT -p udp -m udp --dport 443 -m comment --comment "OpenClash QUIC REJECT" -m set ! --match-set china_ip6_route dst -j REJECT --reject-with icmp6-port-unreachable
-A INPUT -i lo -m comment --comment "!fw3" -j ACCEPT
-A INPUT -m comment --comment "!fw3: Custom input rule chain" -j input_rule
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m comment --comment "!fw3" -j syn_flood
-A INPUT -i eth0.10 -m comment --comment "!fw3" -j zone_lan_input
-A INPUT -i eth0.100 -m comment --comment "!fw3" -j zone_wan_input
-A INPUT -i tun0 -m comment --comment "!fw3" -j zone_vpn_input
-A INPUT -i docker0 -m comment --comment "!fw3" -j zone_docker_input
-A FORWARD -m comment --comment "!fw3: Custom forwarding rule chain" -j forwarding_rule
-A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A FORWARD -p tcp -m tcp --dport 22 -m comment --comment "!fw3: drop-wan-ssh" -j zone_wan_dest_DROP
-A FORWARD -i eth0.10 -m comment --comment "!fw3" -j zone_lan_forward
-A FORWARD -i eth0.100 -m comment --comment "!fw3" -j zone_wan_forward
-A FORWARD -i tun0 -m comment --comment "!fw3" -j zone_vpn_forward
-A FORWARD -i docker0 -m comment --comment "!fw3" -j zone_docker_forward
-A FORWARD -m comment --comment "!fw3" -j reject
-A OUTPUT -o lo -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -m comment --comment "!fw3: Custom output rule chain" -j output_rule
-A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -o eth0.10 -m comment --comment "!fw3" -j zone_lan_output
-A OUTPUT -o eth0.100 -m comment --comment "!fw3" -j zone_wan_output
-A OUTPUT -o tun0 -m comment --comment "!fw3" -j zone_vpn_output
-A OUTPUT -o docker0 -m comment --comment "!fw3" -j zone_docker_output
-A reject -p tcp -m comment --comment "!fw3" -j REJECT --reject-with tcp-reset
-A reject -m comment --comment "!fw3" -j REJECT --reject-with icmp6-port-unreachable
-A syn_flood -m limit --limit 25/sec --limit-burst 50 -m comment --comment "!fw3" -j RETURN
-A syn_flood -m comment --comment "!fw3" -j DROP
-A zone_docker_dest_ACCEPT -o docker0 -m comment --comment "!fw3" -j ACCEPT
-A zone_docker_forward -m comment --comment "!fw3: Custom docker forwarding rule chain" -j forwarding_docker_rule
-A zone_docker_forward -m comment --comment "!fw3" -j zone_docker_dest_ACCEPT
-A zone_docker_input -m comment --comment "!fw3: Custom docker input rule chain" -j input_docker_rule
-A zone_docker_input -m comment --comment "!fw3" -j zone_docker_src_ACCEPT
-A zone_docker_output -m comment --comment "!fw3: Custom docker output rule chain" -j output_docker_rule
-A zone_docker_output -m comment --comment "!fw3" -j zone_docker_dest_ACCEPT
-A zone_docker_src_ACCEPT -i docker0 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_dest_ACCEPT -o eth0.10 -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_forward -m comment --comment "!fw3: Custom lan forwarding rule chain" -j forwarding_lan_rule
-A zone_lan_forward -m comment --comment "!fw3: Zone lan to wan forwarding policy" -j zone_wan_dest_ACCEPT
-A zone_lan_forward -m comment --comment "!fw3: Zone lan to vpn forwarding policy" -j zone_vpn_dest_ACCEPT
-A zone_lan_forward -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_input -m comment --comment "!fw3: Custom lan input rule chain" -j input_lan_rule
-A zone_lan_input -m comment --comment "!fw3" -j zone_lan_src_ACCEPT
-A zone_lan_output -m comment --comment "!fw3: Custom lan output rule chain" -j output_lan_rule
-A zone_lan_output -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_src_ACCEPT -i eth0.10 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_vpn_dest_ACCEPT -o tun0 -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
-A zone_vpn_dest_ACCEPT -o tun0 -m comment --comment "!fw3" -j ACCEPT
-A zone_vpn_forward -m comment --comment "!fw3: Custom vpn forwarding rule chain" -j forwarding_vpn_rule
-A zone_vpn_forward -m comment --comment "!fw3: Zone vpn to wan forwarding policy" -j zone_wan_dest_ACCEPT
-A zone_vpn_forward -m comment --comment "!fw3: Zone vpn to lan forwarding policy" -j zone_lan_dest_ACCEPT
-A zone_vpn_forward -m comment --comment "!fw3" -j zone_vpn_dest_ACCEPT
-A zone_vpn_input -m comment --comment "!fw3: Custom vpn input rule chain" -j input_vpn_rule
-A zone_vpn_input -m comment --comment "!fw3" -j zone_vpn_src_ACCEPT
-A zone_vpn_output -m comment --comment "!fw3: Custom vpn output rule chain" -j output_vpn_rule
-A zone_vpn_output -m comment --comment "!fw3" -j zone_vpn_dest_ACCEPT
-A zone_vpn_src_ACCEPT -i tun0 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_ACCEPT -o eth0.100 -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
-A zone_wan_dest_ACCEPT -o eth0.100 -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_DROP -o eth0.100 -m comment --comment "!fw3" -j DROP
-A zone_wan_forward -j MINIUPNPD
-A zone_wan_forward -j MINIUPNPD
-A zone_wan_forward -m comment --comment "!fw3: Custom wan forwarding rule chain" -j forwarding_wan_rule
-A zone_wan_forward -p esp -m comment --comment "!fw3: Allow-IPSec-ESP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -p udp -m udp --dport 500 -m comment --comment "!fw3: Allow-ISAKMP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -m comment --comment "!fw3: Zone wan to lan forwarding policy" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -m comment --comment "!fw3" -j zone_wan_dest_ACCEPT
-A zone_wan_input -m comment --comment "!fw3: Custom wan input rule chain" -j input_wan_rule
-A zone_wan_input -s fc00::/6 -d fc00::/6 -p udp -m udp --dport 546 -m comment --comment "!fw3: Allow-DHCPv6" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 130/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 131/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 132/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 143/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 128 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 129 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 2 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 3 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 4/0 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 4/1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 133 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 135 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 134 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 136 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p tcp -m tcp --dport 8118 -m comment --comment "!fw3: adblock" -j DROP
-A zone_wan_input -p tcp -m tcp --dport 1194 -m comment --comment "!fw3: openvpn" -j ACCEPT
-A zone_wan_input -p udp -m udp --dport 1194 -m comment --comment "!fw3: openvpn" -j ACCEPT
-A zone_wan_input -p tcp -m tcp --dport 1688 -m comment --comment "!fw3: kms" -j ACCEPT
-A zone_wan_input -m comment --comment "!fw3" -j zone_wan_src_ACCEPT
-A zone_wan_output -m comment --comment "!fw3: Custom wan output rule chain" -j output_wan_rule
-A zone_wan_output -m comment --comment "!fw3" -j zone_wan_dest_ACCEPT
-A zone_wan_src_ACCEPT -i eth0.100 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
COMMIT
# Completed on Sat Mar 26 21:27:55 2022

#===================== IPSET状态 =====================#

Name: music
Name: china_ip_route
Name: localnetwork
Name: common_ports
Name: china_ip6_route
Name: localnetwork6

#ip rule show
0:  from all lookup local
32765:  from all fwmark 0x162 lookup 354
32766:  from all lookup main
32767:  from all lookup default

#===================== Tun设备状态 =====================#

ztuku2crnt: tap
utun: tun

#===================== 端口占用状态 =====================#

tcp        0      0 198.18.0.1:7777         0.0.0.0:*               LISTEN      18702/clash
tcp        0      0 :::7890                 :::*                    LISTEN      18702/clash
tcp        0      0 :::7891                 :::*                    LISTEN      18702/clash
tcp        0      0 :::7892                 :::*                    LISTEN      18702/clash
tcp        0      0 :::7893                 :::*                    LISTEN      18702/clash
tcp        0      0 :::7895                 :::*                    LISTEN      18702/clash
tcp        0      0 :::9090                 :::*                    LISTEN      18702/clash
udp        0      0 198.18.0.1:7777         0.0.0.0:*                           18702/clash
udp        0      0 :::60242                :::*                                18702/clash
udp        0      0 :::7874                 :::*                                18702/clash
udp        0      0 :::7891                 :::*                                18702/clash
udp        0      0 :::7892                 :::*                                18702/clash
udp        0      0 :::7893                 :::*                                18702/clash
udp        0      0 :::7895                 :::*                                18702/clash

#===================== 测试本机DNS查询 =====================#

Server:     127.0.0.1
Address:    127.0.0.1:53

www.baidu.com   canonical name = www.a.shifen.com
Name:   www.a.shifen.com
Address: 182.61.200.7
Name:   www.a.shifen.com
Address: 182.61.200.6

www.baidu.com   canonical name = www.a.shifen.com
www.a.shifen.com    canonical name = www.wshifen.com

#===================== 测试本机网络连接 =====================#

HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: private, no-cache, no-store, proxy-revalidate, no-transform
Connection: keep-alive
Content-Length: 277
Content-Type: text/html
Date: Sat, 26 Mar 2022 13:27:55 GMT
Etag: "575e1f60-115"
Last-Modified: Mon, 13 Jun 2016 02:50:08 GMT
Pragma: no-cache
Server: bfe/1.0.8.18
vernesong commented 2 years ago

订阅的所有设置私我

a76yyyy commented 2 years ago

订阅的所有设置私我

订阅地址是可以更新的,在浏览器里通过subconverter后端api可以获取,在路由器ssh里直接curl也可以获取到内容,但是同样的配置在openclash里无法更新

image

2022-03-28 15:31:27 错误:【default】下载失败,请检查网络或稍后再试...
2022-03-28 15:30:52 错误:配置文件【default】订阅失败,尝试不使用代理下载配置文件...
2022-03-28 15:30:30 开始更新配置文件【default】...
vernesong commented 2 years ago

订阅地址发我啊

a76yyyy commented 2 years ago

订阅地址发我啊

已发现是订阅转换地址(https://sub.6yearsok.xyz/sub)[https://sub.6yearsok.xyz/sub]的问题,随意一个订阅地址用这个就失败,但是浏览器可以获取

还需要私发订阅地址么?

vernesong commented 2 years ago

那不用了,你自己换吧

github-actions[bot] commented 2 years ago

This issue is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 5 days