vernesong / OpenClash

A Clash Client For OpenWrt
MIT License
17.52k stars 3.18k forks source link

openWrt旁路由,开启openwrt,过几个小时后,无法打开google.com,能打开youtube.com网站,视频列表,搜索,评论都正常,但是视频无法播放 #2232

Closed loohalh closed 2 years ago

loohalh commented 2 years ago

主路由是ikuai,旁路由是openWrt,openwrt作为旁路由,刚开始配置好一切正常,用几个小时后就出问题了,无法打开google.com,能打开youtube.com网站,视频列表,搜索,评论都正常,但是视频无法播放,其他外网网站也都是正常的,就google.com和youtube.com播放视频有问题

id: 45915049-e088-46b0-9f32-0033d04324d7 start: 2022-04-05T23:26:12.784885439+08:00 download: 7.8 KB upload: 1.0 KB rule: DomainKeyword rulePayload: youtube chains: 1: 🇭🇰 香港 HKTx0.8 2: 🚀 手动切换 3: 🚀 节点选择 4: 📹 油管视频 metadata: sourceIP: 192.168.10.28 sourcePort: 49879 host: youtube.com destinationIP: destinationPort: 443 network: tcp type: Redir

OpenClash 调试日志

生成时间: 2022-04-05 23:26:55 插件版本: v0.44.42-beta 隐私提示: 上传此日志前请注意检查、屏蔽公网IP、节点、密码等相关敏感信息


#===================== 系统信息 =====================#

主机型号: VMware - Intel(R) Core(TM) i5-7200U CPU @ 2.50GHz : 2 Core 2 Thread
固件版本: OpenWrt SNAPSHOT r4403-a77cc5f1e
LuCI版本: git-22.091.36880-c3be048-1
内核版本: 5.15.32
处理器架构: x86_64

#此项有值时,如不使用IPv6,建议到网络-接口-lan的设置中禁用IPV6的DHCP
IPV6-DHCP: 

#此项结果应仅有配置文件的DNS监听地址
Dnsmasq转发设置: 127.0.0.1#5338

#===================== 依赖检查 =====================#

dnsmasq-full: 已安装
coreutils: 已安装
coreutils-nohup: 已安装
bash: 已安装
curl: 已安装
ca-certificates: 已安装
ipset: 已安装
ip-full: 已安装
iptables-mod-tproxy: 已安装
kmod-ipt-tproxy: 已安装
iptables-mod-extra: 已安装
kmod-ipt-extra: 已安装
libcap: 已安装
libcap-bin: 已安装
ruby: 已安装
ruby-yaml: 已安装
ruby-psych: 已安装
ruby-pstore: 已安装
ruby-dbm: 已安装
kmod-tun(TUN模式): 已安装
luci-compat(Luci-19.07): 已安装
kmod-inet-diag(PROCESS-NAME): 未安装

#===================== 内核检查 =====================#

运行状态: 运行中
进程pid: 12421
运行权限: 12421: cap_dac_override,cap_net_bind_service,cap_net_admin,cap_net_raw,cap_sys_ptrace,cap_sys_resource=eip
运行用户: nobody
已选择的架构: linux-amd64

#下方无法显示内核版本号时请确认您的内核版本是否正确或者有无权限
Tun内核版本: 2022.01.27
Tun内核文件: 存在
Tun内核运行权限: 正常

Dev内核版本: v1.7.1-5-gced9749
Dev内核文件: 存在
Dev内核运行权限: 正常

#===================== 插件设置 =====================#

当前配置文件: /etc/openclash/config/looha.yaml
启动配置文件: /etc/openclash/looha.yaml
运行模式: redir-host
默认代理模式: rule
UDP流量转发(tproxy): 启用
DNS劫持: 停用
自定义DNS: 启用
IPV6代理: 停用
IPV6-DNS解析: 停用
禁用Dnsmasq缓存: 停用
自定义规则: 停用
仅允许内网: 停用
仅代理命中规则流量: 停用
仅允许常用端口流量: 停用
绕过中国大陆IP: 停用
DNS远程解析: 启用
路由本机代理: 停用

#启动异常时建议关闭此项后重试
混合节点: 停用
保留配置: 停用

#启动异常时建议关闭此项后重试
第三方规则: 停用

#===================== 配置文件 =====================#

port: 7890
socks-port: 7891
allow-lan: true
mode: rule
log-level: silent
external-controller: 0.0.0.0:9090
proxy-groups:
- name: "\U0001F680 节点选择"
  type: select
  proxies:
  - "♻️ 自动选择"
  - "\U0001F1ED\U0001F1F0 香港节点"
  - "\U0001F1E8\U0001F1F3 台湾节点"
  - "\U0001F1F8\U0001F1EC 狮城节点"
  - "\U0001F1EF\U0001F1F5 日本节点"
  - "\U0001F1FA\U0001F1F2 美国节点"
  - "\U0001F1F0\U0001F1F7 韩国节点"
  - "\U0001F680 手动切换"
  - DIRECT
- name: "\U0001F680 手动切换"
  type: select
  proxies:
  - "\U0001F1F8\U0001F1EC 新加坡 A x3"
  - "\U0001F1F8\U0001F1EC 新加坡 B x3"
  - "\U0001F1F8\U0001F1EC 新加坡 C x3"
  - "\U0001F1EF\U0001F1F5 日本 A x3"
  - "\U0001F1EF\U0001F1F5 日本 B x3"
  - "\U0001F1EF\U0001F1F5 日本 C x3"
  - "\U0001F1EF\U0001F1F5 日本 D x3"
  - "\U0001F1EF\U0001F1F5 日本 E x3"
  - "\U0001F1EF\U0001F1F5 日本 F x3"
  - "\U0001F1ED\U0001F1F0 香港 A x1"
  - "\U0001F1ED\U0001F1F0 香港 B x1"
  - "\U0001F1ED\U0001F1F0 香港 C x1"
  - "\U0001F1ED\U0001F1F0 香港 D x1"
  - "\U0001F1ED\U0001F1F0 香港 E x1"
  - "\U0001F1ED\U0001F1F0 香港 F x1"
  - "\U0001F1ED\U0001F1F0 香港 G x1"
  - "\U0001F1ED\U0001F1F0 香港 H x1"
  - "\U0001F1ED\U0001F1F0 香港 HKTx0.8"
  - "\U0001F1ED\U0001F1F0 香港 I x1"
  - "\U0001F1ED\U0001F1F0 香港 J x1"
  - "\U0001F1ED\U0001F1F0 香港 K x1"
  - "\U0001F1ED\U0001F1F0 香港 L x1"
  - "\U0001F1ED\U0001F1F0 香港 Netflix非自制剧"
- name: "♻️ 自动选择"
  type: url-test
  url: http://www.gstatic.com/generate_204
  interval: 300
  tolerance: 50
  proxies:
  - "\U0001F1F8\U0001F1EC 新加坡 A x3"
  - "\U0001F1F8\U0001F1EC 新加坡 B x3"
  - "\U0001F1F8\U0001F1EC 新加坡 C x3"
  - "\U0001F1EF\U0001F1F5 日本 A x3"
  - "\U0001F1EF\U0001F1F5 日本 B x3"
  - "\U0001F1EF\U0001F1F5 日本 C x3"
  - "\U0001F1EF\U0001F1F5 日本 D x3"
  - "\U0001F1EF\U0001F1F5 日本 E x3"
  - "\U0001F1EF\U0001F1F5 日本 F x3"
  - "\U0001F1ED\U0001F1F0 香港 A x1"
  - "\U0001F1ED\U0001F1F0 香港 B x1"
  - "\U0001F1ED\U0001F1F0 香港 C x1"
  - "\U0001F1ED\U0001F1F0 香港 D x1"
  - "\U0001F1ED\U0001F1F0 香港 E x1"
  - "\U0001F1ED\U0001F1F0 香港 F x1"
  - "\U0001F1ED\U0001F1F0 香港 G x1"
  - "\U0001F1ED\U0001F1F0 香港 H x1"
  - "\U0001F1ED\U0001F1F0 香港 HKTx0.8"
  - "\U0001F1ED\U0001F1F0 香港 I x1"
  - "\U0001F1ED\U0001F1F0 香港 J x1"
  - "\U0001F1ED\U0001F1F0 香港 K x1"
  - "\U0001F1ED\U0001F1F0 香港 L x1"
  - "\U0001F1ED\U0001F1F0 香港 Netflix非自制剧"
- name: "\U0001F4F2 电报消息"
  type: select
  proxies:
  - "\U0001F680 节点选择"
  - "♻️ 自动选择"
  - "\U0001F1F8\U0001F1EC 狮城节点"
  - "\U0001F1ED\U0001F1F0 香港节点"
  - "\U0001F1E8\U0001F1F3 台湾节点"
  - "\U0001F1EF\U0001F1F5 日本节点"
  - "\U0001F1FA\U0001F1F2 美国节点"
  - "\U0001F1F0\U0001F1F7 韩国节点"
  - "\U0001F680 手动切换"
  - DIRECT
- name: "\U0001F4F9 油管视频"
  type: select
  proxies:
  - "\U0001F680 节点选择"
  - "♻️ 自动选择"
  - "\U0001F1F8\U0001F1EC 狮城节点"
  - "\U0001F1ED\U0001F1F0 香港节点"
  - "\U0001F1E8\U0001F1F3 台湾节点"
  - "\U0001F1EF\U0001F1F5 日本节点"
  - "\U0001F1FA\U0001F1F2 美国节点"
  - "\U0001F1F0\U0001F1F7 韩国节点"
  - "\U0001F680 手动切换"
  - DIRECT
- name: "\U0001F3A5 奈飞视频"
  type: select
  proxies:
  - "\U0001F3A5 奈飞节点"
  - "\U0001F680 节点选择"
  - "♻️ 自动选择"
  - "\U0001F1F8\U0001F1EC 狮城节点"
  - "\U0001F1ED\U0001F1F0 香港节点"
  - "\U0001F1E8\U0001F1F3 台湾节点"
  - "\U0001F1EF\U0001F1F5 日本节点"
  - "\U0001F1FA\U0001F1F2 美国节点"
  - "\U0001F1F0\U0001F1F7 韩国节点"
  - "\U0001F680 手动切换"
  - DIRECT
- name: "\U0001F4FA 巴哈姆特"
  type: select
  proxies:
  - "\U0001F1E8\U0001F1F3 台湾节点"
  - "\U0001F680 节点选择"
  - "\U0001F680 手动切换"
  - DIRECT
- name: "\U0001F4FA 哔哩哔哩"
  type: select
  proxies:
  - "\U0001F3AF 全球直连"
  - "\U0001F1E8\U0001F1F3 台湾节点"
  - "\U0001F1ED\U0001F1F0 香港节点"
- name: "\U0001F30D 国外媒体"
  type: select
  proxies:
  - "\U0001F680 节点选择"
  - "♻️ 自动选择"
  - "\U0001F1ED\U0001F1F0 香港节点"
  - "\U0001F1E8\U0001F1F3 台湾节点"
  - "\U0001F1F8\U0001F1EC 狮城节点"
  - "\U0001F1EF\U0001F1F5 日本节点"
  - "\U0001F1FA\U0001F1F2 美国节点"
  - "\U0001F1F0\U0001F1F7 韩国节点"
  - "\U0001F680 手动切换"
  - DIRECT
- name: "\U0001F30F 国内媒体"
  type: select
  proxies:
  - DIRECT
  - "\U0001F1ED\U0001F1F0 香港节点"
  - "\U0001F1E8\U0001F1F3 台湾节点"
  - "\U0001F1F8\U0001F1EC 狮城节点"
  - "\U0001F1EF\U0001F1F5 日本节点"
  - "\U0001F680 手动切换"
- name: "\U0001F4E2 谷歌FCM"
  type: select
  proxies:
  - DIRECT
  - "\U0001F680 节点选择"
  - "\U0001F1FA\U0001F1F2 美国节点"
  - "\U0001F1ED\U0001F1F0 香港节点"
  - "\U0001F1E8\U0001F1F3 台湾节点"
  - "\U0001F1F8\U0001F1EC 狮城节点"
  - "\U0001F1EF\U0001F1F5 日本节点"
  - "\U0001F1F0\U0001F1F7 韩国节点"
  - "\U0001F680 手动切换"
- name: Ⓜ️ 微软云盘
  type: select
  proxies:
  - DIRECT
  - "\U0001F680 节点选择"
  - "\U0001F1FA\U0001F1F2 美国节点"
  - "\U0001F1ED\U0001F1F0 香港节点"
  - "\U0001F1E8\U0001F1F3 台湾节点"
  - "\U0001F1F8\U0001F1EC 狮城节点"
  - "\U0001F1EF\U0001F1F5 日本节点"
  - "\U0001F1F0\U0001F1F7 韩国节点"
  - "\U0001F680 手动切换"
- name: Ⓜ️ 微软服务
  type: select
  proxies:
  - DIRECT
  - "\U0001F680 节点选择"
  - "\U0001F1FA\U0001F1F2 美国节点"
  - "\U0001F1ED\U0001F1F0 香港节点"
  - "\U0001F1E8\U0001F1F3 台湾节点"
  - "\U0001F1F8\U0001F1EC 狮城节点"
  - "\U0001F1EF\U0001F1F5 日本节点"
  - "\U0001F1F0\U0001F1F7 韩国节点"
  - "\U0001F680 手动切换"
- name: "\U0001F34E 苹果服务"
  type: select
  proxies:
  - DIRECT
  - "\U0001F680 节点选择"
  - "\U0001F1FA\U0001F1F2 美国节点"
  - "\U0001F1ED\U0001F1F0 香港节点"
  - "\U0001F1E8\U0001F1F3 台湾节点"
  - "\U0001F1F8\U0001F1EC 狮城节点"
  - "\U0001F1EF\U0001F1F5 日本节点"
  - "\U0001F1F0\U0001F1F7 韩国节点"
  - "\U0001F680 手动切换"
- name: "\U0001F3AE 游戏平台"
  type: select
  proxies:
  - DIRECT
  - "\U0001F680 节点选择"
  - "\U0001F1FA\U0001F1F2 美国节点"
  - "\U0001F1ED\U0001F1F0 香港节点"
  - "\U0001F1E8\U0001F1F3 台湾节点"
  - "\U0001F1F8\U0001F1EC 狮城节点"
  - "\U0001F1EF\U0001F1F5 日本节点"
  - "\U0001F1F0\U0001F1F7 韩国节点"
  - "\U0001F680 手动切换"
- name: "\U0001F3B6 网易音乐"
  type: select
  proxies:
  - DIRECT
  - "\U0001F680 节点选择"
  - "♻️ 自动选择"
- name: "\U0001F3AF 全球直连"
  type: select
  proxies:
  - DIRECT
  - "\U0001F680 节点选择"
  - "♻️ 自动选择"
- name: "\U0001F6D1 广告拦截"
  type: select
  proxies:
  - REJECT
  - DIRECT
- name: "\U0001F343 应用净化"
  type: select
  proxies:
  - REJECT
  - DIRECT
- name: "\U0001F41F 漏网之鱼"
  type: select
  proxies:
  - "\U0001F680 节点选择"
  - "♻️ 自动选择"
  - DIRECT
  - "\U0001F1ED\U0001F1F0 香港节点"
  - "\U0001F1E8\U0001F1F3 台湾节点"
  - "\U0001F1F8\U0001F1EC 狮城节点"
  - "\U0001F1EF\U0001F1F5 日本节点"
  - "\U0001F1FA\U0001F1F2 美国节点"
  - "\U0001F1F0\U0001F1F7 韩国节点"
  - "\U0001F680 手动切换"
- name: "\U0001F1ED\U0001F1F0 香港节点"
  type: url-test
  url: http://www.gstatic.com/generate_204
  interval: 300
  tolerance: 50
  proxies:

  type: url-test
  url: http://www.gstatic.com/generate_204
  interval: 300
  tolerance: 50
  proxies:
  - "\U0001F1EF\U0001F1F5 日本 A x3"
  - "\U0001F1EF\U0001F1F5 日本 B x3"
  - "\U0001F1EF\U0001F1F5 日本 C x3"
  - "\U0001F1EF\U0001F1F5 日本 D x3"
  - "\U0001F1EF\U0001F1F5 日本 E x3"
  - "\U0001F1EF\U0001F1F5 日本 F x3"
- name: "\U0001F1FA\U0001F1F2 美国节点"
  type: url-test
  url: http://www.gstatic.com/generate_204
  interval: 300
  tolerance: 150
  proxies:
  - DIRECT
- name: "\U0001F1E8\U0001F1F3 台湾节点"
  type: url-test
  url: http://www.gstatic.com/generate_204
  interval: 300
  tolerance: 50
  proxies:
  - DIRECT
- name: "\U0001F1F8\U0001F1EC 狮城节点"
  type: url-test
  url: http://www.gstatic.com/generate_204
  interval: 300
  tolerance: 50
  proxies:
  - "\U0001F1F8\U0001F1EC 新加坡 A x3"
  - "\U0001F1F8\U0001F1EC 新加坡 B x3"
  - "\U0001F1F8\U0001F1EC 新加坡 C x3"
- name: "\U0001F1F0\U0001F1F7 韩国节点"
  type: url-test
  url: http://www.gstatic.com/generate_204
  interval: 300
  tolerance: 50
  proxies:
  - DIRECT
- name: "\U0001F3A5 奈飞节点"
  type: select
  proxies:
  - "\U0001F1ED\U0001F1F0 香港 Netflix非自制剧"
rules:
- IP-CIDR,198.18.0.1/16,REJECT,no-resolve
- SRC-IP-CIDR,192.168.10.5/32,DIRECT
- SRC-IP-CIDR,198.18.0.1/32,DIRECT

dns:
  nameserver:
  - 192.168.10.3
  - dhcp://"eth0"
  - 114.114.114.114
  - 119.29.29.29
  - 223.5.5.5
  - https://doh.pub/dns-query
  - https://dns.alidns.com/dns-query
  fallback:
  - https://dns.cloudflare.com/dns-query
  - https://public.dns.iij.jp/dns-query
  - https://jp.tiar.app/dns-query
  - https://jp.tiarap.org/dns-query
  - tls://dot.tiar.app
  enable: true
  ipv6: false
  enhanced-mode: fake-ip
  fake-ip-range: 198.18.0.1/16
  listen: 0.0.0.0:7874
  fake-ip-filter:
  - "+.*"
  default-nameserver:
  - 192.168.10.3
  - 114.114.114.114
  - 119.29.29.29
  - 223.5.5.5
redir-port: 7892
tproxy-port: 7895
mixed-port: 7893
bind-address: "*"
external-ui: "/usr/share/openclash/dashboard"
ipv6: false
profile:
  store-selected: true
  store-fake-ip: true

#===================== 防火墙设置 =====================#

#IPv4 NAT chain

# Generated by iptables-save v1.8.7 on Tue Apr  5 23:26:56 2022
*nat
:PREROUTING ACCEPT [186:25876]
:INPUT ACCEPT [225:21734]
:OUTPUT ACCEPT [476:32231]
:POSTROUTING ACCEPT [479:32411]
:DOCKER - [0:0]
:MINIUPNPD - [0:0]
:MINIUPNPD-POSTROUTING - [0:0]
:openclash - [0:0]
:openclash_output - [0:0]
:postrouting_docker_rule - [0:0]
:postrouting_ipsecserver_rule - [0:0]
:postrouting_lan_rule - [0:0]
:postrouting_rule - [0:0]
:postrouting_vpn_rule - [0:0]
:postrouting_wan_rule - [0:0]
:prerouting_docker_rule - [0:0]
:prerouting_ipsecserver_rule - [0:0]
:prerouting_lan_rule - [0:0]
:prerouting_rule - [0:0]
:prerouting_vpn_rule - [0:0]
:prerouting_wan_rule - [0:0]
:zone_docker_postrouting - [0:0]
:zone_docker_prerouting - [0:0]
:zone_ipsecserver_postrouting - [0:0]
:zone_ipsecserver_prerouting - [0:0]
:zone_lan_postrouting - [0:0]
:zone_lan_prerouting - [0:0]
:zone_vpn_postrouting - [0:0]
:zone_vpn_prerouting - [0:0]
:zone_wan_postrouting - [0:0]
:zone_wan_prerouting - [0:0]
-A PREROUTING -d 8.8.4.4/32 -p tcp -m comment --comment "OpenClash Google DNS Hijack" -m tcp --dport 53 -j REDIRECT --to-ports 7892
-A PREROUTING -d 8.8.8.8/32 -p tcp -m comment --comment "OpenClash Google DNS Hijack" -m tcp --dport 53 -j REDIRECT --to-ports 7892
-A PREROUTING -p udp -m udp --dport 53 -j REDIRECT --to-ports 53
-A PREROUTING -p tcp -m tcp --dport 53 -j REDIRECT --to-ports 53
-A PREROUTING -m addrtype --dst-type LOCAL -j DOCKER
-A PREROUTING -m comment --comment "!fw3: Custom prerouting rule chain" -j prerouting_rule
-A PREROUTING -i eth0 -m comment --comment "!fw3" -j zone_lan_prerouting
-A PREROUTING -i tun0 -m comment --comment "!fw3" -j zone_vpn_prerouting
-A PREROUTING -i docker0 -m comment --comment "!fw3" -j zone_docker_prerouting
-A PREROUTING -i ipsec0 -m comment --comment "!fw3" -j zone_ipsecserver_prerouting
-A PREROUTING -p tcp -j openclash
-A OUTPUT ! -d 127.0.0.0/8 -m addrtype --dst-type LOCAL -j DOCKER
-A OUTPUT -j openclash_output
-A POSTROUTING -s 172.17.0.0/16 ! -o docker0 -j MASQUERADE
-A POSTROUTING -m comment --comment "!fw3: Custom postrouting rule chain" -j postrouting_rule
-A POSTROUTING -o eth0 -m comment --comment "!fw3" -j zone_lan_postrouting
-A POSTROUTING -o tun0 -m comment --comment "!fw3" -j zone_vpn_postrouting
-A POSTROUTING -o docker0 -m comment --comment "!fw3" -j zone_docker_postrouting
-A POSTROUTING -o ipsec0 -m comment --comment "!fw3" -j zone_ipsecserver_postrouting
-A DOCKER -i docker0 -j RETURN
-A openclash -p tcp -m tcp --sport 1688 -j RETURN
-A openclash -p tcp -m tcp --sport 1723 -j RETURN
-A openclash -p tcp -m tcp --sport 1194 -j RETURN
-A openclash -p tcp -m tcp --sport 8897 -j RETURN
-A openclash -m set --match-set localnetwork dst -j RETURN
-A openclash -p tcp -j REDIRECT --to-ports 7892
-A openclash_output -p tcp -m tcp --sport 1688 -j RETURN
-A openclash_output -p tcp -m tcp --sport 1723 -j RETURN
-A openclash_output -p tcp -m tcp --sport 1194 -j RETURN
-A openclash_output -p tcp -m tcp --sport 8897 -j RETURN
-A openclash_output -m set --match-set localnetwork dst -j RETURN
-A openclash_output -p tcp -m owner ! --uid-owner 65534 -j REDIRECT --to-ports 7892
-A zone_docker_postrouting -m comment --comment "!fw3: Custom docker postrouting rule chain" -j postrouting_docker_rule
-A zone_docker_prerouting -m comment --comment "!fw3: Custom docker prerouting rule chain" -j prerouting_docker_rule
-A zone_ipsecserver_postrouting -m comment --comment "!fw3: Custom ipsecserver postrouting rule chain" -j postrouting_ipsecserver_rule
-A zone_ipsecserver_prerouting -m comment --comment "!fw3: Custom ipsecserver prerouting rule chain" -j prerouting_ipsecserver_rule
-A zone_lan_postrouting -j MINIUPNPD-POSTROUTING
-A zone_lan_postrouting -j MINIUPNPD-POSTROUTING
-A zone_lan_postrouting -m comment --comment "!fw3: Custom lan postrouting rule chain" -j postrouting_lan_rule
-A zone_lan_prerouting -j MINIUPNPD
-A zone_lan_prerouting -j MINIUPNPD
-A zone_lan_prerouting -m comment --comment "!fw3: Custom lan prerouting rule chain" -j prerouting_lan_rule
-A zone_vpn_postrouting -m comment --comment "!fw3: Custom vpn postrouting rule chain" -j postrouting_vpn_rule
-A zone_vpn_postrouting -m comment --comment "!fw3" -j MASQUERADE
-A zone_vpn_prerouting -m comment --comment "!fw3: Custom vpn prerouting rule chain" -j prerouting_vpn_rule
-A zone_wan_postrouting -m comment --comment "!fw3: Custom wan postrouting rule chain" -j postrouting_wan_rule
-A zone_wan_postrouting -m comment --comment "!fw3" -j MASQUERADE
-A zone_wan_prerouting -m comment --comment "!fw3: Custom wan prerouting rule chain" -j prerouting_wan_rule
COMMIT
# Completed on Tue Apr  5 23:26:56 2022

#IPv4 Mangle chain

# Generated by iptables-save v1.8.7 on Tue Apr  5 23:26:56 2022
*mangle
:PREROUTING ACCEPT [3023:783859]
:INPUT ACCEPT [2973:787657]
:FORWARD ACCEPT [69:10877]
:OUTPUT ACCEPT [2979:551038]
:POSTROUTING ACCEPT [3098:574015]
:RRDIPT_FORWARD - [0:0]
:RRDIPT_INPUT - [0:0]
:RRDIPT_OUTPUT - [0:0]
:openclash - [0:0]
:qos_Default - [0:0]
:qos_Default_ct - [0:0]
-A PREROUTING -p udp -j openclash
-A INPUT -j RRDIPT_INPUT
-A FORWARD -j RRDIPT_FORWARD
-A OUTPUT -j RRDIPT_OUTPUT
-A RRDIPT_FORWARD -s 192.168.10.3/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.10.3/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.10.11/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.10.11/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.10.12/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.10.12/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.10.13/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.10.13/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.10.30/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.10.30/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.10.41/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.10.41/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.10.25/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.10.25/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.10.50/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.10.50/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.10.42/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.10.42/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.10.26/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.10.26/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.10.43/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.10.43/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.10.19/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.10.19/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.10.51/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.10.51/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.10.52/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.10.52/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.10.28/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.10.28/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.10.44/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.10.44/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.10.45/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.10.45/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.10.46/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.10.46/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.10.47/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.10.47/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.10.48/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.10.48/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.10.49/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.10.49/32 -j RETURN
-A RRDIPT_INPUT -i eth0 -j RETURN
-A RRDIPT_OUTPUT -o eth0 -j RETURN
-A openclash -p udp -m udp --sport 1194 -j RETURN
-A openclash -p udp -m udp --sport 500 -j RETURN
-A openclash -p udp -m udp --sport 68 -j RETURN
-A openclash -m set --match-set localnetwork dst -j RETURN
-A openclash -p udp -m udp --dport 53 -j RETURN
-A openclash -p udp -j TPROXY --on-port 7892 --on-ip 0.0.0.0 --tproxy-mark 0x162/0xffffffff
-A qos_Default -j CONNMARK --restore-mark --nfmask 0xf --ctmask 0xf
-A qos_Default -m mark --mark 0x0/0xf -j qos_Default_ct
-A qos_Default -p udp -m mark --mark 0x0/0xf0 -m length --length 0:500 -j MARK --set-xmark 0x22/0xff
-A qos_Default -p icmp -j MARK --set-xmark 0x11/0xff
-A qos_Default -p tcp -m mark --mark 0x0/0xf0 -m tcp --sport 1024:65535 --dport 1024:65535 -j MARK --set-xmark 0x44/0xff
-A qos_Default -p udp -m mark --mark 0x0/0xf0 -m udp --sport 1024:65535 --dport 1024:65535 -j MARK --set-xmark 0x44/0xff
-A qos_Default -j CONNMARK --save-mark --nfmask 0xff --ctmask 0xff
-A qos_Default_ct -p tcp -m mark --mark 0x0/0xf -m tcp -m multiport --ports 22,53 -m comment --comment "ssh, dns" -j MARK --set-xmark 0x11/0xff
-A qos_Default_ct -p udp -m mark --mark 0x0/0xf -m udp -m multiport --ports 22,53 -m comment --comment "ssh, dns" -j MARK --set-xmark 0x11/0xff
-A qos_Default_ct -p tcp -m mark --mark 0x0/0xf -m tcp -m multiport --ports 20,21,25,80,110,443,993,995 -m comment --comment "ftp, smtp, http(s), imap" -j MARK --set-xmark 0x33/0xff
-A qos_Default_ct -p tcp -m mark --mark 0x0/0xf -m tcp -m multiport --ports 5190 -m comment --comment "AOL, iChat, ICQ" -j MARK --set-xmark 0x22/0xff
-A qos_Default_ct -p udp -m mark --mark 0x0/0xf -m udp -m multiport --ports 5190 -m comment --comment "AOL, iChat, ICQ" -j MARK --set-xmark 0x22/0xff
-A qos_Default_ct -j CONNMARK --save-mark --nfmask 0xff --ctmask 0xff
COMMIT
# Completed on Tue Apr  5 23:26:56 2022

#IPv4 Filter chain

# Generated by iptables-save v1.8.7 on Tue Apr  5 23:26:56 2022
*filter
:INPUT ACCEPT [0:0]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [0:0]
:DOCKER - [0:0]
:DOCKER-ISOLATION-STAGE-1 - [0:0]
:DOCKER-ISOLATION-STAGE-2 - [0:0]
:DOCKER-MAN - [0:0]
:DOCKER-USER - [0:0]
:MINIUPNPD - [0:0]
:forwarding_docker_rule - [0:0]
:forwarding_ipsecserver_rule - [0:0]
:forwarding_lan_rule - [0:0]
:forwarding_rule - [0:0]
:forwarding_vpn_rule - [0:0]
:forwarding_wan_rule - [0:0]
:input_docker_rule - [0:0]
:input_ipsecserver_rule - [0:0]
:input_lan_rule - [0:0]
:input_rule - [0:0]
:input_vpn_rule - [0:0]
:input_wan_rule - [0:0]
:output_docker_rule - [0:0]
:output_ipsecserver_rule - [0:0]
:output_lan_rule - [0:0]
:output_rule - [0:0]
:output_vpn_rule - [0:0]
:output_wan_rule - [0:0]
:reject - [0:0]
:zone_docker_dest_ACCEPT - [0:0]
:zone_docker_forward - [0:0]
:zone_docker_input - [0:0]
:zone_docker_output - [0:0]
:zone_docker_src_ACCEPT - [0:0]
:zone_ipsecserver_dest_ACCEPT - [0:0]
:zone_ipsecserver_forward - [0:0]
:zone_ipsecserver_input - [0:0]
:zone_ipsecserver_output - [0:0]
:zone_ipsecserver_src_ACCEPT - [0:0]
:zone_lan_dest_ACCEPT - [0:0]
:zone_lan_forward - [0:0]
:zone_lan_input - [0:0]
:zone_lan_output - [0:0]
:zone_lan_src_ACCEPT - [0:0]
:zone_vpn_dest_ACCEPT - [0:0]
:zone_vpn_forward - [0:0]
:zone_vpn_input - [0:0]
:zone_vpn_output - [0:0]
:zone_vpn_src_ACCEPT - [0:0]
:zone_wan_dest_ACCEPT - [0:0]
:zone_wan_dest_REJECT - [0:0]
:zone_wan_forward - [0:0]
:zone_wan_input - [0:0]
:zone_wan_output - [0:0]
:zone_wan_src_REJECT - [0:0]
-A INPUT -p udp -m udp --dport 443 -m comment --comment "OpenClash QUIC REJECT" -m set ! --match-set china_ip_route dst -j REJECT --reject-with icmp-port-unreachable
-A INPUT -i lo -m comment --comment "!fw3" -j ACCEPT
-A INPUT -m comment --comment "!fw3: Custom input rule chain" -j input_rule
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A INPUT -i eth0 -m comment --comment "!fw3" -j zone_lan_input
-A INPUT -i tun0 -m comment --comment "!fw3" -j zone_vpn_input
-A INPUT -i docker0 -m comment --comment "!fw3" -j zone_docker_input
-A INPUT -i ipsec0 -m comment --comment "!fw3" -j zone_ipsecserver_input
-A FORWARD -j DOCKER-USER
-A FORWARD -j DOCKER-ISOLATION-STAGE-1
-A FORWARD -o docker0 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -o docker0 -j DOCKER
-A FORWARD -i docker0 ! -o docker0 -j ACCEPT
-A FORWARD -i docker0 -o docker0 -j ACCEPT
-A FORWARD -m comment --comment "!fw3: Custom forwarding rule chain" -j forwarding_rule
-A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A FORWARD -i eth0 -m comment --comment "!fw3" -j zone_lan_forward
-A FORWARD -i tun0 -m comment --comment "!fw3" -j zone_vpn_forward
-A FORWARD -i docker0 -m comment --comment "!fw3" -j zone_docker_forward
-A FORWARD -i ipsec0 -m comment --comment "!fw3" -j zone_ipsecserver_forward
-A FORWARD -m comment --comment "!fw3" -j reject
-A OUTPUT -o lo -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -m comment --comment "!fw3: Custom output rule chain" -j output_rule
-A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -o eth0 -m comment --comment "!fw3" -j zone_lan_output
-A OUTPUT -o tun0 -m comment --comment "!fw3" -j zone_vpn_output
-A OUTPUT -o docker0 -m comment --comment "!fw3" -j zone_docker_output
-A OUTPUT -o ipsec0 -m comment --comment "!fw3" -j zone_ipsecserver_output
-A DOCKER-ISOLATION-STAGE-1 -i docker0 ! -o docker0 -j DOCKER-ISOLATION-STAGE-2
-A DOCKER-ISOLATION-STAGE-1 -j RETURN
-A DOCKER-ISOLATION-STAGE-2 -o docker0 -j DROP
-A DOCKER-ISOLATION-STAGE-2 -j RETURN
-A DOCKER-MAN -i br-lan -o docker0 -j RETURN
-A DOCKER-MAN -o docker0 -m conntrack --ctstate RELATED,ESTABLISHED -j RETURN
-A DOCKER-MAN -o docker0 -m conntrack --ctstate INVALID,NEW -j DROP
-A DOCKER-MAN -j RETURN
-A DOCKER-USER -j DOCKER-MAN
-A DOCKER-USER -j RETURN
-A forwarding_rule -i pppoe+ -j RETURN
-A forwarding_rule -o pppoe+ -j RETURN
-A forwarding_rule -i ppp+ -m conntrack --ctstate NEW -j ACCEPT
-A forwarding_rule -o ppp+ -m conntrack --ctstate NEW -j ACCEPT
-A reject -p tcp -m comment --comment "!fw3" -j REJECT --reject-with tcp-reset
-A reject -m comment --comment "!fw3" -j REJECT --reject-with icmp-port-unreachable
-A zone_docker_dest_ACCEPT -o docker0 -m comment --comment "!fw3" -j ACCEPT
-A zone_docker_forward -m comment --comment "!fw3: Custom docker forwarding rule chain" -j forwarding_docker_rule
-A zone_docker_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_docker_forward -m comment --comment "!fw3" -j zone_docker_dest_ACCEPT
-A zone_docker_input -m comment --comment "!fw3: Custom docker input rule chain" -j input_docker_rule
-A zone_docker_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_docker_input -m comment --comment "!fw3" -j zone_docker_src_ACCEPT
-A zone_docker_output -m comment --comment "!fw3: Custom docker output rule chain" -j output_docker_rule
-A zone_docker_output -m comment --comment "!fw3" -j zone_docker_dest_ACCEPT
-A zone_docker_src_ACCEPT -i docker0 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_ipsecserver_dest_ACCEPT -o ipsec0 -m comment --comment "!fw3" -j ACCEPT
-A zone_ipsecserver_forward -m comment --comment "!fw3: Custom ipsecserver forwarding rule chain" -j forwarding_ipsecserver_rule
-A zone_ipsecserver_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_ipsecserver_forward -m comment --comment "!fw3" -j zone_ipsecserver_dest_ACCEPT
-A zone_ipsecserver_input -m comment --comment "!fw3: Custom ipsecserver input rule chain" -j input_ipsecserver_rule
-A zone_ipsecserver_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_ipsecserver_input -m comment --comment "!fw3" -j zone_ipsecserver_src_ACCEPT
-A zone_ipsecserver_output -m comment --comment "!fw3: Custom ipsecserver output rule chain" -j output_ipsecserver_rule
-A zone_ipsecserver_output -m comment --comment "!fw3" -j zone_ipsecserver_dest_ACCEPT
-A zone_ipsecserver_src_ACCEPT -i ipsec0 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_dest_ACCEPT -o eth0 -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_forward -j MINIUPNPD
-A zone_lan_forward -j MINIUPNPD
-A zone_lan_forward -m comment --comment "!fw3: Custom lan forwarding rule chain" -j forwarding_lan_rule
-A zone_lan_forward -m comment --comment "!fw3: Zone lan to wan forwarding policy" -j zone_wan_dest_ACCEPT
-A zone_lan_forward -m comment --comment "!fw3: Zone lan to vpn forwarding policy" -j zone_vpn_dest_ACCEPT
-A zone_lan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_lan_forward -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_input -m comment --comment "!fw3: Custom lan input rule chain" -j input_lan_rule
-A zone_lan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_lan_input -m comment --comment "!fw3" -j zone_lan_src_ACCEPT
-A zone_lan_output -m comment --comment "!fw3: Custom lan output rule chain" -j output_lan_rule
-A zone_lan_output -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_src_ACCEPT -i eth0 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_vpn_dest_ACCEPT -o tun0 -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
-A zone_vpn_dest_ACCEPT -o tun0 -m comment --comment "!fw3" -j ACCEPT
-A zone_vpn_forward -m comment --comment "!fw3: Custom vpn forwarding rule chain" -j forwarding_vpn_rule
-A zone_vpn_forward -m comment --comment "!fw3: Zone vpn to wan forwarding policy" -j zone_wan_dest_ACCEPT
-A zone_vpn_forward -m comment --comment "!fw3: Zone vpn to lan forwarding policy" -j zone_lan_dest_ACCEPT
-A zone_vpn_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_vpn_forward -m comment --comment "!fw3" -j zone_vpn_dest_ACCEPT
-A zone_vpn_input -m comment --comment "!fw3: Custom vpn input rule chain" -j input_vpn_rule
-A zone_vpn_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_vpn_input -m comment --comment "!fw3" -j zone_vpn_src_ACCEPT
-A zone_vpn_output -m comment --comment "!fw3: Custom vpn output rule chain" -j output_vpn_rule
-A zone_vpn_output -m comment --comment "!fw3" -j zone_vpn_dest_ACCEPT
-A zone_vpn_src_ACCEPT -i tun0 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_forward -m comment --comment "!fw3: Custom wan forwarding rule chain" -j forwarding_wan_rule
-A zone_wan_forward -p esp -m comment --comment "!fw3: Allow-IPSec-ESP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -p udp -m udp --dport 500 -m comment --comment "!fw3: Allow-ISAKMP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_wan_forward -m comment --comment "!fw3" -j zone_wan_dest_REJECT
-A zone_wan_input -m comment --comment "!fw3: Custom wan input rule chain" -j input_wan_rule
-A zone_wan_input -p udp -m udp --dport 68 -m comment --comment "!fw3: Allow-DHCP-Renew" -j ACCEPT
-A zone_wan_input -p icmp -m icmp --icmp-type 8 -m comment --comment "!fw3: Allow-Ping" -j ACCEPT
-A zone_wan_input -p igmp -m comment --comment "!fw3: Allow-IGMP" -j ACCEPT
-A zone_wan_input -p tcp -m tcp --dport 8897 -m comment --comment "!fw3: linkease" -j ACCEPT
-A zone_wan_input -p tcp -m tcp --dport 8118 -m comment --comment "!fw3: adblock" -j DROP
-A zone_wan_input -p tcp -m tcp --dport 1194 -m comment --comment "!fw3: openvpn" -j ACCEPT
-A zone_wan_input -p udp -m udp --dport 1194 -m comment --comment "!fw3: openvpn" -j ACCEPT
-A zone_wan_input -p tcp -m tcp --dport 1723 -m comment --comment "!fw3: pptp" -j ACCEPT
-A zone_wan_input -p gre -m comment --comment "!fw3: gre" -j ACCEPT
-A zone_wan_input -p tcp -m tcp --dport 1688 -m comment --comment "!fw3: kms" -j ACCEPT
-A zone_wan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_wan_input -m comment --comment "!fw3" -j zone_wan_src_REJECT
-A zone_wan_output -m comment --comment "!fw3: Custom wan output rule chain" -j output_wan_rule
-A zone_wan_output -m comment --comment "!fw3" -j zone_wan_dest_ACCEPT
COMMIT
# Completed on Tue Apr  5 23:26:56 2022

#IPv6 NAT chain

# Generated by ip6tables-save v1.8.7 on Tue Apr  5 23:26:56 2022
*nat
:PREROUTING ACCEPT [6890:1658239]
:INPUT ACCEPT [5625:1020459]
:OUTPUT ACCEPT [732:77962]
:POSTROUTING ACCEPT [732:77962]
-A PREROUTING -p udp -m udp --dport 53 -j REDIRECT --to-ports 53
-A PREROUTING -p tcp -m tcp --dport 53 -j REDIRECT --to-ports 53
COMMIT
# Completed on Tue Apr  5 23:26:56 2022

#IPv6 Mangle chain

# Generated by ip6tables-save v1.8.7 on Tue Apr  5 23:26:56 2022
*mangle
:PREROUTING ACCEPT [225388:75575450]
:INPUT ACCEPT [224323:75042776]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [615:184977]
:POSTROUTING ACCEPT [640:188952]
:qos_Default - [0:0]
:qos_Default_ct - [0:0]
-A qos_Default -j CONNMARK --restore-mark --nfmask 0xf --ctmask 0xf
-A qos_Default -m mark --mark 0x0/0xf -j qos_Default_ct
-A qos_Default -p udp -m mark --mark 0x0/0xf0 -m length --length 0:500 -j MARK --set-xmark 0x22/0xff
-A qos_Default -p icmp -j MARK --set-xmark 0x11/0xff
-A qos_Default -p tcp -m mark --mark 0x0/0xf0 -m tcp --sport 1024:65535 --dport 1024:65535 -j MARK --set-xmark 0x44/0xff
-A qos_Default -p udp -m mark --mark 0x0/0xf0 -m udp --sport 1024:65535 --dport 1024:65535 -j MARK --set-xmark 0x44/0xff
-A qos_Default -j CONNMARK --save-mark --nfmask 0xff --ctmask 0xff
-A qos_Default_ct -p tcp -m mark --mark 0x0/0xf -m tcp -m multiport --ports 22,53 -m comment --comment "ssh, dns" -j MARK --set-xmark 0x11/0xff
-A qos_Default_ct -p udp -m mark --mark 0x0/0xf -m udp -m multiport --ports 22,53 -m comment --comment "ssh, dns" -j MARK --set-xmark 0x11/0xff
-A qos_Default_ct -p tcp -m mark --mark 0x0/0xf -m tcp -m multiport --ports 20,21,25,80,110,443,993,995 -m comment --comment "ftp, smtp, http(s), imap" -j MARK --set-xmark 0x33/0xff
-A qos_Default_ct -p tcp -m mark --mark 0x0/0xf -m tcp -m multiport --ports 5190 -m comment --comment "AOL, iChat, ICQ" -j MARK --set-xmark 0x22/0xff
-A qos_Default_ct -p udp -m mark --mark 0x0/0xf -m udp -m multiport --ports 5190 -m comment --comment "AOL, iChat, ICQ" -j MARK --set-xmark 0x22/0xff
-A qos_Default_ct -j CONNMARK --save-mark --nfmask 0xff --ctmask 0xff
COMMIT
# Completed on Tue Apr  5 23:26:56 2022

#IPv6 Filter chain

# Generated by ip6tables-save v1.8.7 on Tue Apr  5 23:26:56 2022
*filter
:INPUT ACCEPT [0:0]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [0:0]
:MINIUPNPD - [0:0]
:forwarding_docker_rule - [0:0]
:forwarding_ipsecserver_rule - [0:0]
:forwarding_lan_rule - [0:0]
:forwarding_rule - [0:0]
:forwarding_vpn_rule - [0:0]
:forwarding_wan_rule - [0:0]
:input_docker_rule - [0:0]
:input_ipsecserver_rule - [0:0]
:input_lan_rule - [0:0]
:input_rule - [0:0]
:input_vpn_rule - [0:0]
:input_wan_rule - [0:0]
:output_docker_rule - [0:0]
:output_ipsecserver_rule - [0:0]
:output_lan_rule - [0:0]
:output_rule - [0:0]
:output_vpn_rule - [0:0]
:output_wan_rule - [0:0]
:reject - [0:0]
:zone_docker_dest_ACCEPT - [0:0]
:zone_docker_forward - [0:0]
:zone_docker_input - [0:0]
:zone_docker_output - [0:0]
:zone_docker_src_ACCEPT - [0:0]
:zone_ipsecserver_dest_ACCEPT - [0:0]
:zone_ipsecserver_forward - [0:0]
:zone_ipsecserver_input - [0:0]
:zone_ipsecserver_output - [0:0]
:zone_ipsecserver_src_ACCEPT - [0:0]
:zone_lan_dest_ACCEPT - [0:0]
:zone_lan_forward - [0:0]
:zone_lan_input - [0:0]
:zone_lan_output - [0:0]
:zone_lan_src_ACCEPT - [0:0]
:zone_vpn_dest_ACCEPT - [0:0]
:zone_vpn_forward - [0:0]
:zone_vpn_input - [0:0]
:zone_vpn_output - [0:0]
:zone_vpn_src_ACCEPT - [0:0]
:zone_wan_dest_ACCEPT - [0:0]
:zone_wan_dest_REJECT - [0:0]
:zone_wan_forward - [0:0]
:zone_wan_input - [0:0]
:zone_wan_output - [0:0]
:zone_wan_src_REJECT - [0:0]
-A INPUT -i lo -m comment --comment "!fw3" -j ACCEPT
-A INPUT -m comment --comment "!fw3: Custom input rule chain" -j input_rule
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A INPUT -i eth0 -m comment --comment "!fw3" -j zone_lan_input
-A INPUT -i tun0 -m comment --comment "!fw3" -j zone_vpn_input
-A INPUT -i docker0 -m comment --comment "!fw3" -j zone_docker_input
-A INPUT -i ipsec0 -m comment --comment "!fw3" -j zone_ipsecserver_input
-A FORWARD -m comment --comment "!fw3: Custom forwarding rule chain" -j forwarding_rule
-A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A FORWARD -i eth0 -m comment --comment "!fw3" -j zone_lan_forward
-A FORWARD -i tun0 -m comment --comment "!fw3" -j zone_vpn_forward
-A FORWARD -i docker0 -m comment --comment "!fw3" -j zone_docker_forward
-A FORWARD -i ipsec0 -m comment --comment "!fw3" -j zone_ipsecserver_forward
-A FORWARD -m comment --comment "!fw3" -j reject
-A OUTPUT -o lo -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -m comment --comment "!fw3: Custom output rule chain" -j output_rule
-A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -o eth0 -m comment --comment "!fw3" -j zone_lan_output
-A OUTPUT -o tun0 -m comment --comment "!fw3" -j zone_vpn_output
-A OUTPUT -o docker0 -m comment --comment "!fw3" -j zone_docker_output
-A OUTPUT -o ipsec0 -m comment --comment "!fw3" -j zone_ipsecserver_output
-A reject -p tcp -m comment --comment "!fw3" -j REJECT --reject-with tcp-reset
-A reject -m comment --comment "!fw3" -j REJECT --reject-with icmp6-port-unreachable
-A zone_docker_dest_ACCEPT -o docker0 -m comment --comment "!fw3" -j ACCEPT
-A zone_docker_forward -m comment --comment "!fw3: Custom docker forwarding rule chain" -j forwarding_docker_rule
-A zone_docker_forward -m comment --comment "!fw3" -j zone_docker_dest_ACCEPT
-A zone_docker_input -m comment --comment "!fw3: Custom docker input rule chain" -j input_docker_rule
-A zone_docker_input -m comment --comment "!fw3" -j zone_docker_src_ACCEPT
-A zone_docker_output -m comment --comment "!fw3: Custom docker output rule chain" -j output_docker_rule
-A zone_docker_output -m comment --comment "!fw3" -j zone_docker_dest_ACCEPT
-A zone_docker_src_ACCEPT -i docker0 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_ipsecserver_dest_ACCEPT -o ipsec0 -m comment --comment "!fw3" -j ACCEPT
-A zone_ipsecserver_forward -m comment --comment "!fw3: Custom ipsecserver forwarding rule chain" -j forwarding_ipsecserver_rule
-A zone_ipsecserver_forward -m comment --comment "!fw3" -j zone_ipsecserver_dest_ACCEPT
-A zone_ipsecserver_input -m comment --comment "!fw3: Custom ipsecserver input rule chain" -j input_ipsecserver_rule
-A zone_ipsecserver_input -m comment --comment "!fw3" -j zone_ipsecserver_src_ACCEPT
-A zone_ipsecserver_output -m comment --comment "!fw3: Custom ipsecserver output rule chain" -j output_ipsecserver_rule
-A zone_ipsecserver_output -m comment --comment "!fw3" -j zone_ipsecserver_dest_ACCEPT
-A zone_ipsecserver_src_ACCEPT -i ipsec0 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_dest_ACCEPT -o eth0 -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_forward -j MINIUPNPD
-A zone_lan_forward -j MINIUPNPD
-A zone_lan_forward -m comment --comment "!fw3: Custom lan forwarding rule chain" -j forwarding_lan_rule
-A zone_lan_forward -m comment --comment "!fw3: Zone lan to wan forwarding policy" -j zone_wan_dest_ACCEPT
-A zone_lan_forward -m comment --comment "!fw3: Zone lan to vpn forwarding policy" -j zone_vpn_dest_ACCEPT
-A zone_lan_forward -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_input -m comment --comment "!fw3: Custom lan input rule chain" -j input_lan_rule
-A zone_lan_input -m comment --comment "!fw3" -j zone_lan_src_ACCEPT
-A zone_lan_output -m comment --comment "!fw3: Custom lan output rule chain" -j output_lan_rule
-A zone_lan_output -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_src_ACCEPT -i eth0 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_vpn_dest_ACCEPT -o tun0 -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
-A zone_vpn_dest_ACCEPT -o tun0 -m comment --comment "!fw3" -j ACCEPT
-A zone_vpn_forward -m comment --comment "!fw3: Custom vpn forwarding rule chain" -j forwarding_vpn_rule
-A zone_vpn_forward -m comment --comment "!fw3: Zone vpn to wan forwarding policy" -j zone_wan_dest_ACCEPT
-A zone_vpn_forward -m comment --comment "!fw3: Zone vpn to lan forwarding policy" -j zone_lan_dest_ACCEPT
-A zone_vpn_forward -m comment --comment "!fw3" -j zone_vpn_dest_ACCEPT
-A zone_vpn_input -m comment --comment "!fw3: Custom vpn input rule chain" -j input_vpn_rule
-A zone_vpn_input -m comment --comment "!fw3" -j zone_vpn_src_ACCEPT
-A zone_vpn_output -m comment --comment "!fw3: Custom vpn output rule chain" -j output_vpn_rule
-A zone_vpn_output -m comment --comment "!fw3" -j zone_vpn_dest_ACCEPT
-A zone_vpn_src_ACCEPT -i tun0 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_forward -m comment --comment "!fw3: Custom wan forwarding rule chain" -j forwarding_wan_rule
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 128 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 129 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 2 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 3 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 4/0 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 4/1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p esp -m comment --comment "!fw3: Allow-IPSec-ESP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -p udp -m udp --dport 500 -m comment --comment "!fw3: Allow-ISAKMP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -m comment --comment "!fw3" -j zone_wan_dest_REJECT
-A zone_wan_input -m comment --comment "!fw3: Custom wan input rule chain" -j input_wan_rule
-A zone_wan_input -s fc00::/6 -d fc00::/6 -p udp -m udp --dport 546 -m comment --comment "!fw3: Allow-DHCPv6" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 130/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 131/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 132/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 143/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 128 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 129 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 2 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 3 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 4/0 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 4/1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 133 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 135 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 134 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 136 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p tcp -m tcp --dport 8897 -m comment --comment "!fw3: linkease" -j ACCEPT
-A zone_wan_input -p tcp -m tcp --dport 8118 -m comment --comment "!fw3: adblock" -j DROP
-A zone_wan_input -p tcp -m tcp --dport 1194 -m comment --comment "!fw3: openvpn" -j ACCEPT
-A zone_wan_input -p udp -m udp --dport 1194 -m comment --comment "!fw3: openvpn" -j ACCEPT
-A zone_wan_input -p tcp -m tcp --dport 1723 -m comment --comment "!fw3: pptp" -j ACCEPT
-A zone_wan_input -p gre -m comment --comment "!fw3: gre" -j ACCEPT
-A zone_wan_input -p tcp -m tcp --dport 1688 -m comment --comment "!fw3: kms" -j ACCEPT
-A zone_wan_input -m comment --comment "!fw3" -j zone_wan_src_REJECT
-A zone_wan_output -m comment --comment "!fw3: Custom wan output rule chain" -j output_wan_rule
-A zone_wan_output -m comment --comment "!fw3" -j zone_wan_dest_ACCEPT
COMMIT
# Completed on Tue Apr  5 23:26:56 2022

#===================== IPSET状态 =====================#

Name: cn
Name: ct
Name: cnc
Name: cmcc
Name: crtc
Name: cernet
Name: gwbn
Name: othernet
Name: music
Name: mwan3_connected_v4
Name: mwan3_connected_v6
Name: mwan3_source_v6
Name: mwan3_dynamic_v4
Name: mwan3_dynamic_v6
Name: mwan3_custom_v4
Name: mwan3_custom_v6
Name: china
Name: china_ip_route
Name: localnetwork
Name: mwan3_connected

#===================== 路由表状态 =====================#

#route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
0.0.0.0         192.168.10.3    0.0.0.0         UG    0      0        0 eth0
172.17.0.0      0.0.0.0         255.255.0.0     U     0      0        0 docker0
192.168.10.0    0.0.0.0         255.255.255.0   U     0      0        0 eth0
#ip route list
default via 192.168.10.3 dev eth0 proto static 
172.17.0.0/16 dev docker0 proto kernel scope link src 172.17.0.1 linkdown 
192.168.10.0/24 dev eth0 proto kernel scope link src 192.168.10.5 
#ip rule show
0:  from all lookup local
32765:  from all fwmark 0x162 lookup 354
32766:  from all lookup main
32767:  from all lookup default

#===================== 端口占用状态 =====================#

tcp        0      0 :::7891                 :::*                    LISTEN      12421/clash
tcp        0      0 :::7890                 :::*                    LISTEN      12421/clash
tcp        0      0 :::7893                 :::*                    LISTEN      12421/clash
tcp        0      0 :::7892                 :::*                    LISTEN      12421/clash
tcp        0      0 :::7895                 :::*                    LISTEN      12421/clash
tcp        0      0 :::9090                 :::*                    LISTEN      12421/clash
udp        0      0 :::7874                 :::*                                12421/clash
udp        0      0 :::7891                 :::*                                12421/clash
udp        0      0 :::7892                 :::*                                12421/clash
udp        0      0 :::7893                 :::*                                12421/clash
udp        0      0 :::7895                 :::*                                12421/clash
udp        0      0 :::35044                :::*                                12421/clash
udp        0      0 :::50542                :::*                                12421/clash

#===================== 测试本机DNS查询 =====================#

Server:     127.0.0.1
Address:    127.0.0.1:53

www.baidu.com   canonical name = www.a.shifen.com
Name:   www.a.shifen.com
Address: 14.215.177.38
Name:   www.a.shifen.com
Address: 14.215.177.39

#===================== resolv.conf.d =====================#

# Interface IPV6_LAN
nameserver 240e:x:x::x
nameserver 240e:x:xxxx::6
# Interface lan
nameserver 192.168.10.5

#===================== 测试本机网络连接 =====================#

HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: private, no-cache, no-store, proxy-revalidate, no-transform
Connection: keep-alive
Content-Length: 277
Content-Type: text/html
Date: Tue, 05 Apr 2022 15:26:57 GMT
Etag: "575e1f72-115"
Last-Modified: Mon, 13 Jun 2016 02:50:26 GMT
Pragma: no-cache
Server: bfe/1.0.8.18

#===================== 测试本机网络下载 =====================#

HTTP/1.1 200 OK
Connection: keep-alive
Content-Length: 80
Cache-Control: max-age=300
Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
Content-Type: text/plain; charset=utf-8
ETag: "16c1cabfce4b2c499fc6633a2ae11448106afdabf6ae893645053c31b2d1d15c"
Strict-Transport-Security: max-age=31536000
X-Content-Type-Options: nosniff
X-Frame-Options: deny
X-XSS-Protection: 1; mode=block
X-GitHub-Request-Id: C4D0:2D03:6CA97:8B9DD:624B3FEC
Fastly-Original-Body-Size: 0
Accept-Ranges: bytes
Date: Tue, 05 Apr 2022 15:26:57 GMT
Via: 1.1 varnish
X-Served-By: cache-hnd18749-HND
X-Cache: HIT
X-Cache-Hits: 1
X-Timer: S1649172418.765821,VS0,VE1
Vary: Authorization,Accept-Encoding,Origin
Access-Control-Allow-Origin: *
X-Fastly-Request-ID: 1d62c2b8192804387d464059258e24366bb1f153
Expires: Tue, 05 Apr 2022 15:31:57 GMT
Source-Age: 298

#===================== 最近运行日志 =====================#

2022-04-05 22:58:38 Reload OpenClash Firewall Rules...
2022-04-05 23:07:31 Reload OpenClash Firewall Rules...
2022-04-05 23:24:39 OpenClash Stoping...
2022-04-05 23:24:39 Step 1: Backup The Current Groups State...
2022-04-05 23:24:39 Step 2: Delete OpenClash Firewall Rules...
2022-04-05 23:24:40 Step 3: Close The OpenClash Daemons...
2022-04-05 23:24:40 Step 4: Close The Clash Core Process...
2022-04-05 23:24:40 Step 5: Restart Dnsmasq...
2022-04-05 23:24:40 Step 6: Delete OpenClash Residue File...
2022-04-05 23:24:41 OpenClash Start Running...
2022-04-05 23:24:41 Step 1: Get The Configuration...
2022-04-05 23:24:41 Step 2: Check The Components...
2022-04-05 23:24:41 Tip: Because of the file【 /etc/config/openclash 】modificated, Pause quick start...
2022-04-05 23:24:41 Step 3: Modify The Config File...
2022-04-05 23:24:45 Step 4: Start Running The Clash Core...
2022-04-05 23:24:45 Tip: No Special Configuration Detected, Use Dev Core to Start...
2022-04-05 23:24:46 Step 5: Check The Core Status...
time="2022-04-05T23:24:46+08:00" level=info msg="Start initial compatible provider 📢 谷歌FCM"
time="2022-04-05T23:24:46+08:00" level=info msg="Start initial compatible provider Ⓜ️ 微软服务"
time="2022-04-05T23:24:46+08:00" level=info msg="Start initial compatible provider 🇯🇵 日本节点"
time="2022-04-05T23:24:46+08:00" level=info msg="Start initial compatible provider 📺 巴哈姆特"
time="2022-04-05T23:24:46+08:00" level=info msg="Start initial compatible provider 🚀 手动切换"
time="2022-04-05T23:24:46+08:00" level=info msg="Start initial compatible provider 🌏 国内媒体"
time="2022-04-05T23:24:46+08:00" level=info msg="Start initial compatible provider 🇰🇷 韩国节点"
time="2022-04-05T23:24:46+08:00" level=info msg="Start initial compatible provider 🛑 广告拦截"
time="2022-04-05T23:24:46+08:00" level=info msg="Start initial compatible provider 🎥 奈飞节点"
time="2022-04-05T23:24:46+08:00" level=info msg="Start initial compatible provider Ⓜ️ 微软云盘"
time="2022-04-05T23:24:46+08:00" level=info msg="Start initial compatible provider 🎥 奈飞视频"
time="2022-04-05T23:24:46+08:00" level=info msg="Start initial compatible provider 🇸🇬 狮城节点"
time="2022-04-05T23:24:46+08:00" level=info msg="Start initial compatible provider ♻️ 自动选择"
time="2022-04-05T23:24:46+08:00" level=info msg="Start initial compatible provider 🎶 网易音乐"
time="2022-04-05T23:24:46+08:00" level=info msg="Start initial compatible provider 🚀 节点选择"
time="2022-04-05T23:24:46+08:00" level=info msg="Start initial compatible provider 🎮 游戏平台"
time="2022-04-05T23:24:46+08:00" level=info msg="Start initial compatible provider 🇨🇳 台湾节点"
time="2022-04-05T23:24:46+08:00" level=info msg="Start initial compatible provider 🌍 国外媒体"
time="2022-04-05T23:24:46+08:00" level=info msg="Start initial compatible provider 📲 电报消息"
time="2022-04-05T23:24:46+08:00" level=info msg="Start initial compatible provider 🍎 苹果服务"
time="2022-04-05T23:24:46+08:00" level=info msg="Start initial compatible provider 🍃 应用净化"
time="2022-04-05T23:24:46+08:00" level=info msg="Start initial compatible provider 📹 油管视频"
time="2022-04-05T23:24:46+08:00" level=info msg="Start initial compatible provider 🇺🇲 美国节点"
time="2022-04-05T23:24:46+08:00" level=info msg="Start initial compatible provider 🇭🇰 香港节点"
time="2022-04-05T23:24:46+08:00" level=info msg="Start initial compatible provider 🎯 全球直连"
time="2022-04-05T23:24:46+08:00" level=info msg="Start initial compatible provider 🐟 漏网之鱼"
time="2022-04-05T23:24:46+08:00" level=info msg="Start initial compatible provider 📺 哔哩哔哩"
2022-04-05 23:24:49 Step 6: Wait For The File Downloading...
2022-04-05 23:24:49 Step 7: Set Control Panel...
2022-04-05 23:24:49 Step 8: Set Firewall Rules...
2022-04-05 23:24:50 Step 9: Restart Dnsmasq...
2022-04-05 23:24:50 Step 10: Add Cron Rules, Start Daemons...
2022-04-05 23:24:50 OpenClash Start Successful!

#===================== 活动连接信息 =====================#

1. SourceIP:【192.168.10.44】 - Host:【Empty】 - DestinationIP:【17.57.145.169】 - Network:【tcp】 - RulePayload:【17.0.0.0/8】 - Lastchain:【DIRECT】
2. SourceIP:【192.168.10.52】 - Host:【Empty】 - DestinationIP:【17.57.145.168】 - Network:【tcp】 - RulePayload:【17.0.0.0/8】 - Lastchain:【DIRECT】
3. SourceIP:【192.168.10.28】 - Host:【youtube.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【youtube】 - Lastchain:【🇭🇰 香港 HKTx0.8】
4. SourceIP:【192.168.10.30】 - Host:【Empty】 - DestinationIP:【192.198.1.27】 - Network:【udp】 - RulePayload:【】 - Lastchain:【DIRECT】
5. SourceIP:【192.168.10.30】 - Host:【Empty】 - DestinationIP:【114.215.174.133】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
6. SourceIP:【192.168.10.30】 - Host:【Empty】 - DestinationIP:【212.129.230.34】 - Network:【tcp】 - RulePayload:【212.129.128.0/17】 - Lastchain:【DIRECT】
7. SourceIP:【192.168.10.30】 - Host:【Empty】 - DestinationIP:【58.63.233.98】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
8. SourceIP:【192.168.10.30】 - Host:【Empty】 - DestinationIP:【172.217.163.33】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【🇭🇰 香港 HKTx0.8】
9. SourceIP:【192.168.10.28】 - Host:【Empty】 - DestinationIP:【199.59.148.246】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【🇭🇰 香港 HKTx0.8】
10. SourceIP:【192.168.10.30】 - Host:【Empty】 - DestinationIP:【121.41.32.171】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
11. SourceIP:【192.168.10.28】 - Host:【www.instagram.com】 - DestinationIP:【31.13.82.174】 - Network:【tcp】 - RulePayload:【instagram】 - Lastchain:【🇭🇰 香港 HKTx0.8】
12. SourceIP:【192.168.10.28】 - Host:【Empty】 - DestinationIP:【xxx.217.163.46】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【🇭🇰 香港 HKTx0.8】
13. SourceIP:【192.168.10.49】 - Host:【Empty】 - DestinationIP:【1xx188.168.145】 - Network:【tcp】 - RulePayload:【17.0.0.0/8】 - Lastchain:【DIRECT】
14. SourceIP:【192.168.10.28】 - Host:【Empty】 - DestinationIP:【1xx2.14xx0.194.120】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
15. SourceIP:【192.168.10.30】 - Host:【Empty】 - DestinationIP:【xxx.40.127.215】 - Network:【udp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
vernesong commented 2 years ago

节点问题,你开debug看内核日志

loohalh commented 2 years ago

节点问题,你开debug看内核日志

debug内核日志确实走正确的节点了,但是这同一个节点在手机圈X上,电脑clashX上都没有问题,而且在openclash上刚配置好也是好的,过几个小时就不行了,换了其他几点和其他机场也是一样的

loohalh commented 2 years ago

节点问题,你开debug看内核日志

现在目前和adguard Home搭配使用的,之前不用adguard Home,也是这个现象

vernesong commented 2 years ago

ad把缓存关了

loohalh commented 2 years ago

ad把缓存关了

好的 晚上回去我试试

loohalh commented 2 years ago

ad把缓存关了

ad 缓存关了,也不行,直接关闭ad,openClash设置初始化,设置在默认的基础上勾选了允许IPv6类型DNS解析,禁止Dnsmasq缓存DNS,旁路网关(旁路由)兼容 这三项 还是不行,在浏览器访问谷歌,内核日志是

image

浏览器显示这样

image

,在openClash调试访问谷歌,提示找不到任何连接日志!

image
vernesong commented 2 years ago

ip哪来的?开安全DNS了?

loohalh commented 2 years ago

ip哪来的?开安全DNS了?

DNS安全不知道在哪儿看 应该没开,都是默认的,主路由ikuai的DNS加速也是关闭的

vernesong commented 2 years ago

检查DNS是哪里解析的,或者换浏览器

loohalh commented 2 years ago

检查DNS是哪里解析的,或者换浏览器

换电脑,换浏览器都一样的情况 主路由iKuai ,网关是OpenWrt地址,DNS是223.5.5.5 ,223.5.5.5 ,旁路由OpenWrt,网关是iKuai 地址,DNS是223.5.5.5 ,223.5.5.5 ,DHCP/DNS里面DNS转发是127.0.0.1#7874,DNS 查询缓存的大小也设置了0 openClash设置在默认的基础上勾选了允许IPv6类型DNS解析,禁止Dnsmasq缓存DNS,旁路网关(旁路由)兼容 这三项,其余的都是默认。 还有个问题,今天中午登陆路由器后台查看的时候,iP全是我自己的iP了

image
lu6zhi6gan commented 2 years ago

原来我并不孤单,楼主的问题和我一个样,降级和更新到最近版的openclash都试了一遍,清除缓存,换内核,指定DNS也试了,一个样。坐等楼主解决问题。

vernesong commented 2 years ago

谁教你互指的

loohalh commented 2 years ago

谁教你互指的

啊 不能互指吗,我的天,我从一开始配置双软路由的时候,就一直互指了,看的油管的教程。不能互指,是只有ikuai指定openwrt吗?

loohalh commented 2 years ago

原来我并不孤单,楼主的问题和我一个样,降级和更新到最近版的openclash都试了一遍,清除缓存,换内核,指定DNS也试了,一个样。坐等楼主解决问题。

我折腾了好久了,好头大,等等大佬在线解决看看。

vernesong commented 2 years ago

旁路由指向主路由就行了

loohalh commented 2 years ago

旁路由指向主路由就行了

晚上回去我尝试下,但是旁路由网关写主路由地址的话,相当于旁路由只是局域网的一个普通设备,局域网其他设备的流量不经过openWrt吧

lu6zhi6gan commented 2 years ago

我觉得IKUAI要是不指向OP的话那OP还有啥用?

loohalh commented 2 years ago

我觉得IKUAI要是不指向OP的话那OP还有啥用?

我也理解的是,ikuai的网关要指向openwrt地址,不然流量不经过openwrt,更不会到经过openClash

vernesong commented 2 years ago

翻墙设备的网关dns改成旁路由的

loohalh commented 2 years ago

翻墙设备的网关dns改成旁路由的 几乎家里的设备都需要翻墙,除了智能家电这些无所谓,而且电视,还有电视盒子也不能自己设置DNS和网关

loohalh commented 2 years ago

旁路由指向主路由就行了

昨晚重装了openwrt,重新设置了,dev内核用的v1.7.1-5,tun内核是2022.01.27,openclash版本是v0.44.42-beta,还是不行,openwrt作为旁路有,要让其他设备流量都经过openWrt,必须互指,然后还是这样的问题。头秃

javierzhang0504 commented 2 years ago

我开始也这样,后来是旁路由指向主路由,dns和网关都指向主路由。主路由不互指 然后设备端网关和dns都填写旁路由ip地址,就莫名其妙好了。

loohalh commented 2 years ago

我开始也这样,后来是旁路由指向主路由,dns和网关都指向主路由。主路由不互指 然后设备端网关和dns都填写旁路由ip地址,就莫名其妙好了。

不互指,openwrt也失去了存在的意义,能支持手动填写填写网关和dns的设备相比也能安装clash对应平台的客户端,直接安装对应客户端,效果更好点,主要我的需要翻墙搭建在路由器上,这样不支持手动填写填写网关和dns的设备就都能翻墙了。

MBRjun commented 2 years ago

ad把缓存关了

ad 缓存关了,也不行,直接关闭ad,openClash设置初始化,设置在默认的基础上勾选了允许IPv6类型DNS解析,禁止Dnsmasq缓存DNS,旁路网关(旁路由)兼容 这三项 还是不行,在浏览器访问谷歌,内核日志是 image 浏览器显示这样 image

,在openClash调试访问谷歌,提示找不到任何连接日志! image

典型dns污染啊

MBRjun commented 2 years ago

[ikuai] DHCP Server 网关:写wrt DNS:写wrt [wrt] LAN口 网关:写爱快 DNS:写啥都行但是建议写个能用的 [wrt] Clash DNS:看着配置(

MBRjun commented 2 years ago

翻墙设备的网关dns改成旁路由的 几乎家里的设备都需要翻墙,除了智能家电这些无所谓,而且电视,还有电视盒子也不能自己设置DNS和网关

DHCP 是个好东西

MBRjun commented 2 years ago

旁路由指向主路由就行了

晚上回去我尝试下,但是旁路由网关写主路由地址的话,相当于旁路由只是局域网的一个普通设备,局域网其他设备的流量不经过openWrt吧

别的设备的网关写wrt

loohalh commented 2 years ago

[ikuai] DHCP Server 网关:写wrt DNS:写wrt [wrt] LAN口 网关:写爱快 DNS:写啥都行但是建议写个能用的 [wrt] Clash DNS:看着配置(

谢谢大佬指导,目前方案改成双ad了。 ikuai DHCP server 网关和DNS都改成了wrt,ikuai DNS设置里面DNS也改成了wrt地址 wrt lan口网关是ikuai,DNS写wrt,DHCP/DNS,DNS查询缓存大小改为0 openClash fake-ip,tun模式,

image

自定义Fallback-Filter规则为:https://raw.githubusercontent.com/wxfyes/cf/main/openclashfallback.txt, DNS自定义为:

image

目前大部分都能正常上,google,youtube也正常,github的带有/raw.githubusercontent.com的打不开,其他暂时没发现异常,只是速度好像比不用Ad直接开启慢,不知道那儿还没有设置好,正在尝试中,谢谢指导

loohalh commented 2 years ago

[ikuai] DHCP Server 网关:写wrt DNS:写wrt [wrt] LAN口 网关:写爱快 DNS:写啥都行但是建议写个能用的 [wrt] Clash DNS:看着配置(

双ad设置方法是从https://www.youtube.com/watch?v=2irgruSdTWw&t=188s这个up主这儿看到的

loohalh commented 2 years ago

[ikuai] DHCP Server 网关:写wrt DNS:写wrt [wrt] LAN口 网关:写爱快 DNS:写啥都行但是建议写个能用的 [wrt] Clash DNS:看着配置(

刚开始设置是好的,过几个小时后又成老样子了,感觉没辙了

MBRjun commented 2 years ago

[ikuai] DHCP Server 网关:写wrt DNS:写wrt [wrt] LAN口 网关:写爱快 DNS:写啥都行但是建议写个能用的 [wrt] Clash DNS:看着配置(

刚开始设置是好的,过几个小时后又成老样子了,感觉没辙了

不要套太多DNS 性能不好 顺手提一句,wrt上的ADGH容易莫名的炸 然后就是尽量使用 Redir-Host

loohalh commented 2 years ago

[ikuai] DHCP Server 网关:写wrt DNS:写wrt [wrt] LAN口 网关:写爱快 DNS:写啥都行但是建议写个能用的 [wrt] Clash DNS:看着配置(

刚开始设置是好的,过几个小时后又成老样子了,感觉没辙了

不要套太多DNS 性能不好 顺手提一句,wrt上的ADGH容易莫名的炸 然后就是尽量使用 Redir-Host

wrt docker 里面安装的ad,Redir-Host模式无法正常翻墙,就切换到了fake-tun模式,也是一样的症状,刚开始可以,几个小时后就不行了哈,在电脑上ping google和youtube.com 都能ping通,就是没法正常使用,特别奇怪,怀疑clash本身有缺陷

MBRjun commented 2 years ago

[ikuai] DHCP Server 网关:写wrt DNS:写wrt [wrt] LAN口 网关:写爱快 DNS:写啥都行但是建议写个能用的 [wrt] Clash DNS:看着配置(

刚开始设置是好的,过几个小时后又成老样子了,感觉没辙了

不要套太多DNS 性能不好 顺手提一句,wrt上的ADGH容易莫名的炸 然后就是尽量使用 Redir-Host

wrt docker 里面安装的ad,Redir-Host模式无法正常翻墙,就切换到了fake-tun模式,也是一样的症状,刚开始可以,几个小时后就不行了哈,在电脑上ping google和youtube.com 都能ping通,就是没法正常使用,特别奇怪,怀疑clash本身有缺陷

新版本不可能ping通吧 会丢ICMP包 Redir-Host翻不出去我建议...重新刷或者换个固件?

loohalh commented 2 years ago

[ikuai] DHCP Server 网关:写wrt DNS:写wrt [wrt] LAN口 网关:写爱快 DNS:写啥都行但是建议写个能用的 [wrt] Clash DNS:看着配置(

刚开始设置是好的,过几个小时后又成老样子了,感觉没辙了

不要套太多DNS 性能不好 顺手提一句,wrt上的ADGH容易莫名的炸 然后就是尽量使用 Redir-Host

wrt docker 里面安装的ad,Redir-Host模式无法正常翻墙,就切换到了fake-tun模式,也是一样的症状,刚开始可以,几个小时后就不行了哈,在电脑上ping google和youtube.com 都能ping通,就是没法正常使用,特别奇怪,怀疑clash本身有缺陷

新版本不可能ping通吧 会丢ICMP包 Redir-Host翻不出去我建议...重新刷或者换个固件? o 我的确实能ping 通,重刷也是刚配置好是没问题的,几个小时后后老样子。大佬有推荐的固件吗?我试过两个固件不大行,收拾你的固件。谢谢!。另外,不能使用的时候,打开youtube.com,视频转圈一段时间又可以了,这个时间有时候几分钟,有时候十来二十分钟,有时候一直不会好,就很奇怪。我把我的全部设置贴出来

image image image image image image image image image image
loohalh commented 2 years ago

[ikuai] DHCP Server 网关:写wrt DNS:写wrt [wrt] LAN口 网关:写爱快 DNS:写啥都行但是建议写个能用的 [wrt] Clash DNS:看着配置(

刚开始设置是好的,过几个小时后又成老样子了,感觉没辙了

不要套太多DNS 性能不好 顺手提一句,wrt上的ADGH容易莫名的炸 然后就是尽量使用 Redir-Host

wrt docker 里面安装的ad,Redir-Host模式无法正常翻墙,就切换到了fake-tun模式,也是一样的症状,刚开始可以,几个小时后就不行了哈,在电脑上ping google和youtube.com 都能ping通,就是没法正常使用,特别奇怪,怀疑clash本身有缺陷

新版本不可能ping通吧 会丢ICMP包 Redir-Host翻不出去我建议...重新刷或者换个固件?

这会儿又莫名其妙好了 另外,这是wrt里面的诊断:

image image image

这是电脑上的查看到的

image
MBRjun commented 2 years ago

[ikuai] DHCP Server 网关:写wrt DNS:写wrt [wrt] LAN口 网关:写爱快 DNS:写啥都行但是建议写个能用的 [wrt] Clash DNS:看着配置(

刚开始设置是好的,过几个小时后又成老样子了,感觉没辙了

不要套太多DNS 性能不好 顺手提一句,wrt上的ADGH容易莫名的炸 然后就是尽量使用 Redir-Host

wrt docker 里面安装的ad,Redir-Host模式无法正常翻墙,就切换到了fake-tun模式,也是一样的症状,刚开始可以,几个小时后就不行了哈,在电脑上ping google和youtube.com 都能ping通,就是没法正常使用,特别奇怪,怀疑clash本身有缺陷

新版本不可能ping通吧 会丢ICMP包 Redir-Host翻不出去我建议...重新刷或者换个固件? o 我的确实能ping 通,重刷也是刚配置好是没问题的,几个小时后后老样子。大佬有推荐的固件吗?我试过两个固件不大行,收拾你的固件。谢谢!。另外,不能使用的时候,打开youtube.com,视频转圈一段时间又可以了,这个时间有时候几分钟,有时候十来二十分钟,有时候一直不会好,就很奇怪。我把我的全部设置贴出来

image image image image image image image image image image

爱快不需要备用 DNS 可以写四个0 Snipaste_2022-04-10_16-22-47 我不确定我的固件在你的设备上能否正常使用,它在我的设备上运行良好(有一个小问题:没有自带 kmod-inet-diag) 在 https://blog.mbrjun.cn/archives/414 获取

loohalh commented 2 years ago

[ikuai] DHCP Server 网关:写wrt DNS:写wrt [wrt] LAN口 网关:写爱快 DNS:写啥都行但是建议写个能用的 [wrt] Clash DNS:看着配置(

刚开始设置是好的,过几个小时后又成老样子了,感觉没辙了

不要套太多DNS 性能不好 顺手提一句,wrt上的ADGH容易莫名的炸 然后就是尽量使用 Redir-Host

wrt docker 里面安装的ad,Redir-Host模式无法正常翻墙,就切换到了fake-tun模式,也是一样的症状,刚开始可以,几个小时后就不行了哈,在电脑上ping google和youtube.com 都能ping通,就是没法正常使用,特别奇怪,怀疑clash本身有缺陷

新版本不可能ping通吧 会丢ICMP包 Redir-Host翻不出去我建议...重新刷或者换个固件?

好的 收到固件,我重新刷一下,谢谢 另外请教一下,ad不设置缓存是把这儿填写0吗,填0后会自动置空。

image
MBRjun commented 2 years ago

[ikuai] DHCP Server 网关:写wrt DNS:写wrt [wrt] LAN口 网关:写爱快 DNS:写啥都行但是建议写个能用的 [wrt] Clash DNS:看着配置(

刚开始设置是好的,过几个小时后又成老样子了,感觉没辙了

不要套太多DNS 性能不好 顺手提一句,wrt上的ADGH容易莫名的炸 然后就是尽量使用 Redir-Host

wrt docker 里面安装的ad,Redir-Host模式无法正常翻墙,就切换到了fake-tun模式,也是一样的症状,刚开始可以,几个小时后就不行了哈,在电脑上ping google和youtube.com 都能ping通,就是没法正常使用,特别奇怪,怀疑clash本身有缺陷

新版本不可能ping通吧 会丢ICMP包 Redir-Host翻不出去我建议...重新刷或者换个固件?

好的 收到固件,我重新刷一下,谢谢 另外请教一下,ad不设置缓存是把这儿填写0吗,填0后会自动置空。 image

不知道,我是开着缓存的

loohalh commented 2 years ago

[ikuai] DHCP Server 网关:写wrt DNS:写wrt [wrt] LAN口 网关:写爱快 DNS:写啥都行但是建议写个能用的 [wrt] Clash DNS:看着配置(

刚开始设置是好的,过几个小时后又成老样子了,感觉没辙了

不要套太多DNS 性能不好 顺手提一句,wrt上的ADGH容易莫名的炸 然后就是尽量使用 Redir-Host

wrt docker 里面安装的ad,Redir-Host模式无法正常翻墙,就切换到了fake-tun模式,也是一样的症状,刚开始可以,几个小时后就不行了哈,在电脑上ping google和youtube.com 都能ping通,就是没法正常使用,特别奇怪,怀疑clash本身有缺陷

新版本不可能ping通吧 会丢ICMP包 Redir-Host翻不出去我建议...重新刷或者换个固件?

好的 收到固件,我重新刷一下,谢谢 另外请教一下,ad不设置缓存是把这儿填写0吗,填0后会自动置空。 image

不知道,我是开着缓存的

好的 谢谢你,正在尝试你推荐的固件,kmod-inet-diag这个不安装也没关系吧

MBRjun commented 2 years ago

[ikuai] DHCP Server 网关:写wrt DNS:写wrt [wrt] LAN口 网关:写爱快 DNS:写啥都行但是建议写个能用的 [wrt] Clash DNS:看着配置(

刚开始设置是好的,过几个小时后又成老样子了,感觉没辙了

不要套太多DNS 性能不好 顺手提一句,wrt上的ADGH容易莫名的炸 然后就是尽量使用 Redir-Host

wrt docker 里面安装的ad,Redir-Host模式无法正常翻墙,就切换到了fake-tun模式,也是一样的症状,刚开始可以,几个小时后就不行了哈,在电脑上ping google和youtube.com 都能ping通,就是没法正常使用,特别奇怪,怀疑clash本身有缺陷

新版本不可能ping通吧 会丢ICMP包 Redir-Host翻不出去我建议...重新刷或者换个固件?

好的 收到固件,我重新刷一下,谢谢 另外请教一下,ad不设置缓存是把这儿填写0吗,填0后会自动置空。 image

不知道,我是开着缓存的

好的 谢谢你,正在尝试你推荐的固件,kmod-inet-diag这个不安装也没关系吧

OpenClash 未来可能会强制依赖,这个插件你也可以自己安装,但是并不容易

vernesong commented 2 years ago

ad不要开缓存

loohalh commented 2 years ago

ad不要开缓存

ad没有设置缓存开关的地方,只有设置缓存大小的地方,设置为0,自动置空,不知道置空是不缓存还是不限制大小

image
MBRjun commented 2 years ago

ad不要开缓存

ad没有设置缓存开关的地方,只有设置缓存大小的地方,设置为0,自动置空,不知道置空是不缓存还是不限制大小 image

AD作为Clash上游

lu6zhi6gan commented 2 years ago

3天了,楼主解决了吗?我等着抄作业

loohalh commented 2 years ago

ad不要开缓存

ad没有设置缓存开关的地方,只有设置缓存大小的地方,设置为0,自动置空,不知道置空是不缓存还是不限制大小 image

AD作为Clash上游

嗯 AD是作为Clash上游的

loohalh commented 2 years ago

3天了,楼主解决了吗?我等着抄作业

看这部分,这两个是我目前的配置,时好时坏,https://github.com/vernesong/OpenClash/issues/2232#issuecomment-1094101781,https://github.com/vernesong/OpenClash/issues/2232#issuecomment-1094216147。再给你推荐两个视频,双Ad搭建:https://www.youtube.com/watch?v=Z6bAxSdZVdc,双Ad对接openClash:https://www.youtube.com/watch?v=2irgruSdTWw&t=188s

loohalh commented 2 years ago

ad不要开缓存

对了,我的ikuai是多拨,流控配置如下,多拨会对openClash有影响吗

image
MBRjun commented 2 years ago

不会

loohalh commented 2 years ago

不会

好的,这个时好时坏,我总感觉就是和DNS缓存有关

madman43 commented 2 years ago

我和他情况一样,但是我是旁路指向主路,只有openclash,没有其他dns和去广告,也是同样情况。实在无法成功使用上openclash,手机电脑版本的clash都没任何问题,很奇怪