vernesong / OpenClash

A Clash Client For OpenWrt
MIT License
17.54k stars 3.18k forks source link

[Bug] netflix土区账号在港区无法播放 #2508

Closed wqh227 closed 2 years ago

wqh227 commented 2 years ago

Verify Steps

OpenClash Version

v0.45.33-beta

Bug on Environment

Official OpenWrt

Bug on Platform

Linux-amd64(x86-64)

To Reproduce

netflix港区可以登录但不能播放,提示账号无法在此地区使用。

Describe the Bug

最近618从asus换了一个软路由,发现了一个openclash的问题,这可能是个bug,但也可能是一个功能的需求。不知道为什么,我一开始使用默认内核,同样的节点,使用url导入,netflix就是港区可以登录但不能播放,提示账号无法在此地区使用。后来我控制变量,在openclash同样使用meta核心,把meilinclash正常使用的配置文件,上传到openclash下,就netflix港区依旧不行,还是提示账号错误,然后,我怀疑是DNS的问题关闭了追加上游DNS,关闭了UDP,但是错误依旧,请问这个问题怎么解决? 后来我对比了openclash自动修改的部分,就还有default-nameserver和profile的store-selected和store-fake-ip不一样,但是我无法测试修改的配置文件,因为一重启openclash,修改的配置文件会被新自动生成的文件覆盖。 我也觉得很奇怪,同样的土区账号,同样的节点,在meilinclash港区就都可以用,我觉得可能土区账号可能会使netflix检测加强,而meilinclash通过了某些手段绕过了netflix的检测,但我目前没有办法得知这是什么方法。

OpenClash Log

OpenClash 调试日志

生成时间: 2022-06-24 15:36:37 插件版本: 隐私提示: 上传此日志前请注意检查、屏蔽公网IP、节点、密码等相关敏感信息


#===================== 系统信息 =====================#

主机型号: QEMU Standard PC (Q35 + ICH9 - Common KVM processor : 2 Core 4 Thread
固件版本: OpenWrt SPP K54 Spring[2022]
LuCI版本: git-22.095.24346-72703c8-1
内核版本: 5.4.190
处理器架构: x86_64

#此项有值时,如不使用IPv6,建议到网络-接口-lan的设置中禁用IPV6的DHCP
IPV6-DHCP: 

#此项结果应仅有配置文件的DNS监听地址
Dnsmasq转发设置: 127.0.0.1#7874

#===================== 依赖检查 =====================#

dnsmasq-full: 已安装
coreutils: 已安装
coreutils-nohup: 已安装
bash: 已安装
curl: 已安装
ca-certificates: 已安装
ipset: 已安装
ip-full: 已安装
iptables-mod-tproxy: 已安装
kmod-ipt-tproxy: 已安装
iptables-mod-extra: 已安装
kmod-ipt-extra: 已安装
libcap: 已安装
libcap-bin: 已安装
ruby: 已安装
ruby-yaml: 已安装
ruby-psych: 已安装
ruby-pstore: 已安装
ruby-dbm: 已安装
kmod-tun(TUN模式): 已安装
luci-compat(Luci-19.07): 已安装
kmod-inet-diag(PROCESS-NAME): 已安装

#===================== 内核检查 =====================#

运行状态: 运行中
进程pid: 17823
运行权限: 17823: cap_dac_override,cap_net_bind_service,cap_net_admin,cap_net_raw,cap_sys_ptrace,cap_sys_resource=eip
运行用户: nobody
已选择的架构: linux-amd64

#下方无法显示内核版本号时请确认您的内核版本是否正确或者有无权限
Tun内核版本: 2022.06.19
Tun内核文件: 存在
Tun内核运行权限: 正常

Dev内核版本: v1.11.0
Dev内核文件: 存在
Dev内核运行权限: 正常

Meta内核版本: alpha-g30a0834
Meta内核文件: 存在
Meta内核运行权限: 正常

#===================== 插件设置 =====================#

当前配置文件: /etc/openclash/config/MCC_prpr.yaml
启动配置文件: /etc/openclash/MCC_prpr.yaml
运行模式: redir-host
默认代理模式: rule
UDP流量转发(tproxy): 停用
DNS劫持: 启用
自定义DNS: 停用
IPV6代理: 停用
IPV6-DNS解析: 停用
禁用Dnsmasq缓存: 停用
自定义规则: 停用
仅允许内网: 启用
仅代理命中规则流量: 停用
仅允许常用端口流量: 停用
绕过中国大陆IP: 启用
DNS远程解析: 停用
路由本机代理: 停用

#启动异常时建议关闭此项后重试
混合节点: 停用
保留配置: 停用

#启动异常时建议关闭此项后重试
第三方规则: 停用

#===================== 配置文件 =====================#

proxy-groups:
- name: "\U0001F3AF 总模式"
  type: select
  proxies:
  - Ⓜ️ 延迟最低
  - Ⓜ️ 负载均衡
  - Ⓜ️ 故障切换
  - "♻️ 手动切换"
  - DIRECT
- name: Ⓜ️ 延迟最低
  type: url-test
  url: http://www.gstatic.com/generate_204
  interval: 300
  tolerance: 50
  proxies:
  - 懒人节点 01
  - ️ 垃圾节点 01
  - "\U0001F1ED\U0001F1F0 香港 01^"
  - "\U0001F1ED\U0001F1F0 香港 02^"
  - "\U0001F1ED\U0001F1F0 香港 05"
  - "\U0001F1ED\U0001F1F0 香港 06"
  - "\U0001F1ED\U0001F1F0 香港 07"
  - "\U0001F1ED\U0001F1F0 香港 08"
  - "\U0001F1E8\U0001F1F3 台湾 01"
  - "\U0001F1E8\U0001F1F3 台湾 02"
  - "\U0001F1E8\U0001F1F3 台湾 03^"
  - "\U0001F1F8\U0001F1EC 新加坡 01^"
  - "\U0001F1F8\U0001F1EC 新加坡 02"
  - "\U0001F1F8\U0001F1EC 新加坡 03"
  - "\U0001F1F8\U0001F1EC 新加坡 04"
  - "\U0001F1F8\U0001F1EC 新加坡 05"
  - "\U0001F1EF\U0001F1F5 日本 01"
  - "\U0001F1EF\U0001F1F5 日本 02"
  - "\U0001F1EF\U0001F1F5 日本 03"
  - "\U0001F1EF\U0001F1F5 日本 04"
  - "\U0001F1EF\U0001F1F5 日本 05"
  - "\U0001F1F0\U0001F1F7 韩国 01"
  - "\U0001F1F0\U0001F1F7 韩国 02"
  - "\U0001F1FA\U0001F1F8 美国 01"
  - "\U0001F1FA\U0001F1F8 美国 02"
  - "\U0001F1FA\U0001F1F8 美国 03"
  - "\U0001F1F7\U0001F1FA 俄罗斯 01"
  - "\U0001F1F9\U0001F1F7 土耳其 01"
  - 乌克兰 01
  - "\U0001F1F1\U0001F1FA 卢森堡 01"
  - "\U0001F1EC\U0001F1E7 英国 01"
  - "\U0001F1F5\U0001F1ED 菲律宾 01"
  - "\U0001F1EE\U0001F1F3 印度 01"
  - "\U0001F1F5\U0001F1F0 巴基斯坦 01"
  - "\U0001F1F2\U0001F1FE 马来西亚 01"
  - "\U0001F1E6\U0001F1EA 阿联酋 01"
  - "\U0001F1F9\U0001F1ED 泰国 01"
  - "\U0001F1E6\U0001F1FA 澳洲 01"
  - "\U0001F1FF\U0001F1E6 南非 01"
  - "\U0001F1E7\U0001F1F7 巴西 01"
  - "\U0001F1E6\U0001F1F7 阿根廷 01"
  - "\U0001F1FB\U0001F1F3 越南 01"
  - "\U0001F1EB\U0001F1F7 法国 01"
  - "\U0001F1E8\U0001F1E6 加拿大 01"
  - "\U0001F1E9\U0001F1EA 德国 01"
- name: Ⓜ️ 故障切换
  type: fallback
  url: http://www.gstatic.com/generate_204
  interval: 300
  proxies:
  - 懒人节点 01
  - ️ 垃圾节点 01
  - "\U0001F1ED\U0001F1F0 香港 01^"
  - "\U0001F1ED\U0001F1F0 香港 02^"
  - "\U0001F1ED\U0001F1F0 香港 05"
  - "\U0001F1ED\U0001F1F0 香港 06"
  - "\U0001F1ED\U0001F1F0 香港 07"
  - "\U0001F1ED\U0001F1F0 香港 08"
  - "\U0001F1E8\U0001F1F3 台湾 01"
  - "\U0001F1E8\U0001F1F3 台湾 02"
  - "\U0001F1E8\U0001F1F3 台湾 03^"
  - "\U0001F1F8\U0001F1EC 新加坡 01^"
  - "\U0001F1F8\U0001F1EC 新加坡 02"
  - "\U0001F1F8\U0001F1EC 新加坡 03"
  - "\U0001F1F8\U0001F1EC 新加坡 04"
  - "\U0001F1F8\U0001F1EC 新加坡 05"
  - "\U0001F1EF\U0001F1F5 日本 01"
  - "\U0001F1EF\U0001F1F5 日本 02"
  - "\U0001F1EF\U0001F1F5 日本 03"
  - "\U0001F1EF\U0001F1F5 日本 04"
  - "\U0001F1EF\U0001F1F5 日本 05"
  - "\U0001F1F0\U0001F1F7 韩国 01"
  - "\U0001F1F0\U0001F1F7 韩国 02"
  - "\U0001F1FA\U0001F1F8 美国 01"
  - "\U0001F1FA\U0001F1F8 美国 02"
  - "\U0001F1FA\U0001F1F8 美国 03"
  - "\U0001F1F7\U0001F1FA 俄罗斯 01"
  - "\U0001F1F9\U0001F1F7 土耳其 01"
  - 乌克兰 01
  - "\U0001F1F1\U0001F1FA 卢森堡 01"
  - "\U0001F1EC\U0001F1E7 英国 01"
  - "\U0001F1F5\U0001F1ED 菲律宾 01"
  - "\U0001F1EE\U0001F1F3 印度 01"
  - "\U0001F1F5\U0001F1F0 巴基斯坦 01"
  - "\U0001F1F2\U0001F1FE 马来西亚 01"
  - "\U0001F1E6\U0001F1EA 阿联酋 01"
  - "\U0001F1F9\U0001F1ED 泰国 01"
  - "\U0001F1E6\U0001F1FA 澳洲 01"
  - "\U0001F1FF\U0001F1E6 南非 01"
  - "\U0001F1E7\U0001F1F7 巴西 01"
  - "\U0001F1E6\U0001F1F7 阿根廷 01"
  - "\U0001F1FB\U0001F1F3 越南 01"
  - "\U0001F1EB\U0001F1F7 法国 01"
  - "\U0001F1E8\U0001F1E6 加拿大 01"
  - "\U0001F1E9\U0001F1EA 德国 01"
- name: Ⓜ️ 负载均衡
  type: load-balance
  strategy: consistent-hashing
  url: http://www.gstatic.com/generate_204
  interval: 300
  proxies:
  - 懒人节点 01
  - ️ 垃圾节点 01
  - "\U0001F1ED\U0001F1F0 香港 01^"
  - "\U0001F1ED\U0001F1F0 香港 02^"
  - "\U0001F1ED\U0001F1F0 香港 05"
  - "\U0001F1ED\U0001F1F0 香港 06"
  - "\U0001F1ED\U0001F1F0 香港 07"
  - "\U0001F1ED\U0001F1F0 香港 08"
  - "\U0001F1E8\U0001F1F3 台湾 01"
  - "\U0001F1E8\U0001F1F3 台湾 02"
  - "\U0001F1E8\U0001F1F3 台湾 03^"
  - "\U0001F1F8\U0001F1EC 新加坡 01^"
  - "\U0001F1F8\U0001F1EC 新加坡 02"
  - "\U0001F1F8\U0001F1EC 新加坡 03"
  - "\U0001F1F8\U0001F1EC 新加坡 04"
  - "\U0001F1F8\U0001F1EC 新加坡 05"
  - "\U0001F1EF\U0001F1F5 日本 01"
  - "\U0001F1EF\U0001F1F5 日本 02"
  - "\U0001F1EF\U0001F1F5 日本 03"
  - "\U0001F1EF\U0001F1F5 日本 04"
  - "\U0001F1EF\U0001F1F5 日本 05"
  - "\U0001F1F0\U0001F1F7 韩国 01"
  - "\U0001F1F0\U0001F1F7 韩国 02"
  - "\U0001F1FA\U0001F1F8 美国 01"
  - "\U0001F1FA\U0001F1F8 美国 02"
  - "\U0001F1FA\U0001F1F8 美国 03"
  - "\U0001F1F7\U0001F1FA 俄罗斯 01"
  - "\U0001F1F9\U0001F1F7 土耳其 01"
  - 乌克兰 01
  - "\U0001F1F1\U0001F1FA 卢森堡 01"
  - "\U0001F1EC\U0001F1E7 英国 01"
  - "\U0001F1F5\U0001F1ED 菲律宾 01"
  - "\U0001F1EE\U0001F1F3 印度 01"
  - "\U0001F1F5\U0001F1F0 巴基斯坦 01"
  - "\U0001F1F2\U0001F1FE 马来西亚 01"
  - "\U0001F1E6\U0001F1EA 阿联酋 01"
  - "\U0001F1F9\U0001F1ED 泰国 01"
  - "\U0001F1E6\U0001F1FA 澳洲 01"
  - "\U0001F1FF\U0001F1E6 南非 01"
  - "\U0001F1E7\U0001F1F7 巴西 01"
  - "\U0001F1E6\U0001F1F7 阿根廷 01"
  - "\U0001F1FB\U0001F1F3 越南 01"
  - "\U0001F1EB\U0001F1F7 法国 01"
  - "\U0001F1E8\U0001F1E6 加拿大 01"
  - "\U0001F1E9\U0001F1EA 德国 01"
- name: "♻️ 手动切换"
  type: select
  proxies:
  - 懒人节点 01
  - ️ 垃圾节点 01
  - "\U0001F1ED\U0001F1F0 香港 01^"
  - "\U0001F1ED\U0001F1F0 香港 02^"
  - "\U0001F1ED\U0001F1F0 香港 05"
  - "\U0001F1ED\U0001F1F0 香港 06"
  - "\U0001F1ED\U0001F1F0 香港 07"
  - "\U0001F1ED\U0001F1F0 香港 08"
  - "\U0001F1E8\U0001F1F3 台湾 01"
  - "\U0001F1E8\U0001F1F3 台湾 02"
  - "\U0001F1E8\U0001F1F3 台湾 03^"
  - "\U0001F1F8\U0001F1EC 新加坡 01^"
  - "\U0001F1F8\U0001F1EC 新加坡 02"
  - "\U0001F1F8\U0001F1EC 新加坡 03"
  - "\U0001F1F8\U0001F1EC 新加坡 04"
  - "\U0001F1F8\U0001F1EC 新加坡 05"
  - "\U0001F1EF\U0001F1F5 日本 01"
  - "\U0001F1EF\U0001F1F5 日本 02"
  - "\U0001F1EF\U0001F1F5 日本 03"
  - "\U0001F1EF\U0001F1F5 日本 04"
  - "\U0001F1EF\U0001F1F5 日本 05"
  - "\U0001F1F0\U0001F1F7 韩国 01"
  - "\U0001F1F0\U0001F1F7 韩国 02"
  - "\U0001F1FA\U0001F1F8 美国 01"
  - "\U0001F1FA\U0001F1F8 美国 02"
  - "\U0001F1FA\U0001F1F8 美国 03"
  - "\U0001F1F7\U0001F1FA 俄罗斯 01"
  - "\U0001F1F9\U0001F1F7 土耳其 01"
  - 乌克兰 01
  - "\U0001F1F1\U0001F1FA 卢森堡 01"
  - "\U0001F1EC\U0001F1E7 英国 01"
  - "\U0001F1F5\U0001F1ED 菲律宾 01"
  - "\U0001F1EE\U0001F1F3 印度 01"
  - "\U0001F1F5\U0001F1F0 巴基斯坦 01"
  - "\U0001F1F2\U0001F1FE 马来西亚 01"
  - "\U0001F1E6\U0001F1EA 阿联酋 01"
  - "\U0001F1F9\U0001F1ED 泰国 01"
  - "\U0001F1E6\U0001F1FA 澳洲 01"
  - "\U0001F1FF\U0001F1E6 南非 01"
  - "\U0001F1E7\U0001F1F7 巴西 01"
  - "\U0001F1E6\U0001F1F7 阿根廷 01"
  - "\U0001F1FB\U0001F1F3 越南 01"
  - "\U0001F1EB\U0001F1F7 法国 01"
  - "\U0001F1E8\U0001F1E6 加拿大 01"
  - "\U0001F1E9\U0001F1EA 德国 01"
- name: "♻️ 手动切换1"
  type: select
  proxies:
  - 懒人节点 01
  - ️ 垃圾节点 01
  - "\U0001F1ED\U0001F1F0 香港 01^"
  - "\U0001F1ED\U0001F1F0 香港 02^"
  - "\U0001F1ED\U0001F1F0 香港 05"
  - "\U0001F1ED\U0001F1F0 香港 06"
  - "\U0001F1ED\U0001F1F0 香港 07"
  - "\U0001F1ED\U0001F1F0 香港 08"
  - "\U0001F1E8\U0001F1F3 台湾 01"
  - "\U0001F1E8\U0001F1F3 台湾 02"
  - "\U0001F1E8\U0001F1F3 台湾 03^"
  - "\U0001F1F8\U0001F1EC 新加坡 01^"
  - "\U0001F1F8\U0001F1EC 新加坡 02"
  - "\U0001F1F8\U0001F1EC 新加坡 03"
  - "\U0001F1F8\U0001F1EC 新加坡 04"
  - "\U0001F1F8\U0001F1EC 新加坡 05"
  - "\U0001F1EF\U0001F1F5 日本 01"
  - "\U0001F1EF\U0001F1F5 日本 02"
  - "\U0001F1EF\U0001F1F5 日本 03"
  - "\U0001F1EF\U0001F1F5 日本 04"
  - "\U0001F1EF\U0001F1F5 日本 05"
  - "\U0001F1F0\U0001F1F7 韩国 01"
  - "\U0001F1F0\U0001F1F7 韩国 02"
  - "\U0001F1FA\U0001F1F8 美国 01"
  - "\U0001F1FA\U0001F1F8 美国 02"
  - "\U0001F1FA\U0001F1F8 美国 03"
  - "\U0001F1F7\U0001F1FA 俄罗斯 01"
  - "\U0001F1F9\U0001F1F7 土耳其 01"
  - 乌克兰 01
  - "\U0001F1F1\U0001F1FA 卢森堡 01"
  - "\U0001F1EC\U0001F1E7 英国 01"
  - "\U0001F1F5\U0001F1ED 菲律宾 01"
  - "\U0001F1EE\U0001F1F3 印度 01"
  - "\U0001F1F5\U0001F1F0 巴基斯坦 01"
  - "\U0001F1F2\U0001F1FE 马来西亚 01"
  - "\U0001F1E6\U0001F1EA 阿联酋 01"
  - "\U0001F1F9\U0001F1ED 泰国 01"
  - "\U0001F1E6\U0001F1FA 澳洲 01"
  - "\U0001F1FF\U0001F1E6 南非 01"
  - "\U0001F1E7\U0001F1F7 巴西 01"
  - "\U0001F1E6\U0001F1F7 阿根廷 01"
  - "\U0001F1FB\U0001F1F3 越南 01"
  - "\U0001F1EB\U0001F1F7 法国 01"
  - "\U0001F1E8\U0001F1E6 加拿大 01"
  - "\U0001F1E9\U0001F1EA 德国 01"
  - DIRECT
- name: "♻️ 手动切换2"
  type: select
  proxies:
  - 懒人节点 01
  - ️ 垃圾节点 01
  - "\U0001F1ED\U0001F1F0 香港 01^"
  - "\U0001F1ED\U0001F1F0 香港 02^"
  - "\U0001F1ED\U0001F1F0 香港 05"
  - "\U0001F1ED\U0001F1F0 香港 06"
  - "\U0001F1ED\U0001F1F0 香港 07"
  - "\U0001F1ED\U0001F1F0 香港 08"
  - "\U0001F1E8\U0001F1F3 台湾 01"
  - "\U0001F1E8\U0001F1F3 台湾 02"
  - "\U0001F1E8\U0001F1F3 台湾 03^"
  - "\U0001F1F8\U0001F1EC 新加坡 01^"
  - "\U0001F1F8\U0001F1EC 新加坡 02"
  - "\U0001F1F8\U0001F1EC 新加坡 03"
  - "\U0001F1F8\U0001F1EC 新加坡 04"
  - "\U0001F1F8\U0001F1EC 新加坡 05"
  - "\U0001F1EF\U0001F1F5 日本 01"
  - "\U0001F1EF\U0001F1F5 日本 02"
  - "\U0001F1EF\U0001F1F5 日本 03"
  - "\U0001F1EF\U0001F1F5 日本 04"
  - "\U0001F1EF\U0001F1F5 日本 05"
  - "\U0001F1F0\U0001F1F7 韩国 01"
  - "\U0001F1F0\U0001F1F7 韩国 02"
  - "\U0001F1FA\U0001F1F8 美国 01"
  - "\U0001F1FA\U0001F1F8 美国 02"
  - "\U0001F1FA\U0001F1F8 美国 03"
  - "\U0001F1F7\U0001F1FA 俄罗斯 01"
  - "\U0001F1F9\U0001F1F7 土耳其 01"
  - 乌克兰 01
  - "\U0001F1F1\U0001F1FA 卢森堡 01"
  - "\U0001F1EC\U0001F1E7 英国 01"
  - "\U0001F1F5\U0001F1ED 菲律宾 01"
  - "\U0001F1EE\U0001F1F3 印度 01"
  - "\U0001F1F5\U0001F1F0 巴基斯坦 01"
  - "\U0001F1F2\U0001F1FE 马来西亚 01"
  - "\U0001F1E6\U0001F1EA 阿联酋 01"
  - "\U0001F1F9\U0001F1ED 泰国 01"
  - "\U0001F1E6\U0001F1FA 澳洲 01"
  - "\U0001F1FF\U0001F1E6 南非 01"
  - "\U0001F1E7\U0001F1F7 巴西 01"
  - "\U0001F1E6\U0001F1F7 阿根廷 01"
  - "\U0001F1FB\U0001F1F3 越南 01"
  - "\U0001F1EB\U0001F1F7 法国 01"
  - "\U0001F1E8\U0001F1E6 加拿大 01"
  - "\U0001F1E9\U0001F1EA 德国 01"
  - DIRECT
- name: "♻️ 手动切换3"
  type: select
  proxies:
  - 懒人节点 01
  - ️ 垃圾节点 01
  - "\U0001F1ED\U0001F1F0 香港 01^"
  - "\U0001F1ED\U0001F1F0 香港 02^"
  - "\U0001F1ED\U0001F1F0 香港 05"
  - "\U0001F1ED\U0001F1F0 香港 06"
  - "\U0001F1ED\U0001F1F0 香港 07"
  - "\U0001F1ED\U0001F1F0 香港 08"
  - "\U0001F1E8\U0001F1F3 台湾 01"
  - "\U0001F1E8\U0001F1F3 台湾 02"
  - "\U0001F1E8\U0001F1F3 台湾 03^"
  - "\U0001F1F8\U0001F1EC 新加坡 01^"
  - "\U0001F1F8\U0001F1EC 新加坡 02"
  - "\U0001F1F8\U0001F1EC 新加坡 03"
  - "\U0001F1F8\U0001F1EC 新加坡 04"
  - "\U0001F1F8\U0001F1EC 新加坡 05"
  - "\U0001F1EF\U0001F1F5 日本 01"
  - "\U0001F1EF\U0001F1F5 日本 02"
  - "\U0001F1EF\U0001F1F5 日本 03"
  - "\U0001F1EF\U0001F1F5 日本 04"
  - "\U0001F1EF\U0001F1F5 日本 05"
  - "\U0001F1F0\U0001F1F7 韩国 01"
  - "\U0001F1F0\U0001F1F7 韩国 02"
  - "\U0001F1FA\U0001F1F8 美国 01"
  - "\U0001F1FA\U0001F1F8 美国 02"
  - "\U0001F1FA\U0001F1F8 美国 03"
  - "\U0001F1F7\U0001F1FA 俄罗斯 01"
  - "\U0001F1F9\U0001F1F7 土耳其 01"
  - 乌克兰 01
  - "\U0001F1F1\U0001F1FA 卢森堡 01"
  - "\U0001F1EC\U0001F1E7 英国 01"
  - "\U0001F1F5\U0001F1ED 菲律宾 01"
  - "\U0001F1EE\U0001F1F3 印度 01"
  - "\U0001F1F5\U0001F1F0 巴基斯坦 01"
  - "\U0001F1F2\U0001F1FE 马来西亚 01"
  - "\U0001F1E6\U0001F1EA 阿联酋 01"
  - "\U0001F1F9\U0001F1ED 泰国 01"
  - "\U0001F1E6\U0001F1FA 澳洲 01"
  - "\U0001F1FF\U0001F1E6 南非 01"
  - "\U0001F1E7\U0001F1F7 巴西 01"
  - "\U0001F1E6\U0001F1F7 阿根廷 01"
  - "\U0001F1FB\U0001F1F3 越南 01"
  - "\U0001F1EB\U0001F1F7 法国 01"
  - "\U0001F1E8\U0001F1E6 加拿大 01"
  - "\U0001F1E9\U0001F1EA 德国 01"
  - DIRECT
- name: "♻️ 手动切换4"
  type: select
  proxies:
  - 懒人节点 01
  - ️ 垃圾节点 01
  - "\U0001F1ED\U0001F1F0 香港 01^"
  - "\U0001F1ED\U0001F1F0 香港 02^"
  - "\U0001F1ED\U0001F1F0 香港 05"
  - "\U0001F1ED\U0001F1F0 香港 06"
  - "\U0001F1ED\U0001F1F0 香港 07"
  - "\U0001F1ED\U0001F1F0 香港 08"
  - "\U0001F1E8\U0001F1F3 台湾 01"
  - "\U0001F1E8\U0001F1F3 台湾 02"
  - "\U0001F1E8\U0001F1F3 台湾 03^"
  - "\U0001F1F8\U0001F1EC 新加坡 01^"
  - "\U0001F1F8\U0001F1EC 新加坡 02"
  - "\U0001F1F8\U0001F1EC 新加坡 03"
  - "\U0001F1F8\U0001F1EC 新加坡 04"
  - "\U0001F1F8\U0001F1EC 新加坡 05"
  - "\U0001F1EF\U0001F1F5 日本 01"
  - "\U0001F1EF\U0001F1F5 日本 02"
  - "\U0001F1EF\U0001F1F5 日本 03"
  - "\U0001F1EF\U0001F1F5 日本 04"
  - "\U0001F1EF\U0001F1F5 日本 05"
  - "\U0001F1F0\U0001F1F7 韩国 01"
  - "\U0001F1F0\U0001F1F7 韩国 02"
  - "\U0001F1FA\U0001F1F8 美国 01"
  - "\U0001F1FA\U0001F1F8 美国 02"
  - "\U0001F1FA\U0001F1F8 美国 03"
  - "\U0001F1F7\U0001F1FA 俄罗斯 01"
  - "\U0001F1F9\U0001F1F7 土耳其 01"
  - 乌克兰 01
  - "\U0001F1F1\U0001F1FA 卢森堡 01"
  - "\U0001F1EC\U0001F1E7 英国 01"
  - "\U0001F1F5\U0001F1ED 菲律宾 01"
  - "\U0001F1EE\U0001F1F3 印度 01"
  - "\U0001F1F5\U0001F1F0 巴基斯坦 01"
  - "\U0001F1F2\U0001F1FE 马来西亚 01"
  - "\U0001F1E6\U0001F1EA 阿联酋 01"
  - "\U0001F1F9\U0001F1ED 泰国 01"
  - "\U0001F1E6\U0001F1FA 澳洲 01"
  - "\U0001F1FF\U0001F1E6 南非 01"
  - "\U0001F1E7\U0001F1F7 巴西 01"
  - "\U0001F1E6\U0001F1F7 阿根廷 01"
  - "\U0001F1FB\U0001F1F3 越南 01"
  - "\U0001F1EB\U0001F1F7 法国 01"
  - "\U0001F1E8\U0001F1E6 加拿大 01"
  - "\U0001F1E9\U0001F1EA 德国 01"
  - DIRECT
- name: "♻️ 手动切换5"
  type: select
  proxies:
  - 懒人节点 01
  - ️ 垃圾节点 01
  - "\U0001F1ED\U0001F1F0 香港 01^"
  - "\U0001F1ED\U0001F1F0 香港 02^"
  - "\U0001F1ED\U0001F1F0 香港 05"
  - "\U0001F1ED\U0001F1F0 香港 06"
  - "\U0001F1ED\U0001F1F0 香港 07"
  - "\U0001F1ED\U0001F1F0 香港 08"
  - "\U0001F1E8\U0001F1F3 台湾 01"
  - "\U0001F1E8\U0001F1F3 台湾 02"
  - "\U0001F1E8\U0001F1F3 台湾 03^"
  - "\U0001F1F8\U0001F1EC 新加坡 01^"
  - "\U0001F1F8\U0001F1EC 新加坡 02"
  - "\U0001F1F8\U0001F1EC 新加坡 03"
  - "\U0001F1F8\U0001F1EC 新加坡 04"
  - "\U0001F1F8\U0001F1EC 新加坡 05"
  - "\U0001F1EF\U0001F1F5 日本 01"
  - "\U0001F1EF\U0001F1F5 日本 02"
  - "\U0001F1EF\U0001F1F5 日本 03"
  - "\U0001F1EF\U0001F1F5 日本 04"
  - "\U0001F1EF\U0001F1F5 日本 05"
  - "\U0001F1F0\U0001F1F7 韩国 01"
  - "\U0001F1F0\U0001F1F7 韩国 02"
  - "\U0001F1FA\U0001F1F8 美国 01"
  - "\U0001F1FA\U0001F1F8 美国 02"
  - "\U0001F1FA\U0001F1F8 美国 03"
  - "\U0001F1F7\U0001F1FA 俄罗斯 01"
  - "\U0001F1F9\U0001F1F7 土耳其 01"
  - 乌克兰 01
  - "\U0001F1F1\U0001F1FA 卢森堡 01"
  - "\U0001F1EC\U0001F1E7 英国 01"
  - "\U0001F1F5\U0001F1ED 菲律宾 01"
  - "\U0001F1EE\U0001F1F3 印度 01"
  - "\U0001F1F5\U0001F1F0 巴基斯坦 01"
  - "\U0001F1F2\U0001F1FE 马来西亚 01"
  - "\U0001F1E6\U0001F1EA 阿联酋 01"
  - "\U0001F1F9\U0001F1ED 泰国 01"
  - "\U0001F1E6\U0001F1FA 澳洲 01"
  - "\U0001F1FF\U0001F1E6 南非 01"
  - "\U0001F1E7\U0001F1F7 巴西 01"
  - "\U0001F1E6\U0001F1F7 阿根廷 01"
  - "\U0001F1FB\U0001F1F3 越南 01"
  - "\U0001F1EB\U0001F1F7 法国 01"
  - "\U0001F1E8\U0001F1E6 加拿大 01"
  - "\U0001F1E9\U0001F1EA 德国 01"
  - DIRECT
- name: "\U0001F34E 苹果服务"
  type: select
  proxies:
  - DIRECT
  - "\U0001F3AF 总模式"
  - Ⓜ️ 负载均衡
  - Ⓜ️ 延迟最低
  - Ⓜ️ 故障切换
  - "♻️ 手动切换"
  - "♻️ 手动切换1"
  - "♻️ 手动切换2"
  - "♻️ 手动切换3"
  - "♻️ 手动切换4"
  - "♻️ 手动切换5"
- name: "\U0001F9E9 微软服务"
  type: select
  proxies:
  - DIRECT
  - "\U0001F3AF 总模式"
  - Ⓜ️ 负载均衡
  - Ⓜ️ 延迟最低
  - Ⓜ️ 故障切换
  - "♻️ 手动切换"
  - "♻️ 手动切换1"
  - "♻️ 手动切换2"
  - "♻️ 手动切换3"
  - "♻️ 手动切换4"
  - "♻️ 手动切换5"
- name: "\U0001F4F2 聊天软件"
  type: select
  proxies:
  - "\U0001F3AF 总模式"
  - Ⓜ️ 负载均衡
  - Ⓜ️ 延迟最低
  - Ⓜ️ 故障切换
  - "♻️ 手动切换"
  - "♻️ 手动切换1"
  - "♻️ 手动切换2"
  - "♻️ 手动切换3"
  - "♻️ 手动切换4"
  - "♻️ 手动切换5"
  - DIRECT
- name: "\U0001F4F9 YouTube"
  type: select
  proxies:
  - "\U0001F3AF 总模式"
  - Ⓜ️ 负载均衡
  - Ⓜ️ 延迟最低
  - Ⓜ️ 故障切换
  - "♻️ 手动切换"
  - "♻️ 手动切换1"
  - "♻️ 手动切换2"
  - "♻️ 手动切换3"
  - "♻️ 手动切换4"
  - "♻️ 手动切换5"
  - DIRECT
- name: "\U0001F3A5 NETFLIX"
  type: select
  proxies:
  - "\U0001F3AF 总模式"
  - Ⓜ️ 负载均衡
  - Ⓜ️ 延迟最低
  - Ⓜ️ 故障切换
  - "♻️ 手动切换"
  - "♻️ 手动切换1"
  - "♻️ 手动切换2"
  - "♻️ 手动切换3"
  - "♻️ 手动切换4"
  - "♻️ 手动切换5"
  - DIRECT
- name: "\U0001F50D 谷歌服务"
  type: select
  proxies:
  - "\U0001F3AF 总模式"
  - Ⓜ️ 负载均衡
  - Ⓜ️ 延迟最低
  - Ⓜ️ 故障切换
  - "♻️ 手动切换"
  - "♻️ 手动切换1"
  - "♻️ 手动切换2"
  - "♻️ 手动切换3"
  - "♻️ 手动切换4"
  - "♻️ 手动切换5"
  - DIRECT
- name: "\U0001F3AE 游戏平台"
  type: select
  proxies:
  - "\U0001F3AF 总模式"
  - Ⓜ️ 负载均衡
  - Ⓜ️ 延迟最低
  - Ⓜ️ 故障切换
  - "♻️ 手动切换"
  - "♻️ 手动切换1"
  - "♻️ 手动切换2"
  - "♻️ 手动切换3"
  - "♻️ 手动切换4"
  - "♻️ 手动切换5"
  - DIRECT
- name: "⛩ 日韩媒体"
  type: select
  proxies:
  - "\U0001F3AF 总模式"
  - Ⓜ️ 负载均衡
  - Ⓜ️ 延迟最低
  - Ⓜ️ 故障切换
  - "♻️ 手动切换"
  - "♻️ 手动切换1"
  - "♻️ 手动切换2"
  - "♻️ 手动切换3"
  - "♻️ 手动切换4"
  - "♻️ 手动切换5"
  - DIRECT
- name: "\U0001F30D 国外媒体"
  type: select
  proxies:
  - "\U0001F3AF 总模式"
  - Ⓜ️ 负载均衡
  - Ⓜ️ 延迟最低
  - Ⓜ️ 故障切换
  - "♻️ 手动切换"
  - "♻️ 手动切换1"
  - "♻️ 手动切换2"
  - "♻️ 手动切换3"
  - "♻️ 手动切换4"
  - "♻️ 手动切换5"
  - DIRECT
- name: "\U0001F30F 港台媒体"
  type: select
  proxies:
  - "\U0001F3AF 总模式"
  - Ⓜ️ 负载均衡
  - Ⓜ️ 延迟最低
  - Ⓜ️ 故障切换
  - "♻️ 手动切换"
  - "♻️ 手动切换1"
  - "♻️ 手动切换2"
  - "♻️ 手动切换3"
  - "♻️ 手动切换4"
  - "♻️ 手动切换5"
  - DIRECT
- name: "\U0001F1FA\U0001F1F3 国外网站"
  type: select
  proxies:
  - "\U0001F3AF 总模式"
  - Ⓜ️ 负载均衡
  - Ⓜ️ 延迟最低
  - Ⓜ️ 故障切换
  - "♻️ 手动切换"
  - "♻️ 手动切换1"
  - "♻️ 手动切换2"
  - "♻️ 手动切换3"
  - "♻️ 手动切换4"
  - "♻️ 手动切换5"
  - DIRECT
- name: "\U0001F1E8\U0001F1F3 国内网站"
  type: select
  proxies:
  - DIRECT
  - "\U0001F3AF 总模式"
  - Ⓜ️ 负载均衡
  - Ⓜ️ 延迟最低
  - Ⓜ️ 故障切换
  - "♻️ 手动切换"
  - "♻️ 手动切换1"
  - "♻️ 手动切换2"
  - "♻️ 手动切换3"
  - "♻️ 手动切换4"
  - "♻️ 手动切换5"
- name: "\U0001F41F 漏网之鱼"
  type: select
  proxies:
  - DIRECT
  - "\U0001F3AF 总模式"
  - Ⓜ️ 负载均衡
  - Ⓜ️ 延迟最低
  - Ⓜ️ 故障切换
  - "♻️ 手动切换"
  - "♻️ 手动切换1"
  - "♻️ 手动切换2"
  - "♻️ 手动切换3"
  - "♻️ 手动切换4"
  - "♻️ 手动切换5"
- name: "\U0001F6D1 广告拦截"
  type: select
  proxies:
  - REJECT
  - DIRECT
- name: "⛔ 应用净化"
  type: select
  proxies:
  - REJECT
  - DIRECT
script:
rules:
- DST-PORT,7895,REJECT
- DST-PORT,7892,REJECT
- IP-CIDR,198.18.0.1/16,REJECT,no-resolve
- SRC-IP-CIDR,192.168.50.1/32,DIRECT
- SRC-IP-CIDR,198.18.0.1/32,DIRECT
- DOMAIN-SUFFIX,msftncsi.com,DIRECT
- DOMAIN-SUFFIX,msftconnecttest.com,DIRECT
- DOMAIN,checkip.synology.com,DIRECT
- DOMAIN,checkipv6.synology.com,DIRECT
- DOMAIN,checkport.synology.com,DIRECT
- DOMAIN-SUFFIX,sellercentral.amazon.com,DIRECT
- DOMAIN-SUFFIX,advertising.amazon.com,DIRECT
- DOMAIN-SUFFIX,acl4.ssr,DIRECT
- DOMAIN-SUFFIX,ip6-localhost,DIRECT
- DOMAIN-SUFFIX,ip6-loopback,DIRECT
- DOMAIN-SUFFIX,local,DIRECT
- DOMAIN-SUFFIX,localhost,DIRECT
- IP-CIDR,10.0.0.0/8,DIRECT,no-resolve
- IP-CIDR,100.64.0.0/10,DIRECT,no-resolve
- IP-CIDR,127.0.0.0/8,DIRECT,no-resolve
- IP-CIDR,172.16.0.0/12,DIRECT,no-resolve
- IP-CIDR,192.168.0.0/16,DIRECT,no-resolve
- IP-CIDR,198.18.0.0/16,DIRECT,no-resolve
- IP-CIDR6,::1/128,DIRECT,no-resolve
- IP-CIDR6,fc00::/7,DIRECT,no-resolve
- IP-CIDR6,fe80::/10,DIRECT,no-resolve
- IP-CIDR6,fd00::/8,DIRECT,no-resolve
- DOMAIN,instant.arubanetworks.com,DIRECT
- DOMAIN,setmeup.arubanetworks.com,DIRECT
- DOMAIN,router.asus.com,DIRECT
- DOMAIN-SUFFIX,hiwifi.com,DIRECT
- DOMAIN-SUFFIX,leike.cc,DIRECT
- DOMAIN-SUFFIX,miwifi.com,DIRECT
- DOMAIN-SUFFIX,my.router,DIRECT
- DOMAIN-SUFFIX,p.to,DIRECT
- DOMAIN-SUFFIX,peiluyou.com,DIRECT
- DOMAIN-SUFFIX,phicomm.me,DIRECT
- DOMAIN-SUFFIX,router.ctc,DIRECT
- DOMAIN-SUFFIX,routerlogin.com,DIRECT
- DOMAIN-SUFFIX,tendawifi.com,DIRECT
- DOMAIN-SUFFIX,zte.home,DIRECT
- "DOMAIN,dl.google.com,\U0001F50D 谷歌服务"
- "DOMAIN-SUFFIX,googletraveladservices.com,\U0001F50D 谷歌服务"
- "DOMAIN-SUFFIX,ol.epicgames.com,\U0001F1E8\U0001F1F3 国内网站"
- "DOMAIN-SUFFIX,dizhensubao.getui.com,\U0001F1E8\U0001F1F3 国内网站"
- "DOMAIN,dl.google.com,\U0001F1E8\U0001F1F3 国内网站"
- "DOMAIN-SUFFIX,googletraveladservices.com,\U0001F1E8\U0001F1F3 国内网站"
- "DOMAIN-SUFFIX,tracking-protection.cdn.mozilla.net,\U0001F1E8\U0001F1F3 国内网站"
- "DOMAIN,origin-a.akamaihd.net,\U0001F1E8\U0001F1F3 国内网站"
- "DOMAIN,xivanalysis.com,\U0001F1E8\U0001F1F3 国内网站"
- "DOMAIN,picanalysis.vivo.com.cn,\U0001F1E8\U0001F1F3 国内网站"
- "DOMAIN,fairplay.l.qq.com,\U0001F1E8\U0001F1F3 国内网站"
- "DOMAIN,livew.l.qq.com,\U0001F1E8\U0001F1F3 国内网站"
- "DOMAIN,vd.l.qq.com,\U0001F1E8\U0001F1F3 国内网站"
- "DOMAIN,analytics.strava.com,\U0001F1E8\U0001F1F3 国内网站"
- "DOMAIN,errlog.umeng.com,\U0001F1E8\U0001F1F3 国内网站"
- "DOMAIN,msg.umeng.com,\U0001F1E8\U0001F1F3 国内网站"
- "DOMAIN,msg.umengcloud.com,\U0001F1E8\U0001F1F3 国内网站"
- "DOMAIN,tracking.miui.com,\U0001F1E8\U0001F1F3 国内网站"
- "DOMAIN,app.adjust.com,\U0001F1E8\U0001F1F3 国内网站"
- "DOMAIN,bdtj.tagtic.cn,\U0001F1E8\U0001F1F3 国内网站"
- "DOMAIN-KEYWORD,admarvel,\U0001F6D1 广告拦截"
- "DOMAIN-KEYWORD,admaster,\U0001F6D1 广告拦截"
- "DOMAIN-KEYWORD,adsage,\U0001F6D1 广告拦截"
- "DOMAIN-KEYWORD,adsensor,\U0001F6D1 广告拦截"
- "DOMAIN-KEYWORD,adservice,\U0001F6D1 广告拦截"
- "DOMAIN-KEYWORD,adsmogo,\U0001F6D1 广告拦截"
- "DOMAIN-KEYWORD,adsrvmedia,\U0001F6D1 广告拦截"
- "DOMAIN-KEYWORD,adsserving,\U0001F6D1 广告拦截"
- "DOMAIN-KEYWORD,adsystem,\U0001F6D1 广告拦截"
- "DOMAIN-KEYWORD,adwords,\U0001F6D1 广告拦截"
- "DOMAIN-KEYWORD,analysis,\U0001F6D1 广告拦截"
- "DOMAIN-KEYWORD,applovin,\U0001F6D1 广告拦截"
- "DOMAIN-KEYWORD,appsflyer,\U0001F6D1 广告拦截"
- "DOMAIN-KEYWORD,domob,\U0001F6D1 广告拦截"
- "DOMAIN-KEYWORD,duomeng,\U0001F6D1 广告拦截"
- "DOMAIN-KEYWORD,dwtrack,\U0001F6D1 广告拦截"
- "DOMAIN-KEYWORD,guanggao,\U0001F6D1 广告拦截"
- "DOMAIN-KEYWORD,omgmta,\U0001F6D1 广告拦截"
- "DOMAIN-KEYWORD,omniture,\U0001F6D1 广告拦截"
- "DOMAIN-KEYWORD,openx,\U0001F6D1 广告拦截"
- "DOMAIN-KEYWORD,partnerad,\U0001F6D1 广告拦截"
- "DOMAIN-KEYWORD,pingfore,\U0001F6D1 广告拦截"
- "DOMAIN-KEYWORD,socdm,\U0001F6D1 广告拦截"
- "DOMAIN-KEYWORD,supersonicads,\U0001F6D1 广告拦截"
- "DOMAIN-KEYWORD,usage,\U0001F6D1 广告拦截"
- "DOMAIN-KEYWORD,wlmonitor,\U0001F6D1 广告拦截"
- "DOMAIN-KEYWORD,zjtoolbar,\U0001F6D1 广告拦截"
- "DOMAIN-SUFFIX,09mk.cn,\U0001F6D1 广告拦截"
- "DOMAIN-SUFFIX,100peng.com,\U0001F6D1 广告拦截"

......省略......

port: 7890
socks-port: 7891
redir-port: 7892
allow-lan: true
mode: rule
log-level: silent
external-controller: 0.0.0.0:9090
experimental:
  ignore-resolve-fail: true
external-ui: "/usr/share/openclash/ui"
profile:
  store-selected: true
  store-fake-ip: true
ipv6: false
hosts:
  router.asus.com: 192.168.50.1
  services.googleapis.cn: 74.125.193.94
  time.android.com: 203.107.6.88
  ipv6.msftconnecttest.com: 2a01:111:2003::52
  www.msftconnecttest.com: 13.107.4.52
dns:
  enable: true
  ipv6: false
  listen: 0.0.0.0:7874
  default-nameserver:
  - 223.5.5.5
  - 8.8.8.8
  - https://223.5.5.5/dns-query
  - tls://101.101.101.101:853
  - tcp://208.67.222.222:443
  enhanced-mode: redir-host
  nameserver:
  - https://223.5.5.5/dns-query
  - tls://101.101.101.101:853
  - https://doh.pub/dns-query
  fallback:
  - https://doh.dns.sb/dns-query
  - tcp://208.67.222.222:443
  - tls://dns.google
  fallback-filter:
    geoip: true
    ipcidr:
    - 240.0.0.0/4
    domain:
    - "+.netflix.com.edgesuite.net"
    - "+.fast.com"
    - "+.netflix.com"
    - "+.netflix.net"
    - "+.netflixdnstest0.com"
    - "+.netflixdnstest1.com"
    - "+.netflixdnstest2.com"
    - "+.netflixdnstest3.com"
    - "+.netflixdnstest4.com"
    - "+.netflixdnstest5.com"
    - "+.netflixdnstest6.com"
    - "+.netflixdnstest7.com"
    - "+.netflixdnstest8.com"
    - "+.netflixdnstest9.com"
    - "+.nflxext.com"
    - "+.nflximg.com"
    - "+.nflximg.net"
    - "+.nflxso.net"
    - "+.nflxvideo.net"
    - "+.linkedin.com"
    - "+.licdn.com"
    - "+.renzhe.cloud"
tproxy: true
tproxy-port: 7895
mixed-port: 7893
bind-address: "*"
geodata-mode: false
geodata-loader: memconservative
tcp-concurrent: false
sniffer:
  enable: true
  sniffing:
  - tls
  - http

#===================== 防火墙设置 =====================#

#IPv4 NAT chain

# Generated by iptables-save v1.8.7 on Fri Jun 24 15:36:40 2022
*nat
:PREROUTING ACCEPT [214501:48406926]
:INPUT ACCEPT [212193:47391369]
:OUTPUT ACCEPT [55863:3450761]
:POSTROUTING ACCEPT [19613:1274663]
:MINIUPNPD - [0:0]
:MINIUPNPD-POSTROUTING - [0:0]
:openclash - [0:0]
:openclash_output - [0:0]
:postrouting_VPN_rule - [0:0]
:postrouting_lan_rule - [0:0]
:postrouting_rule - [0:0]
:postrouting_vpn_rule - [0:0]
:postrouting_wan_rule - [0:0]
:prerouting_VPN_rule - [0:0]
:prerouting_lan_rule - [0:0]
:prerouting_rule - [0:0]
:prerouting_vpn_rule - [0:0]
:prerouting_wan_rule - [0:0]
:zone_VPN_postrouting - [0:0]
:zone_VPN_prerouting - [0:0]
:zone_lan_postrouting - [0:0]
:zone_lan_prerouting - [0:0]
:zone_vpn_postrouting - [0:0]
:zone_vpn_prerouting - [0:0]
:zone_wan_postrouting - [0:0]
:zone_wan_prerouting - [0:0]
-A PREROUTING -d 8.8.4.4/32 -p tcp -m comment --comment "OpenClash Google DNS Hijack" -m tcp --dport 53 -j REDIRECT --to-ports 7892
-A PREROUTING -d 8.8.8.8/32 -p tcp -m comment --comment "OpenClash Google DNS Hijack" -m tcp --dport 53 -j REDIRECT --to-ports 7892
-A PREROUTING -p tcp -m tcp --dport 53 -m comment --comment "OpenClash DNS Hijack" -j REDIRECT --to-ports 53
-A PREROUTING -p udp -m udp --dport 53 -m comment --comment "OpenClash DNS Hijack" -j REDIRECT --to-ports 53
-A PREROUTING -p udp -m udp --dport 53 -j REDIRECT --to-ports 53
-A PREROUTING -p tcp -m tcp --dport 53 -j REDIRECT --to-ports 53
-A PREROUTING -m comment --comment "!fw3: Custom prerouting rule chain" -j prerouting_rule
-A PREROUTING -i br-lan -m comment --comment "!fw3" -j zone_lan_prerouting
-A PREROUTING -i eth1 -m comment --comment "!fw3" -j zone_wan_prerouting
-A PREROUTING -i ipsec0 -m comment --comment "!fw3" -j zone_VPN_prerouting
-A PREROUTING -i tun0 -m comment --comment "!fw3" -j zone_vpn_prerouting
-A PREROUTING -p tcp -j openclash
-A OUTPUT -j openclash_output
-A POSTROUTING -m comment --comment "!fw3: Custom postrouting rule chain" -j postrouting_rule
-A POSTROUTING -o br-lan -m comment --comment "!fw3" -j zone_lan_postrouting
-A POSTROUTING -o eth1 -m comment --comment "!fw3" -j zone_wan_postrouting
-A POSTROUTING -o ipsec0 -m comment --comment "!fw3" -j zone_VPN_postrouting
-A POSTROUTING -o tun0 -m comment --comment "!fw3" -j zone_vpn_postrouting
-A openclash -p tcp -m tcp --sport 1688 -j RETURN
-A openclash -p tcp -m tcp --sport 1723 -j RETURN
-A openclash -p tcp -m tcp --sport 1194 -j RETURN
-A openclash -m set --match-set localnetwork dst -j RETURN
-A openclash -m set --match-set china_ip_route dst -j RETURN
-A openclash -p tcp -j REDIRECT --to-ports 7892
-A openclash_output -p tcp -m tcp --sport 1688 -j RETURN
-A openclash_output -p tcp -m tcp --sport 1723 -j RETURN
-A openclash_output -p tcp -m tcp --sport 1194 -j RETURN
-A openclash_output -m set --match-set localnetwork dst -j RETURN
-A openclash_output -m owner ! --uid-owner 65534 -m set --match-set china_ip_route dst -j RETURN
-A openclash_output -p tcp -m owner ! --uid-owner 65534 -j REDIRECT --to-ports 7892
-A zone_VPN_postrouting -m comment --comment "!fw3: Custom VPN postrouting rule chain" -j postrouting_VPN_rule
-A zone_VPN_prerouting -m comment --comment "!fw3: Custom VPN prerouting rule chain" -j prerouting_VPN_rule
-A zone_lan_postrouting -m comment --comment "!fw3: Custom lan postrouting rule chain" -j postrouting_lan_rule
-A zone_lan_prerouting -m comment --comment "!fw3: Custom lan prerouting rule chain" -j prerouting_lan_rule
-A zone_vpn_postrouting -m comment --comment "!fw3: Custom vpn postrouting rule chain" -j postrouting_vpn_rule
-A zone_vpn_postrouting -m comment --comment "!fw3" -j MASQUERADE
-A zone_vpn_prerouting -m comment --comment "!fw3: Custom vpn prerouting rule chain" -j prerouting_vpn_rule
-A zone_wan_postrouting -j MINIUPNPD-POSTROUTING
-A zone_wan_postrouting -j MINIUPNPD-POSTROUTING
-A zone_wan_postrouting -m comment --comment "!fw3: Custom wan postrouting rule chain" -j postrouting_wan_rule
-A zone_wan_postrouting -m comment --comment "!fw3" -j MASQUERADE
-A zone_wan_prerouting -j MINIUPNPD
-A zone_wan_prerouting -j MINIUPNPD
-A zone_wan_prerouting -m comment --comment "!fw3: Custom wan prerouting rule chain" -j prerouting_wan_rule
COMMIT
# Completed on Fri Jun 24 15:36:40 2022

#IPv4 Mangle chain

# Generated by iptables-save v1.8.7 on Fri Jun 24 15:36:40 2022
*mangle
:PREROUTING ACCEPT [3581667:8597165191]
:INPUT ACCEPT [3109681:8546784011]
:FORWARD ACCEPT [449053:48681896]
:OUTPUT ACCEPT [2653814:8503076002]
:POSTROUTING ACCEPT [3097609:8551548389]
:RRDIPT_FORWARD - [0:0]
:RRDIPT_INPUT - [0:0]
:RRDIPT_OUTPUT - [0:0]
-A INPUT -j RRDIPT_INPUT
-A FORWARD -j RRDIPT_FORWARD
-A FORWARD -o eth1 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -i eth1 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A OUTPUT -j RRDIPT_OUTPUT
-A RRDIPT_FORWARD -s 192.168.50.201/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.201/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.122/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.122/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.202/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.202/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.203/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.203/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.220/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.220/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.116/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.116/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.204/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.204/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.117/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.117/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.213/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.213/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.126/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.126/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.214/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.214/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.215/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.215/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.151/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.151/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.207/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.207/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.160/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.160/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.144/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.144/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.216/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.216/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.161/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.161/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.233/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.233/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.146/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.146/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.139/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.139/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.147/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.147/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.227/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.227/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.243/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.243/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.155/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.155/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.156/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.156/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.181/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.181/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.157/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.157/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.1.1/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.1.1/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.174/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.174/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.159/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.159/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.191/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.191/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.16/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.16/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.177/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.177/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.193/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.193/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.195/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.195/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.196/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.196/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.62/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.62/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.1.9/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.1.9/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.50.94/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.50.94/32 -j RETURN
-A RRDIPT_INPUT -i eth0 -j RETURN
-A RRDIPT_INPUT -i eth1 -j RETURN
-A RRDIPT_OUTPUT -o eth0 -j RETURN
-A RRDIPT_OUTPUT -o eth1 -j RETURN
COMMIT
# Completed on Fri Jun 24 15:36:40 2022

#IPv4 Filter chain

# Generated by iptables-save v1.8.7 on Fri Jun 24 15:36:40 2022
*filter
:INPUT ACCEPT [25:1192]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [0:0]
:MINIUPNPD - [0:0]
:forwarding_VPN_rule - [0:0]
:forwarding_lan_rule - [0:0]
:forwarding_rule - [0:0]
:forwarding_vpn_rule - [0:0]
:forwarding_wan_rule - [0:0]
:input_VPN_rule - [0:0]
:input_lan_rule - [0:0]
:input_rule - [0:0]
:input_vpn_rule - [0:0]
:input_wan_rule - [0:0]
:openclash_wan_input - [0:0]
:output_VPN_rule - [0:0]
:output_lan_rule - [0:0]
:output_rule - [0:0]
:output_vpn_rule - [0:0]
:output_wan_rule - [0:0]
:reject - [0:0]
:syn_flood - [0:0]
:zone_VPN_dest_ACCEPT - [0:0]
:zone_VPN_forward - [0:0]
:zone_VPN_input - [0:0]
:zone_VPN_output - [0:0]
:zone_VPN_src_ACCEPT - [0:0]
:zone_lan_dest_ACCEPT - [0:0]
:zone_lan_forward - [0:0]
:zone_lan_input - [0:0]
:zone_lan_output - [0:0]
:zone_lan_src_ACCEPT - [0:0]
:zone_vpn_dest_ACCEPT - [0:0]
:zone_vpn_forward - [0:0]
:zone_vpn_input - [0:0]
:zone_vpn_output - [0:0]
:zone_vpn_src_ACCEPT - [0:0]
:zone_wan_dest_ACCEPT - [0:0]
:zone_wan_dest_REJECT - [0:0]
:zone_wan_forward - [0:0]
:zone_wan_input - [0:0]
:zone_wan_output - [0:0]
:zone_wan_src_REJECT - [0:0]
-A INPUT -i eth1 -j openclash_wan_input
-A INPUT -m policy --dir in --pol ipsec --proto esp -j ACCEPT
-A INPUT -i lo -m comment --comment "!fw3" -j ACCEPT
-A INPUT -m comment --comment "!fw3: Custom input rule chain" -j input_rule
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m comment --comment "!fw3" -j syn_flood
-A INPUT -i br-lan -m comment --comment "!fw3" -j zone_lan_input
-A INPUT -i eth1 -m comment --comment "!fw3" -j zone_wan_input
-A INPUT -i ipsec0 -m comment --comment "!fw3" -j zone_VPN_input
-A INPUT -i tun0 -m comment --comment "!fw3" -j zone_vpn_input
-A FORWARD -m policy --dir out --pol ipsec --proto esp -j ACCEPT
-A FORWARD -m policy --dir in --pol ipsec --proto esp -j ACCEPT
-A FORWARD -d 111.202.0.29/32 -j DROP
-A FORWARD -d 39.156.81.19/32 -j DROP
-A FORWARD -d 111.13.142.142/32 -j DROP
-A FORWARD -d 118.26.252.10/32 -j DROP
-A FORWARD -d 203.100.92.136/32 -j DROP
-A FORWARD -d 123.125.102.127/32 -j DROP
-A FORWARD -d 183.84.5.15/32 -j DROP
-A FORWARD -d 120.92.96.60/32 -j DROP
-A FORWARD -m comment --comment "!fw3: Custom forwarding rule chain" -j forwarding_rule
-A FORWARD -m comment --comment "!fw3: Traffic offloading" -m conntrack --ctstate RELATED,ESTABLISHED -j FLOWOFFLOAD --hw
-A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A FORWARD -i br-lan -m comment --comment "!fw3" -j zone_lan_forward
-A FORWARD -i eth1 -m comment --comment "!fw3" -j zone_wan_forward
-A FORWARD -i ipsec0 -m comment --comment "!fw3" -j zone_VPN_forward
-A FORWARD -i tun0 -m comment --comment "!fw3" -j zone_vpn_forward
-A FORWARD -m comment --comment "!fw3" -j reject
-A OUTPUT -m policy --dir out --pol ipsec --proto esp -j ACCEPT
-A OUTPUT -o lo -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -m comment --comment "!fw3: Custom output rule chain" -j output_rule
-A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -o br-lan -m comment --comment "!fw3" -j zone_lan_output
-A OUTPUT -o eth1 -m comment --comment "!fw3" -j zone_wan_output
-A OUTPUT -o ipsec0 -m comment --comment "!fw3" -j zone_VPN_output
-A OUTPUT -o tun0 -m comment --comment "!fw3" -j zone_vpn_output
-A forwarding_rule -i pppoe+ -j RETURN
-A forwarding_rule -o pppoe+ -j RETURN
-A forwarding_rule -i ppp+ -m conntrack --ctstate NEW -j ACCEPT
-A forwarding_rule -o ppp+ -m conntrack --ctstate NEW -j ACCEPT
-A openclash_wan_input -p udp -m multiport --dports 7892,7895,9090,7890,7891,7893,7874 -j REJECT --reject-with icmp-port-unreachable
-A openclash_wan_input -p tcp -m multiport --dports 7892,7895,9090,7890,7891,7893,7874 -j REJECT --reject-with icmp-port-unreachable
-A reject -p tcp -m comment --comment "!fw3" -j REJECT --reject-with tcp-reset
-A reject -m comment --comment "!fw3" -j REJECT --reject-with icmp-port-unreachable
-A syn_flood -m limit --limit 25/sec --limit-burst 50 -m comment --comment "!fw3" -j RETURN
-A syn_flood -m comment --comment "!fw3" -j DROP
-A zone_VPN_dest_ACCEPT -o ipsec0 -m comment --comment "!fw3" -j ACCEPT
-A zone_VPN_forward -m comment --comment "!fw3: Custom VPN forwarding rule chain" -j forwarding_VPN_rule
-A zone_VPN_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_VPN_forward -m comment --comment "!fw3" -j zone_VPN_dest_ACCEPT
-A zone_VPN_input -m comment --comment "!fw3: Custom VPN input rule chain" -j input_VPN_rule
-A zone_VPN_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_VPN_input -m comment --comment "!fw3" -j zone_VPN_src_ACCEPT
-A zone_VPN_output -m comment --comment "!fw3: Custom VPN output rule chain" -j output_VPN_rule
-A zone_VPN_output -m comment --comment "!fw3" -j zone_VPN_dest_ACCEPT
-A zone_VPN_src_ACCEPT -i ipsec0 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_dest_ACCEPT -o br-lan -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_forward -m comment --comment "!fw3: Custom lan forwarding rule chain" -j forwarding_lan_rule
-A zone_lan_forward -m comment --comment "!fw3: Zone lan to wan forwarding policy" -j zone_wan_dest_ACCEPT
-A zone_lan_forward -m comment --comment "!fw3: Zone lan to vpn forwarding policy" -j zone_vpn_dest_ACCEPT
-A zone_lan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_lan_forward -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_input -m comment --comment "!fw3: Custom lan input rule chain" -j input_lan_rule
-A zone_lan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_lan_input -m comment --comment "!fw3" -j zone_lan_src_ACCEPT
-A zone_lan_output -m comment --comment "!fw3: Custom lan output rule chain" -j output_lan_rule
-A zone_lan_output -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_src_ACCEPT -i br-lan -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_vpn_dest_ACCEPT -o tun0 -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
-A zone_vpn_dest_ACCEPT -o tun0 -m comment --comment "!fw3" -j ACCEPT
-A zone_vpn_forward -m comment --comment "!fw3: Custom vpn forwarding rule chain" -j forwarding_vpn_rule
-A zone_vpn_forward -m comment --comment "!fw3: Zone vpn to wan forwarding policy" -j zone_wan_dest_ACCEPT
-A zone_vpn_forward -m comment --comment "!fw3: Zone vpn to lan forwarding policy" -j zone_lan_dest_ACCEPT
-A zone_vpn_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_vpn_forward -m comment --comment "!fw3" -j zone_vpn_dest_ACCEPT
-A zone_vpn_input -m comment --comment "!fw3: Custom vpn input rule chain" -j input_vpn_rule
-A zone_vpn_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_vpn_input -m comment --comment "!fw3" -j zone_vpn_src_ACCEPT
-A zone_vpn_output -m comment --comment "!fw3: Custom vpn output rule chain" -j output_vpn_rule
-A zone_vpn_output -m comment --comment "!fw3" -j zone_vpn_dest_ACCEPT
-A zone_vpn_src_ACCEPT -i tun0 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_ACCEPT -o eth1 -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
-A zone_wan_dest_ACCEPT -o eth1 -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_REJECT -o eth1 -m comment --comment "!fw3" -j reject
-A zone_wan_forward -j MINIUPNPD
-A zone_wan_forward -j MINIUPNPD
-A zone_wan_forward -m comment --comment "!fw3: Custom wan forwarding rule chain" -j forwarding_wan_rule
-A zone_wan_forward -p esp -m comment --comment "!fw3: Allow-IPSec-ESP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -p udp -m udp --dport 500 -m comment --comment "!fw3: Allow-ISAKMP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_wan_forward -m comment --comment "!fw3" -j zone_wan_dest_REJECT
-A zone_wan_input -m comment --comment "!fw3: Custom wan input rule chain" -j input_wan_rule
-A zone_wan_input -p udp -m udp --dport 68 -m comment --comment "!fw3: Allow-DHCP-Renew" -j ACCEPT
-A zone_wan_input -p icmp -m icmp --icmp-type 8 -m comment --comment "!fw3: Allow-Ping" -j ACCEPT
-A zone_wan_input -p igmp -m comment --comment "!fw3: Allow-IGMP" -j ACCEPT
-A zone_wan_input -p tcp -m tcp --dport 8118 -m comment --comment "!fw3: adblock" -j DROP
-A zone_wan_input -p udp -m udp --dport 500 -m comment --comment "!fw3: ike" -j ACCEPT
-A zone_wan_input -p udp -m udp --dport 4500 -m comment --comment "!fw3: ipsec" -j ACCEPT
-A zone_wan_input -p ah -m comment --comment "!fw3: ah" -j ACCEPT
-A zone_wan_input -p esp -m comment --comment "!fw3: esp" -j ACCEPT
-A zone_wan_input -p tcp -m tcp --dport 1194 -m comment --comment "!fw3: openvpn" -j ACCEPT
-A zone_wan_input -p udp -m udp --dport 1194 -m comment --comment "!fw3: openvpn" -j ACCEPT
-A zone_wan_input -p tcp -m tcp --dport 1723 -m comment --comment "!fw3: pptp" -j ACCEPT
-A zone_wan_input -p gre -m comment --comment "!fw3: gre" -j ACCEPT
-A zone_wan_input -p tcp -m tcp --dport 1688 -m comment --comment "!fw3: kms" -j ACCEPT
-A zone_wan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_wan_input -m comment --comment "!fw3" -j zone_wan_src_REJECT
-A zone_wan_output -m comment --comment "!fw3: Custom wan output rule chain" -j output_wan_rule
-A zone_wan_output -m comment --comment "!fw3" -j zone_wan_dest_ACCEPT
-A zone_wan_src_REJECT -i eth1 -m comment --comment "!fw3" -j reject
COMMIT
# Completed on Fri Jun 24 15:36:40 2022

#IPv6 NAT chain

# Generated by ip6tables-save v1.8.7 on Fri Jun 24 15:36:40 2022
*nat
:PREROUTING ACCEPT [801:154479]
:INPUT ACCEPT [486:67044]
:OUTPUT ACCEPT [116:11230]
:POSTROUTING ACCEPT [116:11230]
-A PREROUTING -p udp -m udp --dport 53 -j REDIRECT --to-ports 53
-A PREROUTING -p tcp -m tcp --dport 53 -j REDIRECT --to-ports 53
COMMIT
# Completed on Fri Jun 24 15:36:40 2022

#IPv6 Mangle chain

# Generated by ip6tables-save v1.8.7 on Fri Jun 24 15:36:40 2022
*mangle
:PREROUTING ACCEPT [4672:698836]
:INPUT ACCEPT [3964:640683]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [900:129689]
:POSTROUTING ACCEPT [900:129689]
-A FORWARD -o eth1 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -i eth1 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
COMMIT
# Completed on Fri Jun 24 15:36:40 2022

#IPv6 Filter chain

# Generated by ip6tables-save v1.8.7 on Fri Jun 24 15:36:40 2022
*filter
:INPUT ACCEPT [0:0]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [0:0]
:MINIUPNPD - [0:0]
:forwarding_VPN_rule - [0:0]
:forwarding_lan_rule - [0:0]
:forwarding_rule - [0:0]
:forwarding_vpn_rule - [0:0]
:forwarding_wan_rule - [0:0]
:input_VPN_rule - [0:0]
:input_lan_rule - [0:0]
:input_rule - [0:0]
:input_vpn_rule - [0:0]
:input_wan_rule - [0:0]
:output_VPN_rule - [0:0]
:output_lan_rule - [0:0]
:output_rule - [0:0]
:output_vpn_rule - [0:0]
:output_wan_rule - [0:0]
:reject - [0:0]
:syn_flood - [0:0]
:zone_VPN_dest_ACCEPT - [0:0]
:zone_VPN_forward - [0:0]
:zone_VPN_input - [0:0]
:zone_VPN_output - [0:0]
:zone_VPN_src_ACCEPT - [0:0]
:zone_lan_dest_ACCEPT - [0:0]
:zone_lan_forward - [0:0]
:zone_lan_input - [0:0]
:zone_lan_output - [0:0]
:zone_lan_src_ACCEPT - [0:0]
:zone_vpn_dest_ACCEPT - [0:0]
:zone_vpn_forward - [0:0]
:zone_vpn_input - [0:0]
:zone_vpn_output - [0:0]
:zone_vpn_src_ACCEPT - [0:0]
:zone_wan_dest_ACCEPT - [0:0]
:zone_wan_dest_REJECT - [0:0]
:zone_wan_forward - [0:0]
:zone_wan_input - [0:0]
:zone_wan_output - [0:0]
:zone_wan_src_REJECT - [0:0]
-A INPUT -i lo -m comment --comment "!fw3" -j ACCEPT
-A INPUT -m comment --comment "!fw3: Custom input rule chain" -j input_rule
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m comment --comment "!fw3" -j syn_flood
-A INPUT -i br-lan -m comment --comment "!fw3" -j zone_lan_input
-A INPUT -i eth1 -m comment --comment "!fw3" -j zone_wan_input
-A INPUT -i ipsec0 -m comment --comment "!fw3" -j zone_VPN_input
-A INPUT -i tun0 -m comment --comment "!fw3" -j zone_vpn_input
-A FORWARD -m comment --comment "!fw3: Custom forwarding rule chain" -j forwarding_rule
-A FORWARD -m comment --comment "!fw3: Traffic offloading" -m conntrack --ctstate RELATED,ESTABLISHED -j FLOWOFFLOAD --hw
-A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A FORWARD -i br-lan -m comment --comment "!fw3" -j zone_lan_forward
-A FORWARD -i eth1 -m comment --comment "!fw3" -j zone_wan_forward
-A FORWARD -i ipsec0 -m comment --comment "!fw3" -j zone_VPN_forward
-A FORWARD -i tun0 -m comment --comment "!fw3" -j zone_vpn_forward
-A FORWARD -m comment --comment "!fw3" -j reject
-A OUTPUT -o lo -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -m comment --comment "!fw3: Custom output rule chain" -j output_rule
-A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -o br-lan -m comment --comment "!fw3" -j zone_lan_output
-A OUTPUT -o eth1 -m comment --comment "!fw3" -j zone_wan_output
-A OUTPUT -o ipsec0 -m comment --comment "!fw3" -j zone_VPN_output
-A OUTPUT -o tun0 -m comment --comment "!fw3" -j zone_vpn_output
-A reject -p tcp -m comment --comment "!fw3" -j REJECT --reject-with tcp-reset
-A reject -m comment --comment "!fw3" -j REJECT --reject-with icmp6-port-unreachable
-A syn_flood -m limit --limit 25/sec --limit-burst 50 -m comment --comment "!fw3" -j RETURN
-A syn_flood -m comment --comment "!fw3" -j DROP
-A zone_VPN_dest_ACCEPT -o ipsec0 -m comment --comment "!fw3" -j ACCEPT
-A zone_VPN_forward -m comment --comment "!fw3: Custom VPN forwarding rule chain" -j forwarding_VPN_rule
-A zone_VPN_forward -m comment --comment "!fw3" -j zone_VPN_dest_ACCEPT
-A zone_VPN_input -m comment --comment "!fw3: Custom VPN input rule chain" -j input_VPN_rule
-A zone_VPN_input -m comment --comment "!fw3" -j zone_VPN_src_ACCEPT
-A zone_VPN_output -m comment --comment "!fw3: Custom VPN output rule chain" -j output_VPN_rule
-A zone_VPN_output -m comment --comment "!fw3" -j zone_VPN_dest_ACCEPT
-A zone_VPN_src_ACCEPT -i ipsec0 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_dest_ACCEPT -o br-lan -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_forward -m comment --comment "!fw3: Custom lan forwarding rule chain" -j forwarding_lan_rule
-A zone_lan_forward -m comment --comment "!fw3: Zone lan to wan forwarding policy" -j zone_wan_dest_ACCEPT
-A zone_lan_forward -m comment --comment "!fw3: Zone lan to vpn forwarding policy" -j zone_vpn_dest_ACCEPT
-A zone_lan_forward -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_input -m comment --comment "!fw3: Custom lan input rule chain" -j input_lan_rule
-A zone_lan_input -m comment --comment "!fw3" -j zone_lan_src_ACCEPT
-A zone_lan_output -m comment --comment "!fw3: Custom lan output rule chain" -j output_lan_rule
-A zone_lan_output -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_src_ACCEPT -i br-lan -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_vpn_dest_ACCEPT -o tun0 -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
-A zone_vpn_dest_ACCEPT -o tun0 -m comment --comment "!fw3" -j ACCEPT
-A zone_vpn_forward -m comment --comment "!fw3: Custom vpn forwarding rule chain" -j forwarding_vpn_rule
-A zone_vpn_forward -m comment --comment "!fw3: Zone vpn to wan forwarding policy" -j zone_wan_dest_ACCEPT
-A zone_vpn_forward -m comment --comment "!fw3: Zone vpn to lan forwarding policy" -j zone_lan_dest_ACCEPT
-A zone_vpn_forward -m comment --comment "!fw3" -j zone_vpn_dest_ACCEPT
-A zone_vpn_input -m comment --comment "!fw3: Custom vpn input rule chain" -j input_vpn_rule
-A zone_vpn_input -m comment --comment "!fw3" -j zone_vpn_src_ACCEPT
-A zone_vpn_output -m comment --comment "!fw3: Custom vpn output rule chain" -j output_vpn_rule
-A zone_vpn_output -m comment --comment "!fw3" -j zone_vpn_dest_ACCEPT
-A zone_vpn_src_ACCEPT -i tun0 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_ACCEPT -o eth1 -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
-A zone_wan_dest_ACCEPT -o eth1 -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_REJECT -o eth1 -m comment --comment "!fw3" -j reject
-A zone_wan_forward -j MINIUPNPD
-A zone_wan_forward -j MINIUPNPD
-A zone_wan_forward -m comment --comment "!fw3: Custom wan forwarding rule chain" -j forwarding_wan_rule
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 128 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 129 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 2 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 3 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 4/0 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 4/1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p esp -m comment --comment "!fw3: Allow-IPSec-ESP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -p udp -m udp --dport 500 -m comment --comment "!fw3: Allow-ISAKMP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -m comment --comment "!fw3" -j zone_wan_dest_REJECT
-A zone_wan_input -m comment --comment "!fw3: Custom wan input rule chain" -j input_wan_rule
-A zone_wan_input -s fc00::/6 -d fc00::/6 -p udp -m udp --dport 546 -m comment --comment "!fw3: Allow-DHCPv6" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 130/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 131/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 132/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 143/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 128 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 129 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 2 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 3 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 4/0 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 4/1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 133 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 135 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 134 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 136 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p tcp -m tcp --dport 8118 -m comment --comment "!fw3: adblock" -j DROP
-A zone_wan_input -p udp -m udp --dport 500 -m comment --comment "!fw3: ike" -j ACCEPT
-A zone_wan_input -p udp -m udp --dport 4500 -m comment --comment "!fw3: ipsec" -j ACCEPT
-A zone_wan_input -p ah -m comment --comment "!fw3: ah" -j ACCEPT
-A zone_wan_input -p esp -m comment --comment "!fw3: esp" -j ACCEPT
-A zone_wan_input -p tcp -m tcp --dport 1194 -m comment --comment "!fw3: openvpn" -j ACCEPT
-A zone_wan_input -p udp -m udp --dport 1194 -m comment --comment "!fw3: openvpn" -j ACCEPT
-A zone_wan_input -p tcp -m tcp --dport 1723 -m comment --comment "!fw3: pptp" -j ACCEPT
-A zone_wan_input -p gre -m comment --comment "!fw3: gre" -j ACCEPT
-A zone_wan_input -p tcp -m tcp --dport 1688 -m comment --comment "!fw3: kms" -j ACCEPT
-A zone_wan_input -m comment --comment "!fw3" -j zone_wan_src_REJECT
-A zone_wan_output -m comment --comment "!fw3: Custom wan output rule chain" -j output_wan_rule
-A zone_wan_output -m comment --comment "!fw3" -j zone_wan_dest_ACCEPT
-A zone_wan_src_REJECT -i eth1 -m comment --comment "!fw3" -j reject
COMMIT
# Completed on Fri Jun 24 15:36:40 2022

#===================== IPSET状态 =====================#

Name: music
Name: china_ip_route
Name: localnetwork

#===================== 路由表状态 =====================#

#route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
0.0.0.0         192.168.1.1     0.0.0.0         UG    64     0        0 eth1
192.168.1.0     0.0.0.0         255.255.255.0   U     64     0        0 eth1
192.168.50.0    0.0.0.0         255.255.255.0   U     0      0        0 br-lan
#ip route list
default via 192.168.1.1 dev eth1 proto static src 192.168.1.10 metric 64 
192.168.1.0/24 dev eth1 proto static scope link metric 64 
192.168.50.0/24 dev br-lan proto kernel scope link src 192.168.50.1 
#ip rule show
0:  from all lookup local
32766:  from all lookup main
32767:  from all lookup default

#===================== 端口占用状态 =====================#

tcp        0      0 :::9090                 :::*                    LISTEN      17823/clash
tcp        0      0 :::7890                 :::*                    LISTEN      17823/clash
tcp        0      0 :::7891                 :::*                    LISTEN      17823/clash
tcp        0      0 :::7892                 :::*                    LISTEN      17823/clash
tcp        0      0 :::7893                 :::*                    LISTEN      17823/clash
tcp        0      0 :::7895                 :::*                    LISTEN      17823/clash
udp        0      0 :::7874                 :::*                                17823/clash
udp        0      0 :::7891                 :::*                                17823/clash
udp        0      0 :::7892                 :::*                                17823/clash
udp        0      0 :::7893                 :::*                                17823/clash
udp        0      0 :::7895                 :::*                                17823/clash

#===================== 测试本机DNS查询 =====================#

Server:     127.0.0.1
Address:    127.0.0.1#53

Non-authoritative answer:
www.baidu.com   canonical name = www.a.shifen.com.
Name:   www.a.shifen.com
Address: 180.101.49.11
Name:   www.a.shifen.com
Address: 180.101.49.12

#===================== resolv.conf.d =====================#

# Interface wan6
nameserver fe80::1%eth1
# Interface wan
nameserver 192.168.1.1

#===================== 测试本机网络连接 =====================#

HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: private, no-cache, no-store, proxy-revalidate, no-transform
Connection: keep-alive
Content-Length: 277
Content-Type: text/html
Date: Fri, 24 Jun 2022 07:36:40 GMT
Etag: "575e1f60-115"
Last-Modified: Mon, 13 Jun 2016 02:50:08 GMT
Pragma: no-cache
Server: bfe/1.0.8.18

#===================== 测试本机网络下载 =====================#

HTTP/1.1 200 OK
Connection: keep-alive
Content-Length: 80
Cache-Control: max-age=300
Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
Content-Type: text/plain; charset=utf-8
ETag: "c6bb9cda4a2e3b5447b0804e4a6a170e5e2b9a13d5cc570ca749375db654aeeb"
Strict-Transport-Security: max-age=31536000
X-Content-Type-Options: nosniff
X-Frame-Options: deny
X-XSS-Protection: 1; mode=block
X-GitHub-Request-Id: AF3C:126C:B277F:1D295E:62B0E47C
Accept-Ranges: bytes
Date: Fri, 24 Jun 2022 07:36:40 GMT
Via: 1.1 varnish
X-Served-By: cache-hkg17927-HKG
X-Cache: HIT
X-Cache-Hits: 1
X-Timer: S1656056201.873168,VS0,VE1
Vary: Authorization,Accept-Encoding,Origin
Access-Control-Allow-Origin: *
X-Fastly-Request-ID: efc71fe630678d9b3181597e353f48573ced62f1
Expires: Fri, 24 Jun 2022 07:41:40 GMT
Source-Age: 68

#===================== 最近运行日志 =====================#

2022-06-24 01:30:05 Step 2: Delete OpenClash Firewall Rules...
2022-06-24 01:30:06 Step 3: Close The OpenClash Daemons...
2022-06-24 01:30:06 Step 4: Close The Clash Core Process...
2022-06-24 01:30:06 Step 5: Restart Dnsmasq...
2022-06-24 01:30:08 Step 6: Delete OpenClash Residue File...
2022-06-24 01:30:08 OpenClash Start Running...
2022-06-24 01:30:08 Step 1: Get The Configuration...
2022-06-24 01:30:09 Step 2: Check The Components...
2022-06-24 01:30:09 Tip: Because of the file【 /etc/config/openclash 】modificated, Pause quick start...
2022-06-24 01:30:09 Step 3: Modify The Config File...
2022-06-24 01:30:11 Step 4: Start Running The Clash Core...
2022-06-24 01:30:11 Tip: Detected The Exclusive Function of The Meta Core, Use Meta Core to Start...
2022-06-24 01:30:12 Step 5: Check The Core Status...
time="2022-06-23T17:30:13Z" level=info msg="Start initial configuration in progress"
time="2022-06-23T17:30:13Z" level=info msg="Geodata Loader mode: memconservative"
time="2022-06-23T17:30:13Z" level=info msg="Initial configuration complete, total time: 30ms"
time="2022-06-23T17:30:13Z" level=info msg="Sniffer is loaded and working"
time="2022-06-23T17:30:13Z" level=info msg="DNS server listening at: [::]:7874"
time="2022-06-23T17:30:13Z" level=info msg="RESTful API listening at: [::]:9090"
time="2022-06-23T17:30:13Z" level=info msg="Start initial compatible provider 🐟 漏网之鱼"
time="2022-06-23T17:30:13Z" level=info msg="Start initial compatible provider default"
time="2022-06-23T17:30:13Z" level=info msg="Start initial compatible provider 🌍 国外媒体"
time="2022-06-23T17:30:13Z" level=info msg="Start initial compatible provider 🔍 谷歌服务"
time="2022-06-23T17:30:13Z" level=info msg="Start initial compatible provider ♻️ 手动切换3"
time="2022-06-23T17:30:13Z" level=info msg="Start initial compatible provider 📲 聊天软件"
time="2022-06-23T17:30:13Z" level=info msg="Start initial compatible provider ♻️ 手动切换2"
time="2022-06-23T17:30:13Z" level=info msg="Start initial compatible provider 🎮 游戏平台"
time="2022-06-23T17:30:13Z" level=info msg="Start initial compatible provider 🎯 总模式"
time="2022-06-23T17:30:13Z" level=info msg="Start initial compatible provider ⛔ 应用净化"
time="2022-06-23T17:30:13Z" level=info msg="Start initial compatible provider 📹 YouTube"
time="2022-06-23T17:30:13Z" level=info msg="Start initial compatible provider ♻️ 手动切换"
time="2022-06-23T17:30:13Z" level=info msg="Start initial compatible provider Ⓜ️ 故障切换"
time="2022-06-23T17:30:13Z" level=info msg="Start initial compatible provider Ⓜ️ 负载均衡"
time="2022-06-23T17:30:13Z" level=info msg="Start initial compatible provider Ⓜ️ 延迟最低"
time="2022-06-23T17:30:13Z" level=info msg="Start initial compatible provider ♻️ 手动切换1"
time="2022-06-23T17:30:13Z" level=info msg="Start initial compatible provider ♻️ 手动切换5"
time="2022-06-23T17:30:13Z" level=info msg="Start initial compatible provider 🛑 广告拦截"
time="2022-06-23T17:30:13Z" level=info msg="Start initial compatible provider ♻️ 手动切换4"
time="2022-06-23T17:30:13Z" level=info msg="Start initial compatible provider 🇨🇳 国内网站"
time="2022-06-23T17:30:13Z" level=info msg="Start initial compatible provider 🎥 NETFLIX"
time="2022-06-23T17:30:13Z" level=info msg="Start initial compatible provider 🧩 微软服务"
time="2022-06-23T17:30:13Z" level=info msg="Start initial compatible provider 🍎 苹果服务"
time="2022-06-23T17:30:13Z" level=info msg="Start initial compatible provider ⛩ 日韩媒体"
time="2022-06-23T17:30:13Z" level=info msg="Start initial compatible provider 🌏 港台媒体"
time="2022-06-23T17:30:13Z" level=info msg="Start initial compatible provider 🇺🇳 国外网站"
2022-06-24 01:30:15 Step 6: Wait For The File Downloading...
2022-06-24 01:30:15 Step 7: Set Firewall Rules...
2022-06-24 01:30:15 Step 8: Restart Dnsmasq...
2022-06-24 01:30:18 Step 9: Add Cron Rules, Start Daemons...
2022-06-24 01:30:18 OpenClash Start Successful!

#===================== 活动连接信息 =====================#

......省略......

OpenClash Config

No response

Expected Behavior

netflix土区账号在港区可以播放,毕竟港区价格较高。

Screenshots

image

pscj commented 2 years ago

netflix的限制,就不要在clash这里提了