vernesong / OpenClash

A Clash Client For OpenWrt
MIT License
17.49k stars 3.18k forks source link

新版Discord更新后,无法加入Discord语音房[Bug] #3153

Closed CuewarsTaner closed 1 year ago

CuewarsTaner commented 1 year ago

Verify Steps

OpenClash Version

v0.45.103-beta

Bug on Environment

Lean

Bug on Platform

Linux-amd64(x86-64)

To Reproduce

  1. 国内网络环境:中国联通,iStoreOS单路由
  2. 使用Discord

Describe the Bug

可以正常使用Discord的非语音频道功能,无法加入Discord的语音房间,显示RTC Connecting,No Route等错误,换用其他SSR插件可以正常使用,应该是最近Discord更新之后出的新问题

OpenClash Log

OpenClash 调试日志

生成时间: 2023-03-30 17:07:57 插件版本: v0.45.87-beta 隐私提示: 上传此日志前请注意检查、屏蔽公网IP、节点、密码等相关敏感信息


#===================== 系统信息 =====================#

主机型号: To be filled by O.E.M. To be filled by O.E.M.
固件版本: iStoreOS 21.02.3 2023032001
LuCI版本: git-22.258.47264-284140f
内核版本: 5.4.188
处理器架构: x86_64

#此项有值时,如不使用IPv6,建议到网络-接口-lan的设置中禁用IPV6的DHCP
IPV6-DHCP: server

#此项结果应仅有配置文件的DNS监听地址
Dnsmasq转发设置: 127.0.0.1#7874

#===================== 依赖检查 =====================#

dnsmasq-full: 已安装
coreutils: 已安装
coreutils-nohup: 已安装
bash: 已安装
curl: 已安装
ca-certificates: 已安装
ipset: 已安装
ip-full: 已安装
libcap: 已安装
libcap-bin: 已安装
ruby: 已安装
ruby-yaml: 已安装
ruby-psych: 已安装
ruby-pstore: 已安装
kmod-tun(TUN模式): 已安装
luci-compat(Luci >= 19.07): 已安装
kmod-inet-diag(PROCESS-NAME): 已安装
unzip: 已安装
iptables-mod-tproxy: 已安装
kmod-ipt-tproxy: 已安装
iptables-mod-extra: 已安装
kmod-ipt-extra: 已安装
kmod-ipt-nat: 已安装

#===================== 内核检查 =====================#

运行状态: 运行中
进程pid: 8800
运行权限: 8800: cap_dac_override,cap_net_bind_service,cap_net_admin,cap_net_raw,cap_sys_ptrace,cap_sys_resource=eip
运行用户: nobody
已选择的架构: linux-amd64

#下方无法显示内核版本号时请确认您的内核版本是否正确或者有无权限
Tun内核版本: 2023.01.29-3-gfce8649
Tun内核文件: 存在
Tun内核运行权限: 正常

Dev内核版本: v1.13.0-3-gfbf2f26
Dev内核文件: 存在
Dev内核运行权限: 正常

Meta内核版本: alpha-g4c25f5e7
Meta内核文件: 存在
Meta内核运行权限: 正常

#===================== 插件设置 =====================#

当前配置文件: /etc/openclash/config/Wallless-Convert.yaml
启动配置文件: /etc/openclash/Wallless-Convert.yaml
运行模式: redir-host-mix
默认代理模式: rule
UDP流量转发(tproxy): 停用
DNS劫持: Dnsmasq 转发
自定义DNS: 启用
IPV6代理: 停用
IPV6-DNS解析: 停用
禁用Dnsmasq缓存: 启用
自定义规则: 停用
仅允许内网: 启用
仅代理命中规则流量: 停用
仅允许常用端口流量: 停用
绕过中国大陆IP: 停用
路由本机代理: 启用

#启动异常时建议关闭此项后重试
混合节点: 停用
保留配置: 停用

#启动异常时建议关闭此项后重试
第三方规则: 停用

#===================== 配置文件 =====================#

port: 7890
socks-port: 7891
allow-lan: true
mode: rule
log-level: silent
external-controller: 0.0.0.0:9090

#===================== 自定义防火墙设置 =====================#

#!/bin/sh
. /usr/share/openclash/log.sh
. /lib/functions.sh

# This script is called by /etc/init.d/openclash
# Add your custom firewall rules here, they will be added after the end of the OpenClash iptables rules

LOG_OUT "Tip: Start Add Custom Firewall Rules..."

exit 0
#===================== IPTABLES 防火墙设置 =====================#

#IPv4 NAT chain

# Generated by iptables-save v1.8.7 on Thu Mar 30 17:08:01 2023
*nat
:PREROUTING ACCEPT [865:77600]
:INPUT ACCEPT [1211:83295]
:OUTPUT ACCEPT [2562:167191]
:POSTROUTING ACCEPT [457:33939]
:DOCKER - [0:0]
:MINIUPNPD - [0:0]
:MINIUPNPD-POSTROUTING - [0:0]
:openclash - [0:0]
:openclash_output - [0:0]
:postrouting_docker_rule - [0:0]
:postrouting_lan_rule - [0:0]
:postrouting_rule - [0:0]
:postrouting_wan_rule - [0:0]
:prerouting_docker_rule - [0:0]
:prerouting_lan_rule - [0:0]
:prerouting_rule - [0:0]
:prerouting_wan_rule - [0:0]
:zone_docker_postrouting - [0:0]
:zone_docker_prerouting - [0:0]
:zone_lan_postrouting - [0:0]
:zone_lan_prerouting - [0:0]
:zone_wan_postrouting - [0:0]
:zone_wan_prerouting - [0:0]
-A PREROUTING -p tcp -m comment --comment "OpenClash TCP DNS Hijack" -m tcp --dport 53 -j ACCEPT
-A PREROUTING -p tcp -m tcp --dport 53 -m comment --comment "OpenClash DNS Hijack" -j REDIRECT --to-ports 53
-A PREROUTING -p udp -m udp --dport 53 -m comment --comment "OpenClash DNS Hijack" -j REDIRECT --to-ports 53
-A PREROUTING -m comment --comment "!fw3: Custom prerouting rule chain" -j prerouting_rule
-A PREROUTING -i br-lan -m comment --comment "!fw3" -j zone_lan_prerouting
-A PREROUTING -i pppoe-wan -m comment --comment "!fw3" -j zone_wan_prerouting
-A PREROUTING -i eth0 -m comment --comment "!fw3" -j zone_wan_prerouting
-A PREROUTING -i docker0 -m comment --comment "!fw3" -j zone_docker_prerouting
-A PREROUTING -p tcp -j openclash
-A OUTPUT -j openclash_output
-A POSTROUTING -s 172.17.0.0/16 ! -o docker0 -j MASQUERADE
-A POSTROUTING -m comment --comment "!fw3: Custom postrouting rule chain" -j postrouting_rule
-A POSTROUTING -o br-lan -m comment --comment "!fw3" -j zone_lan_postrouting
-A POSTROUTING -o pppoe-wan -m comment --comment "!fw3" -j zone_wan_postrouting
-A POSTROUTING -o eth0 -m comment --comment "!fw3" -j zone_wan_postrouting
-A POSTROUTING -o docker0 -m comment --comment "!fw3" -j zone_docker_postrouting
-A DOCKER -i docker0 -j RETURN
-A openclash -p tcp -m tcp --sport 8897 -j RETURN
-A openclash -m set --match-set localnetwork dst -j RETURN
-A openclash -p tcp -j REDIRECT --to-ports 7892
-A openclash_output -p tcp -m tcp --sport 8897 -j RETURN
-A openclash_output -m set --match-set localnetwork dst -j RETURN
-A openclash_output -p tcp -m owner ! --uid-owner 65534 -j REDIRECT --to-ports 7892
-A zone_docker_postrouting -m comment --comment "!fw3: Custom docker postrouting rule chain" -j postrouting_docker_rule
-A zone_docker_prerouting -m comment --comment "!fw3: Custom docker prerouting rule chain" -j prerouting_docker_rule
-A zone_lan_postrouting -m comment --comment "!fw3: Custom lan postrouting rule chain" -j postrouting_lan_rule
-A zone_lan_prerouting -m comment --comment "!fw3: Custom lan prerouting rule chain" -j prerouting_lan_rule
-A zone_wan_postrouting -m comment --comment "!fw3: Custom wan postrouting rule chain" -j postrouting_wan_rule
-A zone_wan_postrouting -j MINIUPNPD-POSTROUTING
-A zone_wan_postrouting -j MINIUPNPD-POSTROUTING
-A zone_wan_postrouting -m comment --comment "!fw3" -j FULLCONENAT
-A zone_wan_prerouting -m comment --comment "!fw3: Custom wan prerouting rule chain" -j prerouting_wan_rule
-A zone_wan_prerouting -m comment --comment "!fw3" -j FULLCONENAT
-A zone_wan_prerouting -j MINIUPNPD
-A zone_wan_prerouting -j MINIUPNPD
COMMIT
# Completed on Thu Mar 30 17:08:01 2023

#IPv4 Mangle chain

# Generated by iptables-save v1.8.7 on Thu Mar 30 17:08:01 2023
*mangle
:PREROUTING ACCEPT [326082:207195340]
:INPUT ACCEPT [172793:115727449]
:FORWARD ACCEPT [153054:91452680]
:OUTPUT ACCEPT [140638:120882791]
:POSTROUTING ACCEPT [293853:212372851]
:openclash - [0:0]
:openclash_dns_hijack - [0:0]
:openclash_upnp - [0:0]
-A PREROUTING -p udp -j openclash
-A PREROUTING -p tcp -m tcp --dport 53 -j openclash_dns_hijack
-A FORWARD -o pppoe-wan -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -i pppoe-wan -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -o eth0 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -i eth0 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A openclash -p udp -m udp --sport 500 -j RETURN
-A openclash -p udp -m udp --sport 68 -j RETURN
-A openclash -i utun -j RETURN
-A openclash -m set --match-set localnetwork dst -j RETURN
-A openclash -p udp -j openclash_upnp
-A openclash -j MARK --set-xmark 0x162/0xffffffff
-A openclash_dns_hijack -p tcp -m comment --comment "OpenClash TCP DNS Hijack" -m tcp --dport 53 -j MARK --set-xmark 0x162/0xffffffff
COMMIT
# Completed on Thu Mar 30 17:08:01 2023

#IPv4 Filter chain

# Generated by iptables-save v1.8.7 on Thu Mar 30 17:08:01 2023
*filter
:INPUT ACCEPT [251:52390]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [6:901]
:DOCKER - [0:0]
:DOCKER-BLOCKED - [0:0]
:DOCKER-ISOLATION-STAGE-1 - [0:0]
:DOCKER-ISOLATION-STAGE-2 - [0:0]
:DOCKER-USER - [0:0]
:MINIUPNPD - [0:0]
:forwarding_docker_rule - [0:0]
:forwarding_lan_rule - [0:0]
:forwarding_rule - [0:0]
:forwarding_wan_rule - [0:0]
:input_docker_rule - [0:0]
:input_lan_rule - [0:0]
:input_rule - [0:0]
:input_wan_rule - [0:0]
:openclash_wan_input - [0:0]
:output_docker_rule - [0:0]
:output_lan_rule - [0:0]
:output_rule - [0:0]
:output_wan_rule - [0:0]
:reject - [0:0]
:syn_flood - [0:0]
:zone_docker_dest_ACCEPT - [0:0]
:zone_docker_forward - [0:0]
:zone_docker_input - [0:0]
:zone_docker_output - [0:0]
:zone_docker_src_ACCEPT - [0:0]
:zone_lan_dest_ACCEPT - [0:0]
:zone_lan_forward - [0:0]
:zone_lan_input - [0:0]
:zone_lan_output - [0:0]
:zone_lan_src_ACCEPT - [0:0]
:zone_wan_dest_ACCEPT - [0:0]
:zone_wan_dest_REJECT - [0:0]
:zone_wan_forward - [0:0]
:zone_wan_input - [0:0]
:zone_wan_output - [0:0]
:zone_wan_src_DROP - [0:0]
-A INPUT -i eth0 -m set ! --match-set localnetwork src -j openclash_wan_input
-A INPUT -i pppoe-wan -m set ! --match-set localnetwork src -j openclash_wan_input
-A INPUT -i lo -m comment --comment "!fw3" -j ACCEPT
-A INPUT -m comment --comment "!fw3: Custom input rule chain" -j input_rule
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m comment --comment "!fw3" -j syn_flood
-A INPUT -i br-lan -m comment --comment "!fw3" -j zone_lan_input
-A INPUT -i pppoe-wan -m comment --comment "!fw3" -j zone_wan_input
-A INPUT -i eth0 -m comment --comment "!fw3" -j zone_wan_input
-A INPUT -i docker0 -m comment --comment "!fw3" -j zone_docker_input
-A FORWARD -o utun -p udp -m udp --dport 443 -m comment --comment "OpenClash QUIC REJECT" -m set ! --match-set china_ip_route dst -j REJECT --reject-with icmp-port-unreachable
-A FORWARD -o utun -m comment --comment "OpenClash TUN Forward" -j ACCEPT
-A FORWARD -j DOCKER-USER
-A FORWARD -j DOCKER-ISOLATION-STAGE-1
-A FORWARD -o docker0 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -o docker0 -j DOCKER
-A FORWARD -i docker0 ! -o docker0 -j ACCEPT
-A FORWARD -i docker0 -o docker0 -j ACCEPT
-A FORWARD -m comment --comment "!fw3: Custom forwarding rule chain" -j forwarding_rule
-A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A FORWARD -i br-lan -m comment --comment "!fw3" -j zone_lan_forward
-A FORWARD -i pppoe-wan -m comment --comment "!fw3" -j zone_wan_forward
-A FORWARD -i eth0 -m comment --comment "!fw3" -j zone_wan_forward
-A FORWARD -i docker0 -m comment --comment "!fw3" -j zone_docker_forward
-A FORWARD -m comment --comment "!fw3" -j reject
-A OUTPUT -o lo -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -m comment --comment "!fw3: Custom output rule chain" -j output_rule
-A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -o br-lan -m comment --comment "!fw3" -j zone_lan_output
-A OUTPUT -o pppoe-wan -m comment --comment "!fw3" -j zone_wan_output
-A OUTPUT -o eth0 -m comment --comment "!fw3" -j zone_wan_output
-A OUTPUT -o docker0 -m comment --comment "!fw3" -j zone_docker_output
-A DOCKER-ISOLATION-STAGE-1 -i docker0 ! -o docker0 -j DOCKER-ISOLATION-STAGE-2
-A DOCKER-ISOLATION-STAGE-1 -j RETURN
-A DOCKER-ISOLATION-STAGE-2 -o docker0 -j DROP
-A DOCKER-ISOLATION-STAGE-2 -j RETURN
-A DOCKER-USER -j DOCKER-BLOCKED
-A DOCKER-USER -j RETURN
-A openclash_wan_input -p udp -m multiport --dports 7892,7895,9090,7890,7891,7893,7874 -j REJECT --reject-with icmp-port-unreachable
-A openclash_wan_input -p tcp -m multiport --dports 7892,7895,9090,7890,7891,7893,7874 -j REJECT --reject-with icmp-port-unreachable
-A reject -p tcp -m comment --comment "!fw3" -j REJECT --reject-with tcp-reset
-A reject -m comment --comment "!fw3" -j REJECT --reject-with icmp-port-unreachable
-A syn_flood -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m limit --limit 25/sec --limit-burst 50 -m comment --comment "!fw3" -j RETURN
-A syn_flood -m comment --comment "!fw3" -j DROP
-A zone_docker_dest_ACCEPT -o docker0 -m comment --comment "!fw3" -j ACCEPT
-A zone_docker_forward -m comment --comment "!fw3: Custom docker forwarding rule chain" -j forwarding_docker_rule
-A zone_docker_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_docker_forward -m comment --comment "!fw3" -j zone_docker_dest_ACCEPT
-A zone_docker_input -m comment --comment "!fw3: Custom docker input rule chain" -j input_docker_rule
-A zone_docker_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_docker_input -m comment --comment "!fw3" -j zone_docker_src_ACCEPT
-A zone_docker_output -m comment --comment "!fw3: Custom docker output rule chain" -j output_docker_rule
-A zone_docker_output -m comment --comment "!fw3" -j zone_docker_dest_ACCEPT
-A zone_docker_src_ACCEPT -i docker0 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_dest_ACCEPT -o br-lan -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_forward -m comment --comment "!fw3: Custom lan forwarding rule chain" -j forwarding_lan_rule
-A zone_lan_forward -m comment --comment "!fw3: Zone lan to wan forwarding policy" -j zone_wan_dest_ACCEPT
-A zone_lan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_lan_forward -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_input -m comment --comment "!fw3: Custom lan input rule chain" -j input_lan_rule
-A zone_lan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_lan_input -m comment --comment "!fw3" -j zone_lan_src_ACCEPT
-A zone_lan_output -m comment --comment "!fw3: Custom lan output rule chain" -j output_lan_rule
-A zone_lan_output -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_src_ACCEPT -i br-lan -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_ACCEPT -o pppoe-wan -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
-A zone_wan_dest_ACCEPT -o pppoe-wan -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_ACCEPT -o eth0 -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
-A zone_wan_dest_ACCEPT -o eth0 -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_REJECT -o pppoe-wan -m comment --comment "!fw3" -j reject
-A zone_wan_dest_REJECT -o eth0 -m comment --comment "!fw3" -j reject
-A zone_wan_forward -m comment --comment "!fw3: Custom wan forwarding rule chain" -j forwarding_wan_rule
-A zone_wan_forward -p esp -m comment --comment "!fw3: Allow-IPSec-ESP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -p udp -m udp --dport 500 -m comment --comment "!fw3: Allow-ISAKMP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_wan_forward -j MINIUPNPD
-A zone_wan_forward -j MINIUPNPD
-A zone_wan_forward -m comment --comment "!fw3" -j zone_wan_dest_REJECT
-A zone_wan_input -m comment --comment "!fw3: Custom wan input rule chain" -j input_wan_rule
-A zone_wan_input -p udp -m udp --dport 68 -m comment --comment "!fw3: Allow-DHCP-Renew" -j ACCEPT
-A zone_wan_input -p icmp -m icmp --icmp-type 8 -m comment --comment "!fw3: Allow-Ping" -j ACCEPT
-A zone_wan_input -p igmp -m comment --comment "!fw3: Allow-IGMP" -j ACCEPT
-A zone_wan_input -p tcp -m tcp --dport 8897 -m comment --comment "!fw3: linkease" -j ACCEPT
-A zone_wan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_wan_input -j MINIUPNPD
-A zone_wan_input -j MINIUPNPD
-A zone_wan_input -m comment --comment "!fw3" -j zone_wan_src_DROP
-A zone_wan_output -m comment --comment "!fw3: Custom wan output rule chain" -j output_wan_rule
-A zone_wan_output -m comment --comment "!fw3" -j zone_wan_dest_ACCEPT
-A zone_wan_src_DROP -i pppoe-wan -m comment --comment "!fw3" -j DROP
-A zone_wan_src_DROP -i eth0 -m comment --comment "!fw3" -j DROP
COMMIT
# Completed on Thu Mar 30 17:08:01 2023

#IPv6 NAT chain

# Generated by ip6tables-save v1.8.7 on Thu Mar 30 17:08:01 2023
*nat
:PREROUTING ACCEPT [14147:1850087]
:INPUT ACCEPT [10019:903008]
:OUTPUT ACCEPT [64:9507]
:POSTROUTING ACCEPT [3191:773531]
COMMIT
# Completed on Thu Mar 30 17:08:01 2023

#IPv6 Mangle chain

# Generated by ip6tables-save v1.8.7 on Thu Mar 30 17:08:01 2023
*mangle
:PREROUTING ACCEPT [303874:239855086]
:INPUT ACCEPT [25501:2798553]
:FORWARD ACCEPT [276759:236855610]
:OUTPUT ACCEPT [21127:2389240]
:POSTROUTING ACCEPT [297361:239215517]
-A FORWARD -o pppoe-wan -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -i pppoe-wan -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -o eth0 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -i eth0 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
COMMIT
# Completed on Thu Mar 30 17:08:01 2023

#IPv6 Filter chain

# Generated by ip6tables-save v1.8.7 on Thu Mar 30 17:08:01 2023
*filter
:INPUT ACCEPT [18:5496]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [30:6688]
:MINIUPNPD - [0:0]
:forwarding_docker_rule - [0:0]
:forwarding_lan_rule - [0:0]
:forwarding_rule - [0:0]
:forwarding_wan_rule - [0:0]
:input_docker_rule - [0:0]
:input_lan_rule - [0:0]
:input_rule - [0:0]
:input_wan_rule - [0:0]
:output_docker_rule - [0:0]
:output_lan_rule - [0:0]
:output_rule - [0:0]
:output_wan_rule - [0:0]
:reject - [0:0]
:syn_flood - [0:0]
:zone_docker_dest_ACCEPT - [0:0]
:zone_docker_forward - [0:0]
:zone_docker_input - [0:0]
:zone_docker_output - [0:0]
:zone_docker_src_ACCEPT - [0:0]
:zone_lan_dest_ACCEPT - [0:0]
:zone_lan_forward - [0:0]
:zone_lan_input - [0:0]
:zone_lan_output - [0:0]
:zone_lan_src_ACCEPT - [0:0]
:zone_wan_dest_ACCEPT - [0:0]
:zone_wan_dest_REJECT - [0:0]
:zone_wan_forward - [0:0]
:zone_wan_input - [0:0]
:zone_wan_output - [0:0]
:zone_wan_src_DROP - [0:0]
-A INPUT -i lo -m comment --comment "!fw3" -j ACCEPT
-A INPUT -m comment --comment "!fw3: Custom input rule chain" -j input_rule
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m comment --comment "!fw3" -j syn_flood
-A INPUT -i br-lan -m comment --comment "!fw3" -j zone_lan_input
-A INPUT -i pppoe-wan -m comment --comment "!fw3" -j zone_wan_input
-A INPUT -i eth0 -m comment --comment "!fw3" -j zone_wan_input
-A INPUT -i docker0 -m comment --comment "!fw3" -j zone_docker_input
-A FORWARD -m comment --comment "!fw3: Custom forwarding rule chain" -j forwarding_rule
-A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A FORWARD -i br-lan -m comment --comment "!fw3" -j zone_lan_forward
-A FORWARD -i pppoe-wan -m comment --comment "!fw3" -j zone_wan_forward
-A FORWARD -i eth0 -m comment --comment "!fw3" -j zone_wan_forward
-A FORWARD -i docker0 -m comment --comment "!fw3" -j zone_docker_forward
-A FORWARD -m comment --comment "!fw3" -j reject
-A OUTPUT -o lo -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -m comment --comment "!fw3: Custom output rule chain" -j output_rule
-A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -o br-lan -m comment --comment "!fw3" -j zone_lan_output
-A OUTPUT -o pppoe-wan -m comment --comment "!fw3" -j zone_wan_output
-A OUTPUT -o eth0 -m comment --comment "!fw3" -j zone_wan_output
-A OUTPUT -o docker0 -m comment --comment "!fw3" -j zone_docker_output
-A reject -p tcp -m comment --comment "!fw3" -j REJECT --reject-with tcp-reset
-A reject -m comment --comment "!fw3" -j REJECT --reject-with icmp6-port-unreachable
-A syn_flood -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m limit --limit 25/sec --limit-burst 50 -m comment --comment "!fw3" -j RETURN
-A syn_flood -m comment --comment "!fw3" -j DROP
-A zone_docker_dest_ACCEPT -o docker0 -m comment --comment "!fw3" -j ACCEPT
-A zone_docker_forward -m comment --comment "!fw3: Custom docker forwarding rule chain" -j forwarding_docker_rule
-A zone_docker_forward -m comment --comment "!fw3" -j zone_docker_dest_ACCEPT
-A zone_docker_input -m comment --comment "!fw3: Custom docker input rule chain" -j input_docker_rule
-A zone_docker_input -m comment --comment "!fw3" -j zone_docker_src_ACCEPT
-A zone_docker_output -m comment --comment "!fw3: Custom docker output rule chain" -j output_docker_rule
-A zone_docker_output -m comment --comment "!fw3" -j zone_docker_dest_ACCEPT
-A zone_docker_src_ACCEPT -i docker0 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_dest_ACCEPT -o br-lan -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_forward -m comment --comment "!fw3: Custom lan forwarding rule chain" -j forwarding_lan_rule
-A zone_lan_forward -m comment --comment "!fw3: Zone lan to wan forwarding policy" -j zone_wan_dest_ACCEPT
-A zone_lan_forward -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_input -m comment --comment "!fw3: Custom lan input rule chain" -j input_lan_rule
-A zone_lan_input -m comment --comment "!fw3" -j zone_lan_src_ACCEPT
-A zone_lan_output -m comment --comment "!fw3: Custom lan output rule chain" -j output_lan_rule
-A zone_lan_output -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_src_ACCEPT -i br-lan -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_ACCEPT -o pppoe-wan -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
-A zone_wan_dest_ACCEPT -o pppoe-wan -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_ACCEPT -o eth0 -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
-A zone_wan_dest_ACCEPT -o eth0 -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_REJECT -o pppoe-wan -m comment --comment "!fw3" -j reject
-A zone_wan_dest_REJECT -o eth0 -m comment --comment "!fw3" -j reject
-A zone_wan_forward -m comment --comment "!fw3: Custom wan forwarding rule chain" -j forwarding_wan_rule
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 128 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 129 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 2 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 3 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 4/0 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 4/1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p esp -m comment --comment "!fw3: Allow-IPSec-ESP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -p udp -m udp --dport 500 -m comment --comment "!fw3: Allow-ISAKMP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -j MINIUPNPD
-A zone_wan_forward -j MINIUPNPD
-A zone_wan_forward -m comment --comment "!fw3" -j zone_wan_dest_REJECT
-A zone_wan_input -m comment --comment "!fw3: Custom wan input rule chain" -j input_wan_rule
-A zone_wan_input -s fc00::/6 -d fc00::/6 -p udp -m udp --dport 546 -m comment --comment "!fw3: Allow-DHCPv6" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 130/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 131/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 132/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 143/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 128 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 129 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 2 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 3 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 4/0 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 4/1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 133 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 135 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 134 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 136 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p tcp -m tcp --dport 8897 -m comment --comment "!fw3: linkease" -j ACCEPT
-A zone_wan_input -j MINIUPNPD
-A zone_wan_input -j MINIUPNPD
-A zone_wan_input -m comment --comment "!fw3" -j zone_wan_src_DROP
-A zone_wan_output -m comment --comment "!fw3: Custom wan output rule chain" -j output_wan_rule
-A zone_wan_output -m comment --comment "!fw3" -j zone_wan_dest_ACCEPT
-A zone_wan_src_DROP -i pppoe-wan -m comment --comment "!fw3" -j DROP
-A zone_wan_src_DROP -i eth0 -m comment --comment "!fw3" -j DROP
COMMIT
# Completed on Thu Mar 30 17:08:01 2023

#===================== IPSET状态 =====================#

Name: china_ip_route
Name: china_ip_route_pass
Name: localnetwork

#===================== 路由表状态 =====================#

#route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
0.0.0.0         10.95.192.1     0.0.0.0         UG    0      0        0 pppoe-wan
10.95.192.1     0.0.0.0         255.255.255.255 UH    0      0        0 pppoe-wan
172.17.0.0      0.0.0.0         255.255.0.0     U     0      0        0 docker0
192.168.1.0     0.0.0.0         255.255.255.0   U     0      0        0 br-lan
198.18.0.0      0.0.0.0         255.255.0.0     U     0      0        0 utun
#ip route list
default via 10.95.192.1 dev pppoe-wan proto static 
10.95.192.1 dev pppoe-wan proto kernel scope link src *WAN IP*.39 
172.17.0.0/16 dev docker0 proto kernel scope link src 172.17.0.1 linkdown 
192.168.1.0/24 dev br-lan proto kernel scope link src 192.168.1.251 
198.18.0.0/16 dev utun proto kernel scope link src 198.18.0.1 
#ip rule show
0:  from all lookup local
32765:  from all fwmark 0x162 lookup 354
32766:  from all lookup main
32767:  from all lookup default

#===================== Tun设备状态 =====================#

utun: tun pi filter0x100

#===================== 端口占用状态 =====================#

tcp        0      0 198.18.0.1:7777         0.0.0.0:*               LISTEN      8800/clash
tcp        0      0 :::7890                 :::*                    LISTEN      8800/clash
tcp        0      0 :::7891                 :::*                    LISTEN      8800/clash
tcp        0      0 :::7892                 :::*                    LISTEN      8800/clash
tcp        0      0 :::7893                 :::*                    LISTEN      8800/clash
tcp        0      0 :::7895                 :::*                    LISTEN      8800/clash
tcp        0      0 :::9090                 :::*                    LISTEN      8800/clash
udp        0      0 198.18.0.1:7777         0.0.0.0:*                           8800/clash
udp        0      0 :::43003                :::*                                8800/clash
udp        0      0 :::34823                :::*                                8800/clash
udp        0      0 :::55489                :::*                                8800/clash
udp        0      0 :::39430                :::*                                8800/clash
udp        0      0 :::47835                :::*                                8800/clash
udp        0      0 :::39877                :::*                                8800/clash
udp        0      0 :::36141                :::*                                8800/clash
udp        0      0 :::48531                :::*                                8800/clash
udp        0      0 :::52773                :::*                                8800/clash
udp        0      0 :::52924                :::*                                8800/clash
udp        0      0 :::7874                 :::*                                8800/clash
udp        0      0 :::7891                 :::*                                8800/clash
udp        0      0 :::7892                 :::*                                8800/clash
udp        0      0 :::7893                 :::*                                8800/clash
udp        0      0 :::7895                 :::*                                8800/clash
udp        0      0 :::44812                :::*                                8800/clash
udp        0      0 :::36758                :::*                                8800/clash
udp        0      0 :::45535                :::*                                8800/clash
udp        0      0 :::53927                :::*                                8800/clash
udp        0      0 :::49964                :::*                                8800/clash
udp        0      0 :::41824                :::*                                8800/clash
udp        0      0 :::50419                :::*                                8800/clash

#===================== 测试本机DNS查询(www.baidu.com) =====================#

Server:     127.0.0.1
Address:    127.0.0.1#53

Name:      www.baidu.com
www.baidu.com   canonical name = www.a.shifen.com
Name:      www.a.shifen.com
Address 1: 163.177.151.109
Address 2: 157.148.69.74
*** Can't find www.baidu.com: No answer

#===================== 测试内核DNS查询(www.instagram.com) =====================#

Status: 0
TC: false
RD: true
RA: true
AD: false
CD: false

Question: 
  Name: www.instagram.com.
  Qtype: 1
  Qclass: 1

Answer: 
  TTL: 3502
  data: geo-p42.instagram.com.
  name: www.instagram.com.
  type: 5

  TTL: 3502
  data: z-p42-instagram.c10r.instagram.com.
  name: geo-p42.instagram.com.
  type: 5

  TTL: 17
  data: 157.240.22.174
  name: z-p42-instagram.c10r.instagram.com.
  type: 1

#===================== resolv.conf.d =====================#

# Interface wan
nameserver 223.5.5.5
nameserver 223.6.6.6
# Interface wan_6

#===================== 测试本机网络连接(www.baidu.com) =====================#

HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: private, no-cache, no-store, proxy-revalidate, no-transform
Connection: keep-alive
Content-Length: 277
Content-Type: text/html
Date: Thu, 30 Mar 2023 09:08:01 GMT
Etag: "575e1f65-115"
Last-Modified: Mon, 13 Jun 2016 02:50:13 GMT
Pragma: no-cache
Server: bfe/1.0.8.18

#===================== 测试本机网络下载(raw.githubusercontent.com) =====================#

HTTP/2 200 
cache-control: max-age=300
content-security-policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
content-type: text/plain; charset=utf-8
etag: "275ce7c4d332951875158904a2c8128e7ea40f4ae5057d32acf9f67754ef0e71"
strict-transport-security: max-age=31536000
x-content-type-options: nosniff
x-frame-options: deny
x-xss-protection: 1; mode=block
x-github-request-id: 1E14:2C62:28A9BB:2F8B37:6418DDD8
accept-ranges: bytes
date: Thu, 30 Mar 2023 09:08:01 GMT
via: 1.1 varnish
x-served-by: cache-qpg1275-QPG
x-cache: HIT
x-cache-hits: 1
x-timer: S1680167282.778100,VS0,VE1
vary: Authorization,Accept-Encoding,Origin
access-control-allow-origin: *
x-fastly-request-id: 02a7d10a0c5f46f4256bd7f0ee28f3c76a021c6b
expires: Thu, 30 Mar 2023 09:13:01 GMT
source-age: 110
content-length: 83

#===================== 最近运行日志 =====================#

2023-03-30 08:00:00【/tmp/yaml_sub_tmp_config.yaml】Download Failed:【curl: (28) Operation too slow. Less than 1 bytes/sec transferred the last 15 seconds】
2023-03-30 08:00:27 Config File Download Successful, Check If There is Any Update...
2023-03-30 08:00:27 Config File【Wallless-Convert】No Change, Do Nothing!
2023-03-30 08:00:30 Start Updating Config File【Wallless】...
2023-03-30 08:00:31 Config File Download Successful, Check If There is Any Update...
2023-03-30 08:00:31 Config File【Wallless】No Change, Do Nothing!
2023-03-30 08:00:34 Start Updating Config File【管人痴】...
2023-03-30 08:00:35 Config File Download Successful, Check If There is Any Update...
2023-03-30 08:00:35 Config File【管人痴】Are Updates, Start Replacing...
2023-03-30 08:00:35 Config File【管人痴】Update Successful!
2023-03-30 17:03:02 OpenClash Stoping...
2023-03-30 17:03:02 Step 1: Backup The Current Groups State...
2023-03-30 17:03:02 Step 2: Delete OpenClash Firewall Rules...
2023-03-30 17:03:03 Step 3: Close The OpenClash Daemons...
2023-03-30 17:03:03 Step 4: Close The Clash Core Process...
2023-03-30 17:03:03 Step 5: Restart Dnsmasq...
2023-03-30 17:03:05 Step 6: Delete OpenClash Residue File...
2023-03-30 17:03:05 OpenClash Start Running...
2023-03-30 17:03:05 Step 1: Get The Configuration...
2023-03-30 17:03:05 Step 2: Check The Components...
2023-03-30 17:03:06 Step 3: Modify The Config File...
2023-03-30 17:03:06 Tip: You have seted the authentication of SOCKS5/HTTP(S) proxy with【Clash:83XLJCUX】
2023-03-30 17:03:08 Step 4: Start Running The Clash Core...
2023-03-30 17:03:08 Tip: Detected The Exclusive Function of The TUN Core, Use TUN Core to Start...
2023-03-30 17:03:09 Step 5: Check The Core Status...
09:03:09 INF [Config] initial compatible provider name=Others
09:03:09 INF [Config] initial compatible provider name=ChatGPT
09:03:09 INF [Config] initial compatible provider name=Microsoft
09:03:09 INF [Config] initial compatible provider name=Apple
09:03:09 INF [Config] initial compatible provider name=Proxies
09:03:09 INF [Config] initial compatible provider name=Telegram
09:03:09 INF [Config] initial compatible provider name=GlobalTV
09:03:09 INF [Config] initial compatible provider name=Bilibili
09:03:09 INF [Config] initial compatible provider name=YouTube
09:03:09 INF [Config] initial compatible provider name=AsianTV
09:03:09 INF [Config] initial compatible provider name=Apple TV
09:03:09 INF [Config] initial compatible provider name=Disney Plus
09:03:09 INF [Config] initial compatible provider name=Netease Music
09:03:09 INF [Config] initial compatible provider name=Domestic
09:03:09 INF [Config] initial compatible provider name=Netflix
09:03:09 INF [Config] initial compatible provider name=Bahamut
2023-03-30 17:03:12 Step 6: Wait For The File Downloading...
2023-03-30 17:03:12 Step 7: Set Firewall Rules...
2023-03-30 17:03:12 Tip: DNS Hijacking Mode is Dnsmasq Redirect...
2023-03-30 17:03:12 Tip: Waiting for TUN Interface Start...
2023-03-30 17:03:12 Tip: Start Add Port Bypassing Rules For Firewall Redirect and Firewall Rules...
2023-03-30 17:03:12 Tip: Start Add Custom Firewall Rules...
2023-03-30 17:03:12 Step 8: Restart Dnsmasq...
2023-03-30 17:03:15 Step 9: Add Cron Rules, Start Daemons...
2023-03-30 17:03:15 Warning: OpenClash Start Successful, Please Note That Network May Abnormal With IPv6's DHCP Server

#===================== 活动连接信息 =====================#

1. SourceIP:【192.168.1.198】 - Host:【Empty】 - DestinationIP:【60.28.217.99】 - Network:【udp】 - RulePayload:【60.0.0.0/11】 - Lastchain:【DIRECT】
2. SourceIP:【192.168.1.210】 - Host:【Empty】 - DestinationIP:【60.28.217.96】 - Network:【udp】 - RulePayload:【60.0.0.0/11】 - Lastchain:【DIRECT】
3. SourceIP:【192.168.1.241】 - Host:【Empty】 - DestinationIP:【122.96.96.225】 - Network:【udp】 - RulePayload:【122.96.0.0/15】 - Lastchain:【DIRECT】
4. SourceIP:【192.168.1.210】 - Host:【Empty】 - DestinationIP:【60.28.217.96】 - Network:【udp】 - RulePayload:【60.0.0.0/11】 - Lastchain:【DIRECT】
5. SourceIP:【192.168.1.103】 - Host:【hongkong3101.discord.media】 - DestinationIP:【162.159.138.234】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【台湾I】
6. SourceIP:【192.168.1.198】 - Host:【Empty】 - DestinationIP:【60.28.217.99】 - Network:【udp】 - RulePayload:【60.0.0.0/11】 - Lastchain:【DIRECT】
7. SourceIP:【192.168.1.103】 - Host:【prod-rso.lol.qq.com】 - DestinationIP:【42.194.252.119】 - Network:【tcp】 - RulePayload:【qq.com】 - Lastchain:【DIRECT】
8. SourceIP:【192.168.1.103】 - Host:【skydrive.wns.windows.com】 - DestinationIP:【20.198.119.143】 - Network:【tcp】 - RulePayload:【windows.com】 - Lastchain:【台湾I】
9. SourceIP:【192.168.1.103】 - Host:【statwup.huya.com】 - DestinationIP:【116.162.10.161】 - Network:【tcp】 - RulePayload:【116.128.0.0/10】 - Lastchain:【DIRECT】
10. SourceIP:【192.168.1.212】 - Host:【Empty】 - DestinationIP:【58.254.154.234】 - Network:【tcp】 - RulePayload:【58.240.0.0/12】 - Lastchain:【DIRECT】
11. SourceIP:【192.168.1.103】 - Host:【wsproxy.douyu.com】 - DestinationIP:【39.107.73.128】 - Network:【tcp】 - RulePayload:【douyu.com】 - Lastchain:【DIRECT】
12. SourceIP:【192.168.1.103】 - Host:【www.baidu.com】 - DestinationIP:【157.148.69.74】 - Network:【tcp】 - RulePayload:【baidu.com】 - Lastchain:【DIRECT】
13. SourceIP:【192.168.1.103】 - Host:【livewebbs2.msstatic.com】 - DestinationIP:【61.240.200.201】 - Network:【tcp】 - RulePayload:【61.240.0.0/14】 - Lastchain:【DIRECT】
14. SourceIP:【192.168.1.103】 - Host:【Empty】 - DestinationIP:【220.202.53.201】 - Network:【tcp】 - RulePayload:【220.192.0.0/12】 - Lastchain:【DIRECT】
15. SourceIP:【192.168.1.103】 - Host:【www.doseeing.com】 - DestinationIP:【139.129.245.159】 - Network:【tcp】 - RulePayload:【139.129.0.0/16】 - Lastchain:【DIRECT】
16. SourceIP:【192.168.1.206】 - Host:【Empty】 - DestinationIP:【60.28.217.97】 - Network:【udp】 - RulePayload:【60.0.0.0/11】 - Lastchain:【DIRECT】
17. SourceIP:【192.168.1.103】 - Host:【api.ipify.org】 - DestinationIP:【173.231.16.76】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【台湾I】
18. SourceIP:【192.168.1.103】 - Host:【functional.events.data.microsoft.com】 - DestinationIP:【20.50.80.210】 - Network:【tcp】 - RulePayload:【microsoft.com】 - Lastchain:【台湾I】
19. SourceIP:【192.168.1.241】 - Host:【Empty】 - DestinationIP:【122.96.96.225】 - Network:【udp】 - RulePayload:【122.96.0.0/15】 - Lastchain:【DIRECT】
20. SourceIP:【192.168.1.103】 - Host:【705a5a6a-ws.va.huya.com】 - DestinationIP:【112.90.90.106】 - Network:【tcp】 - RulePayload:【112.80.0.0/12】 - Lastchain:【DIRECT】
21. SourceIP:【192.168.1.103】 - Host:【ylog.huya.com】 - DestinationIP:【116.162.48.72】 - Network:【tcp】 - RulePayload:【116.128.0.0/10】 - Lastchain:【DIRECT】
22. SourceIP:【192.168.1.124】 - Host:【Empty】 - DestinationIP:【58.254.154.252】 - Network:【tcp】 - RulePayload:【58.240.0.0/12】 - Lastchain:【DIRECT】
23. SourceIP:【192.168.1.103】 - Host:【rpic.douyucdn.cn】 - DestinationIP:【163.177.180.99】 - Network:【tcp】 - RulePayload:【cn】 - Lastchain:【DIRECT】
24. SourceIP:【192.168.1.125】 - Host:【Empty】 - DestinationIP:【120.92.65.237】 - Network:【udp】 - RulePayload:【120.92.0.0/17】 - Lastchain:【DIRECT】
25. SourceIP:【192.168.1.223】 - Host:【alt7-mtalk.google.com】 - DestinationIP:【173.194.219.188】 - Network:【tcp】 - RulePayload:【google】 - Lastchain:【台湾I】
26. SourceIP:【192.168.1.100】 - Host:【Empty】 - DestinationIP:【120.92.65.243】 - Network:【udp】 - RulePayload:【120.92.0.0/17】 - Lastchain:【DIRECT】
27. SourceIP:【192.168.1.103】 - Host:【nleditor.osi.office.net】 - DestinationIP:【40.83.137.243】 - Network:【tcp】 - RulePayload:【office.net】 - Lastchain:【台湾I】
28. SourceIP:【192.168.1.210】 - Host:【Empty】 - DestinationIP:【58.254.154.234】 - Network:【tcp】 - RulePayload:【58.240.0.0/12】 - Lastchain:【DIRECT】
29. SourceIP:【192.168.1.103】 - Host:【www.douyu.com】 - DestinationIP:【122.13.173.229】 - Network:【tcp】 - RulePayload:【douyu.com】 - Lastchain:【DIRECT】
30. SourceIP:【192.168.1.241】 - Host:【Empty】 - DestinationIP:【153.3.47.73】 - Network:【udp】 - RulePayload:【153.3.0.0/16】 - Lastchain:【DIRECT】
31. SourceIP:【192.168.1.103】 - Host:【metric.huya.com】 - DestinationIP:【116.162.155.83】 - Network:【tcp】 - RulePayload:【116.128.0.0/10】 - Lastchain:【DIRECT】
32. SourceIP:【192.168.1.103】 - Host:【whois.pconline.com.cn】 - DestinationIP:【182.89.223.98】 - Network:【tcp】 - RulePayload:【cn】 - Lastchain:【DIRECT】
33. SourceIP:【192.168.1.103】 - Host:【al-dm.p2p.huya.com】 - DestinationIP:【163.177.180.115】 - Network:【tcp】 - RulePayload:【163.177.0.0/16】 - Lastchain:【DIRECT】
34. SourceIP:【192.168.1.103】 - Host:【discord.com】 - DestinationIP:【162.159.137.232】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【台湾I】
35. SourceIP:【192.168.1.241】 - Host:【Empty】 - DestinationIP:【59.36.127.185】 - Network:【udp】 - RulePayload:【59.32.0.0/11】 - Lastchain:【DIRECT】
36. SourceIP:【192.168.1.103】 - Host:【ws.game.qq.com】 - DestinationIP:【58.247.214.38】 - Network:【tcp】 - RulePayload:【qq.com】 - Lastchain:【DIRECT】
37. SourceIP:【192.168.1.196】 - Host:【Empty】 - DestinationIP:【58.254.154.252】 - Network:【tcp】 - RulePayload:【58.240.0.0/12】 - Lastchain:【DIRECT】
38. SourceIP:【192.168.1.103】 - Host:【www.youtube.com】 - DestinationIP:【142.250.196.110】 - Network:【tcp】 - RulePayload:【youtube.com】 - Lastchain:【台湾I】
39. SourceIP:【192.168.1.103】 - Host:【api.github.com】 - DestinationIP:【192.30.255.117】 - Network:【tcp】 - RulePayload:【github】 - Lastchain:【台湾I】
40. SourceIP:【192.168.1.103】 - Host:【wss.tim.qq.com】 - DestinationIP:【157.148.41.169】 - Network:【tcp】 - RulePayload:【qq.com】 - Lastchain:【DIRECT】
41. SourceIP:【192.168.1.103】 - Host:【hn1-sz-feapp.lol.qq.com】 - DestinationIP:【58.251.116.184】 - Network:【tcp】 - RulePayload:【qq.com】 - Lastchain:【DIRECT】
42. SourceIP:【192.168.1.103】 - Host:【stream-kunming-cu-14-204-184-131.edgesrv.com】 - DestinationIP:【14.204.184.131】 - Network:【tcp】 - RulePayload:【14.204.0.0/15】 - Lastchain:【DIRECT】
43. SourceIP:【192.168.1.241】 - Host:【cschannel.anticheatexpert.com】 - DestinationIP:【157.148.45.30】 - Network:【tcp】 - RulePayload:【157.148.0.0/16】 - Lastchain:【DIRECT】
44. SourceIP:【192.168.1.145】 - Host:【Empty】 - DestinationIP:【47.114.176.28】 - Network:【tcp】 - RulePayload:【47.96.0.0/11】 - Lastchain:【DIRECT】
45. SourceIP:【192.168.1.103】 - Host:【hn1-entitlements.lol.qq.com】 - DestinationIP:【157.255.196.46】 - Network:【tcp】 - RulePayload:【qq.com】 - Lastchain:【DIRECT】
46. SourceIP:【192.168.1.103】 - Host:【api-ipv4.ip.sb】 - DestinationIP:【104.26.13.31】 - Network:【tcp】 - RulePayload:【ip.sb】 - Lastchain:【台湾I】
47. SourceIP:【192.168.1.121】 - Host:【Empty】 - DestinationIP:【124.160.120.78】 - Network:【udp】 - RulePayload:【124.160.0.0/13】 - Lastchain:【DIRECT】
48. SourceIP:【192.168.1.241】 - Host:【hn1-sz-feapp.lol.qq.com】 - DestinationIP:【58.251.116.184】 - Network:【tcp】 - RulePayload:【qq.com】 - Lastchain:【DIRECT】
49. SourceIP:【192.168.1.128】 - Host:【Empty】 - DestinationIP:【58.254.154.234】 - Network:【tcp】 - RulePayload:【58.240.0.0/12】 - Lastchain:【DIRECT】
50. SourceIP:【192.168.1.103】 - Host:【cschannel.anticheatexpert.com】 - DestinationIP:【157.148.45.91】 - Network:【tcp】 - RulePayload:【157.148.0.0/16】 - Lastchain:【DIRECT】
51. SourceIP:【192.168.1.241】 - Host:【Empty】 - DestinationIP:【157.255.4.78】 - Network:【udp】 - RulePayload:【157.255.0.0/16】 - Lastchain:【DIRECT】
52. SourceIP:【192.168.1.136】 - Host:【Empty】 - DestinationIP:【118.212.146.33】 - Network:【udp】 - RulePayload:【118.212.0.0/15】 - Lastchain:【DIRECT】
53. SourceIP:【192.168.1.103】 - Host:【Empty】 - DestinationIP:【122.96.96.225】 - Network:【udp】 - RulePayload:【122.96.0.0/15】 - Lastchain:【DIRECT】
54. SourceIP:【192.168.1.103】 - Host:【s1.music.126.net】 - DestinationIP:【122.13.173.233】 - Network:【tcp】 - RulePayload:【126.net】 - Lastchain:【DIRECT】
55. SourceIP:【192.168.1.103】 - Host:【diy-front.cdn.huya.com】 - DestinationIP:【182.89.194.242】 - Network:【tcp】 - RulePayload:【182.88.0.0/14】 - Lastchain:【DIRECT】
56. SourceIP:【192.168.1.206】 - Host:【Empty】 - DestinationIP:【60.28.217.97】 - Network:【udp】 - RulePayload:【60.0.0.0/11】 - Lastchain:【DIRECT】
57. SourceIP:【192.168.1.103】 - Host:【705a5a6a-ws.va.huya.com】 - DestinationIP:【112.90.90.106】 - Network:【tcp】 - RulePayload:【112.80.0.0/12】 - Lastchain:【DIRECT】
58. SourceIP:【192.168.1.149】 - Host:【Empty】 - DestinationIP:【58.254.154.252】 - Network:【tcp】 - RulePayload:【58.240.0.0/12】 - Lastchain:【DIRECT】
59. SourceIP:【192.168.1.136】 - Host:【g-aicloud.alibaba.com】 - DestinationIP:【59.82.113.224】 - Network:【tcp】 - RulePayload:【alibaba.com】 - Lastchain:【DIRECT】
60. SourceIP:【192.168.1.103】 - Host:【gateway.discord.gg】 - DestinationIP:【128.242.240.59】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【台湾I】
61. SourceIP:【192.168.1.145】 - Host:【Empty】 - DestinationIP:【47.114.176.28】 - Network:【udp】 - RulePayload:【47.96.0.0/11】 - Lastchain:【DIRECT】
62. SourceIP:【192.168.1.103】 - Host:【edge.microsoft.com】 - DestinationIP:【204.79.197.239】 - Network:【tcp】 - RulePayload:【microsoft.com】 - Lastchain:【台湾I】
63. SourceIP:【192.168.1.103】 - Host:【alive.github.com】 - DestinationIP:【140.82.113.25】 - Network:【tcp】 - RulePayload:【github】 - Lastchain:【台湾I】
64. SourceIP:【192.168.1.103】 - Host:【github.com】 - DestinationIP:【20.27.177.113】 - Network:【tcp】 - RulePayload:【github】 - Lastchain:【台湾I】
65. SourceIP:【192.168.1.103】 - Host:【skydrive.wns.windows.com】 - DestinationIP:【20.198.119.143】 - Network:【tcp】 - RulePayload:【windows.com】 - Lastchain:【台湾I】

OpenClash Config

No response

Expected Behavior

希望修复BUG,在OpenClash环境下可以链接Discord的语音房,加入语音

Screenshots

image

vernesong commented 1 year ago

全局代理看看控制面板的相关日志

CuewarsTaner commented 1 year ago

全局代理看看控制面板的相关日志

请问控制面板日志是在哪里查看的?

CuewarsTaner commented 1 year ago

查阅了一下,好像Discord的语音房是走的UDP,2021年末有这个issue提交,但是没解决,希望可以解决一下。

OpenClash 调试日志

生成时间: 2023-04-02 05:16:42 插件版本: v0.45.103-beta 隐私提示: 上传此日志前请注意检查、屏蔽公网IP、节点、密码等相关敏感信息


#===================== 系统信息 =====================#

主机型号: To be filled by O.E.M. To be filled by O.E.M.
固件版本: iStoreOS 21.02.3 2023032001
LuCI版本: git-22.258.47264-284140f
内核版本: 5.4.188
处理器架构: x86_64

#此项有值时,如不使用IPv6,建议到网络-接口-lan的设置中禁用IPV6的DHCP
IPV6-DHCP: server

DNS劫持: Dnsmasq 转发
#DNS劫持为Dnsmasq时,此项结果应仅有配置文件的DNS监听地址
Dnsmasq转发设置: 127.0.0.1#7874

#===================== 依赖检查 =====================#

dnsmasq-full: 已安装
coreutils: 已安装
coreutils-nohup: 已安装
bash: 已安装
curl: 已安装
ca-certificates: 已安装
ipset: 已安装
ip-full: 已安装
libcap: 已安装
libcap-bin: 已安装
ruby: 已安装
ruby-yaml: 已安装
ruby-psych: 已安装
ruby-pstore: 已安装
kmod-tun(TUN模式): 已安装
luci-compat(Luci >= 19.07): 已安装
kmod-inet-diag(PROCESS-NAME): 已安装
unzip: 已安装
iptables-mod-tproxy: 已安装
kmod-ipt-tproxy: 已安装
iptables-mod-extra: 已安装
kmod-ipt-extra: 已安装
kmod-ipt-nat: 已安装

#===================== 内核检查 =====================#

运行状态: 运行中
内核:TUN
进程pid: 24315
运行权限: 24315: cap_dac_override,cap_net_bind_service,cap_net_admin,cap_net_raw,cap_sys_ptrace,cap_sys_resource=eip
运行用户: nobody
已选择的架构: TUN

#下方无法显示内核版本号时请确认您的内核版本是否正确或者有无权限
Tun内核版本: 2023.03.04-5-g4a8cefb
Tun内核文件: 存在
Tun内核运行权限: 正常

Dev内核版本: v1.13.0-7-g4ffc999
Dev内核文件: 存在
Dev内核运行权限: 正常

Meta内核版本: alpha-g2f992e9
Meta内核文件: 存在
Meta内核运行权限: 正常

#===================== 插件设置 =====================#

当前配置文件: /etc/openclash/config/管人痴.yaml
启动配置文件: /etc/openclash/管人痴.yaml
运行模式: fake-ip-tun
默认代理模式: rule
UDP流量转发(tproxy): 停用
自定义DNS: 启用
IPV6代理: 停用
IPV6-DNS解析: 停用
禁用Dnsmasq缓存: 启用
自定义规则: 停用
仅允许内网: 启用
仅代理命中规则流量: 停用
仅允许常用端口流量: 停用
绕过中国大陆IP: 停用
路由本机代理: 启用

#启动异常时建议关闭此项后重试
混合节点: 停用
保留配置: 停用

#启动异常时建议关闭此项后重试
第三方规则: 停用

#===================== 配置文件 =====================#

port: 7890
socks-port: 7891
redir-port: 7892
allow-lan: true
mode: rule
log-level: silent
external-controller: 0.0.0.0:9090
proxy-groups:
- name: "\U0001F530国外流量"
  type: select
  proxies:
  - '1 官网: https://管人痴.com'
  - 1 请使用全局代理访问官网,非全局会拦截报1020
  - ASYNCHRONOUS TRANSFERMODE 永久虚通路连接PVCC D01

tproxy-port: 7895
mixed-port: 7893
bind-address: "*"
external-ui: "/usr/share/openclash/ui"
ipv6: false
dns:
  enable: true
  ipv6: false
  enhanced-mode: fake-ip
  fake-ip-range: 198.18.0.1/16
  listen: 0.0.0.0:7874
  nameserver:
  - dhcp://"pppoe-wan"
  - 10.95.192.1
  - 223.5.5.5
  - 223.6.6.6
  - 114.114.114.114
  - 119.29.29.29
  - https://doh.pub/dns-query
  - https://dns.alidns.com/dns-query
  fallback:
  - https://dns.cloudflare.com/dns-query
  - https://public.dns.iij.jp/dns-query
  - https://jp.tiar.app/dns-query
  - https://jp.tiarap.org/dns-query
  - tls://dot.tiar.app
  default-nameserver:
  - 10.95.192.1
  - 223.5.5.5
  - 223.6.6.6
  - 114.114.114.114
  - 119.29.29.29
experimental:
  sniff-tls-sni: true
tun:
  enable: true
  stack: system
  auto-route: false
  auto-detect-interface: false
  dns-hijack:
  - tcp://any:53
profile:
  store-selected: true
  store-fake-ip: true
authentication:
- Clash:83XLJCUX

#===================== 自定义覆写设置 =====================#

#!/bin/sh
. /usr/share/openclash/ruby.sh
. /usr/share/openclash/log.sh
. /lib/functions.sh

# This script is called by /etc/init.d/openclash
# Add your custom overwrite scripts here, they will be take effict after the OpenClash own srcipts

LOG_OUT "Tip: Start Running Custom Overwrite Scripts..."
LOGTIME=$(echo $(date "+%Y-%m-%d %H:%M:%S"))
LOG_FILE="/tmp/openclash.log"
CONFIG_FILE="$1" #config path

#Simple Demo:
    #General Demo
    #1--config path
    #2--key name
    #3--value
    #ruby_edit "$CONFIG_FILE" "['redir-port']" "7892"
    #ruby_edit "$CONFIG_FILE" "['secret']" "123456"
    #ruby_edit "$CONFIG_FILE" "['dns']['enable']" "true"

    #Hash Demo
    #1--config path
    #2--key name
    #3--hash type value
    #ruby_edit "$CONFIG_FILE" "['experimental']" "{'sniff-tls-sni'=>true}"
    #ruby_edit "$CONFIG_FILE" "['sniffer']" "{'sniffing'=>['tls','http']}"

    #Array Demo:
    #1--config path
    #2--key name
    #3--position(start from 0, end with -1)
    #4--value
    #ruby_arr_insert "$CONFIG_FILE" "['dns']['nameserver']" "0" "114.114.114.114"

    #Array Add From Yaml File Demo:
    #1--config path
    #2--key name
    #3--position(start from 0, end with -1)
    #4--value file path
    #5--value key name in #4 file
    #ruby_arr_add_file "$CONFIG_FILE" "['dns']['fallback-filter']['ipcidr']" "0" "/etc/openclash/custom/openclash_custom_fallback_filter.yaml" "['fallback-filter']['ipcidr']"

#Ruby Script Demo:
    #ruby -ryaml -rYAML -I "/usr/share/openclash" -E UTF-8 -e "
    #   begin
    #      Value = YAML.load_file('$CONFIG_FILE');
    #   rescue Exception => e
    #      puts '${LOGTIME} Error: Load File Failed,【' + e.message + '】';
    #   end;

        #General
    #   begin
    #   Thread.new{
    #      Value['redir-port']=7892;
    #      Value['tproxy-port']=7895;
    #      Value['port']=7890;
    #      Value['socks-port']=7891;
    #      Value['mixed-port']=7893;
    #   }.join;

    #   rescue Exception => e
    #      puts '${LOGTIME} Error: Set General Failed,【' + e.message + '】';
    #   ensure
    #      File.open('$CONFIG_FILE','w') {|f| YAML.dump(Value, f)};
    #   end" 2>/dev/null >> $LOG_FILE

exit 0
#===================== 自定义防火墙设置 =====================#

#!/bin/sh
. /usr/share/openclash/log.sh
. /lib/functions.sh

# This script is called by /etc/init.d/openclash
# Add your custom firewall rules here, they will be added after the end of the OpenClash iptables rules

LOG_OUT "Tip: Start Add Custom Firewall Rules..."

exit 0
#===================== IPTABLES 防火墙设置 =====================#

#IPv4 NAT chain

# Generated by iptables-save v1.8.7 on Sun Apr  2 05:16:45 2023
*nat
:PREROUTING ACCEPT [1138:267798]
:INPUT ACCEPT [677:52195]
:OUTPUT ACCEPT [1123:73513]
:POSTROUTING ACCEPT [597:46507]
:DOCKER - [0:0]
:MINIUPNPD - [0:0]
:MINIUPNPD-POSTROUTING - [0:0]
:postrouting_docker_rule - [0:0]
:postrouting_lan_rule - [0:0]
:postrouting_rule - [0:0]
:postrouting_wan_rule - [0:0]
:prerouting_docker_rule - [0:0]
:prerouting_lan_rule - [0:0]
:prerouting_rule - [0:0]
:prerouting_wan_rule - [0:0]
:zone_docker_postrouting - [0:0]
:zone_docker_prerouting - [0:0]
:zone_lan_postrouting - [0:0]
:zone_lan_prerouting - [0:0]
:zone_wan_postrouting - [0:0]
:zone_wan_prerouting - [0:0]
-A PREROUTING -p tcp -m comment --comment "OpenClash TCP DNS Hijack" -m tcp --dport 53 -j ACCEPT
-A PREROUTING -p tcp -m tcp --dport 53 -m comment --comment "OpenClash DNS Hijack" -j REDIRECT --to-ports 53
-A PREROUTING -p udp -m udp --dport 53 -m comment --comment "OpenClash DNS Hijack" -j REDIRECT --to-ports 53
-A PREROUTING -m comment --comment "!fw3: Custom prerouting rule chain" -j prerouting_rule
-A PREROUTING -i br-lan -m comment --comment "!fw3" -j zone_lan_prerouting
-A PREROUTING -i pppoe-wan -m comment --comment "!fw3" -j zone_wan_prerouting
-A PREROUTING -i eth0 -m comment --comment "!fw3" -j zone_wan_prerouting
-A PREROUTING -i docker0 -m comment --comment "!fw3" -j zone_docker_prerouting
-A POSTROUTING -s 172.17.0.0/16 ! -o docker0 -j MASQUERADE
-A POSTROUTING -m comment --comment "!fw3: Custom postrouting rule chain" -j postrouting_rule
-A POSTROUTING -o br-lan -m comment --comment "!fw3" -j zone_lan_postrouting
-A POSTROUTING -o pppoe-wan -m comment --comment "!fw3" -j zone_wan_postrouting
-A POSTROUTING -o eth0 -m comment --comment "!fw3" -j zone_wan_postrouting
-A POSTROUTING -o docker0 -m comment --comment "!fw3" -j zone_docker_postrouting
-A DOCKER -i docker0 -j RETURN
-A zone_docker_postrouting -m comment --comment "!fw3: Custom docker postrouting rule chain" -j postrouting_docker_rule
-A zone_docker_prerouting -m comment --comment "!fw3: Custom docker prerouting rule chain" -j prerouting_docker_rule
-A zone_lan_postrouting -m comment --comment "!fw3: Custom lan postrouting rule chain" -j postrouting_lan_rule
-A zone_lan_prerouting -m comment --comment "!fw3: Custom lan prerouting rule chain" -j prerouting_lan_rule
-A zone_wan_postrouting -m comment --comment "!fw3: Custom wan postrouting rule chain" -j postrouting_wan_rule
-A zone_wan_postrouting -j MINIUPNPD-POSTROUTING
-A zone_wan_postrouting -j MINIUPNPD-POSTROUTING
-A zone_wan_postrouting -m comment --comment "!fw3" -j FULLCONENAT
-A zone_wan_prerouting -m comment --comment "!fw3: Custom wan prerouting rule chain" -j prerouting_wan_rule
-A zone_wan_prerouting -m comment --comment "!fw3" -j FULLCONENAT
-A zone_wan_prerouting -j MINIUPNPD
-A zone_wan_prerouting -j MINIUPNPD
COMMIT
# Completed on Sun Apr  2 05:16:45 2023

#IPv4 Mangle chain

# Generated by iptables-save v1.8.7 on Sun Apr  2 05:16:45 2023
*mangle
:PREROUTING ACCEPT [39914:11545461]
:INPUT ACCEPT [19998:6187905]
:FORWARD ACCEPT [19858:5352927]
:OUTPUT ACCEPT [19608:9875239]
:POSTROUTING ACCEPT [39352:15232207]
:openclash - [0:0]
:openclash_dns_hijack - [0:0]
:openclash_output - [0:0]
:openclash_upnp - [0:0]
-A PREROUTING -j openclash
-A FORWARD -o pppoe-wan -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -i pppoe-wan -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -o eth0 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -i eth0 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A OUTPUT -j openclash_output
-A openclash -p tcp -m tcp --sport 8897 -j RETURN
-A openclash -p udp -m udp --sport 500 -j RETURN
-A openclash -p udp -m udp --sport 68 -j RETURN
-A openclash -i utun -j RETURN
-A openclash -m set --match-set localnetwork dst -j RETURN
-A openclash -p udp -j openclash_upnp
-A openclash -j MARK --set-xmark 0x162/0xffffffff
-A openclash_output -p tcp -m tcp --sport 8897 -j RETURN
-A openclash_output -p udp -m udp --sport 500 -j RETURN
-A openclash_output -p udp -m udp --sport 68 -j RETURN
-A openclash_output -m set --match-set localnetwork dst -j RETURN
-A openclash_output -d 198.18.0.0/16 -m owner ! --uid-owner 65534 -j MARK --set-xmark 0x162/0xffffffff
-A openclash_output -p tcp -m owner ! --uid-owner 65534 -j MARK --set-xmark 0x162/0xffffffff
COMMIT
# Completed on Sun Apr  2 05:16:45 2023

#IPv4 Filter chain

# Generated by iptables-save v1.8.7 on Sun Apr  2 05:16:45 2023
*filter
:INPUT ACCEPT [322:29652]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [15:1281]
:DOCKER - [0:0]
:DOCKER-BLOCKED - [0:0]
:DOCKER-ISOLATION-STAGE-1 - [0:0]
:DOCKER-ISOLATION-STAGE-2 - [0:0]
:DOCKER-USER - [0:0]
:MINIUPNPD - [0:0]
:forwarding_docker_rule - [0:0]
:forwarding_lan_rule - [0:0]
:forwarding_rule - [0:0]
:forwarding_wan_rule - [0:0]
:input_docker_rule - [0:0]
:input_lan_rule - [0:0]
:input_rule - [0:0]
:input_wan_rule - [0:0]
:openclash_wan_input - [0:0]
:output_docker_rule - [0:0]
:output_lan_rule - [0:0]
:output_rule - [0:0]
:output_wan_rule - [0:0]
:reject - [0:0]
:syn_flood - [0:0]
:zone_docker_dest_ACCEPT - [0:0]
:zone_docker_forward - [0:0]
:zone_docker_input - [0:0]
:zone_docker_output - [0:0]
:zone_docker_src_ACCEPT - [0:0]
:zone_lan_dest_ACCEPT - [0:0]
:zone_lan_forward - [0:0]
:zone_lan_input - [0:0]
:zone_lan_output - [0:0]
:zone_lan_src_ACCEPT - [0:0]
:zone_wan_dest_ACCEPT - [0:0]
:zone_wan_dest_REJECT - [0:0]
:zone_wan_forward - [0:0]
:zone_wan_input - [0:0]
:zone_wan_output - [0:0]
:zone_wan_src_DROP - [0:0]
-A INPUT -i eth0 -m set ! --match-set localnetwork src -j openclash_wan_input
-A INPUT -i pppoe-wan -m set ! --match-set localnetwork src -j openclash_wan_input
-A INPUT -i lo -m comment --comment "!fw3" -j ACCEPT
-A INPUT -m comment --comment "!fw3: Custom input rule chain" -j input_rule
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m comment --comment "!fw3" -j syn_flood
-A INPUT -i br-lan -m comment --comment "!fw3" -j zone_lan_input
-A INPUT -i pppoe-wan -m comment --comment "!fw3" -j zone_wan_input
-A INPUT -i eth0 -m comment --comment "!fw3" -j zone_wan_input
-A INPUT -i docker0 -m comment --comment "!fw3" -j zone_docker_input
-A FORWARD -o utun -p udp -m udp --dport 443 -m comment --comment "OpenClash QUIC REJECT" -m set ! --match-set china_ip_route dst -j REJECT --reject-with icmp-port-unreachable
-A FORWARD -o utun -m comment --comment "OpenClash TUN Forward" -j ACCEPT
-A FORWARD -j DOCKER-USER
-A FORWARD -j DOCKER-ISOLATION-STAGE-1
-A FORWARD -o docker0 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -o docker0 -j DOCKER
-A FORWARD -i docker0 ! -o docker0 -j ACCEPT
-A FORWARD -i docker0 -o docker0 -j ACCEPT
-A FORWARD -m comment --comment "!fw3: Custom forwarding rule chain" -j forwarding_rule
-A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A FORWARD -i br-lan -m comment --comment "!fw3" -j zone_lan_forward
-A FORWARD -i pppoe-wan -m comment --comment "!fw3" -j zone_wan_forward
-A FORWARD -i eth0 -m comment --comment "!fw3" -j zone_wan_forward
-A FORWARD -i docker0 -m comment --comment "!fw3" -j zone_docker_forward
-A FORWARD -m comment --comment "!fw3" -j reject
-A OUTPUT -o lo -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -m comment --comment "!fw3: Custom output rule chain" -j output_rule
-A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -o br-lan -m comment --comment "!fw3" -j zone_lan_output
-A OUTPUT -o pppoe-wan -m comment --comment "!fw3" -j zone_wan_output
-A OUTPUT -o eth0 -m comment --comment "!fw3" -j zone_wan_output
-A OUTPUT -o docker0 -m comment --comment "!fw3" -j zone_docker_output
-A DOCKER-ISOLATION-STAGE-1 -i docker0 ! -o docker0 -j DOCKER-ISOLATION-STAGE-2
-A DOCKER-ISOLATION-STAGE-1 -j RETURN
-A DOCKER-ISOLATION-STAGE-2 -o docker0 -j DROP
-A DOCKER-ISOLATION-STAGE-2 -j RETURN
-A DOCKER-USER -j DOCKER-BLOCKED
-A DOCKER-USER -j RETURN
-A openclash_wan_input -p udp -m multiport --dports 7892,7895,9090,7890,7891,7893,7874 -j REJECT --reject-with icmp-port-unreachable
-A openclash_wan_input -p tcp -m multiport --dports 7892,7895,9090,7890,7891,7893,7874 -j REJECT --reject-with icmp-port-unreachable
-A reject -p tcp -m comment --comment "!fw3" -j REJECT --reject-with tcp-reset
-A reject -m comment --comment "!fw3" -j REJECT --reject-with icmp-port-unreachable
-A syn_flood -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m limit --limit 25/sec --limit-burst 50 -m comment --comment "!fw3" -j RETURN
-A syn_flood -m comment --comment "!fw3" -j DROP
-A zone_docker_dest_ACCEPT -o docker0 -m comment --comment "!fw3" -j ACCEPT
-A zone_docker_forward -m comment --comment "!fw3: Custom docker forwarding rule chain" -j forwarding_docker_rule
-A zone_docker_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_docker_forward -m comment --comment "!fw3" -j zone_docker_dest_ACCEPT
-A zone_docker_input -m comment --comment "!fw3: Custom docker input rule chain" -j input_docker_rule
-A zone_docker_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_docker_input -m comment --comment "!fw3" -j zone_docker_src_ACCEPT
-A zone_docker_output -m comment --comment "!fw3: Custom docker output rule chain" -j output_docker_rule
-A zone_docker_output -m comment --comment "!fw3" -j zone_docker_dest_ACCEPT
-A zone_docker_src_ACCEPT -i docker0 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_dest_ACCEPT -o br-lan -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_forward -m comment --comment "!fw3: Custom lan forwarding rule chain" -j forwarding_lan_rule
-A zone_lan_forward -m comment --comment "!fw3: Zone lan to wan forwarding policy" -j zone_wan_dest_ACCEPT
-A zone_lan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_lan_forward -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_input -m comment --comment "!fw3: Custom lan input rule chain" -j input_lan_rule
-A zone_lan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_lan_input -m comment --comment "!fw3" -j zone_lan_src_ACCEPT
-A zone_lan_output -m comment --comment "!fw3: Custom lan output rule chain" -j output_lan_rule
-A zone_lan_output -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_src_ACCEPT -i br-lan -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_ACCEPT -o pppoe-wan -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
-A zone_wan_dest_ACCEPT -o pppoe-wan -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_ACCEPT -o eth0 -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
-A zone_wan_dest_ACCEPT -o eth0 -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_REJECT -o pppoe-wan -m comment --comment "!fw3" -j reject
-A zone_wan_dest_REJECT -o eth0 -m comment --comment "!fw3" -j reject
-A zone_wan_forward -m comment --comment "!fw3: Custom wan forwarding rule chain" -j forwarding_wan_rule
-A zone_wan_forward -p esp -m comment --comment "!fw3: Allow-IPSec-ESP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -p udp -m udp --dport 500 -m comment --comment "!fw3: Allow-ISAKMP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_wan_forward -j MINIUPNPD
-A zone_wan_forward -j MINIUPNPD
-A zone_wan_forward -m comment --comment "!fw3" -j zone_wan_dest_REJECT
-A zone_wan_input -m comment --comment "!fw3: Custom wan input rule chain" -j input_wan_rule
-A zone_wan_input -p udp -m udp --dport 68 -m comment --comment "!fw3: Allow-DHCP-Renew" -j ACCEPT
-A zone_wan_input -p icmp -m icmp --icmp-type 8 -m comment --comment "!fw3: Allow-Ping" -j ACCEPT
-A zone_wan_input -p igmp -m comment --comment "!fw3: Allow-IGMP" -j ACCEPT
-A zone_wan_input -p tcp -m tcp --dport 8897 -m comment --comment "!fw3: linkease" -j ACCEPT
-A zone_wan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_wan_input -j MINIUPNPD
-A zone_wan_input -j MINIUPNPD
-A zone_wan_input -m comment --comment "!fw3" -j zone_wan_src_DROP
-A zone_wan_output -m comment --comment "!fw3: Custom wan output rule chain" -j output_wan_rule
-A zone_wan_output -m comment --comment "!fw3" -j zone_wan_dest_ACCEPT
-A zone_wan_src_DROP -i pppoe-wan -m comment --comment "!fw3" -j DROP
-A zone_wan_src_DROP -i eth0 -m comment --comment "!fw3" -j DROP
COMMIT
# Completed on Sun Apr  2 05:16:45 2023

#IPv6 NAT chain

# Generated by ip6tables-save v1.8.7 on Sun Apr  2 05:16:45 2023
*nat
:PREROUTING ACCEPT [118353:13477988]
:INPUT ACCEPT [86174:7674863]
:OUTPUT ACCEPT [570:65560]
:POSTROUTING ACCEPT [30812:5549350]
COMMIT
# Completed on Sun Apr  2 05:16:45 2023

#IPv6 Mangle chain

# Generated by ip6tables-save v1.8.7 on Sun Apr  2 05:16:45 2023
*mangle
:PREROUTING ACCEPT [581:90469]
:INPUT ACCEPT [240:22099]
:FORWARD ACCEPT [341:68370]
:OUTPUT ACCEPT [234:23420]
:POSTROUTING ACCEPT [585:94729]
-A FORWARD -o pppoe-wan -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -i pppoe-wan -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -o eth0 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -i eth0 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
COMMIT
# Completed on Sun Apr  2 05:16:45 2023

#IPv6 Filter chain

# Generated by ip6tables-save v1.8.7 on Sun Apr  2 05:16:45 2023
*filter
:INPUT ACCEPT [10:2939]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [14:3303]
:MINIUPNPD - [0:0]
:forwarding_docker_rule - [0:0]
:forwarding_lan_rule - [0:0]
:forwarding_rule - [0:0]
:forwarding_wan_rule - [0:0]
:input_docker_rule - [0:0]
:input_lan_rule - [0:0]
:input_rule - [0:0]
:input_wan_rule - [0:0]
:output_docker_rule - [0:0]
:output_lan_rule - [0:0]
:output_rule - [0:0]
:output_wan_rule - [0:0]
:reject - [0:0]
:syn_flood - [0:0]
:zone_docker_dest_ACCEPT - [0:0]
:zone_docker_forward - [0:0]
:zone_docker_input - [0:0]
:zone_docker_output - [0:0]
:zone_docker_src_ACCEPT - [0:0]
:zone_lan_dest_ACCEPT - [0:0]
:zone_lan_forward - [0:0]
:zone_lan_input - [0:0]
:zone_lan_output - [0:0]
:zone_lan_src_ACCEPT - [0:0]
:zone_wan_dest_ACCEPT - [0:0]
:zone_wan_dest_REJECT - [0:0]
:zone_wan_forward - [0:0]
:zone_wan_input - [0:0]
:zone_wan_output - [0:0]
:zone_wan_src_DROP - [0:0]
-A INPUT -i lo -m comment --comment "!fw3" -j ACCEPT
-A INPUT -m comment --comment "!fw3: Custom input rule chain" -j input_rule
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m comment --comment "!fw3" -j syn_flood
-A INPUT -i br-lan -m comment --comment "!fw3" -j zone_lan_input
-A INPUT -i pppoe-wan -m comment --comment "!fw3" -j zone_wan_input
-A INPUT -i eth0 -m comment --comment "!fw3" -j zone_wan_input
-A INPUT -i docker0 -m comment --comment "!fw3" -j zone_docker_input
-A FORWARD -m comment --comment "!fw3: Custom forwarding rule chain" -j forwarding_rule
-A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A FORWARD -i br-lan -m comment --comment "!fw3" -j zone_lan_forward
-A FORWARD -i pppoe-wan -m comment --comment "!fw3" -j zone_wan_forward
-A FORWARD -i eth0 -m comment --comment "!fw3" -j zone_wan_forward
-A FORWARD -i docker0 -m comment --comment "!fw3" -j zone_docker_forward
-A FORWARD -m comment --comment "!fw3" -j reject
-A OUTPUT -o lo -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -m comment --comment "!fw3: Custom output rule chain" -j output_rule
-A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -o br-lan -m comment --comment "!fw3" -j zone_lan_output
-A OUTPUT -o pppoe-wan -m comment --comment "!fw3" -j zone_wan_output
-A OUTPUT -o eth0 -m comment --comment "!fw3" -j zone_wan_output
-A OUTPUT -o docker0 -m comment --comment "!fw3" -j zone_docker_output
-A reject -p tcp -m comment --comment "!fw3" -j REJECT --reject-with tcp-reset
-A reject -m comment --comment "!fw3" -j REJECT --reject-with icmp6-port-unreachable
-A syn_flood -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m limit --limit 25/sec --limit-burst 50 -m comment --comment "!fw3" -j RETURN
-A syn_flood -m comment --comment "!fw3" -j DROP
-A zone_docker_dest_ACCEPT -o docker0 -m comment --comment "!fw3" -j ACCEPT
-A zone_docker_forward -m comment --comment "!fw3: Custom docker forwarding rule chain" -j forwarding_docker_rule
-A zone_docker_forward -m comment --comment "!fw3" -j zone_docker_dest_ACCEPT
-A zone_docker_input -m comment --comment "!fw3: Custom docker input rule chain" -j input_docker_rule
-A zone_docker_input -m comment --comment "!fw3" -j zone_docker_src_ACCEPT
-A zone_docker_output -m comment --comment "!fw3: Custom docker output rule chain" -j output_docker_rule
-A zone_docker_output -m comment --comment "!fw3" -j zone_docker_dest_ACCEPT
-A zone_docker_src_ACCEPT -i docker0 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_dest_ACCEPT -o br-lan -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_forward -m comment --comment "!fw3: Custom lan forwarding rule chain" -j forwarding_lan_rule
-A zone_lan_forward -m comment --comment "!fw3: Zone lan to wan forwarding policy" -j zone_wan_dest_ACCEPT
-A zone_lan_forward -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_input -m comment --comment "!fw3: Custom lan input rule chain" -j input_lan_rule
-A zone_lan_input -m comment --comment "!fw3" -j zone_lan_src_ACCEPT
-A zone_lan_output -m comment --comment "!fw3: Custom lan output rule chain" -j output_lan_rule
-A zone_lan_output -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_src_ACCEPT -i br-lan -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_ACCEPT -o pppoe-wan -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
-A zone_wan_dest_ACCEPT -o pppoe-wan -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_ACCEPT -o eth0 -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
-A zone_wan_dest_ACCEPT -o eth0 -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_REJECT -o pppoe-wan -m comment --comment "!fw3" -j reject
-A zone_wan_dest_REJECT -o eth0 -m comment --comment "!fw3" -j reject
-A zone_wan_forward -m comment --comment "!fw3: Custom wan forwarding rule chain" -j forwarding_wan_rule
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 128 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 129 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 2 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 3 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 4/0 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 4/1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p esp -m comment --comment "!fw3: Allow-IPSec-ESP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -p udp -m udp --dport 500 -m comment --comment "!fw3: Allow-ISAKMP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -j MINIUPNPD
-A zone_wan_forward -j MINIUPNPD
-A zone_wan_forward -m comment --comment "!fw3" -j zone_wan_dest_REJECT
-A zone_wan_input -m comment --comment "!fw3: Custom wan input rule chain" -j input_wan_rule
-A zone_wan_input -s fc00::/6 -d fc00::/6 -p udp -m udp --dport 546 -m comment --comment "!fw3: Allow-DHCPv6" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 130/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 131/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 132/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 143/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 128 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 129 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 2 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 3 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 4/0 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 4/1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 133 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 135 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 134 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 136 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p tcp -m tcp --dport 8897 -m comment --comment "!fw3: linkease" -j ACCEPT
-A zone_wan_input -j MINIUPNPD
-A zone_wan_input -j MINIUPNPD
-A zone_wan_input -m comment --comment "!fw3" -j zone_wan_src_DROP
-A zone_wan_output -m comment --comment "!fw3: Custom wan output rule chain" -j output_wan_rule
-A zone_wan_output -m comment --comment "!fw3" -j zone_wan_dest_ACCEPT
-A zone_wan_src_DROP -i pppoe-wan -m comment --comment "!fw3" -j DROP
-A zone_wan_src_DROP -i eth0 -m comment --comment "!fw3" -j DROP
COMMIT
# Completed on Sun Apr  2 05:16:45 2023

#===================== IPSET状态 =====================#

Name: china
Name: china_ip_route
Name: china_ip_route_pass
Name: localnetwork

#===================== 路由表状态 =====================#

#route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
0.0.0.0         10.95.192.1     0.0.0.0         UG    0      0        0 pppoe-wan
10.95.192.1     0.0.0.0         255.255.255.255 UH    0      0        0 pppoe-wan
172.17.0.0      0.0.0.0         255.255.0.0     U     0      0        0 docker0
192.168.1.0     0.0.0.0         255.255.255.0   U     0      0        0 br-lan
198.18.0.0      0.0.0.0         255.255.0.0     U     0      0        0 utun
#ip route list
default via 10.95.192.1 dev pppoe-wan proto static 
10.95.192.1 dev pppoe-wan proto kernel scope link src *WAN IP*.39 
172.17.0.0/16 dev docker0 proto kernel scope link src 172.17.0.1 linkdown 
192.168.1.0/24 dev br-lan proto kernel scope link src 192.168.1.251 
198.18.0.0/16 dev utun proto kernel scope link src 198.18.0.1 
#ip rule show
0:  from all lookup local
32765:  from all fwmark 0x162 lookup 354
32766:  from all lookup main
32767:  from all lookup default

#===================== Tun设备状态 =====================#

utun: tun pi filter0x100

#===================== 端口占用状态 =====================#

tcp        0      0 198.18.0.1:7777         0.0.0.0:*               LISTEN      24315/clash
tcp        0      0 :::7890                 :::*                    LISTEN      24315/clash
tcp        0      0 :::7891                 :::*                    LISTEN      24315/clash
tcp        0      0 :::7892                 :::*                    LISTEN      24315/clash
tcp        0      0 :::7893                 :::*                    LISTEN      24315/clash
tcp        0      0 :::7895                 :::*                    LISTEN      24315/clash
tcp        0      0 :::9090                 :::*                    LISTEN      24315/clash
udp        0      0 :::34282                :::*                                24315/clash
udp        0      0 :::55083                :::*                                24315/clash
udp        0      0 :::38771                :::*                                24315/clash
udp        0      0 :::51327                :::*                                24315/clash
udp        0      0 :::51365                :::*                                24315/clash
udp        0      0 :::51631                :::*                                24315/clash
udp        0      0 :::35285                :::*                                24315/clash
udp        0      0 :::52131                :::*                                24315/clash
udp        0      0 :::60360                :::*                                24315/clash
udp        0      0 :::39979                :::*                                24315/clash
udp        0      0 :::48277                :::*                                24315/clash
udp        0      0 :::56834                :::*                                24315/clash
udp        0      0 :::52920                :::*                                24315/clash
udp        0      0 :::7874                 :::*                                24315/clash
udp        0      0 :::52931                :::*                                24315/clash
udp        0      0 :::7891                 :::*                                24315/clash
udp        0      0 :::7892                 :::*                                24315/clash
udp        0      0 :::7893                 :::*                                24315/clash
udp        0      0 :::7895                 :::*                                24315/clash
udp        0      0 :::57154                :::*                                24315/clash
udp        0      0 :::57365                :::*                                24315/clash
udp        0      0 :::57723                :::*                                24315/clash
udp        0      0 :::33178                :::*                                24315/clash
udp        0      0 :::33326                :::*                                24315/clash
udp        0      0 :::49790                :::*                                24315/clash
udp        0      0 :::33434                :::*                                24315/clash
udp        0      0 :::45821                :::*                                24315/clash
udp        0      0 :::37686                :::*                                24315/clash
udp        0      0 :::45908                :::*                                24315/clash
udp        0      0 :::54111                :::*                                24315/clash
udp        0      0 :::46075                :::*                                24315/clash
udp        0      0 :::34131                :::*                                24315/clash

#===================== 测试本机DNS查询(www.baidu.com) =====================#

Server:     127.0.0.1
Address:    127.0.0.1#53

Name:      www.baidu.com
Address 1: 198.18.0.4
*** Can't find www.baidu.com: No answer

#===================== 测试内核DNS查询(www.instagram.com) =====================#

Status: 0
TC: false
RD: true
RA: true
AD: false
CD: false

Question: 
  Name: www.instagram.com.
  Qtype: 1
  Qclass: 1

Answer: 
  TTL: 3536
  data: geo-p42.instagram.com.
  name: www.instagram.com.
  type: 5

  TTL: 3536
  data: z-p42-instagram.c10r.instagram.com.
  name: geo-p42.instagram.com.
  type: 5

  TTL: 3536
  data: 157.240.22.174
  name: z-p42-instagram.c10r.instagram.com.
  type: 1

#===================== resolv.conf.d =====================#

# Interface wan
nameserver 223.5.5.5
nameserver 223.6.6.6
# Interface wan_6

#===================== 测试本机网络连接(www.baidu.com) =====================#

HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: private, no-cache, no-store, proxy-revalidate, no-transform
Connection: keep-alive
Content-Length: 277
Content-Type: text/html
Date: Sat, 01 Apr 2023 21:16:46 GMT
Etag: "575e1f60-115"
Last-Modified: Mon, 13 Jun 2016 02:50:08 GMT
Pragma: no-cache
Server: bfe/1.0.8.18

#===================== 测试本机网络下载(raw.githubusercontent.com) =====================#

HTTP/2 200 
cache-control: max-age=300
content-security-policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
content-type: text/plain; charset=utf-8
etag: "275ce7c4d332951875158904a2c8128e7ea40f4ae5057d32acf9f67754ef0e71"
strict-transport-security: max-age=31536000
x-content-type-options: nosniff
x-frame-options: deny
x-xss-protection: 1; mode=block
x-github-request-id: 6118:EA96:5C33E6:5F815D:641E2F7C
accept-ranges: bytes
date: Sat, 01 Apr 2023 21:16:46 GMT
via: 1.1 varnish
x-served-by: cache-mrs10525-MRS
x-cache: HIT
x-cache-hits: 1
x-timer: S1680383807.883656,VS0,VE1
vary: Authorization,Accept-Encoding,Origin
access-control-allow-origin: *
x-fastly-request-id: 1b5c124c3ae4864bcdb66b51295a95bb301efcf3
expires: Sat, 01 Apr 2023 21:21:46 GMT
source-age: 236
content-length: 83

#===================== 最近运行日志(自动切换为Debug模式) =====================#

2023-04-02 05:10:15 Tip: DNS Hijacking Mode is Dnsmasq Redirect...
2023-04-02 05:10:16 Tip: Start Add Port Bypassing Rules For Firewall Redirect and Firewall Rules...
2023-04-02 05:10:16 Tip: Start Add Custom Firewall Rules...
2023-04-02 05:10:16 Step 8: Restart Dnsmasq...
2023-04-02 05:10:18 Step 9: Add Cron Rules, Start Daemons...
2023-04-02 05:10:18 Warning: OpenClash Start Successful, Please Note That Network May Abnormal With IPv6's DHCP Server
2023-04-02 05:13:22 Reload OpenClash Firewall Rules...
2023-04-02 05:13:26 Tip: DNS Hijacking Mode is Dnsmasq Redirect...
2023-04-02 05:13:26 Tip: Start Add Port Bypassing Rules For Firewall Redirect and Firewall Rules...
2023-04-02 05:13:26 Tip: Start Add Custom Firewall Rules...
2023-04-02 05:13:56 Reload OpenClash Firewall Rules...
2023-04-02 05:14:00 Tip: DNS Hijacking Mode is Dnsmasq Redirect...
2023-04-02 05:14:00 Tip: Start Add Port Bypassing Rules For Firewall Redirect and Firewall Rules...
2023-04-02 05:14:00 Tip: Start Add Custom Firewall Rules...
2023-04-02 05:14:46 OpenClash Restart...
2023-04-02 05:14:46 OpenClash Stoping...
2023-04-02 05:14:46 Step 1: Backup The Current Groups State...
2023-04-02 05:14:46 Step 2: Delete OpenClash Firewall Rules...
2023-04-02 05:14:47 Step 3: Close The OpenClash Daemons...
2023-04-02 05:14:47 Step 4: Close The Clash Core Process...
2023-04-02 05:14:47 Step 5: Restart Dnsmasq...
2023-04-02 05:14:50 Step 6: Delete OpenClash Residue File...
2023-04-02 05:14:50 OpenClash Start Running...
2023-04-02 05:14:50 Step 1: Get The Configuration...
2023-04-02 05:14:50 Step 2: Check The Components...
2023-04-02 05:14:51 Tip: Because of the file【 /etc/config/openclash 】modificated, Pause quick start...
2023-04-02 05:14:51 Step 3: Modify The Config File...
2023-04-02 05:14:51 Tip: You have seted the authentication of SOCKS5/HTTP(S) proxy with【Clash:83XLJCUX】
2023-04-02 05:14:52 Tip: Start Running Custom Overwrite Scripts...
2023-04-02 05:14:52 Step 4: Start Running The Clash Core...
2023-04-02 05:14:52 Tip: Detected The Exclusive Function of The TUN Core, Use TUN Core to Start...
2023-04-02 05:14:53 Step 5: Check The Core Status...
21:14:54 INF [Config] initial compatible provider name=??其他流量
21:14:54 INF [Config] initial compatible provider name=??哔哩哔哩
21:14:54 INF [Config] initial compatible provider name=??Youtube
21:14:54 INF [Config] initial compatible provider name=??直接连接
21:14:54 INF [Config] initial compatible provider name=??国外流量
21:14:54 INF [Config] initial compatible provider name=??Netflix
21:14:54 INF [Config] initial compatible provider name=??Telegram
21:14:54 INF [Config] initial compatible provider name=??国外媒体
21:14:54 INF [Config] initial compatible provider name=??苹果服务
2023-04-02 05:14:56 Step 6: Wait For The File Downloading...
2023-04-02 05:14:56 Step 7: Set Firewall Rules...
2023-04-02 05:14:56 Tip: DNS Hijacking Mode is Dnsmasq Redirect...
2023-04-02 05:14:56 Tip: Waiting for TUN Interface Start...
2023-04-02 05:14:56 Tip: Start Add Port Bypassing Rules For Firewall Redirect and Firewall Rules...
2023-04-02 05:14:56 Tip: Start Add Custom Firewall Rules...
2023-04-02 05:14:56 Step 8: Restart Dnsmasq...
2023-04-02 05:14:59 Step 9: Add Cron Rules, Start Daemons...
2023-04-02 05:14:59 Warning: OpenClash Start Successful, Please Note That Network May Abnormal With IPv6's DHCP Server
21:16:27 DBG [TCP] accept connection lAddr=192.168.1.148:48939 rAddr=121.5.96.248:443 inbound=TUN
21:16:27 INF [TCP] connected lAddr=192.168.1.148:48939 rAddr=121.5.96.248:443 mode=global
21:16:28 DBG [TCP] accept connection lAddr=192.168.1.103:7400 rAddr=alive.github.com:443 inbound=TUN
21:16:28 INF [TCP] connected lAddr=192.168.1.103:7400 rAddr=alive.github.com:443 mode=global
21:16:32 DBG [TCP] accept connection lAddr=192.168.1.103:7406 rAddr=cgi.find.qq.com:443 inbound=TUN
21:16:32 DBG [TCP] accept connection lAddr=192.168.1.103:7407 rAddr=cgi.qqweb.qq.com:443 inbound=TUN
21:16:32 INF [TCP] connected lAddr=192.168.1.103:7407 rAddr=cgi.qqweb.qq.com:443 mode=global
21:16:32 INF [TCP] connected lAddr=192.168.1.103:7406 rAddr=cgi.find.qq.com:443 mode=global
21:16:33 DBG [TCP] accept connection lAddr=192.168.1.154:49332 rAddr=api.miwifi.com:443 inbound=TUN
21:16:33 INF [TCP] connected lAddr=192.168.1.154:49332 rAddr=api.miwifi.com:443 mode=global
21:16:34 DBG [TCP] accept connection lAddr=192.168.1.103:7410 rAddr=showxml.qq.com:443 inbound=TUN
21:16:34 INF [TCP] connected lAddr=192.168.1.103:7410 rAddr=showxml.qq.com:443 mode=global
21:16:34 DBG [TCP] accept connection lAddr=192.168.1.103:7412 rAddr=showxml.qq.com:443 inbound=TUN
21:16:34 INF [TCP] connected lAddr=192.168.1.103:7412 rAddr=showxml.qq.com:443 mode=global
21:16:36 DBG [TCP] accept connection lAddr=192.168.1.103:7414 rAddr=220.194.81.125:80 inbound=TUN
21:16:36 DBG [TCP] accept connection lAddr=192.168.1.103:7415 rAddr=157.148.36.88:14000 inbound=TUN
21:16:36 INF [TCP] connected lAddr=192.168.1.103:7414 rAddr=220.194.81.125:80 mode=global
21:16:36 INF [TCP] connected lAddr=192.168.1.103:7415 rAddr=157.148.36.88:14000 mode=global
21:16:36 DBG [TCP] accept connection lAddr=192.168.1.103:7416 rAddr=157.148.54.48:8080 inbound=TUN
21:16:36 DBG [TCP] accept connection lAddr=192.168.1.103:7417 rAddr=112.86.230.235:443 inbound=TUN
21:16:36 INF [TCP] connected lAddr=192.168.1.103:7417 rAddr=112.86.230.235:443 mode=global
21:16:36 INF [TCP] connected lAddr=192.168.1.103:7416 rAddr=157.148.54.48:8080 mode=global
21:16:50 DBG [UDP] accept session lAddr=192.168.1.149:54326 rAddr=212.1.168.192:54321 inbound=TUN
21:16:50 INF [UDP] connected lAddr=192.168.1.149:54326 rAddr=212.1.168.192:54321 mode=global
21:16:50 DBG [TCP] accept connection lAddr=192.168.1.103:9642 rAddr=hongkong11032.discord.media:443 inbound=TUN
21:16:50 DBG [TCP] accept connection lAddr=192.168.1.103:4847 rAddr=hongkong11050.discord.media:443 inbound=TUN
21:16:50 INF [TCP] connected lAddr=192.168.1.103:9642 rAddr=hongkong11032.discord.media:443 mode=global
21:16:50 INF [TCP] connected lAddr=192.168.1.103:4847 rAddr=hongkong11050.discord.media:443 mode=global
21:16:51 DBG [UDP] accept session lAddr=192.168.1.103:53073 rAddr=35.215.153.244:50008 inbound=TUN
21:16:51 INF [UDP] connected lAddr=192.168.1.103:53073 rAddr=35.215.153.244:50008 mode=global
21:16:51 DBG [UDP] accept session lAddr=192.168.1.103:53074 rAddr=35.215.153.244:50008 inbound=TUN
21:16:51 INF [UDP] connected lAddr=192.168.1.103:53074 rAddr=35.215.153.244:50008 mode=global
21:16:54 DBG [TCP] accept connection lAddr=192.168.1.103:4851 rAddr=www.googleapis.com:443 inbound=TUN
21:16:54 INF [TCP] connected lAddr=192.168.1.103:4851 rAddr=www.googleapis.com:443 mode=global
21:16:54 DBG [TCP] accept connection lAddr=192.168.1.103:4853 rAddr=imap.gmail.com:993 inbound=TUN
21:16:54 INF [TCP] connected lAddr=192.168.1.103:4853 rAddr=imap.gmail.com:993 mode=global
21:16:55 DBG [TCP] accept connection lAddr=192.168.1.103:4854 rAddr=static-pcs-sdk-server.alibaba.com:80 inbound=TUN
21:16:55 INF [TCP] connected lAddr=192.168.1.103:4854 rAddr=static-pcs-sdk-server.alibaba.com:80 mode=global
21:16:55 DBG [TCP] accept connection lAddr=192.168.1.103:8075 rAddr=hongkong11050.discord.media:443 inbound=TUN
21:16:55 DBG [TCP] accept connection lAddr=192.168.1.103:1221 rAddr=hongkong11058.discord.media:443 inbound=TUN
21:16:55 INF [TCP] connected lAddr=192.168.1.103:8075 rAddr=hongkong11050.discord.media:443 mode=global
21:16:55 INF [TCP] connected lAddr=192.168.1.103:1221 rAddr=hongkong11058.discord.media:443 mode=global
21:16:55 DBG [UDP] accept session lAddr=192.168.1.103:52882 rAddr=35.215.177.50:50003 inbound=TUN
21:16:55 DBG [UDP] accept session lAddr=192.168.1.103:52883 rAddr=35.215.177.50:50003 inbound=TUN
21:16:55 INF [UDP] connected lAddr=192.168.1.103:52883 rAddr=35.215.177.50:50003 mode=global
21:16:55 INF [UDP] connected lAddr=192.168.1.103:52882 rAddr=35.215.177.50:50003 mode=global
21:16:56 DBG [TCP] accept connection lAddr=192.168.1.103:1223 rAddr=aegis.qq.com:443 inbound=TUN
21:16:56 INF [TCP] connected lAddr=192.168.1.103:1223 rAddr=aegis.qq.com:443 mode=global
21:16:56 DBG [TCP] accept connection lAddr=192.168.1.154:49360 rAddr=api.miwifi.com:443 inbound=TUN
21:16:56 INF [TCP] connected lAddr=192.168.1.154:49360 rAddr=api.miwifi.com:443 mode=global

#===================== 最近运行日志获取完成(自动切换为silent模式) =====================#

#===================== 活动连接信息 =====================#

1. SourceIP:【192.168.1.103】 - Host:【s1.music.126.net】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【126.net】 - Lastchain:【DIRECT】
2. SourceIP:【192.168.1.103】 - Host:【ws.game.qq.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【qq.com】 - Lastchain:【DIRECT】
3. SourceIP:【192.168.1.103】 - Host:【cgi.find.qq.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 02 1Gbps HBO TVB】
4. SourceIP:【192.168.1.103】 - Host:【api-ipv4.ip.sb】 - DestinationIP:【104.26.12.31】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 01 1Gbps HBO TVB】
5. SourceIP:【192.168.1.103】 - Host:【hongkong11032.discord.media】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 02 1Gbps HBO TVB】
6. SourceIP:【192.168.1.103】 - Host:【Empty】 - DestinationIP:【35.215.153.244】 - Network:【udp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 02 1Gbps HBO TVB】
7. SourceIP:【192.168.1.103】 - Host:【dns.google】 - DestinationIP:【8.8.8.8】 - Network:【tcp】 - RulePayload:【google】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 01 1Gbps HBO TVB】
8. SourceIP:【192.168.1.206】 - Host:【Empty】 - DestinationIP:【58.254.154.234】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
9. SourceIP:【192.168.1.103】 - Host:【Empty】 - DestinationIP:【157.148.57.39】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
10. SourceIP:【192.168.1.210】 - Host:【Empty】 - DestinationIP:【60.28.217.96】 - Network:【udp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
11. SourceIP:【192.168.1.145】 - Host:【Empty】 - DestinationIP:【47.114.176.28】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
12. SourceIP:【192.168.1.206】 - Host:【Empty】 - DestinationIP:【58.254.154.240】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
13. SourceIP:【192.168.1.103】 - Host:【Empty】 - DestinationIP:【122.96.96.225】 - Network:【udp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
14. SourceIP:【192.168.1.103】 - Host:【hn1-sgp.lol.qq.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【qq.com】 - Lastchain:【DIRECT】
15. SourceIP:【192.168.1.103】 - Host:【Empty】 - DestinationIP:【157.255.202.50】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
16. SourceIP:【192.168.1.206】 - Host:【Empty】 - DestinationIP:【60.28.217.97】 - Network:【udp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
17. SourceIP:【192.168.1.103】 - Host:【Empty】 - DestinationIP:【157.148.45.141】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
18. SourceIP:【192.168.1.103】 - Host:【www.wegame.com.cn】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【cn】 - Lastchain:【DIRECT】
19. SourceIP:【192.168.1.103】 - Host:【docs2.gtimg.com】 - DestinationIP:【101.33.17.56】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 02 1Gbps HBO TVB】
20. SourceIP:【192.168.1.149】 - Host:【Empty】 - DestinationIP:【212.1.168.192】 - Network:【udp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 02 1Gbps HBO TVB】
21. SourceIP:【192.168.1.103】 - Host:【dns.google】 - DestinationIP:【8.8.8.8】 - Network:【tcp】 - RulePayload:【google】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 01 1Gbps HBO TVB】
22. SourceIP:【192.168.1.206】 - Host:【Empty】 - DestinationIP:【58.83.177.44】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
23. SourceIP:【192.168.1.103】 - Host:【Empty】 - DestinationIP:【119.29.50.47】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
24. SourceIP:【192.168.1.103】 - Host:【hn1-sz-ejabberd.lol.qq.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【qq.com】 - Lastchain:【DIRECT】
25. SourceIP:【192.168.1.103】 - Host:【aegis.qq.com】 - DestinationIP:【43.137.221.145】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 02 1Gbps HBO TVB】
26. SourceIP:【192.168.1.103】 - Host:【www.baidu.com】 - DestinationIP:【157.148.69.80】 - Network:【tcp】 - RulePayload:【baidu.com】 - Lastchain:【DIRECT】
27. SourceIP:【192.168.1.210】 - Host:【Empty】 - DestinationIP:【58.254.154.252】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
28. SourceIP:【192.168.1.100】 - Host:【Empty】 - DestinationIP:【47.241.18.58】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 01 1Gbps HBO TVB】
29. SourceIP:【192.168.1.103】 - Host:【Empty】 - DestinationIP:【58.60.10.45】 - Network:【udp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
30. SourceIP:【192.168.1.103】 - Host:【report.idqqimg.com】 - DestinationIP:【203.205.239.166】 - Network:【tcp】 - RulePayload:【idqqimg.com】 - Lastchain:【DIRECT】
31. SourceIP:【192.168.1.103】 - Host:【hongkong11050.discord.media】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 02 1Gbps HBO TVB】
32. SourceIP:【192.168.1.133】 - Host:【Empty】 - DestinationIP:【5.79.108.34】 - Network:【udp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 02 1Gbps HBO TVB】
33. SourceIP:【192.168.1.103】 - Host:【functional.events.data.microsoft.com】 - DestinationIP:【20.50.201.195】 - Network:【tcp】 - RulePayload:【microsoft.com】 - Lastchain:【DIRECT】
34. SourceIP:【192.168.1.103】 - Host:【report.idqqimg.com】 - DestinationIP:【203.205.239.166】 - Network:【tcp】 - RulePayload:【idqqimg.com】 - Lastchain:【DIRECT】
35. SourceIP:【192.168.1.103】 - Host:【huanghome-my.sharepoint.com】 - DestinationIP:【13.107.138.8】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 01 1Gbps HBO TVB】
36. SourceIP:【192.168.1.103】 - Host:【cgi.qqweb.qq.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 02 1Gbps HBO TVB】
37. SourceIP:【192.168.1.103】 - Host:【Empty】 - DestinationIP:【35.215.182.186】 - Network:【udp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 01 1Gbps HBO TVB】
38. SourceIP:【192.168.1.206】 - Host:【Empty】 - DestinationIP:【111.202.1.250】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
39. SourceIP:【192.168.1.166】 - Host:【Empty】 - DestinationIP:【58.254.154.252】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
40. SourceIP:【192.168.1.103】 - Host:【Empty】 - DestinationIP:【157.255.4.240】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
41. SourceIP:【192.168.1.149】 - Host:【Empty】 - DestinationIP:【58.254.154.234】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
42. SourceIP:【192.168.1.198】 - Host:【Empty】 - DestinationIP:【183.84.5.43】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
43. SourceIP:【192.168.1.103】 - Host:【Empty】 - DestinationIP:【220.194.81.125】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 02 1Gbps HBO TVB】
44. SourceIP:【192.168.1.103】 - Host:【rs1.qq.com】 - DestinationIP:【0.0.0.1】 - Network:【udp】 - RulePayload:【qq.com】 - Lastchain:【DIRECT】
45. SourceIP:【192.168.1.154】 - Host:【Empty】 - DestinationIP:【183.84.7.200】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
46. SourceIP:【192.168.1.103】 - Host:【www.youtube.com】 - DestinationIP:【172.217.175.110】 - Network:【tcp】 - RulePayload:【youtube.com】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 01 1Gbps HBO TVB】
47. SourceIP:【192.168.1.103】 - Host:【a.nel.cloudflare.com】 - DestinationIP:【35.190.80.1】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 01 1Gbps HBO TVB】
48. SourceIP:【192.168.1.103】 - Host:【Empty】 - DestinationIP:【35.215.166.242】 - Network:【udp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 02 1Gbps HBO TVB】
49. SourceIP:【192.168.1.103】 - Host:【Empty】 - DestinationIP:【35.215.153.244】 - Network:【udp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 02 1Gbps HBO TVB】
50. SourceIP:【192.168.1.208】 - Host:【Empty】 - DestinationIP:【58.254.154.234】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
51. SourceIP:【192.168.1.103】 - Host:【tqos.gamesafe.qq.com】 - DestinationIP:【122.96.96.225】 - Network:【udp】 - RulePayload:【qq.com】 - Lastchain:【DIRECT】
52. SourceIP:【192.168.1.103】 - Host:【www.googleapis.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 02 1Gbps HBO TVB】
53. SourceIP:【192.168.1.242】 - Host:【Empty】 - DestinationIP:【58.83.177.195】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
54. SourceIP:【192.168.1.166】 - Host:【product.smarthome.iot.mi.com】 - DestinationIP:【120.133.33.88】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
55. SourceIP:【192.168.1.210】 - Host:【Empty】 - DestinationIP:【183.84.5.229】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
56. SourceIP:【192.168.1.103】 - Host:【discord.com】 - DestinationIP:【162.159.135.232】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 01 1Gbps HBO TVB】
57. SourceIP:【192.168.1.103】 - Host:【Empty】 - DestinationIP:【35.215.177.50】 - Network:【udp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 02 1Gbps HBO TVB】
58. SourceIP:【192.168.1.103】 - Host:【Empty】 - DestinationIP:【35.215.182.186】 - Network:【udp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 01 1Gbps HBO TVB】
59. SourceIP:【192.168.1.196】 - Host:【Empty】 - DestinationIP:【58.254.154.252】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
60. SourceIP:【192.168.1.103】 - Host:【Empty】 - DestinationIP:【35.215.188.204】 - Network:【udp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 02 1Gbps HBO TVB】
61. SourceIP:【192.168.1.103】 - Host:【alive.github.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 02 1Gbps HBO TVB】
62. SourceIP:【192.168.1.103】 - Host:【hn1-sz-feapp.lol.qq.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【qq.com】 - Lastchain:【DIRECT】
63. SourceIP:【192.168.1.210】 - Host:【Empty】 - DestinationIP:【60.28.217.96】 - Network:【udp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
64. SourceIP:【192.168.1.103】 - Host:【Empty】 - DestinationIP:【113.96.233.163】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
65. SourceIP:【192.168.1.103】 - Host:【Empty】 - DestinationIP:【35.215.182.186】 - Network:【udp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 02 1Gbps HBO TVB】
66. SourceIP:【192.168.1.103】 - Host:【Empty】 - DestinationIP:【157.148.45.141】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
67. SourceIP:【192.168.1.133】 - Host:【Empty】 - DestinationIP:【183.84.6.20】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
68. SourceIP:【192.168.1.148】 - Host:【Empty】 - DestinationIP:【42.192.31.13】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
69. SourceIP:【192.168.1.103】 - Host:【d.skk.moe】 - DestinationIP:【104.16.19.35】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 01 1Gbps HBO TVB】
70. SourceIP:【192.168.1.147】 - Host:【Empty】 - DestinationIP:【108.59.2.24】 - Network:【udp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 01 1Gbps HBO TVB】
71. SourceIP:【192.168.1.198】 - Host:【Empty】 - DestinationIP:【60.28.217.96】 - Network:【udp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
72. SourceIP:【192.168.1.103】 - Host:【Empty】 - DestinationIP:【163.177.30.32】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
73. SourceIP:【192.168.1.145】 - Host:【Empty】 - DestinationIP:【47.114.176.28】 - Network:【udp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 02 1Gbps HBO TVB】
74. SourceIP:【192.168.1.103】 - Host:【github.com】 - DestinationIP:【20.205.243.166】 - Network:【tcp】 - RulePayload:【github】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 01 1Gbps HBO TVB】
75. SourceIP:【192.168.1.125】 - Host:【Empty】 - DestinationIP:【8.214.89.135】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
76. SourceIP:【192.168.1.103】 - Host:【sz-rms-bcs.lol.qq.com】 - DestinationIP:【157.255.196.83】 - Network:【tcp】 - RulePayload:【qq.com】 - Lastchain:【DIRECT】
77. SourceIP:【192.168.1.103】 - Host:【Empty】 - DestinationIP:【35.215.188.204】 - Network:【udp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 02 1Gbps HBO TVB】
78. SourceIP:【192.168.1.103】 - Host:【hongkong11058.discord.media】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 02 1Gbps HBO TVB】
79. SourceIP:【192.168.1.103】 - Host:【ext4-hkg1.steamserver.net】 - DestinationIP:【103.28.54.178】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 01 1Gbps HBO TVB】
80. SourceIP:【192.168.1.103】 - Host:【api.ipify.org】 - DestinationIP:【64.185.227.155】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 01 1Gbps HBO TVB】
81. SourceIP:【192.168.1.103】 - Host:【imap.gmail.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 02 1Gbps HBO TVB】
82. SourceIP:【192.168.1.103】 - Host:【static-pcs-sdk-server.alibaba.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 02 1Gbps HBO TVB】
83. SourceIP:【192.168.1.210】 - Host:【Empty】 - DestinationIP:【58.254.154.240】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
84. SourceIP:【192.168.1.206】 - Host:【Empty】 - DestinationIP:【60.28.217.97】 - Network:【udp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
85. SourceIP:【192.168.1.103】 - Host:【Empty】 - DestinationIP:【35.215.182.186】 - Network:【udp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 02 1Gbps HBO TVB】
86. SourceIP:【192.168.1.103】 - Host:【pub.idqqimg.com】 - DestinationIP:【203.205.137.181】 - Network:【tcp】 - RulePayload:【idqqimg.com】 - Lastchain:【DIRECT】
87. SourceIP:【192.168.1.136】 - Host:【Empty】 - DestinationIP:【118.212.146.33】 - Network:【udp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
88. SourceIP:【192.168.1.103】 - Host:【skydrive.wns.windows.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【windows.com】 - Lastchain:【DIRECT】
89. SourceIP:【192.168.1.103】 - Host:【dns.google】 - DestinationIP:【8.8.8.8】 - Network:【tcp】 - RulePayload:【google】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 01 1Gbps HBO TVB】
90. SourceIP:【192.168.1.103】 - Host:【gateway-us-east1-b.discord.gg】 - DestinationIP:【199.16.156.11】 - Network:【tcp】 - RulePayload:【discord.gg】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 01 1Gbps HBO TVB】
91. SourceIP:【192.168.1.103】 - Host:【www.taobao.com】 - DestinationIP:【163.179.228.108】 - Network:【tcp】 - RulePayload:【taobao.com】 - Lastchain:【DIRECT】
92. SourceIP:【192.168.1.103】 - Host:【qqwry.api.skk.moe】 - DestinationIP:【172.67.148.227】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 01 1Gbps HBO TVB】
93. SourceIP:【192.168.1.147】 - Host:【Empty】 - DestinationIP:【183.84.6.19】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
94. SourceIP:【192.168.1.128】 - Host:【Empty】 - DestinationIP:【58.254.154.234】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
95. SourceIP:【192.168.1.103】 - Host:【cschannel.anticheatexpert.com】 - DestinationIP:【157.148.45.163】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
96. SourceIP:【192.168.1.198】 - Host:【Empty】 - DestinationIP:【58.254.154.234】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
97. SourceIP:【192.168.1.147】 - Host:【Empty】 - DestinationIP:【194.186.237.38】 - Network:【udp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 02 1Gbps HBO TVB】
98. SourceIP:【192.168.1.198】 - Host:【Empty】 - DestinationIP:【60.28.217.96】 - Network:【udp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
99. SourceIP:【192.168.1.103】 - Host:【docs.qq.com】 - DestinationIP:【203.205.254.103】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 02 1Gbps HBO TVB】
100. SourceIP:【192.168.1.154】 - Host:【api.miwifi.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 02 1Gbps HBO TVB】
101. SourceIP:【192.168.1.103】 - Host:【skydrive.wns.windows.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【windows.com】 - Lastchain:【DIRECT】
102. SourceIP:【192.168.1.103】 - Host:【whois.pconline.com.cn】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【cn】 - Lastchain:【DIRECT】
103. SourceIP:【192.168.1.103】 - Host:【Empty】 - DestinationIP:【112.86.230.235】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 02 1Gbps HBO TVB】
104. SourceIP:【192.168.1.124】 - Host:【Empty】 - DestinationIP:【123.125.103.143】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
105. SourceIP:【192.168.1.136】 - Host:【g-aicloud.alibaba.com】 - DestinationIP:【59.82.112.126】 - Network:【tcp】 - RulePayload:【alibaba.com】 - Lastchain:【DIRECT】
106. SourceIP:【192.168.1.170】 - Host:【Empty】 - DestinationIP:【58.254.154.234】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
107. SourceIP:【192.168.1.210】 - Host:【Empty】 - DestinationIP:【36.156.49.104】 - Network:【udp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 02 1Gbps HBO TVB】
108. SourceIP:【192.168.1.103】 - Host:【Empty】 - DestinationIP:【35.215.177.50】 - Network:【udp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 02 1Gbps HBO TVB】
109. SourceIP:【192.168.1.198】 - Host:【Empty】 - DestinationIP:【111.202.1.248】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
110. SourceIP:【192.168.1.103】 - Host:【dns.google】 - DestinationIP:【8.8.8.8】 - Network:【tcp】 - RulePayload:【google】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 01 1Gbps HBO TVB】
111. SourceIP:【192.168.1.103】 - Host:【Empty】 - DestinationIP:【36.155.249.12】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
112. SourceIP:【192.168.1.166】 - Host:【product.smarthome.iot.mi.com】 - DestinationIP:【120.133.33.88】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
113. SourceIP:【192.168.1.121】 - Host:【Empty】 - DestinationIP:【163.177.29.77】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
114. SourceIP:【192.168.1.198】 - Host:【Empty】 - DestinationIP:【58.254.154.240】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
115. SourceIP:【192.168.1.103】 - Host:【Empty】 - DestinationIP:【35.215.166.242】 - Network:【udp】 - RulePayload:【】 - Lastchain:【中国-香港 IEPL Equinix HK2 D 02 1Gbps HBO TVB】
116. SourceIP:【192.168.1.212】 - Host:【Empty】 - DestinationIP:【123.125.103.143】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
gangxing1996 commented 1 year ago

i have same issue with openclash and discord. QAQ

vernesong commented 1 year ago

用redir模式,开全局去进房间

github-actions[bot] commented 1 year ago

This issue is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 5 days

fengshuo2004 commented 1 year ago

我也遇到了这个问题。

通过内核日志,可以看到 Discord 的流量正确地被分配到走代理(而不是直连),证明不是规则配置的问题:

2023-06-26 07:58:17 level=info msg="[UDP] 192.168.100.226:56158 --> 35.215.138.188:50005 match Match() using Others[V4-357|台湾|x2.0]"
2023-06-26 07:58:17 level=info msg="[UDP] 192.168.100.226:56159 --> 35.215.138.188:50005 match Match() using Others[V4-357|台湾|x2.0]"
2023-06-26 07:58:16 level=info msg="[TCP] 192.168.100.226:52217 --> hongkong11014.discord.media:443 match Match() using Others[V4-357|台湾|x2.0]"
2023-06-26 07:58:14 level=info msg="[TCP] 192.168.100.226:52216 --> discord.com:443 match IPCIDR(157.240.0.0/17) using Proxy[V4-357|台湾|x2.0]"
2023-06-26 07:58:13 level=info msg="[TCP] 192.168.100.226:52215 --> discord.com:443 match Match() using Others[V4-357|台湾|x2.0]"

那为什么 Discord 语音连不上呢?我之前听说有些 Vmess 节点不代理 UDP,可是我选择一个 ShadowsocksR 节点也连不上啊

fengshuo2004 commented 1 year ago

@CuewarsTaner @gangxing1996 最新版 Discord 好像修好了,至少我这边语音又能用了。你们再看一下。 隐隐约约感觉之前语音出问题是因为 Discord 要搞安全 DNS(又名 DNS-over-HTTP)绕过了 Clash 的 DNS 解析,但是我没有任何证据,哈哈

gloryhui commented 1 year ago

还是不行,只有全局能进语音

CuewarsTaner commented 1 year ago

时隔很多天,问题还是一样的。 和楼上不同的是,我是使用Redir-Host模式,TUN混合(OpenWRT装了Docker)。

ChuXinhao commented 1 year ago

我也是预装了Docker,而且看到有帖子说是Docker引发的,但是卸载并不能解决问题,没有确认真假

github-actions[bot] commented 1 year ago

This issue is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 5 days

CuewarsTaner commented 8 months ago

我找到解决方法了,我用的是iStoreOS,这个Openwrt固件自带Docker(建议不要使用Docker功能)。 在我的iStoreOS里,找到OpenClash的【运行模式】,保持默认的【增强模式】,【UDP流量转发】也不要打钩,这样Discord就能正常观看屏幕和共享屏幕了。 记住不要选【TUN模式】或者【TUN-混合模式】,不然语音房就会连不上。至于【安装Docker的固件游戏流量可能会异常】,我这边没问题。

sqk0232 commented 1 month ago

我找到解决方法了,我用的是iStoreOS,这个Openwrt固件自带Docker(建议不要使用Docker功能)。 在我的iStoreOS里,找到OpenClash的【运行模式】,保持默认的【增强模式】,【UDP流量转发】也不要打钩,这样Discord就能正常观看屏幕和共享屏幕了。 记住不要选【TUN模式】或者【TUN-混合模式】,不然语音房就会连不上。至于【安装Docker的固件游戏流量可能会异常】,我这边没问题。

使用的ImmortalWrt,这个Openwrt默认勾选了UDP流量转发,取消勾选就可以进入了