vernesong / OpenClash

A Clash Client For OpenWrt
MIT License
16.73k stars 3.09k forks source link

[Bug] 网络访问检查那里,上面两行国内网络显示“无法访问”,但其实国内网络是正常的,,, #3286

Closed caliban511 closed 1 year ago

caliban511 commented 1 year ago

Verify Steps

OpenClash Version

v0.45.121-beta

Bug on Environment

Official OpenWrt

Bug on Platform

Linux-amd64(x86-64)

To Reproduce

正常使用就会这样。

Describe the Bug

网速检查这里,上面两项显示无法访问,,,其实上是可以正常访问国内网络的,UI上的显示并不影响实际使用,,,

屏幕截图 2023-05-19 224813

OpenClash Log

OpenClash 调试日志

生成时间: 2023-05-19 22:49:58 插件版本: v0.45.121-beta 隐私提示: 上传此日志前请注意检查、屏蔽公网IP、节点、密码等相关敏感信息


#===================== 系统信息 =====================#

主机型号: QEMU Standard PC (i440FX + PIIX, 1996)
固件版本: OpenWrt 22.03-SNAPSHOT r20145-30fca5413b
LuCI版本: git-23.093.42303-d58cd69
内核版本: 5.10.179
处理器架构: x86_64

#此项有值时,如不使用IPv6,建议到网络-接口-lan的设置中禁用IPV6的DHCP
IPV6-DHCP: server

DNS劫持: Dnsmasq 转发
#DNS劫持为Dnsmasq时,此项结果应仅有配置文件的DNS监听地址
Dnsmasq转发设置: 127.0.0.1#7874

#===================== 依赖检查 =====================#

dnsmasq-full: 已安装
coreutils: 已安装
coreutils-nohup: 已安装
bash: 已安装
curl: 已安装
ca-certificates: 已安装
ipset: 已安装
ip-full: 已安装
libcap: 已安装
libcap-bin: 已安装
ruby: 已安装
ruby-yaml: 已安装
ruby-psych: 已安装
ruby-pstore: 已安装
kmod-tun(TUN模式): 已安装
luci-compat(Luci >= 19.07): 已安装
kmod-inet-diag(PROCESS-NAME): 已安装
unzip: 已安装
kmod-nft-tproxy: 已安装

#===================== 内核检查 =====================#

运行状态: 运行中
运行内核:Dev
进程pid: 6443
运行权限: 6443: cap_dac_override,cap_net_bind_service,cap_net_admin,cap_net_raw,cap_sys_ptrace,cap_sys_resource=eip
运行用户: nobody
已选择的架构: linux-amd64

#下方无法显示内核版本号时请确认您的内核版本是否正确或者有无权限
Tun内核版本: 2023.04.16-20-g212da6a
Tun内核文件: 存在
Tun内核运行权限: 正常

Dev内核版本: v1.15.1-17-g6ecd96e
Dev内核文件: 存在
Dev内核运行权限: 正常

Meta内核版本: alpha-g6b1a438
Meta内核文件: 存在
Meta内核运行权限: 正常

#===================== 插件设置 =====================#

当前配置文件: /etc/openclash/config/prpr-sub.yaml
启动配置文件: /etc/openclash/prpr-sub.yaml
运行模式: redir-host
默认代理模式: rule
UDP流量转发(tproxy): 启用
自定义DNS: 启用
IPV6代理: 启用
IPV6-DNS解析: 启用
禁用Dnsmasq缓存: 启用
自定义规则: 启用
仅允许内网: 启用
仅代理命中规则流量: 启用
仅允许常用端口流量: 停用
绕过中国大陆IP: 启用
路由本机代理: 停用

#启动异常时建议关闭此项后重试
混合节点: 停用
保留配置: 停用

#启动异常时建议关闭此项后重试
第三方规则: 停用

#===================== 自定义规则 一 =====================#
script:
##  shortcuts:
##    Notice: The core timezone is UTC
##    CST 20:00-24:00 = time.now().hour > 12 and time.now().hour < 16
##    内核时区为UTC,故以下time.now()函数的取值需要根据本地时区进行转换
##    北京时间(CST) 20:00-24:00 = time.now().hour > 12 and time.now().hour < 16
##    quic: network == 'udp' and dst_port == 443 and (geoip(resolve_ip(host)) != 'CN' or geoip(dst_ip) != 'CN')
##    time-limit: in_cidr(src_ip,'192.168.1.2/32') and time.now().hour < 20 or time.now().hour > 21
##    time-limit: src_ip == '192.168.1.2' and time.now().hour < 20 or time.now().hour > 21

##  code: |
##    def main(ctx, metadata):
##        directkeywordlist = ["baidu"]
##        for directkeyword in directkeywordlist:
##          if directkeyword in metadata["host"]:
##            ctx.log('[Script] matched keyword %s use direct' % directkeyword)
##            return "DIRECT"

rules:
##- SCRIPT,quic,REJECT #shortcuts rule
##- SCRIPT,time-limit,REJECT #shortcuts rule

##- PROCESS-NAME,curl,DIRECT #匹配路由自身进程(curl直连)
##- DOMAIN-SUFFIX,google.com,Proxy #匹配域名后缀(交由Proxy代理服务器组)
##- DOMAIN-KEYWORD,google,Proxy #匹配域名关键字(交由Proxy代理服务器组)
##- DOMAIN,google.com,Proxy #匹配域名(交由Proxy代理服务器组)
##- DOMAIN-SUFFIX,ad.com,REJECT #匹配域名后缀(拒绝)
##- IP-CIDR,127.0.0.0/8,DIRECT #匹配数据目标IP(直连)
##- SRC-IP-CIDR,192.168.1.201/32,DIRECT #匹配数据发起IP(直连)
##- DST-PORT,80,DIRECT #匹配数据目标端口(直连)
##- SRC-PORT,7777,DIRECT #匹配数据源端口(直连)

##排序在上的规则优先生效,如添加(去除规则前的#号):
##IP段:192.168.1.2-192.168.1.200 直连
##- SRC-IP-CIDR,192.168.1.2/31,DIRECT
##- SRC-IP-CIDR,192.168.1.4/30,DIRECT
##- SRC-IP-CIDR,192.168.1.8/29,DIRECT
##- SRC-IP-CIDR,192.168.1.16/28,DIRECT
##- SRC-IP-CIDR,192.168.1.32/27,DIRECT
##- SRC-IP-CIDR,192.168.1.64/26,DIRECT
##- SRC-IP-CIDR,192.168.1.128/26,DIRECT
##- SRC-IP-CIDR,192.168.1.192/29,DIRECT
##- SRC-IP-CIDR,192.168.1.200/32,DIRECT

##IP段:192.168.1.202-192.168.1.255 直连
##- SRC-IP-CIDR,192.168.1.202/31,DIRECT
##- SRC-IP-CIDR,192.168.1.204/30,DIRECT
##- SRC-IP-CIDR,192.168.1.208/28,DIRECT
##- SRC-IP-CIDR,192.168.1.224/27,DIRECT

##此时IP为192.168.1.1和192.168.1.201的客户端流量走代理(策略),其余客户端不走代理
##因为Fake-IP模式下,IP地址为192.168.1.1的路由器自身流量可走代理(策略),所以需要排除

##仅设置路由器自身直连:
##- SRC-IP-CIDR,192.168.1.1/32,DIRECT
##- SRC-IP-CIDR,198.18.0.1/32,DIRECT

##DDNS
##- DOMAIN-SUFFIX,checkip.dyndns.org,DIRECT
##- DOMAIN-SUFFIX,checkipv6.dyndns.org,DIRECT
##- DOMAIN-SUFFIX,checkip.synology.com,DIRECT
##- DOMAIN-SUFFIX,ifconfig.co,DIRECT
##- DOMAIN-SUFFIX,api.myip.com,DIRECT
##- DOMAIN-SUFFIX,ip-api.com,DIRECT
##- DOMAIN-SUFFIX,ipapi.co,DIRECT
##- DOMAIN-SUFFIX,ip6.seeip.org,DIRECT
##- DOMAIN-SUFFIX,members.3322.org,DIRECT

##在线IP段转CIDR地址:http://ip2cidr.com
#===================== 自定义规则 二 =====================#
script:
##  shortcuts:
##    common_port: dst_port not in [21, 22, 23, 53, 80, 123, 143, 194, 443, 465, 587, 853, 993, 995, 998, 2052, 2053, 2082, 2083, 2086, 2095, 2096, 5222, 5228, 5229, 5230, 8080, 8443, 8880, 8888, 8889]

##  code: |
##    def main(ctx, metadata):
##        directkeywordlist = ["baidu"]
##        for directkeyword in directkeywordlist:
##          if directkeyword in metadata["host"]:
##            ctx.log('[Script] matched keyword %s use direct' % directkeyword)
##            return "DIRECT"

rules:
##- SCRIPT,common_port,DIRECT #shortcuts rule

##- DOMAIN-SUFFIX,google.com,Proxy #匹配域名后缀(交由Proxy代理服务器组)
##- DOMAIN-KEYWORD,google,Proxy #匹配域名关键字(交由Proxy代理服务器组)
##- DOMAIN,google.com,Proxy #匹配域名(交由Proxy代理服务器组)
##- DOMAIN-SUFFIX,ad.com,REJECT #匹配域名后缀(拒绝)
##- IP-CIDR,127.0.0.0/8,DIRECT #匹配数据目标IP(直连)
##- SRC-IP-CIDR,192.168.1.201/32,DIRECT #匹配数据发起IP(直连)
##- DST-PORT,80,DIRECT #匹配数据目标端口(直连)
##- SRC-PORT,7777,DIRECT #匹配数据源端口(直连)

#===================== 配置文件 =====================#

port: 7890
socks-port: 7891
allow-lan: true
mode: rule
log-level: info
external-controller: 0.0.0.0:9090
proxy-groups:

rules:
- DST-PORT,7895,REJECT
- DST-PORT,7892,REJECT
- IP-CIDR,198.18.0.1/16,REJECT,no-resolve
- SRC-IP-CIDR,10.10.10.1/32,DIRECT
- SRC-IP-CIDR,198.18.0.1/16,DIRECT
- DOMAIN-SUFFIX,awesome-hd.me,DIRECT
- DOMAIN-SUFFIX,broadcasthe.net,DIRECT
- DOMAIN-SUFFIX,chdbits.co,DIRECT
- DOMAIN-SUFFIX,classix-unlimited.co.uk,DIRECT
- DOMAIN-SUFFIX,empornium.me,DIRECT
- DOMAIN-SUFFIX,gazellegames.net,DIRECT
- DOMAIN-SUFFIX,hdchina.org,DIRECT
- DOMAIN-SUFFIX,hdsky.me,DIRECT
- DOMAIN-SUFFIX,icetorrent.org,DIRECT
- DOMAIN-SUFFIX,jpopsuki.eu,DIRECT
- DOMAIN-SUFFIX,keepfrds.com,DIRECT
- DOMAIN-SUFFIX,madsrevolution.net,DIRECT
- DOMAIN-SUFFIX,m-team.cc,DIRECT
- DOMAIN-SUFFIX,nanyangpt.com,DIRECT
- DOMAIN-SUFFIX,ncore.cc,DIRECT
- DOMAIN-SUFFIX,open.cd,DIRECT
- DOMAIN-SUFFIX,ourbits.club,DIRECT
- DOMAIN-SUFFIX,passthepopcorn.me,DIRECT
- DOMAIN-SUFFIX,privatehd.to,DIRECT
- DOMAIN-SUFFIX,redacted.ch,DIRECT
- DOMAIN-SUFFIX,springsunday.net,DIRECT
- DOMAIN-SUFFIX,tjupt.org,DIRECT
- DOMAIN-SUFFIX,totheglory.im,DIRECT
- DOMAIN-SUFFIX,smtp,DIRECT
- DOMAIN-KEYWORD,announce,DIRECT
- DOMAIN-KEYWORD,torrent,DIRECT
- DOMAIN-KEYWORD,tracker,DIRECT

- MATCH,DIRECT
redir-port: 7892
tproxy-port: 7895
mixed-port: 7893
bind-address: "*"
external-ui: "/usr/share/openclash/ui"
ipv6: true
interface-name: pppoe-wan
dns:
  enable: true
  ipv6: true
  enhanced-mode: fake-ip
  fake-ip-range: 198.18.0.1/16
  listen: 0.0.0.0:7874
  nameserver:
  - 61.134.1.5
  - 218.30.19.50
  - "[240e:f:a::6]:53"
  - "[240e:f:a00b::6]:53"
  fallback:
  - https://1.1.1.1/dns-query
  - https://1.0.0.1/dns-query
  - "[2606:4700:4700::1111]:53"
  - "[2606:4700:4700::1001]:53"
  default-nameserver:
  - 119.28.28.28
  fake-ip-filter:
  - "+.*"
profile:
  store-selected: true
authentication:
- Clash:w6521BG

#===================== 自定义覆写设置 =====================#

#!/bin/sh
. /usr/share/openclash/ruby.sh
. /usr/share/openclash/log.sh
. /lib/functions.sh

# This script is called by /etc/init.d/openclash
# Add your custom overwrite scripts here, they will be take effict after the OpenClash own srcipts

LOG_OUT "Tip: Start Running Custom Overwrite Scripts..."
LOGTIME=$(echo $(date "+%Y-%m-%d %H:%M:%S"))
LOG_FILE="/tmp/openclash.log"
CONFIG_FILE="$1" #config path

#Simple Demo:
    #General Demo
    #1--config path
    #2--key name
    #3--value
    #ruby_edit "$CONFIG_FILE" "['redir-port']" "7892"
    #ruby_edit "$CONFIG_FILE" "['secret']" "123456"
    #ruby_edit "$CONFIG_FILE" "['dns']['enable']" "true"

    #Hash Demo
    #1--config path
    #2--key name
    #3--hash type value
    #ruby_edit "$CONFIG_FILE" "['experimental']" "{'sniff-tls-sni'=>true}"
    #ruby_edit "$CONFIG_FILE" "['sniffer']" "{'sniffing'=>['tls','http']}"

    #Array Demo:
    #1--config path
    #2--key name
    #3--position(start from 0, end with -1)
    #4--value
    #ruby_arr_insert "$CONFIG_FILE" "['dns']['nameserver']" "0" "114.114.114.114"

    #Array Add From Yaml File Demo:
    #1--config path
    #2--key name
    #3--position(start from 0, end with -1)
    #4--value file path
    #5--value key name in #4 file
    #ruby_arr_add_file "$CONFIG_FILE" "['dns']['fallback-filter']['ipcidr']" "0" "/etc/openclash/custom/openclash_custom_fallback_filter.yaml" "['fallback-filter']['ipcidr']"

#Ruby Script Demo:
    #ruby -ryaml -rYAML -I "/usr/share/openclash" -E UTF-8 -e "
    #   begin
    #      Value = YAML.load_file('$CONFIG_FILE');
    #   rescue Exception => e
    #      puts '${LOGTIME} Error: Load File Failed,【' + e.message + '】';
    #   end;

        #General
    #   begin
    #   Thread.new{
    #      Value['redir-port']=7892;
    #      Value['tproxy-port']=7895;
    #      Value['port']=7890;
    #      Value['socks-port']=7891;
    #      Value['mixed-port']=7893;
    #   }.join;

    #   rescue Exception => e
    #      puts '${LOGTIME} Error: Set General Failed,【' + e.message + '】';
    #   ensure
    #      File.open('$CONFIG_FILE','w') {|f| YAML.dump(Value, f)};
    #   end" 2>/dev/null >> $LOG_FILE

exit 0
#===================== 自定义防火墙设置 =====================#

#!/bin/sh
. /usr/share/openclash/log.sh
. /lib/functions.sh

# This script is called by /etc/init.d/openclash
# Add your custom firewall rules here, they will be added after the end of the OpenClash iptables rules

LOG_OUT "Tip: Start Add Custom Firewall Rules..."

exit 0
#===================== IPTABLES 防火墙设置 =====================#

#IPv4 NAT chain

#IPv4 Mangle chain

#IPv4 Filter chain

#IPv6 NAT chain

#IPv6 Mangle chain

#IPv6 Filter chain

#===================== NFTABLES 防火墙设置 =====================#

table inet fw4 {
    chain input {
        type filter hook input priority filter; policy accept;
        iifname "pppoe-wan" ip6 saddr != @localnetwork6 counter packets 1982 bytes 409984 jump openclash_wan6_input
        udp dport 443 ip6 daddr != @china_ip6_route counter packets 0 bytes 0 reject with icmpv6 port-unreachable comment "OpenClash QUIC REJECT"
        udp dport 443 ip daddr != @china_ip_route counter packets 0 bytes 0 reject with icmp port-unreachable comment "OpenClash QUIC REJECT"
        iifname "pppoe-wan" ip saddr != @localnetwork counter packets 15980 bytes 7294933 jump openclash_wan_input
        iifname "lo" accept comment "!fw4: Accept traffic from loopback"
        ct state established,related accept comment "!fw4: Allow inbound established and related flows"
        tcp flags syn / fin,syn,rst,ack jump syn_flood comment "!fw4: Rate limit TCP syn packets"
        iifname "br-lan" jump input_lan comment "!fw4: Handle lan IPv4/IPv6 input traffic"
        iifname "pppoe-wan" jump input_wan comment "!fw4: Handle wan IPv4/IPv6 input traffic"
    }
}
table inet fw4 {
    chain forward {
        type filter hook forward priority filter; policy drop;
        ct state established,related accept comment "!fw4: Allow forwarded established and related flows"
        iifname "br-lan" jump forward_lan comment "!fw4: Handle lan IPv4/IPv6 forward traffic"
        iifname "pppoe-wan" jump forward_wan comment "!fw4: Handle wan IPv4/IPv6 forward traffic"
        jump upnp_forward comment "Hook into miniupnpd forwarding chain"
        jump handle_reject
    }
}
table inet fw4 {
    chain dstnat {
        type nat hook prerouting priority dstnat; policy accept;
        ip6 daddr { 2001:4860:4860::8844, 2001:4860:4860::8888 } tcp dport 53 counter packets 0 bytes 0 accept comment "OpenClash Google DNS Hijack"
        ip daddr { 8.8.4.4, 8.8.8.8 } tcp dport 53 counter packets 0 bytes 0 redirect to :7892 comment "OpenClash Google DNS Hijack"
        udp dport 53 counter packets 766 bytes 59894 redirect to :53 comment "OpenClash DNS Hijack"
        tcp dport 53 counter packets 0 bytes 0 redirect to :53 comment "OpenClash DNS Hijack"
        iifname "br-lan" jump dstnat_lan comment "!fw4: Handle lan IPv4/IPv6 dstnat traffic"
        iifname "pppoe-wan" jump dstnat_wan comment "!fw4: Handle wan IPv4/IPv6 dstnat traffic"
        jump upnp_prerouting comment "Hook into miniupnpd prerouting chain"
        ip protocol tcp counter packets 7628 bytes 400298 jump openclash
    }
}
table inet fw4 {
    chain srcnat {
        type nat hook postrouting priority srcnat; policy accept;
        oifname "br-lan" jump srcnat_lan comment "!fw4: Handle lan IPv4/IPv6 srcnat traffic"
        oifname "pppoe-wan" jump srcnat_wan comment "!fw4: Handle wan IPv4/IPv6 srcnat traffic"
        jump upnp_postrouting comment "Hook into miniupnpd postrouting chain"
    }
}
table inet fw4 {
    chain nat_output {
        type nat hook output priority filter - 1; policy accept;
        ip protocol tcp counter packets 678 bytes 40680 jump openclash_output
    }
}
table inet fw4 {
    chain mangle_prerouting {
        type filter hook prerouting priority mangle; policy accept;
        ip protocol udp counter packets 10837 bytes 1508876 jump openclash_mangle
        meta nfproto ipv6 counter packets 17548 bytes 2444432 jump openclash_mangle_v6
    }
}
table inet fw4 {
    chain mangle_output {
        type route hook output priority mangle; policy accept;
    }
}
table inet fw4 {
    chain openclash {
        ip daddr @localnetwork counter packets 1551 bytes 81847 return
        tcp dport != @common_ports counter packets 5812 bytes 304204 return
        ip daddr @china_ip_route ip daddr != @china_ip_route_pass counter packets 43 bytes 2461 return
        ip protocol tcp counter packets 231 bytes 12254 redirect to :7892
    }
}
table inet fw4 {
    chain openclash_mangle {
        meta nfproto ipv4 udp sport 500 counter packets 0 bytes 0 return
        meta nfproto ipv4 udp sport 68 counter packets 0 bytes 0 return
        ip saddr 10.10.10.9 udp sport 14483 counter packets 0 bytes 0 return
        ip saddr 10.10.10.9 udp sport 14482 counter packets 0 bytes 0 return
        ip saddr 10.10.10.9 udp sport 14481 counter packets 0 bytes 0 return
        ip saddr 10.10.10.9 udp sport 14480 counter packets 0 bytes 0 return
        ip saddr 10.10.10.1 udp sport 80 counter packets 0 bytes 0 return
        ip saddr 10.10.10.1 udp sport 1448 counter packets 0 bytes 0 return
        ip saddr 10.10.10.10 udp sport 15881 counter packets 0 bytes 0 return
        ip saddr 10.10.10.10 udp sport 18856 counter packets 4697 bytes 601216 return
        ip saddr 10.10.10.10 udp sport 14488 counter packets 0 bytes 0 return
        ip saddr 10.10.10.10 udp sport 14486 counter packets 0 bytes 0 return
        ip daddr @localnetwork counter packets 5860 bytes 898325 return
        udp dport 53 counter packets 0 bytes 0 return
        udp dport != @common_ports counter packets 283 bytes 9624 return
        ip daddr @china_ip_route ip daddr != @china_ip_route_pass counter packets 0 bytes 0 return
        ip protocol udp counter packets 1 bytes 76 jump openclash_upnp
        meta l4proto udp meta mark set 0x00000162 tproxy ip to 127.0.0.1:7895 counter packets 1 bytes 76 accept
    }
}
table inet fw4 {
    chain openclash_output {
        ip saddr 10.10.10.9 tcp sport 14483 counter packets 0 bytes 0 return
        ip saddr 10.10.10.9 tcp sport 14482 counter packets 0 bytes 0 return
        ip saddr 10.10.10.9 tcp sport 14481 counter packets 0 bytes 0 return
        ip saddr 10.10.10.9 tcp sport 14480 counter packets 0 bytes 0 return
        ip saddr 10.10.10.1 tcp sport 80 counter packets 0 bytes 0 return
        ip saddr 10.10.10.1 tcp sport 1448 counter packets 0 bytes 0 return
        ip saddr 10.10.10.10 tcp sport 15881 counter packets 0 bytes 0 return
        ip saddr 10.10.10.10 tcp sport 18856 counter packets 0 bytes 0 return
        ip saddr 10.10.10.10 tcp sport 14488 counter packets 0 bytes 0 return
        ip saddr 10.10.10.10 tcp sport 14486 counter packets 0 bytes 0 return
        ip daddr @localnetwork counter packets 91 bytes 51448 return
        tcp dport != @common_ports meta skuid != 65534 counter packets 0 bytes 0 return
        meta skuid != 65534 ip daddr @china_ip_route ip daddr != @china_ip_route_pass counter packets 2 bytes 120 return
        ip protocol tcp meta skuid != 65534 counter packets 3 bytes 180 redirect to :7892
    }
}
table inet fw4 {
    chain openclash_wan_input {
        udp dport { 7874, 7890, 7891, 7892, 7893, 7895, 9090 } counter packets 0 bytes 0 reject
        tcp dport { 7874, 7890, 7891, 7892, 7893, 7895, 9090 } counter packets 0 bytes 0 reject
    }
}
table inet fw4 {
    chain openclash_mangle_v6 {
        meta nfproto ipv6 udp sport 500 counter packets 0 bytes 0 return
        meta nfproto ipv6 udp sport 546 counter packets 4 bytes 642 return
        ip6 daddr @localnetwork6 counter packets 5871 bytes 971548 return
        meta nfproto ipv6 udp dport 53 counter packets 0 bytes 0 return
        meta nfproto ipv6 th dport != @common_ports counter packets 7104 bytes 738601 return
        ip6 daddr @china_ip6_route ip6 daddr != @china_ip6_route_pass counter packets 611 bytes 54651 return
        meta nfproto ipv6 tcp dport 0-65535 meta mark set 0x00000162 tproxy ip6 to :7895 counter packets 3977 bytes 680762 accept comment "OpenClash TCP Tproxy"
        meta nfproto ipv6 udp dport 0-65535 meta mark set 0x00000162 tproxy ip6 to :7895 counter packets 0 bytes 0 accept comment "OpenClash UDP Tproxy"
    }
}
table inet fw4 {
    chain openclash_mangle_output_v6 {
        meta nfproto ipv6 udp sport 500 counter packets 0 bytes 0 return
        meta nfproto ipv6 udp sport 546 counter packets 0 bytes 0 return
        ip6 daddr @localnetwork6 counter packets 0 bytes 0 return
        meta nfproto ipv6 th dport != @common_ports meta skuid != 65534 counter packets 0 bytes 0 return
        meta skuid != 65534 ip6 daddr @china_ip6_route ip6 daddr != @china_ip6_route_pass counter packets 0 bytes 0 return
        meta nfproto ipv6 meta skuid != 65534 tcp dport 0-65535 meta mark set 0x00000162 tproxy ip6 to :7895 counter packets 0 bytes 0 accept comment "OpenClash TCP Tproxy"
    }
}
table inet fw4 {
    chain openclash_wan6_input {
        udp dport { 7874, 7890, 7891, 7892, 7893, 7895, 9090 } counter packets 0 bytes 0 reject
        tcp dport { 7874, 7890, 7891, 7892, 7893, 7895, 9090 } counter packets 0 bytes 0 reject
    }
}

#===================== IPSET状态 =====================#

#===================== 路由表状态 =====================#

#IPv4

#route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
0.0.0.0         124.115.92.1    0.0.0.0         UG    0      0        0 pppoe-wan
10.10.10.0      0.0.0.0         255.255.255.0   U     0      0        0 br-lan
124.115.92.1    0.0.0.0         255.255.255.255 UH    0      0        0 pppoe-wan

#ip route list
default via 124.115.92.1 dev pppoe-wan proto static 
10.10.10.0/24 dev br-lan proto kernel scope link src 10.10.10.1 
124.115.92.1 dev pppoe-wan proto kernel scope link src *WAN IP*.218 

#ip rule show
0:  from all lookup local
32765:  from all fwmark 0x162 lookup 354
32766:  from all lookup main
32767:  from all lookup default

#IPv6

#route -A inet6
Kernel IPv6 routing table
Destination                                 Next Hop                                Flags Metric Ref    Use Iface
::/0                                        ::                                      U     1024   2        0 lo      
::/0                                        fe80::ce1a:faff:fee9:b0a0               UG    512    4        0 pppoe-wan
::/0                                        fe80::ce1a:faff:fee9:b0a0               UG    512    6        0 pppoe-wan
240e:3358:906:30b::/64                     ::                                      !n    2147483647 2        0 lo      
240e::::/64                     ::                                      U     1024   3        0 br-lan  
240e::::/56                     ::                                      !n    2147483647 1        0 lo      
fd89:f908:9d3f::/64                         ::                                      U     1024   5        0 br-lan  
fd89:f908:9d3f::/48                         ::                                      !n    2147483647 2        0 lo      
fe80::ce1a:faff:fee9:b0a0/128               ::                                      U     256    1        0 pppoe-wan
fe80::fa5f:b8f:7072:4051/128                ::                                      U     256    2        0 pppoe-wan
fe80::/64                                   ::                                      U     256    1        0 eth3    
fe80::/64                                   ::                                      U     256    5        0 br-lan  
::/0                                        ::                                      !n    -1     2        0 lo      
::1/128                                     ::                                      Un    0      7        0 lo      
240e:3358:906:30b::/128                    ::                                      Un    0      3        0 pppoe-wan
*WAN IP*:4051/128   ::                                      Un    0      5        0 pppoe-wan
240e::::/128                    ::                                      Un    0      3        0 br-lan  
240e::::1/128                   ::                                      Un    0      6        0 br-lan  
fd89:f908:9d3f::/128                        ::                                      Un    0      3        0 br-lan  
fd89:f908:9d3f::1/128                       ::                                      Un    0      5        0 br-lan  
fe80::/128                                  ::                                      Un    0      3        0 eth3    
fe80::/128                                  ::                                      Un    0      3        0 br-lan  
fe80::904f:51ff:fecd:ca1e/128               ::                                      Un    0      4        0 br-lan  
fe80::f85f:bff:fe72:4051/128                ::                                      Un    0      5        0 eth3    
fe80::fa5f:b8f:7072:4051/128                ::                                      Un    0      3        0 pppoe-wan
ff00::/8                                    ::                                      U     256    7        0 br-lan  
ff00::/8                                    ::                                      U     256    4        0 eth3    
ff00::/8                                    ::                                      U     256    5        0 pppoe-wan
::/0                                        ::                                      !n    -1     2        0 lo      

#ip -6 route list
default from 240e:3358:906:30b::/64 via fe80::ce1a:faff:fee9:b0a0 dev pppoe-wan proto static metric 512 pref medium
default from 240e::::/56 via fe80::ce1a:faff:fee9:b0a0 dev pppoe-wan proto static metric 512 pref medium
unreachable 240e:3358:906:30b::/64 dev lo proto static metric 2147483647 pref medium
240e::::/64 dev br-lan proto static metric 1024 pref medium
unreachable 240e::::/56 dev lo proto static metric 2147483647 pref medium
fd89:f908:9d3f::/64 dev br-lan proto static metric 1024 pref medium
unreachable fd89:f908:9d3f::/48 dev lo proto static metric 2147483647 pref medium
fe80::ce1a:faff:fee9:b0a0 dev pppoe-wan proto kernel metric 256 pref medium
fe80::fa5f:b8f:7072:4051 dev pppoe-wan proto kernel metric 256 pref medium
fe80::/64 dev eth3 proto kernel metric 256 pref medium
fe80::/64 dev br-lan proto kernel metric 256 pref medium

#ip -6 rule show
0:  from all lookup local
32765:  from all fwmark 0x162 lookup 354
32766:  from all lookup main
4200000000: from 240e::::1/60 iif br-lan unreachable

#===================== 端口占用状态 =====================#

tcp        0      0 :::7890                 :::*                    LISTEN      6443/clash
tcp        0      0 :::7891                 :::*                    LISTEN      6443/clash
tcp        0      0 :::7892                 :::*                    LISTEN      6443/clash
tcp        0      0 :::7893                 :::*                    LISTEN      6443/clash
tcp        0      0 :::7895                 :::*                    LISTEN      6443/clash
tcp        0      0 :::9090                 :::*                    LISTEN      6443/clash
udp        0      0 :::7874                 :::*                                6443/clash
udp        0      0 :::7891                 :::*                                6443/clash
udp        0      0 :::7892                 :::*                                6443/clash
udp        0      0 :::7893                 :::*                                6443/clash
udp        0      0 :::7895                 :::*                                6443/clash

#===================== 测试本机DNS查询(www.baidu.com) =====================#

Server:     127.0.0.1
Address:    127.0.0.1:53

www.baidu.com   canonical name = www.a.shifen.com
Name:   www.a.shifen.com
Address: 14.119.104.189
Name:   www.a.shifen.com
Address: 14.119.104.254

www.baidu.com   canonical name = www.a.shifen.com
www.a.shifen.com    canonical name = www.wshifen.com

#===================== 测试内核DNS查询(www.instagram.com) =====================#

Status: 0
TC: false
RD: true
RA: true
AD: false
CD: false

Question: 
  Name: www.instagram.com.
  Qtype: 1
  Qclass: 1

Answer: 
  TTL: 184
  data: 185.60.216.169
  name: www.instagram.com.
  type: 1

Dnsmasq 当前默认 resolv 文件:/tmp/resolv.conf.d/resolv.conf.auto

#===================== /tmp/resolv.conf.d/resolv.conf.auto =====================#

# Interface wan
nameserver 61.134.1.5
nameserver 218.30.19.50
# Interface wan_6
nameserver 240e:f:a::6
nameserver 240e:f:a00b::6

#===================== 测试本机网络连接(www.baidu.com) =====================#

HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: private, no-cache, no-store, proxy-revalidate, no-transform
Connection: keep-alive
Content-Length: 277
Content-Type: text/html
Date: Fri, 19 May 2023 14:50:03 GMT
Etag: "575e1f72-115"
Last-Modified: Mon, 13 Jun 2016 02:50:26 GMT
Pragma: no-cache
Server: bfe/1.0.8.18

#===================== 测试本机网络下载(raw.githubusercontent.com) =====================#

HTTP/2 200 
cache-control: max-age=300
content-security-policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
content-type: text/plain; charset=utf-8
etag: "20367810d6b16552859ed1f051bfbd4e18233617a5eb4443364fd2b5d49bb469"
strict-transport-security: max-age=31536000
x-content-type-options: nosniff
x-frame-options: deny
x-xss-protection: 1; mode=block
x-github-request-id: 6C64:2606:42A65E:4B73AB:64663645
accept-ranges: bytes
date: Fri, 19 May 2023 14:50:05 GMT
via: 1.1 varnish
x-served-by: cache-nrt-rjtf7700064-NRT
x-cache: HIT
x-cache-hits: 1
x-timer: S1684507805.323346,VS0,VE1
vary: Authorization,Accept-Encoding,Origin
access-control-allow-origin: *
x-fastly-request-id: 00fc7bf5b9d120c63d1d9745345edb9d646986d8
expires: Fri, 19 May 2023 14:55:05 GMT
source-age: 161
content-length: 83

#===================== 最近运行日志(自动切换为Debug模式) =====================#

time="2023-05-19T14:48:33Z" level=info msg="[TCP] [240e:::::c3d2]:56792 --> [2600::ac43:c62b]:80 match DstPort(80) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:48:33Z" level=info msg="[TCP] 10.10.10.10:56793 --> 45.154.253.10:80 match DstPort(80) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:48:40Z" level=info msg="[TCP] [240e:::::c3d2]:56905 --> [2600::ac43:c62b]:80 match DstPort(80) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:48:41Z" level=info msg="[TCP] [240e:::::c3d2]:56904 --> [2600::ac43:c62b]:80 match DstPort(80) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:48:42Z" level=info msg="[TCP] [240e:::::c3d2]:56920 --> [2600::ac43:c62b]:80 match DstPort(80) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:48:44Z" level=info msg="[TCP] [240e:::::c3d2]:56934 --> [2400::::1033]:80 match DstPort(80) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:48:44Z" level=info msg="[TCP] [240e:::::c3d2]:56937 --> [2606:4700:e6::ac40:cc13]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:48:44Z" level=info msg="[TCP] [240e:::::c3d2]:56961 --> [2606:4700:e6::ac40:cc13]:80 match DstPort(80) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:48:48Z" level=info msg="[TCP] [240e:::::c3d2]:57009 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:48:50Z" level=info msg="[TCP] 10.10.10.10:56989 --> tracker2.dler.com:80 match DomainKeyword(tracker) using DIRECT"
time="2023-05-19T14:48:51Z" level=info msg="[TCP] [240e:::::c3d2]:57080 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:48:52Z" level=info msg="[TCP] [240e:::::c3d2]:57082 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:48:52Z" level=info msg="[TCP] [240e:::::c3d2]:57097 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:48:53Z" level=info msg="[TCP] [240e:::::c3d2]:57102 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:48:55Z" level=info msg="[TCP] [240e:::::c3d2]:57134 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:48:55Z" level=info msg="[TCP] [240e:::::c3d2]:57142 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:48:58Z" level=info msg="[TCP] 10.10.10.10:57188 --> 172.64.162.36:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:48:58Z" level=info msg="[TCP] 10.10.10.10:57189 --> 172.64.162.36:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:48:58Z" level=info msg="[TCP] 10.10.10.10:57192 --> 172.64.162.36:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:48:59Z" level=info msg="[TCP] [240e:::::c3d2]:57203 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:48:59Z" level=info msg="[TCP] [240e:::::c3d2]:57212 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:00Z" level=info msg="[TCP] [240e:::::c3d2]:57221 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:00Z" level=info msg="[TCP] [240e:::::c3d2]:57222 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:00Z" level=info msg="[TCP] [240e:::::c3d2]:57223 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:01Z" level=info msg="[TCP] [240e:::::c3d2]:57248 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:01Z" level=info msg="[TCP] [240e:::::c3d2]:57249 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:01Z" level=info msg="[TCP] [240e:::::c3d2]:57251 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:02Z" level=info msg="[TCP] [240e:::::c3d2]:57253 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:02Z" level=info msg="[TCP] [240e:::::c3d2]:57254 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:02Z" level=info msg="[TCP] [240e:::::c3d2]:57255 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:02Z" level=info msg="[TCP] [240e:::::c3d2]:57238 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:04Z" level=info msg="[TCP] [240e:::::c3d2]:57281 --> [2400::::1033]:80 match DstPort(80) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:05Z" level=info msg="[TCP] [240e:::::c3d2]:57292 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:06Z" level=info msg="[TCP] [240e:::::c3d2]:57318 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:06Z" level=info msg="[TCP] [240e:::::c3d2]:57309 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:07Z" level=info msg="[TCP] 10.10.10.10:57308 --> tracker.openbittorrent.com:80 match DomainKeyword(torrent) using DIRECT"
time="2023-05-19T14:49:09Z" level=info msg="[TCP] [240e:::::c3d2]:57347 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:09Z" level=info msg="[TCP] [240e:::::c3d2]:57355 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:09Z" level=info msg="[TCP] [240e:::::c3d2]:57356 --> [2600::ac43:c62b]:80 match DstPort(80) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:10Z" level=info msg="[TCP] [240e:::::c3d2]:57363 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:11Z" level=info msg="[TCP] [240e:::::c3d2]:57390 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:12Z" level=info msg="[TCP] [240e:::::c3d2]:57397 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:12Z" level=info msg="[TCP] 10.10.10.10:57414 --> tracker.openbittorrent.com:80 match DomainKeyword(torrent) using DIRECT"
time="2023-05-19T14:49:14Z" level=info msg="[TCP] [240e:::::c3d2]:57416 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:14Z" level=info msg="[TCP] [240e:::::c3d2]:57425 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:14Z" level=info msg="[TCP] [240e:::::c3d2]:57417 --> [2a0b:8fc1:1077::c3d3:4ff4]:80 match DstPort(80) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:14Z" level=info msg="[TCP] 10.10.10.10:57420 --> tracker1.bt.moack.co.kr:80 match DomainKeyword(tracker) using DIRECT"
time="2023-05-19T14:49:14Z" level=info msg="[TCP] [240e:::::c3d2]:57436 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:15Z" level=warning msg="[TCP] dial DIRECT (match DomainKeyword/torrent) 10.10.10.10:57357 --> tracker.openbittorrent.com:80 error: dial tcp4 45.154.253.8:80: i/o timeout"
time="2023-05-19T14:49:15Z" level=info msg="[TCP] [240e:::::c3d2]:57428 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:15Z" level=info msg="[TCP] [240e:::::c3d2]:57477 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:16Z" level=warning msg="[TCP] dial DIRECT (match DomainKeyword/tracker) 10.10.10.10:57393 --> tracker1.bt.moack.co.kr:80 error: dial tcp4 156.234.201.18:80: i/o timeout"
time="2023-05-19T14:49:17Z" level=info msg="[TCP] [240e:::::c3d2]:57547 --> [2600::ac43:c62b]:80 match DstPort(80) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:17Z" level=info msg="[TCP] [240e:::::c3d2]:57552 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:17Z" level=info msg="[TCP] [240e:::::c3d2]:57571 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:18Z" level=warning msg="[TCP] dial DIRECT (match DomainKeyword/torrent) 10.10.10.10:57418 --> tracker.openbittorrent.com:80 error: dial tcp4 45.154.253.6:80: i/o timeout"
time="2023-05-19T14:49:18Z" level=info msg="[TCP] [240e:::::c3d2]:57603 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:19Z" level=info msg="[TCP] [240e:::::c3d2]:57627 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:20Z" level=info msg="[TCP] [240e:::::c3d2]:57606 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:20Z" level=info msg="[TCP] [240e:::::c3d2]:57641 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:21Z" level=info msg="[TCP] [240e:::::c3d2]:57646 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:23Z" level=info msg="[TCP] [240e:::::c3d2]:57648 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:25Z" level=info msg="[TCP] [240e:::::c3d2]:57707 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:25Z" level=info msg="[TCP] [240e:::::c3d2]:57708 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:25Z" level=info msg="[TCP] [240e:::::c3d2]:57709 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:26Z" level=info msg="[TCP] [240e:::::c3d2]:57717 --> [2400::::1033]:80 match DstPort(80) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:27Z" level=info msg="[TCP] [240e:::::c3d2]:57737 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:28Z" level=info msg="[TCP] 10.10.10.10:57703 --> tracker1.bt.moack.co.kr:80 match DomainKeyword(tracker) using DIRECT"
time="2023-05-19T14:49:30Z" level=info msg="[TCP] [240e:::::c3d2]:57774 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:30Z" level=warning msg="[TCP] dial DIRECT (match DomainKeyword/torrent) 10.10.10.10:57706 --> tracker.openbittorrent.com:80 error: dial tcp4 45.154.253.4:80: i/o timeout"
time="2023-05-19T14:49:30Z" level=info msg="[TCP] [240e:::::c3d2]:57768 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:32Z" level=info msg="[TCP] [240e:::::c3d2]:57792 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:32Z" level=info msg="[TCP] [240e:::::c3d2]:57793 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:34Z" level=info msg="[TCP] [240e:::::c3d2]:57832 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:35Z" level=info msg="[TCP] 10.10.10.205:46316 --> mtalk.google.com:5228 match Domain(mtalk.google.com) using 📢 谷歌FCM[[SS] 新加坡 03]"
time="2023-05-19T14:49:37Z" level=info msg="[TCP] [240e:::::c3d2]:57858 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:37Z" level=info msg="[TCP] 10.10.10.10:57859 --> 23.137.251.45:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:38Z" level=info msg="[TCP] [240e:::::c3d2]:57872 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:38Z" level=info msg="[TCP] 10.10.10.10:57838 --> tracker2.dler.org:80 match DomainKeyword(tracker) using DIRECT"
time="2023-05-19T14:49:39Z" level=info msg="[TCP] [240e:::::c3d2]:57883 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:40Z" level=warning msg="[TCP] dial DIRECT (match DomainKeyword/torrent) 10.10.10.10:57839 --> tracker.openbittorrent.com:80 error: dial tcp4 45.154.253.4:80: i/o timeout"
time="2023-05-19T14:49:42Z" level=warning msg="[TCP] dial DIRECT (match DomainKeyword/torrent) 10.10.10.10:57867 --> tracker.openbittorrent.com:80 error: dial tcp4 45.154.253.9:80: i/o timeout"
time="2023-05-19T14:49:42Z" level=info msg="[TCP] [240e:::::c3d2]:58008 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:43Z" level=info msg="[TCP] [240e:::::c3d2]:58009 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:45Z" level=info msg="[TCP] [240e:::::c3d2]:58047 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:46Z" level=info msg="[TCP] [240e:::::c3d2]:58061 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:52Z" level=info msg="[TCP] 10.10.10.10:58162 --> profile.accounts.firefox.com:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:54Z" level=info msg="[TCP] *WAN IP*.218:33930 --> fastly.jsdelivr.net:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:49:59Z" level=info msg="[TCP] [240e:::::c3d2]:58239 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:50:00Z" level=info msg="[TCP] [240e:::::c3d2]:58242 --> [2600::ac43:c62b]:80 match DstPort(80) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:50:00Z" level=info msg="[TCP] [240e:::::c3d2]:58243 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:50:04Z" level=info msg="[TCP] [240e:::::c3d2]:58351 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:50:05Z" level=warning msg="[TCP] dial DIRECT (match DomainKeyword/torrent) 10.10.10.10:58252 --> tracker.openbittorrent.com:80 error: dial tcp4 45.154.253.10:80: i/o timeout"
time="2023-05-19T14:50:07Z" level=debug msg="[Process] find process 2600:::6815:1f18: process not found"
time="2023-05-19T14:50:07Z" level=debug msg="[Process] find process 2600:::6815:1f18: process not found"
time="2023-05-19T14:50:07Z" level=info msg="[TCP] [240e:::::c3d2]:58393 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:50:10Z" level=info msg="[TCP] [240e:::::c3d2]:58392 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"
time="2023-05-19T14:50:11Z" level=debug msg="[Process] find process tr.ready4.icu: process not found"
time="2023-05-19T14:50:11Z" level=debug msg="[DNS] tr.ready4.icu --> 172.64.162.36"
time="2023-05-19T14:50:12Z" level=info msg="[TCP] [240e:::::c3d2]:58441 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]"

#===================== 最近运行日志获取完成(自动切换为silent模式) =====================#

#===================== 活动连接信息 =====================#

OpenClash Config

No response

Expected Behavior

我自从上次遇到 https://github.com/vernesong/OpenClash/issues/3270 这个问题后,就出现了这个现像,后来 #3270 解决了,但界面上这个地方的显示就一直是这样,, 从那时起我就一直用的是最新的 Developer 版,一直更新到 v0.45.45-beta 都是这样。。。今天看到 Master 版本更新了,就试着编译重刷固件,结果发现问题依旧,,,在PVE里直接删掉虚拟机的硬盘重新添加重新配置,仍然是这样。 麻烦大佬看看是哪里的问题?

Screenshots

屏幕截图 2023-05-19 224813 屏幕截图 2023-05-19 224813

caliban511 commented 1 year ago

突然找到原因,原来是这个扩展的问题,加入白名单就好了:

屏幕截图 2023-06-22 051609