Closed caliban511 closed 1 year ago
v0.45.121-beta
Official OpenWrt
Linux-amd64(x86-64)
正常使用就会这样。
网速检查这里,上面两项显示无法访问,,,其实上是可以正常访问国内网络的,UI上的显示并不影响实际使用,,,
OpenClash 调试日志
生成时间: 2023-05-19 22:49:58 插件版本: v0.45.121-beta 隐私提示: 上传此日志前请注意检查、屏蔽公网IP、节点、密码等相关敏感信息
#===================== 系统信息 =====================# 主机型号: QEMU Standard PC (i440FX + PIIX, 1996) 固件版本: OpenWrt 22.03-SNAPSHOT r20145-30fca5413b LuCI版本: git-23.093.42303-d58cd69 内核版本: 5.10.179 处理器架构: x86_64 #此项有值时,如不使用IPv6,建议到网络-接口-lan的设置中禁用IPV6的DHCP IPV6-DHCP: server DNS劫持: Dnsmasq 转发 #DNS劫持为Dnsmasq时,此项结果应仅有配置文件的DNS监听地址 Dnsmasq转发设置: 127.0.0.1#7874 #===================== 依赖检查 =====================# dnsmasq-full: 已安装 coreutils: 已安装 coreutils-nohup: 已安装 bash: 已安装 curl: 已安装 ca-certificates: 已安装 ipset: 已安装 ip-full: 已安装 libcap: 已安装 libcap-bin: 已安装 ruby: 已安装 ruby-yaml: 已安装 ruby-psych: 已安装 ruby-pstore: 已安装 kmod-tun(TUN模式): 已安装 luci-compat(Luci >= 19.07): 已安装 kmod-inet-diag(PROCESS-NAME): 已安装 unzip: 已安装 kmod-nft-tproxy: 已安装 #===================== 内核检查 =====================# 运行状态: 运行中 运行内核:Dev 进程pid: 6443 运行权限: 6443: cap_dac_override,cap_net_bind_service,cap_net_admin,cap_net_raw,cap_sys_ptrace,cap_sys_resource=eip 运行用户: nobody 已选择的架构: linux-amd64 #下方无法显示内核版本号时请确认您的内核版本是否正确或者有无权限 Tun内核版本: 2023.04.16-20-g212da6a Tun内核文件: 存在 Tun内核运行权限: 正常 Dev内核版本: v1.15.1-17-g6ecd96e Dev内核文件: 存在 Dev内核运行权限: 正常 Meta内核版本: alpha-g6b1a438 Meta内核文件: 存在 Meta内核运行权限: 正常 #===================== 插件设置 =====================# 当前配置文件: /etc/openclash/config/prpr-sub.yaml 启动配置文件: /etc/openclash/prpr-sub.yaml 运行模式: redir-host 默认代理模式: rule UDP流量转发(tproxy): 启用 自定义DNS: 启用 IPV6代理: 启用 IPV6-DNS解析: 启用 禁用Dnsmasq缓存: 启用 自定义规则: 启用 仅允许内网: 启用 仅代理命中规则流量: 启用 仅允许常用端口流量: 停用 绕过中国大陆IP: 启用 路由本机代理: 停用 #启动异常时建议关闭此项后重试 混合节点: 停用 保留配置: 停用 #启动异常时建议关闭此项后重试 第三方规则: 停用 #===================== 自定义规则 一 =====================# script: ## shortcuts: ## Notice: The core timezone is UTC ## CST 20:00-24:00 = time.now().hour > 12 and time.now().hour < 16 ## 内核时区为UTC,故以下time.now()函数的取值需要根据本地时区进行转换 ## 北京时间(CST) 20:00-24:00 = time.now().hour > 12 and time.now().hour < 16 ## quic: network == 'udp' and dst_port == 443 and (geoip(resolve_ip(host)) != 'CN' or geoip(dst_ip) != 'CN') ## time-limit: in_cidr(src_ip,'192.168.1.2/32') and time.now().hour < 20 or time.now().hour > 21 ## time-limit: src_ip == '192.168.1.2' and time.now().hour < 20 or time.now().hour > 21 ## code: | ## def main(ctx, metadata): ## directkeywordlist = ["baidu"] ## for directkeyword in directkeywordlist: ## if directkeyword in metadata["host"]: ## ctx.log('[Script] matched keyword %s use direct' % directkeyword) ## return "DIRECT" rules: ##- SCRIPT,quic,REJECT #shortcuts rule ##- SCRIPT,time-limit,REJECT #shortcuts rule ##- PROCESS-NAME,curl,DIRECT #匹配路由自身进程(curl直连) ##- DOMAIN-SUFFIX,google.com,Proxy #匹配域名后缀(交由Proxy代理服务器组) ##- DOMAIN-KEYWORD,google,Proxy #匹配域名关键字(交由Proxy代理服务器组) ##- DOMAIN,google.com,Proxy #匹配域名(交由Proxy代理服务器组) ##- DOMAIN-SUFFIX,ad.com,REJECT #匹配域名后缀(拒绝) ##- IP-CIDR,127.0.0.0/8,DIRECT #匹配数据目标IP(直连) ##- SRC-IP-CIDR,192.168.1.201/32,DIRECT #匹配数据发起IP(直连) ##- DST-PORT,80,DIRECT #匹配数据目标端口(直连) ##- SRC-PORT,7777,DIRECT #匹配数据源端口(直连) ##排序在上的规则优先生效,如添加(去除规则前的#号): ##IP段:192.168.1.2-192.168.1.200 直连 ##- SRC-IP-CIDR,192.168.1.2/31,DIRECT ##- SRC-IP-CIDR,192.168.1.4/30,DIRECT ##- SRC-IP-CIDR,192.168.1.8/29,DIRECT ##- SRC-IP-CIDR,192.168.1.16/28,DIRECT ##- SRC-IP-CIDR,192.168.1.32/27,DIRECT ##- SRC-IP-CIDR,192.168.1.64/26,DIRECT ##- SRC-IP-CIDR,192.168.1.128/26,DIRECT ##- SRC-IP-CIDR,192.168.1.192/29,DIRECT ##- SRC-IP-CIDR,192.168.1.200/32,DIRECT ##IP段:192.168.1.202-192.168.1.255 直连 ##- SRC-IP-CIDR,192.168.1.202/31,DIRECT ##- SRC-IP-CIDR,192.168.1.204/30,DIRECT ##- SRC-IP-CIDR,192.168.1.208/28,DIRECT ##- SRC-IP-CIDR,192.168.1.224/27,DIRECT ##此时IP为192.168.1.1和192.168.1.201的客户端流量走代理(策略),其余客户端不走代理 ##因为Fake-IP模式下,IP地址为192.168.1.1的路由器自身流量可走代理(策略),所以需要排除 ##仅设置路由器自身直连: ##- SRC-IP-CIDR,192.168.1.1/32,DIRECT ##- SRC-IP-CIDR,198.18.0.1/32,DIRECT ##DDNS ##- DOMAIN-SUFFIX,checkip.dyndns.org,DIRECT ##- DOMAIN-SUFFIX,checkipv6.dyndns.org,DIRECT ##- DOMAIN-SUFFIX,checkip.synology.com,DIRECT ##- DOMAIN-SUFFIX,ifconfig.co,DIRECT ##- DOMAIN-SUFFIX,api.myip.com,DIRECT ##- DOMAIN-SUFFIX,ip-api.com,DIRECT ##- DOMAIN-SUFFIX,ipapi.co,DIRECT ##- DOMAIN-SUFFIX,ip6.seeip.org,DIRECT ##- DOMAIN-SUFFIX,members.3322.org,DIRECT ##在线IP段转CIDR地址:http://ip2cidr.com #===================== 自定义规则 二 =====================# script: ## shortcuts: ## common_port: dst_port not in [21, 22, 23, 53, 80, 123, 143, 194, 443, 465, 587, 853, 993, 995, 998, 2052, 2053, 2082, 2083, 2086, 2095, 2096, 5222, 5228, 5229, 5230, 8080, 8443, 8880, 8888, 8889] ## code: | ## def main(ctx, metadata): ## directkeywordlist = ["baidu"] ## for directkeyword in directkeywordlist: ## if directkeyword in metadata["host"]: ## ctx.log('[Script] matched keyword %s use direct' % directkeyword) ## return "DIRECT" rules: ##- SCRIPT,common_port,DIRECT #shortcuts rule ##- DOMAIN-SUFFIX,google.com,Proxy #匹配域名后缀(交由Proxy代理服务器组) ##- DOMAIN-KEYWORD,google,Proxy #匹配域名关键字(交由Proxy代理服务器组) ##- DOMAIN,google.com,Proxy #匹配域名(交由Proxy代理服务器组) ##- DOMAIN-SUFFIX,ad.com,REJECT #匹配域名后缀(拒绝) ##- IP-CIDR,127.0.0.0/8,DIRECT #匹配数据目标IP(直连) ##- SRC-IP-CIDR,192.168.1.201/32,DIRECT #匹配数据发起IP(直连) ##- DST-PORT,80,DIRECT #匹配数据目标端口(直连) ##- SRC-PORT,7777,DIRECT #匹配数据源端口(直连) #===================== 配置文件 =====================# port: 7890 socks-port: 7891 allow-lan: true mode: rule log-level: info external-controller: 0.0.0.0:9090 proxy-groups: rules: - DST-PORT,7895,REJECT - DST-PORT,7892,REJECT - IP-CIDR,198.18.0.1/16,REJECT,no-resolve - SRC-IP-CIDR,10.10.10.1/32,DIRECT - SRC-IP-CIDR,198.18.0.1/16,DIRECT - DOMAIN-SUFFIX,awesome-hd.me,DIRECT - DOMAIN-SUFFIX,broadcasthe.net,DIRECT - DOMAIN-SUFFIX,chdbits.co,DIRECT - DOMAIN-SUFFIX,classix-unlimited.co.uk,DIRECT - DOMAIN-SUFFIX,empornium.me,DIRECT - DOMAIN-SUFFIX,gazellegames.net,DIRECT - DOMAIN-SUFFIX,hdchina.org,DIRECT - DOMAIN-SUFFIX,hdsky.me,DIRECT - DOMAIN-SUFFIX,icetorrent.org,DIRECT - DOMAIN-SUFFIX,jpopsuki.eu,DIRECT - DOMAIN-SUFFIX,keepfrds.com,DIRECT - DOMAIN-SUFFIX,madsrevolution.net,DIRECT - DOMAIN-SUFFIX,m-team.cc,DIRECT - DOMAIN-SUFFIX,nanyangpt.com,DIRECT - DOMAIN-SUFFIX,ncore.cc,DIRECT - DOMAIN-SUFFIX,open.cd,DIRECT - DOMAIN-SUFFIX,ourbits.club,DIRECT - DOMAIN-SUFFIX,passthepopcorn.me,DIRECT - DOMAIN-SUFFIX,privatehd.to,DIRECT - DOMAIN-SUFFIX,redacted.ch,DIRECT - DOMAIN-SUFFIX,springsunday.net,DIRECT - DOMAIN-SUFFIX,tjupt.org,DIRECT - DOMAIN-SUFFIX,totheglory.im,DIRECT - DOMAIN-SUFFIX,smtp,DIRECT - DOMAIN-KEYWORD,announce,DIRECT - DOMAIN-KEYWORD,torrent,DIRECT - DOMAIN-KEYWORD,tracker,DIRECT - MATCH,DIRECT redir-port: 7892 tproxy-port: 7895 mixed-port: 7893 bind-address: "*" external-ui: "/usr/share/openclash/ui" ipv6: true interface-name: pppoe-wan dns: enable: true ipv6: true enhanced-mode: fake-ip fake-ip-range: 198.18.0.1/16 listen: 0.0.0.0:7874 nameserver: - 61.134.1.5 - 218.30.19.50 - "[240e:f:a::6]:53" - "[240e:f:a00b::6]:53" fallback: - https://1.1.1.1/dns-query - https://1.0.0.1/dns-query - "[2606:4700:4700::1111]:53" - "[2606:4700:4700::1001]:53" default-nameserver: - 119.28.28.28 fake-ip-filter: - "+.*" profile: store-selected: true authentication: - Clash:w6521BG #===================== 自定义覆写设置 =====================# #!/bin/sh . /usr/share/openclash/ruby.sh . /usr/share/openclash/log.sh . /lib/functions.sh # This script is called by /etc/init.d/openclash # Add your custom overwrite scripts here, they will be take effict after the OpenClash own srcipts LOG_OUT "Tip: Start Running Custom Overwrite Scripts..." LOGTIME=$(echo $(date "+%Y-%m-%d %H:%M:%S")) LOG_FILE="/tmp/openclash.log" CONFIG_FILE="$1" #config path #Simple Demo: #General Demo #1--config path #2--key name #3--value #ruby_edit "$CONFIG_FILE" "['redir-port']" "7892" #ruby_edit "$CONFIG_FILE" "['secret']" "123456" #ruby_edit "$CONFIG_FILE" "['dns']['enable']" "true" #Hash Demo #1--config path #2--key name #3--hash type value #ruby_edit "$CONFIG_FILE" "['experimental']" "{'sniff-tls-sni'=>true}" #ruby_edit "$CONFIG_FILE" "['sniffer']" "{'sniffing'=>['tls','http']}" #Array Demo: #1--config path #2--key name #3--position(start from 0, end with -1) #4--value #ruby_arr_insert "$CONFIG_FILE" "['dns']['nameserver']" "0" "114.114.114.114" #Array Add From Yaml File Demo: #1--config path #2--key name #3--position(start from 0, end with -1) #4--value file path #5--value key name in #4 file #ruby_arr_add_file "$CONFIG_FILE" "['dns']['fallback-filter']['ipcidr']" "0" "/etc/openclash/custom/openclash_custom_fallback_filter.yaml" "['fallback-filter']['ipcidr']" #Ruby Script Demo: #ruby -ryaml -rYAML -I "/usr/share/openclash" -E UTF-8 -e " # begin # Value = YAML.load_file('$CONFIG_FILE'); # rescue Exception => e # puts '${LOGTIME} Error: Load File Failed,【' + e.message + '】'; # end; #General # begin # Thread.new{ # Value['redir-port']=7892; # Value['tproxy-port']=7895; # Value['port']=7890; # Value['socks-port']=7891; # Value['mixed-port']=7893; # }.join; # rescue Exception => e # puts '${LOGTIME} Error: Set General Failed,【' + e.message + '】'; # ensure # File.open('$CONFIG_FILE','w') {|f| YAML.dump(Value, f)}; # end" 2>/dev/null >> $LOG_FILE exit 0 #===================== 自定义防火墙设置 =====================# #!/bin/sh . /usr/share/openclash/log.sh . /lib/functions.sh # This script is called by /etc/init.d/openclash # Add your custom firewall rules here, they will be added after the end of the OpenClash iptables rules LOG_OUT "Tip: Start Add Custom Firewall Rules..." exit 0 #===================== IPTABLES 防火墙设置 =====================# #IPv4 NAT chain #IPv4 Mangle chain #IPv4 Filter chain #IPv6 NAT chain #IPv6 Mangle chain #IPv6 Filter chain #===================== NFTABLES 防火墙设置 =====================# table inet fw4 { chain input { type filter hook input priority filter; policy accept; iifname "pppoe-wan" ip6 saddr != @localnetwork6 counter packets 1982 bytes 409984 jump openclash_wan6_input udp dport 443 ip6 daddr != @china_ip6_route counter packets 0 bytes 0 reject with icmpv6 port-unreachable comment "OpenClash QUIC REJECT" udp dport 443 ip daddr != @china_ip_route counter packets 0 bytes 0 reject with icmp port-unreachable comment "OpenClash QUIC REJECT" iifname "pppoe-wan" ip saddr != @localnetwork counter packets 15980 bytes 7294933 jump openclash_wan_input iifname "lo" accept comment "!fw4: Accept traffic from loopback" ct state established,related accept comment "!fw4: Allow inbound established and related flows" tcp flags syn / fin,syn,rst,ack jump syn_flood comment "!fw4: Rate limit TCP syn packets" iifname "br-lan" jump input_lan comment "!fw4: Handle lan IPv4/IPv6 input traffic" iifname "pppoe-wan" jump input_wan comment "!fw4: Handle wan IPv4/IPv6 input traffic" } } table inet fw4 { chain forward { type filter hook forward priority filter; policy drop; ct state established,related accept comment "!fw4: Allow forwarded established and related flows" iifname "br-lan" jump forward_lan comment "!fw4: Handle lan IPv4/IPv6 forward traffic" iifname "pppoe-wan" jump forward_wan comment "!fw4: Handle wan IPv4/IPv6 forward traffic" jump upnp_forward comment "Hook into miniupnpd forwarding chain" jump handle_reject } } table inet fw4 { chain dstnat { type nat hook prerouting priority dstnat; policy accept; ip6 daddr { 2001:4860:4860::8844, 2001:4860:4860::8888 } tcp dport 53 counter packets 0 bytes 0 accept comment "OpenClash Google DNS Hijack" ip daddr { 8.8.4.4, 8.8.8.8 } tcp dport 53 counter packets 0 bytes 0 redirect to :7892 comment "OpenClash Google DNS Hijack" udp dport 53 counter packets 766 bytes 59894 redirect to :53 comment "OpenClash DNS Hijack" tcp dport 53 counter packets 0 bytes 0 redirect to :53 comment "OpenClash DNS Hijack" iifname "br-lan" jump dstnat_lan comment "!fw4: Handle lan IPv4/IPv6 dstnat traffic" iifname "pppoe-wan" jump dstnat_wan comment "!fw4: Handle wan IPv4/IPv6 dstnat traffic" jump upnp_prerouting comment "Hook into miniupnpd prerouting chain" ip protocol tcp counter packets 7628 bytes 400298 jump openclash } } table inet fw4 { chain srcnat { type nat hook postrouting priority srcnat; policy accept; oifname "br-lan" jump srcnat_lan comment "!fw4: Handle lan IPv4/IPv6 srcnat traffic" oifname "pppoe-wan" jump srcnat_wan comment "!fw4: Handle wan IPv4/IPv6 srcnat traffic" jump upnp_postrouting comment "Hook into miniupnpd postrouting chain" } } table inet fw4 { chain nat_output { type nat hook output priority filter - 1; policy accept; ip protocol tcp counter packets 678 bytes 40680 jump openclash_output } } table inet fw4 { chain mangle_prerouting { type filter hook prerouting priority mangle; policy accept; ip protocol udp counter packets 10837 bytes 1508876 jump openclash_mangle meta nfproto ipv6 counter packets 17548 bytes 2444432 jump openclash_mangle_v6 } } table inet fw4 { chain mangle_output { type route hook output priority mangle; policy accept; } } table inet fw4 { chain openclash { ip daddr @localnetwork counter packets 1551 bytes 81847 return tcp dport != @common_ports counter packets 5812 bytes 304204 return ip daddr @china_ip_route ip daddr != @china_ip_route_pass counter packets 43 bytes 2461 return ip protocol tcp counter packets 231 bytes 12254 redirect to :7892 } } table inet fw4 { chain openclash_mangle { meta nfproto ipv4 udp sport 500 counter packets 0 bytes 0 return meta nfproto ipv4 udp sport 68 counter packets 0 bytes 0 return ip saddr 10.10.10.9 udp sport 14483 counter packets 0 bytes 0 return ip saddr 10.10.10.9 udp sport 14482 counter packets 0 bytes 0 return ip saddr 10.10.10.9 udp sport 14481 counter packets 0 bytes 0 return ip saddr 10.10.10.9 udp sport 14480 counter packets 0 bytes 0 return ip saddr 10.10.10.1 udp sport 80 counter packets 0 bytes 0 return ip saddr 10.10.10.1 udp sport 1448 counter packets 0 bytes 0 return ip saddr 10.10.10.10 udp sport 15881 counter packets 0 bytes 0 return ip saddr 10.10.10.10 udp sport 18856 counter packets 4697 bytes 601216 return ip saddr 10.10.10.10 udp sport 14488 counter packets 0 bytes 0 return ip saddr 10.10.10.10 udp sport 14486 counter packets 0 bytes 0 return ip daddr @localnetwork counter packets 5860 bytes 898325 return udp dport 53 counter packets 0 bytes 0 return udp dport != @common_ports counter packets 283 bytes 9624 return ip daddr @china_ip_route ip daddr != @china_ip_route_pass counter packets 0 bytes 0 return ip protocol udp counter packets 1 bytes 76 jump openclash_upnp meta l4proto udp meta mark set 0x00000162 tproxy ip to 127.0.0.1:7895 counter packets 1 bytes 76 accept } } table inet fw4 { chain openclash_output { ip saddr 10.10.10.9 tcp sport 14483 counter packets 0 bytes 0 return ip saddr 10.10.10.9 tcp sport 14482 counter packets 0 bytes 0 return ip saddr 10.10.10.9 tcp sport 14481 counter packets 0 bytes 0 return ip saddr 10.10.10.9 tcp sport 14480 counter packets 0 bytes 0 return ip saddr 10.10.10.1 tcp sport 80 counter packets 0 bytes 0 return ip saddr 10.10.10.1 tcp sport 1448 counter packets 0 bytes 0 return ip saddr 10.10.10.10 tcp sport 15881 counter packets 0 bytes 0 return ip saddr 10.10.10.10 tcp sport 18856 counter packets 0 bytes 0 return ip saddr 10.10.10.10 tcp sport 14488 counter packets 0 bytes 0 return ip saddr 10.10.10.10 tcp sport 14486 counter packets 0 bytes 0 return ip daddr @localnetwork counter packets 91 bytes 51448 return tcp dport != @common_ports meta skuid != 65534 counter packets 0 bytes 0 return meta skuid != 65534 ip daddr @china_ip_route ip daddr != @china_ip_route_pass counter packets 2 bytes 120 return ip protocol tcp meta skuid != 65534 counter packets 3 bytes 180 redirect to :7892 } } table inet fw4 { chain openclash_wan_input { udp dport { 7874, 7890, 7891, 7892, 7893, 7895, 9090 } counter packets 0 bytes 0 reject tcp dport { 7874, 7890, 7891, 7892, 7893, 7895, 9090 } counter packets 0 bytes 0 reject } } table inet fw4 { chain openclash_mangle_v6 { meta nfproto ipv6 udp sport 500 counter packets 0 bytes 0 return meta nfproto ipv6 udp sport 546 counter packets 4 bytes 642 return ip6 daddr @localnetwork6 counter packets 5871 bytes 971548 return meta nfproto ipv6 udp dport 53 counter packets 0 bytes 0 return meta nfproto ipv6 th dport != @common_ports counter packets 7104 bytes 738601 return ip6 daddr @china_ip6_route ip6 daddr != @china_ip6_route_pass counter packets 611 bytes 54651 return meta nfproto ipv6 tcp dport 0-65535 meta mark set 0x00000162 tproxy ip6 to :7895 counter packets 3977 bytes 680762 accept comment "OpenClash TCP Tproxy" meta nfproto ipv6 udp dport 0-65535 meta mark set 0x00000162 tproxy ip6 to :7895 counter packets 0 bytes 0 accept comment "OpenClash UDP Tproxy" } } table inet fw4 { chain openclash_mangle_output_v6 { meta nfproto ipv6 udp sport 500 counter packets 0 bytes 0 return meta nfproto ipv6 udp sport 546 counter packets 0 bytes 0 return ip6 daddr @localnetwork6 counter packets 0 bytes 0 return meta nfproto ipv6 th dport != @common_ports meta skuid != 65534 counter packets 0 bytes 0 return meta skuid != 65534 ip6 daddr @china_ip6_route ip6 daddr != @china_ip6_route_pass counter packets 0 bytes 0 return meta nfproto ipv6 meta skuid != 65534 tcp dport 0-65535 meta mark set 0x00000162 tproxy ip6 to :7895 counter packets 0 bytes 0 accept comment "OpenClash TCP Tproxy" } } table inet fw4 { chain openclash_wan6_input { udp dport { 7874, 7890, 7891, 7892, 7893, 7895, 9090 } counter packets 0 bytes 0 reject tcp dport { 7874, 7890, 7891, 7892, 7893, 7895, 9090 } counter packets 0 bytes 0 reject } } #===================== IPSET状态 =====================# #===================== 路由表状态 =====================# #IPv4 #route -n Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 0.0.0.0 124.115.92.1 0.0.0.0 UG 0 0 0 pppoe-wan 10.10.10.0 0.0.0.0 255.255.255.0 U 0 0 0 br-lan 124.115.92.1 0.0.0.0 255.255.255.255 UH 0 0 0 pppoe-wan #ip route list default via 124.115.92.1 dev pppoe-wan proto static 10.10.10.0/24 dev br-lan proto kernel scope link src 10.10.10.1 124.115.92.1 dev pppoe-wan proto kernel scope link src *WAN IP*.218 #ip rule show 0: from all lookup local 32765: from all fwmark 0x162 lookup 354 32766: from all lookup main 32767: from all lookup default #IPv6 #route -A inet6 Kernel IPv6 routing table Destination Next Hop Flags Metric Ref Use Iface ::/0 :: U 1024 2 0 lo ::/0 fe80::ce1a:faff:fee9:b0a0 UG 512 4 0 pppoe-wan ::/0 fe80::ce1a:faff:fee9:b0a0 UG 512 6 0 pppoe-wan 240e:3358:906:30b::/64 :: !n 2147483647 2 0 lo 240e::::/64 :: U 1024 3 0 br-lan 240e::::/56 :: !n 2147483647 1 0 lo fd89:f908:9d3f::/64 :: U 1024 5 0 br-lan fd89:f908:9d3f::/48 :: !n 2147483647 2 0 lo fe80::ce1a:faff:fee9:b0a0/128 :: U 256 1 0 pppoe-wan fe80::fa5f:b8f:7072:4051/128 :: U 256 2 0 pppoe-wan fe80::/64 :: U 256 1 0 eth3 fe80::/64 :: U 256 5 0 br-lan ::/0 :: !n -1 2 0 lo ::1/128 :: Un 0 7 0 lo 240e:3358:906:30b::/128 :: Un 0 3 0 pppoe-wan *WAN IP*:4051/128 :: Un 0 5 0 pppoe-wan 240e::::/128 :: Un 0 3 0 br-lan 240e::::1/128 :: Un 0 6 0 br-lan fd89:f908:9d3f::/128 :: Un 0 3 0 br-lan fd89:f908:9d3f::1/128 :: Un 0 5 0 br-lan fe80::/128 :: Un 0 3 0 eth3 fe80::/128 :: Un 0 3 0 br-lan fe80::904f:51ff:fecd:ca1e/128 :: Un 0 4 0 br-lan fe80::f85f:bff:fe72:4051/128 :: Un 0 5 0 eth3 fe80::fa5f:b8f:7072:4051/128 :: Un 0 3 0 pppoe-wan ff00::/8 :: U 256 7 0 br-lan ff00::/8 :: U 256 4 0 eth3 ff00::/8 :: U 256 5 0 pppoe-wan ::/0 :: !n -1 2 0 lo #ip -6 route list default from 240e:3358:906:30b::/64 via fe80::ce1a:faff:fee9:b0a0 dev pppoe-wan proto static metric 512 pref medium default from 240e::::/56 via fe80::ce1a:faff:fee9:b0a0 dev pppoe-wan proto static metric 512 pref medium unreachable 240e:3358:906:30b::/64 dev lo proto static metric 2147483647 pref medium 240e::::/64 dev br-lan proto static metric 1024 pref medium unreachable 240e::::/56 dev lo proto static metric 2147483647 pref medium fd89:f908:9d3f::/64 dev br-lan proto static metric 1024 pref medium unreachable fd89:f908:9d3f::/48 dev lo proto static metric 2147483647 pref medium fe80::ce1a:faff:fee9:b0a0 dev pppoe-wan proto kernel metric 256 pref medium fe80::fa5f:b8f:7072:4051 dev pppoe-wan proto kernel metric 256 pref medium fe80::/64 dev eth3 proto kernel metric 256 pref medium fe80::/64 dev br-lan proto kernel metric 256 pref medium #ip -6 rule show 0: from all lookup local 32765: from all fwmark 0x162 lookup 354 32766: from all lookup main 4200000000: from 240e::::1/60 iif br-lan unreachable #===================== 端口占用状态 =====================# tcp 0 0 :::7890 :::* LISTEN 6443/clash tcp 0 0 :::7891 :::* LISTEN 6443/clash tcp 0 0 :::7892 :::* LISTEN 6443/clash tcp 0 0 :::7893 :::* LISTEN 6443/clash tcp 0 0 :::7895 :::* LISTEN 6443/clash tcp 0 0 :::9090 :::* LISTEN 6443/clash udp 0 0 :::7874 :::* 6443/clash udp 0 0 :::7891 :::* 6443/clash udp 0 0 :::7892 :::* 6443/clash udp 0 0 :::7893 :::* 6443/clash udp 0 0 :::7895 :::* 6443/clash #===================== 测试本机DNS查询(www.baidu.com) =====================# Server: 127.0.0.1 Address: 127.0.0.1:53 www.baidu.com canonical name = www.a.shifen.com Name: www.a.shifen.com Address: 14.119.104.189 Name: www.a.shifen.com Address: 14.119.104.254 www.baidu.com canonical name = www.a.shifen.com www.a.shifen.com canonical name = www.wshifen.com #===================== 测试内核DNS查询(www.instagram.com) =====================# Status: 0 TC: false RD: true RA: true AD: false CD: false Question: Name: www.instagram.com. Qtype: 1 Qclass: 1 Answer: TTL: 184 data: 185.60.216.169 name: www.instagram.com. type: 1 Dnsmasq 当前默认 resolv 文件:/tmp/resolv.conf.d/resolv.conf.auto #===================== /tmp/resolv.conf.d/resolv.conf.auto =====================# # Interface wan nameserver 61.134.1.5 nameserver 218.30.19.50 # Interface wan_6 nameserver 240e:f:a::6 nameserver 240e:f:a00b::6 #===================== 测试本机网络连接(www.baidu.com) =====================# HTTP/1.1 200 OK Accept-Ranges: bytes Cache-Control: private, no-cache, no-store, proxy-revalidate, no-transform Connection: keep-alive Content-Length: 277 Content-Type: text/html Date: Fri, 19 May 2023 14:50:03 GMT Etag: "575e1f72-115" Last-Modified: Mon, 13 Jun 2016 02:50:26 GMT Pragma: no-cache Server: bfe/1.0.8.18 #===================== 测试本机网络下载(raw.githubusercontent.com) =====================# HTTP/2 200 cache-control: max-age=300 content-security-policy: default-src 'none'; style-src 'unsafe-inline'; sandbox content-type: text/plain; charset=utf-8 etag: "20367810d6b16552859ed1f051bfbd4e18233617a5eb4443364fd2b5d49bb469" strict-transport-security: max-age=31536000 x-content-type-options: nosniff x-frame-options: deny x-xss-protection: 1; mode=block x-github-request-id: 6C64:2606:42A65E:4B73AB:64663645 accept-ranges: bytes date: Fri, 19 May 2023 14:50:05 GMT via: 1.1 varnish x-served-by: cache-nrt-rjtf7700064-NRT x-cache: HIT x-cache-hits: 1 x-timer: S1684507805.323346,VS0,VE1 vary: Authorization,Accept-Encoding,Origin access-control-allow-origin: * x-fastly-request-id: 00fc7bf5b9d120c63d1d9745345edb9d646986d8 expires: Fri, 19 May 2023 14:55:05 GMT source-age: 161 content-length: 83 #===================== 最近运行日志(自动切换为Debug模式) =====================# time="2023-05-19T14:48:33Z" level=info msg="[TCP] [240e:::::c3d2]:56792 --> [2600::ac43:c62b]:80 match DstPort(80) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:48:33Z" level=info msg="[TCP] 10.10.10.10:56793 --> 45.154.253.10:80 match DstPort(80) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:48:40Z" level=info msg="[TCP] [240e:::::c3d2]:56905 --> [2600::ac43:c62b]:80 match DstPort(80) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:48:41Z" level=info msg="[TCP] [240e:::::c3d2]:56904 --> [2600::ac43:c62b]:80 match DstPort(80) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:48:42Z" level=info msg="[TCP] [240e:::::c3d2]:56920 --> [2600::ac43:c62b]:80 match DstPort(80) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:48:44Z" level=info msg="[TCP] [240e:::::c3d2]:56934 --> [2400::::1033]:80 match DstPort(80) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:48:44Z" level=info msg="[TCP] [240e:::::c3d2]:56937 --> [2606:4700:e6::ac40:cc13]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:48:44Z" level=info msg="[TCP] [240e:::::c3d2]:56961 --> [2606:4700:e6::ac40:cc13]:80 match DstPort(80) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:48:48Z" level=info msg="[TCP] [240e:::::c3d2]:57009 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:48:50Z" level=info msg="[TCP] 10.10.10.10:56989 --> tracker2.dler.com:80 match DomainKeyword(tracker) using DIRECT" time="2023-05-19T14:48:51Z" level=info msg="[TCP] [240e:::::c3d2]:57080 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:48:52Z" level=info msg="[TCP] [240e:::::c3d2]:57082 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:48:52Z" level=info msg="[TCP] [240e:::::c3d2]:57097 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:48:53Z" level=info msg="[TCP] [240e:::::c3d2]:57102 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:48:55Z" level=info msg="[TCP] [240e:::::c3d2]:57134 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:48:55Z" level=info msg="[TCP] [240e:::::c3d2]:57142 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:48:58Z" level=info msg="[TCP] 10.10.10.10:57188 --> 172.64.162.36:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:48:58Z" level=info msg="[TCP] 10.10.10.10:57189 --> 172.64.162.36:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:48:58Z" level=info msg="[TCP] 10.10.10.10:57192 --> 172.64.162.36:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:48:59Z" level=info msg="[TCP] [240e:::::c3d2]:57203 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:48:59Z" level=info msg="[TCP] [240e:::::c3d2]:57212 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:00Z" level=info msg="[TCP] [240e:::::c3d2]:57221 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:00Z" level=info msg="[TCP] [240e:::::c3d2]:57222 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:00Z" level=info msg="[TCP] [240e:::::c3d2]:57223 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:01Z" level=info msg="[TCP] [240e:::::c3d2]:57248 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:01Z" level=info msg="[TCP] [240e:::::c3d2]:57249 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:01Z" level=info msg="[TCP] [240e:::::c3d2]:57251 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:02Z" level=info msg="[TCP] [240e:::::c3d2]:57253 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:02Z" level=info msg="[TCP] [240e:::::c3d2]:57254 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:02Z" level=info msg="[TCP] [240e:::::c3d2]:57255 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:02Z" level=info msg="[TCP] [240e:::::c3d2]:57238 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:04Z" level=info msg="[TCP] [240e:::::c3d2]:57281 --> [2400::::1033]:80 match DstPort(80) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:05Z" level=info msg="[TCP] [240e:::::c3d2]:57292 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:06Z" level=info msg="[TCP] [240e:::::c3d2]:57318 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:06Z" level=info msg="[TCP] [240e:::::c3d2]:57309 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:07Z" level=info msg="[TCP] 10.10.10.10:57308 --> tracker.openbittorrent.com:80 match DomainKeyword(torrent) using DIRECT" time="2023-05-19T14:49:09Z" level=info msg="[TCP] [240e:::::c3d2]:57347 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:09Z" level=info msg="[TCP] [240e:::::c3d2]:57355 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:09Z" level=info msg="[TCP] [240e:::::c3d2]:57356 --> [2600::ac43:c62b]:80 match DstPort(80) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:10Z" level=info msg="[TCP] [240e:::::c3d2]:57363 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:11Z" level=info msg="[TCP] [240e:::::c3d2]:57390 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:12Z" level=info msg="[TCP] [240e:::::c3d2]:57397 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:12Z" level=info msg="[TCP] 10.10.10.10:57414 --> tracker.openbittorrent.com:80 match DomainKeyword(torrent) using DIRECT" time="2023-05-19T14:49:14Z" level=info msg="[TCP] [240e:::::c3d2]:57416 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:14Z" level=info msg="[TCP] [240e:::::c3d2]:57425 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:14Z" level=info msg="[TCP] [240e:::::c3d2]:57417 --> [2a0b:8fc1:1077::c3d3:4ff4]:80 match DstPort(80) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:14Z" level=info msg="[TCP] 10.10.10.10:57420 --> tracker1.bt.moack.co.kr:80 match DomainKeyword(tracker) using DIRECT" time="2023-05-19T14:49:14Z" level=info msg="[TCP] [240e:::::c3d2]:57436 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:15Z" level=warning msg="[TCP] dial DIRECT (match DomainKeyword/torrent) 10.10.10.10:57357 --> tracker.openbittorrent.com:80 error: dial tcp4 45.154.253.8:80: i/o timeout" time="2023-05-19T14:49:15Z" level=info msg="[TCP] [240e:::::c3d2]:57428 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:15Z" level=info msg="[TCP] [240e:::::c3d2]:57477 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:16Z" level=warning msg="[TCP] dial DIRECT (match DomainKeyword/tracker) 10.10.10.10:57393 --> tracker1.bt.moack.co.kr:80 error: dial tcp4 156.234.201.18:80: i/o timeout" time="2023-05-19T14:49:17Z" level=info msg="[TCP] [240e:::::c3d2]:57547 --> [2600::ac43:c62b]:80 match DstPort(80) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:17Z" level=info msg="[TCP] [240e:::::c3d2]:57552 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:17Z" level=info msg="[TCP] [240e:::::c3d2]:57571 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:18Z" level=warning msg="[TCP] dial DIRECT (match DomainKeyword/torrent) 10.10.10.10:57418 --> tracker.openbittorrent.com:80 error: dial tcp4 45.154.253.6:80: i/o timeout" time="2023-05-19T14:49:18Z" level=info msg="[TCP] [240e:::::c3d2]:57603 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:19Z" level=info msg="[TCP] [240e:::::c3d2]:57627 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:20Z" level=info msg="[TCP] [240e:::::c3d2]:57606 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:20Z" level=info msg="[TCP] [240e:::::c3d2]:57641 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:21Z" level=info msg="[TCP] [240e:::::c3d2]:57646 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:23Z" level=info msg="[TCP] [240e:::::c3d2]:57648 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:25Z" level=info msg="[TCP] [240e:::::c3d2]:57707 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:25Z" level=info msg="[TCP] [240e:::::c3d2]:57708 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:25Z" level=info msg="[TCP] [240e:::::c3d2]:57709 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:26Z" level=info msg="[TCP] [240e:::::c3d2]:57717 --> [2400::::1033]:80 match DstPort(80) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:27Z" level=info msg="[TCP] [240e:::::c3d2]:57737 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:28Z" level=info msg="[TCP] 10.10.10.10:57703 --> tracker1.bt.moack.co.kr:80 match DomainKeyword(tracker) using DIRECT" time="2023-05-19T14:49:30Z" level=info msg="[TCP] [240e:::::c3d2]:57774 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:30Z" level=warning msg="[TCP] dial DIRECT (match DomainKeyword/torrent) 10.10.10.10:57706 --> tracker.openbittorrent.com:80 error: dial tcp4 45.154.253.4:80: i/o timeout" time="2023-05-19T14:49:30Z" level=info msg="[TCP] [240e:::::c3d2]:57768 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:32Z" level=info msg="[TCP] [240e:::::c3d2]:57792 --> [2609::ac40:a20d]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:32Z" level=info msg="[TCP] [240e:::::c3d2]:57793 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:34Z" level=info msg="[TCP] [240e:::::c3d2]:57832 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:35Z" level=info msg="[TCP] 10.10.10.205:46316 --> mtalk.google.com:5228 match Domain(mtalk.google.com) using 📢 谷歌FCM[[SS] 新加坡 03]" time="2023-05-19T14:49:37Z" level=info msg="[TCP] [240e:::::c3d2]:57858 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:37Z" level=info msg="[TCP] 10.10.10.10:57859 --> 23.137.251.45:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:38Z" level=info msg="[TCP] [240e:::::c3d2]:57872 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:38Z" level=info msg="[TCP] 10.10.10.10:57838 --> tracker2.dler.org:80 match DomainKeyword(tracker) using DIRECT" time="2023-05-19T14:49:39Z" level=info msg="[TCP] [240e:::::c3d2]:57883 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:40Z" level=warning msg="[TCP] dial DIRECT (match DomainKeyword/torrent) 10.10.10.10:57839 --> tracker.openbittorrent.com:80 error: dial tcp4 45.154.253.4:80: i/o timeout" time="2023-05-19T14:49:42Z" level=warning msg="[TCP] dial DIRECT (match DomainKeyword/torrent) 10.10.10.10:57867 --> tracker.openbittorrent.com:80 error: dial tcp4 45.154.253.9:80: i/o timeout" time="2023-05-19T14:49:42Z" level=info msg="[TCP] [240e:::::c3d2]:58008 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:43Z" level=info msg="[TCP] [240e:::::c3d2]:58009 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:45Z" level=info msg="[TCP] [240e:::::c3d2]:58047 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:46Z" level=info msg="[TCP] [240e:::::c3d2]:58061 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:52Z" level=info msg="[TCP] 10.10.10.10:58162 --> profile.accounts.firefox.com:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:54Z" level=info msg="[TCP] *WAN IP*.218:33930 --> fastly.jsdelivr.net:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:49:59Z" level=info msg="[TCP] [240e:::::c3d2]:58239 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:50:00Z" level=info msg="[TCP] [240e:::::c3d2]:58242 --> [2600::ac43:c62b]:80 match DstPort(80) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:50:00Z" level=info msg="[TCP] [240e:::::c3d2]:58243 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:50:04Z" level=info msg="[TCP] [240e:::::c3d2]:58351 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:50:05Z" level=warning msg="[TCP] dial DIRECT (match DomainKeyword/torrent) 10.10.10.10:58252 --> tracker.openbittorrent.com:80 error: dial tcp4 45.154.253.10:80: i/o timeout" time="2023-05-19T14:50:07Z" level=debug msg="[Process] find process 2600:::6815:1f18: process not found" time="2023-05-19T14:50:07Z" level=debug msg="[Process] find process 2600:::6815:1f18: process not found" time="2023-05-19T14:50:07Z" level=info msg="[TCP] [240e:::::c3d2]:58393 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:50:10Z" level=info msg="[TCP] [240e:::::c3d2]:58392 --> [2600:::6815:1f18]:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" time="2023-05-19T14:50:11Z" level=debug msg="[Process] find process tr.ready4.icu: process not found" time="2023-05-19T14:50:11Z" level=debug msg="[DNS] tr.ready4.icu --> 172.64.162.36" time="2023-05-19T14:50:12Z" level=info msg="[TCP] [240e:::::c3d2]:58441 --> tr.ready4.icu:443 match DstPort(443) using 🐟 漏网之鱼[[SS] 新加坡 03]" #===================== 最近运行日志获取完成(自动切换为silent模式) =====================# #===================== 活动连接信息 =====================#
No response
我自从上次遇到 https://github.com/vernesong/OpenClash/issues/3270 这个问题后,就出现了这个现像,后来 #3270 解决了,但界面上这个地方的显示就一直是这样,, 从那时起我就一直用的是最新的 Developer 版,一直更新到 v0.45.45-beta 都是这样。。。今天看到 Master 版本更新了,就试着编译重刷固件,结果发现问题依旧,,,在PVE里直接删掉虚拟机的硬盘重新添加重新配置,仍然是这样。 麻烦大佬看看是哪里的问题?
突然找到原因,原来是这个扩展的问题,加入白名单就好了:
Verify Steps
OpenClash Version
v0.45.121-beta
Bug on Environment
Official OpenWrt
Bug on Platform
Linux-amd64(x86-64)
To Reproduce
正常使用就会这样。
Describe the Bug
网速检查这里,上面两项显示无法访问,,,其实上是可以正常访问国内网络的,UI上的显示并不影响实际使用,,,
OpenClash Log
OpenClash 调试日志
生成时间: 2023-05-19 22:49:58 插件版本: v0.45.121-beta 隐私提示: 上传此日志前请注意检查、屏蔽公网IP、节点、密码等相关敏感信息
OpenClash Config
No response
Expected Behavior
我自从上次遇到 https://github.com/vernesong/OpenClash/issues/3270 这个问题后,就出现了这个现像,后来 #3270 解决了,但界面上这个地方的显示就一直是这样,, 从那时起我就一直用的是最新的 Developer 版,一直更新到 v0.45.45-beta 都是这样。。。今天看到 Master 版本更新了,就试着编译重刷固件,结果发现问题依旧,,,在PVE里直接删掉虚拟机的硬盘重新添加重新配置,仍然是这样。 麻烦大佬看看是哪里的问题?
Screenshots