Closed supermanxiacheng closed 10 months ago
v0.45.02-beta
Other
Linux-armv7
openclash 在redir的兼容模式,可以正常上内外网。启用TUN模式后,不管是fake-ip还是redir,都上不了外网。
openclash 在redir的兼容模式,可以正常上内外网。启用TUN模式后,不管是fake-ip还是redir,都上不了外网。 有一个我自己发现的问题,不知道有没有关系。配置文件里tun的auto-route相关的都是false,我发现mac上的是true。 但我找了半天,没发现哪里可以改,在配置文件里直接改,也不生效。
tun: enable: true stack: gvisor auto-route: false auto-detect-interface: false dns-hijack:
OpenClash 调试日志
生成时间: 2023-09-08 01:02:11 插件版本: v0.45.02-beta 隐私提示: 上传此日志前请注意检查、屏蔽公网IP、节点、密码等相关敏感信息
#===================== 系统信息 =====================# 主机型号: Phicomm N1 固件版本: OpenWrt SNAPSHOT r4454-940200d60 LuCI版本: git-22.095.24346-72703c8-1 内核版本: 5.4.188-flippy-71+o 处理器架构: aarch64_cortex-a53 #此项有值时,如不使用IPv6,建议到网络-接口-lan的设置中禁用IPV6的DHCP IPV6-DHCP: #此项结果应仅有配置文件的DNS监听地址 Dnsmasq转发设置: 127.0.0.1#7874 #===================== 依赖检查 =====================# dnsmasq-full: 已安装 coreutils: 已安装 coreutils-nohup: 已安装 bash: 已安装 curl: 已安装 ca-certificates: 已安装 ipset: 已安装 ip-full: 已安装 iptables-mod-tproxy: 已安装 kmod-ipt-tproxy: 已安装 iptables-mod-extra: 已安装 kmod-ipt-extra: 已安装 libcap: 已安装 libcap-bin: 已安装 ruby: 已安装 ruby-yaml: 已安装 ruby-psych: 已安装 ruby-pstore: 已安装 ruby-dbm: 已安装 kmod-tun(TUN模式): 已安装 luci-compat(Luci-19.07): 已安装 kmod-inet-diag(PROCESS-NAME): 已安装 #===================== 内核检查 =====================# 运行状态: 运行中 进程pid: 18842 运行权限: 18842: cap_dac_override,cap_net_bind_service,cap_net_admin,cap_net_raw,cap_sys_ptrace,cap_sys_resource=eip 运行用户: nobody 已选择的架构: linux-armv8 #下方无法显示内核版本号时请确认您的内核版本是否正确或者有无权限 Tun内核版本: v1.11.0-7-g5497ada Tun内核文件: 存在 Tun内核运行权限: 正常 Dev内核版本: v1.11.8-3-g4f291fa Dev内核文件: 存在 Dev内核运行权限: 正常 Meta内核版本: Meta内核文件: 不存在 Meta内核运行权限: 否 #===================== 插件设置 =====================# 当前配置文件: /etc/openclash/config/config.yaml 启动配置文件: /etc/openclash/config.yaml 运行模式: fake-ip-tun 默认代理模式: rule UDP流量转发(tproxy): 停用 DNS劫持: 启用 自定义DNS: 停用 IPV6代理: 停用 IPV6-DNS解析: 停用 禁用Dnsmasq缓存: 停用 自定义规则: 停用 仅允许内网: 启用 仅代理命中规则流量: 停用 仅允许常用端口流量: 停用 绕过中国大陆IP: 停用 DNS远程解析: 启用 路由本机代理: 启用 #启动异常时建议关闭此项后重试 混合节点: 停用 保留配置: 停用 #启动异常时建议关闭此项后重试 第三方规则: 停用 #===================== 配置文件 =====================# tun: enable: true stack: gvisor auto-route: false auto-detect-interface: false dns-hijack: - tcp://8.8.8.8:53 - tcp://8.8.4.4:53 mixed-port: 7893 allow-lan: true mode: rule log-level: silent external-controller: 0.0.0.0:9090 dns: enable: true ipv6: false listen: 0.0.0.0:7874 enhanced-mode: fake-ip fake-ip-filter: - "*.lan" - localhost.ptlogin2.qq.com - shark007.net - "+.media.dssott.com" - "*.mcdn.bilivideo.cn" - ff.dorado.sdo.com - "*.ff14.sdo.com" - "*.ffxiv.com" - "*.finalfantasyxiv.com" - "*.square-enix.com" - "+.nflxvideo.net" - stun.l.google.com - lens.l.google.com - swdist.apple.com - swcdn.apple.com - swdownload.apple.com - swquery.apple.com - swscan.apple.com - mesu.apple.com - "*.router.asus.com" - "*.linksyssmartwifi.com" - "*.linksys.com" - heartbeat.belkin.com - "+.stun.*.*.*.*.*" - "+.stun.*.*.*.*" - "+.stun.*.*.*" - "+.stun.*.*" - stun.*.*.* - stun.*.* - proxy.golang.org - "+.wargaming.net" - "+.wowsgame.cn" - "+.wggames.cn" - "+.wotgame.cn" - "+.battlenet.com.cn" - xnotify.xboxlive.com - xbox.*.microsoft.com - "*.*.xboxlive.com" - xbox.*.*.microsoft.com - "+.stun.playstation.net" - "*.n.n.srv.nintendo.net" - "+.srv.nintendo.net" - localhost.sec.qq.com - msftncsi.com - msftconnecttest.com - "+.msftncsi.com" - "+.msftconnecttest.com" - music.migu.cn - "*.music.migu.cn" - "*.xiami.com" - amobile.music.tc.qq.com - aqqmusic.tc.qq.com - dl.stream.qqmusic.qq.com - isure.stream.qqmusic.qq.com - mobileoc.music.tc.qq.com - streamoc.music.tc.qq.com - "*.y.qq.com" - y.qq.com - joox.com - api.joox.com - api-jooxtt.sanook.com - "*.kuwo.cn" - trackercdn.kugou.com - songsearch.kugou.com - music.taihe.com - musicapi.taihe.com - "*.126.net" - "*.music.163.com" - music.163.com - time1.cloud.tencent.com - "+.pool.ntp.org" - "*.ntp.org.cn" - "*.time.edu.cn" - ntp7.*.com - ntp6.*.com - ntp5.*.com - ntp4.*.com - ntp3.*.com - ntp2.*.com - ntp1.*.com - ntp.*.com - time7.*.com - time6.*.com - time5.*.com - time4.*.com - time3.*.com - time2.*.com - time1.*.com - time.*.apple.com - time.*.edu.cn - time.*.gov - time.*.com - "*.home.arpa" - "*.local" - "*.test" - "*.localhost" - "*.invalid" - "*.example" - "*.localdomain" nameserver: - 10.0.0.1 - 114.114.114.114 - 119.29.29.29 - https://doh.pub/dns-query - https://dns.alidns.com/dns-query fallback: - https://162.159.36.1/dns-query - https://dns.google/dns-query - tls://8.8.8.8:853 fallback-filter: geoip: false ipcidr: - 0.0.0.0/8 - 10.0.0.0/8 - 100.64.0.0/10 - 127.0.0.0/8 - 169.254.0.0/16 - 172.16.0.0/12 - 192.0.0.0/24 - 192.0.2.0/24 - 192.88.99.0/24 - 192.168.0.0/16 - 198.18.0.0/15 - 198.51.100.0/24 - 203.0.113.0/24 - 224.0.0.0/4 - 240.0.0.0/4 - 255.255.255.255/32 domain: - "+.google.com" - "+.facebook.com" - "+.youtube.com" - "+.githubusercontent.com" fake-ip-range: 198.18.0.1/16 default-nameserver: - 10.0.0.1 - 114.114.114.114 - 119.29.29.29 proxy-groups: - name: "\U0001F343 Proxies" type: select proxies: - "⭐️ Auto" - 1. 导航页:bit.ly/3NLNLoJ - 冷门-俄罗斯 - 冷门-德国 - 冷门-澳大利亚 - 冷门-英国 - 台湾 01 - 台湾 02 - 台湾 03 - 台湾 04 - 新加坡 01 - 新加坡 02 - 新加坡 03 - 新加坡 04 - 新加坡 05 - 日本 01 - 日本 02 - 日本 03 - 日本 04 - 日本 05 - 美国 01 - 美国 02 - 美国 03 - 美国 04 - 美国 05 - 韩国 01 - 韩国 02 - 香港 01 - 香港 02 - 香港 03 - 香港 04 - 香港 05 - name: "\U0001F342 Domestic" type: select proxies: - DIRECT - name: "☁️ Others" type: select proxies: - "\U0001F343 Proxies" - DIRECT - name: "⭐️ Auto" type: url-test proxies: - 1. 导航页:bit.ly/3NLNLoJ - 冷门-俄罗斯 - 冷门-德国 - 冷门-澳大利亚 - 冷门-英国 - 台湾 01 - 台湾 02 - 台湾 03 - 台湾 04 - 新加坡 01 - 新加坡 02 - 新加坡 03 - 新加坡 04 - 新加坡 05 - 日本 01 - 日本 02 - 日本 03 - 日本 04 - 日本 05 - 美国 01 - 美国 02 - 美国 03 - 美国 04 - 美国 05 - 韩国 01 - 韩国 02 - 香港 01 - 香港 02 - 香港 03 - 香港 04 - 香港 05 url: http://www.gstatic.com/generate_204 interval: '28800' rules: rules已删除 - "GEOIP,CN,\U0001F342 Domestic" - MATCH,☁️ Others redir-port: 7892 tproxy-port: 7895 port: 7890 socks-port: 7891 bind-address: "*" external-ui: "/usr/share/openclash/dashboard" ipv6: false profile: store-selected: true store-fake-ip: true interface-name: br-lan #===================== 防火墙设置 =====================# #IPv4 NAT chain # Generated by iptables-save v1.8.7 on Fri Sep 8 01:02:14 2023 *nat :PREROUTING ACCEPT [83:7460] :INPUT ACCEPT [43:2826] :OUTPUT ACCEPT [255:17129] :POSTROUTING ACCEPT [317:23245] :DOCKER - [0:0] :MINIUPNPD - [0:0] :MINIUPNPD-POSTROUTING - [0:0] :postrouting_VPN_rule - [0:0] :postrouting_docker_rule - [0:0] :postrouting_lan_rule - [0:0] :postrouting_rule - [0:0] :postrouting_vpn_rule - [0:0] :postrouting_wan_rule - [0:0] :prerouting_VPN_rule - [0:0] :prerouting_docker_rule - [0:0] :prerouting_lan_rule - [0:0] :prerouting_rule - [0:0] :prerouting_vpn_rule - [0:0] :prerouting_wan_rule - [0:0] :zone_VPN_postrouting - [0:0] :zone_VPN_prerouting - [0:0] :zone_docker_postrouting - [0:0] :zone_docker_prerouting - [0:0] :zone_lan_postrouting - [0:0] :zone_lan_prerouting - [0:0] :zone_vpn_postrouting - [0:0] :zone_vpn_prerouting - [0:0] :zone_wan_postrouting - [0:0] :zone_wan_prerouting - [0:0] -A PREROUTING -d 8.8.4.4/32 -p tcp -m comment --comment "OpenClash Google DNS Hijack" -m tcp --dport 53 -j ACCEPT -A PREROUTING -d 8.8.8.8/32 -p tcp -m comment --comment "OpenClash Google DNS Hijack" -m tcp --dport 53 -j ACCEPT -A PREROUTING -p tcp -m tcp --dport 53 -m comment --comment "OpenClash DNS Hijack" -j REDIRECT --to-ports 53 -A PREROUTING -p udp -m udp --dport 53 -m comment --comment "OpenClash DNS Hijack" -j REDIRECT --to-ports 53 -A PREROUTING -p udp -m udp --dport 53 -j REDIRECT --to-ports 53 -A PREROUTING -p tcp -m tcp --dport 53 -j REDIRECT --to-ports 53 -A PREROUTING -m addrtype --dst-type LOCAL -j DOCKER -A PREROUTING -m comment --comment "!fw3: Custom prerouting rule chain" -j prerouting_rule -A PREROUTING -i br-lan -m comment --comment "!fw3" -j zone_lan_prerouting -A PREROUTING -i ipsec0 -m comment --comment "!fw3" -j zone_VPN_prerouting -A PREROUTING -i tun0 -m comment --comment "!fw3" -j zone_vpn_prerouting -A PREROUTING -i docker0 -m comment --comment "!fw3" -j zone_docker_prerouting -A OUTPUT ! -d 127.0.0.0/8 -m addrtype --dst-type LOCAL -j DOCKER -A POSTROUTING -s 172.31.0.0/24 ! -o docker0 -j MASQUERADE -A POSTROUTING -m comment --comment "!fw3: Custom postrouting rule chain" -j postrouting_rule -A POSTROUTING -o br-lan -m comment --comment "!fw3" -j zone_lan_postrouting -A POSTROUTING -o ipsec0 -m comment --comment "!fw3" -j zone_VPN_postrouting -A POSTROUTING -o tun0 -m comment --comment "!fw3" -j zone_vpn_postrouting -A POSTROUTING -o docker0 -m comment --comment "!fw3" -j zone_docker_postrouting -A DOCKER -i docker0 -j RETURN -A zone_VPN_postrouting -m comment --comment "!fw3: Custom VPN postrouting rule chain" -j postrouting_VPN_rule -A zone_VPN_prerouting -m comment --comment "!fw3: Custom VPN prerouting rule chain" -j prerouting_VPN_rule -A zone_docker_postrouting -m comment --comment "!fw3: Custom docker postrouting rule chain" -j postrouting_docker_rule -A zone_docker_prerouting -m comment --comment "!fw3: Custom docker prerouting rule chain" -j prerouting_docker_rule -A zone_lan_postrouting -j MINIUPNPD-POSTROUTING -A zone_lan_postrouting -m comment --comment "!fw3: Custom lan postrouting rule chain" -j postrouting_lan_rule -A zone_lan_prerouting -j MINIUPNPD -A zone_lan_prerouting -m comment --comment "!fw3: Custom lan prerouting rule chain" -j prerouting_lan_rule -A zone_vpn_postrouting -m comment --comment "!fw3: Custom vpn postrouting rule chain" -j postrouting_vpn_rule -A zone_vpn_postrouting -m comment --comment "!fw3" -j MASQUERADE -A zone_vpn_prerouting -m comment --comment "!fw3: Custom vpn prerouting rule chain" -j prerouting_vpn_rule -A zone_wan_postrouting -m comment --comment "!fw3: Custom wan postrouting rule chain" -j postrouting_wan_rule -A zone_wan_postrouting -m comment --comment "!fw3" -j MASQUERADE -A zone_wan_prerouting -m comment --comment "!fw3: Custom wan prerouting rule chain" -j prerouting_wan_rule COMMIT # Completed on Fri Sep 8 01:02:14 2023 #IPv4 Mangle chain # Generated by iptables-save v1.8.7 on Fri Sep 8 01:02:14 2023 *mangle :PREROUTING ACCEPT [6253:620023] :INPUT ACCEPT [5758:543959] :FORWARD ACCEPT [729:138496] :OUTPUT ACCEPT [5845:2292786] :POSTROUTING ACCEPT [6579:2431859] :RRDIPT_FORWARD - [0:0] :RRDIPT_INPUT - [0:0] :RRDIPT_OUTPUT - [0:0] :openclash - [0:0] :openclash_dns_hijack - [0:0] :openclash_output - [0:0] :qos_Default - [0:0] :qos_Default_ct - [0:0] -A PREROUTING -j openclash -A INPUT -j RRDIPT_INPUT -A FORWARD -j RRDIPT_FORWARD -A OUTPUT -j RRDIPT_OUTPUT -A OUTPUT -j openclash_output -A RRDIPT_FORWARD -s 10.0.0.195/32 -j RETURN -A RRDIPT_FORWARD -d 10.0.0.195/32 -j RETURN -A RRDIPT_FORWARD -s 10.0.0.14/32 -j RETURN -A RRDIPT_FORWARD -d 10.0.0.14/32 -j RETURN -A RRDIPT_FORWARD -s 10.0.0.1/32 -j RETURN -A RRDIPT_FORWARD -d 10.0.0.1/32 -j RETURN -A RRDIPT_FORWARD -s 10.0.0.3/32 -j RETURN -A RRDIPT_FORWARD -d 10.0.0.3/32 -j RETURN -A RRDIPT_FORWARD -s 10.0.0.233/32 -j RETURN -A RRDIPT_FORWARD -d 10.0.0.233/32 -j RETURN -A RRDIPT_INPUT -i eth0 -j RETURN -A RRDIPT_INPUT -i br-lan -j RETURN -A RRDIPT_OUTPUT -o eth0 -j RETURN -A RRDIPT_OUTPUT -o br-lan -j RETURN -A openclash -p tcp -m tcp --sport 1688 -j RETURN -A openclash -p tcp -m tcp --sport 10240 -j RETURN -A openclash -p tcp -m tcp --sport 1723 -j RETURN -A openclash -p udp -m udp --sport 1194 -j RETURN -A openclash -p tcp -m tcp --sport 1194 -j RETURN -A openclash -p udp -m udp --sport 4500 -j RETURN -A openclash -p udp -m udp --sport 500 -j RETURN -A openclash -p udp -m udp --sport 500 -j RETURN -A openclash -p udp -m udp --sport 68 -j RETURN -A openclash -i utun -j RETURN -A openclash -m set --match-set localnetwork dst -j RETURN -A openclash -j MARK --set-xmark 0x162/0xffffffff -A openclash_output -p tcp -m tcp --sport 1688 -j RETURN -A openclash_output -p tcp -m tcp --sport 10240 -j RETURN -A openclash_output -p tcp -m tcp --sport 1723 -j RETURN -A openclash_output -p udp -m udp --sport 1194 -j RETURN -A openclash_output -p tcp -m tcp --sport 1194 -j RETURN -A openclash_output -p udp -m udp --sport 4500 -j RETURN -A openclash_output -p udp -m udp --sport 500 -j RETURN -A openclash_output -p udp -m udp --sport 500 -j RETURN -A openclash_output -p udp -m udp --sport 68 -j RETURN -A openclash_output -m set --match-set localnetwork dst -j RETURN -A openclash_output -d 198.18.0.0/16 -m owner ! --uid-owner 65534 -j MARK --set-xmark 0x162/0xffffffff -A openclash_output -p tcp -m owner ! --uid-owner 65534 -j MARK --set-xmark 0x162/0xffffffff -A qos_Default -j CONNMARK --restore-mark --nfmask 0xf --ctmask 0xf -A qos_Default -m mark --mark 0x0/0xf -j qos_Default_ct -A qos_Default -p udp -m mark --mark 0x0/0xf0 -m length --length 0:500 -j MARK --set-xmark 0x22/0xff -A qos_Default -p icmp -j MARK --set-xmark 0x11/0xff -A qos_Default -p tcp -m mark --mark 0x0/0xf0 -m tcp --sport 1024:65535 --dport 1024:65535 -j MARK --set-xmark 0x44/0xff -A qos_Default -p udp -m mark --mark 0x0/0xf0 -m udp --sport 1024:65535 --dport 1024:65535 -j MARK --set-xmark 0x44/0xff -A qos_Default -j CONNMARK --save-mark --nfmask 0xff --ctmask 0xff -A qos_Default_ct -p tcp -m mark --mark 0x0/0xf -m tcp -m multiport --ports 22,53 -m comment --comment "ssh, dns" -j MARK --set-xmark 0x11/0xff -A qos_Default_ct -p udp -m mark --mark 0x0/0xf -m udp -m multiport --ports 22,53 -m comment --comment "ssh, dns" -j MARK --set-xmark 0x11/0xff -A qos_Default_ct -p tcp -m mark --mark 0x0/0xf -m tcp -m multiport --ports 20,21,25,80,110,443,993,995 -m comment --comment "ftp, smtp, http(s), imap" -j MARK --set-xmark 0x33/0xff -A qos_Default_ct -p tcp -m mark --mark 0x0/0xf -m tcp -m multiport --ports 5190 -m comment --comment "AOL, iChat, ICQ" -j MARK --set-xmark 0x22/0xff -A qos_Default_ct -p udp -m mark --mark 0x0/0xf -m udp -m multiport --ports 5190 -m comment --comment "AOL, iChat, ICQ" -j MARK --set-xmark 0x22/0xff -A qos_Default_ct -j CONNMARK --save-mark --nfmask 0xff --ctmask 0xff COMMIT # Completed on Fri Sep 8 01:02:14 2023 #IPv4 Filter chain # Generated by iptables-save v1.8.7 on Fri Sep 8 01:02:14 2023 *filter :INPUT ACCEPT [0:0] :FORWARD DROP [0:0] :OUTPUT ACCEPT [0:0] :DOCKER - [0:0] :DOCKER-ISOLATION-STAGE-1 - [0:0] :DOCKER-ISOLATION-STAGE-2 - [0:0] :DOCKER-MAN - [0:0] :DOCKER-USER - [0:0] :MINIUPNPD - [0:0] :SOCAT - [0:0] :forwarding_VPN_rule - [0:0] :forwarding_docker_rule - [0:0] :forwarding_lan_rule - [0:0] :forwarding_rule - [0:0] :forwarding_vpn_rule - [0:0] :forwarding_wan_rule - [0:0] :input_VPN_rule - [0:0] :input_docker_rule - [0:0] :input_lan_rule - [0:0] :input_rule - [0:0] :input_vpn_rule - [0:0] :input_wan_rule - [0:0] :output_VPN_rule - [0:0] :output_docker_rule - [0:0] :output_lan_rule - [0:0] :output_rule - [0:0] :output_vpn_rule - [0:0] :output_wan_rule - [0:0] :reject - [0:0] :syn_flood - [0:0] :zone_VPN_dest_ACCEPT - [0:0] :zone_VPN_forward - [0:0] :zone_VPN_input - [0:0] :zone_VPN_output - [0:0] :zone_VPN_src_ACCEPT - [0:0] :zone_docker_dest_ACCEPT - [0:0] :zone_docker_forward - [0:0] :zone_docker_input - [0:0] :zone_docker_output - [0:0] :zone_docker_src_ACCEPT - [0:0] :zone_lan_dest_ACCEPT - [0:0] :zone_lan_forward - [0:0] :zone_lan_input - [0:0] :zone_lan_output - [0:0] :zone_lan_src_ACCEPT - [0:0] :zone_vpn_dest_ACCEPT - [0:0] :zone_vpn_forward - [0:0] :zone_vpn_input - [0:0] :zone_vpn_output - [0:0] :zone_vpn_src_ACCEPT - [0:0] :zone_wan_dest_ACCEPT - [0:0] :zone_wan_dest_DROP - [0:0] :zone_wan_dest_REJECT - [0:0] :zone_wan_forward - [0:0] :zone_wan_input - [0:0] :zone_wan_output - [0:0] :zone_wan_src_REJECT - [0:0] -A INPUT -m policy --dir in --pol ipsec --proto esp -j ACCEPT -A INPUT -j SOCAT -A INPUT -i lo -m comment --comment "!fw3" -j ACCEPT -A INPUT -m comment --comment "!fw3: Custom input rule chain" -j input_rule -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT -A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m comment --comment "!fw3" -j syn_flood -A INPUT -i br-lan -m comment --comment "!fw3" -j zone_lan_input -A INPUT -i ipsec0 -m comment --comment "!fw3" -j zone_VPN_input -A INPUT -i tun0 -m comment --comment "!fw3" -j zone_vpn_input -A INPUT -i docker0 -m comment --comment "!fw3" -j zone_docker_input -A FORWARD -o utun -p udp -m udp --dport 443 -m comment --comment "OpenClash QUIC REJECT" -m set ! --match-set china_ip_route dst -j REJECT --reject-with icmp-port-unreachable -A FORWARD -o utun -m comment --comment "OpenClash TUN Forward" -j ACCEPT -A FORWARD -m policy --dir out --pol ipsec --proto esp -j ACCEPT -A FORWARD -m policy --dir in --pol ipsec --proto esp -j ACCEPT -A FORWARD -j DOCKER-USER -A FORWARD -j DOCKER-ISOLATION-STAGE-1 -A FORWARD -o docker0 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT -A FORWARD -o docker0 -j DOCKER -A FORWARD -i docker0 ! -o docker0 -j ACCEPT -A FORWARD -i docker0 -o docker0 -j ACCEPT -A FORWARD -m comment --comment "!fw3: Custom forwarding rule chain" -j forwarding_rule -A FORWARD -m comment --comment "!fw3: Traffic offloading" -m conntrack --ctstate RELATED,ESTABLISHED -j FLOWOFFLOAD -A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT -A FORWARD -p tcp -m tcp --dport 22 -m comment --comment "!fw3: drop-wan-ssh" -j zone_wan_dest_DROP -A FORWARD -i br-lan -m comment --comment "!fw3" -j zone_lan_forward -A FORWARD -i ipsec0 -m comment --comment "!fw3" -j zone_VPN_forward -A FORWARD -i tun0 -m comment --comment "!fw3" -j zone_vpn_forward -A FORWARD -i docker0 -m comment --comment "!fw3" -j zone_docker_forward -A FORWARD -m comment --comment "!fw3" -j reject -A OUTPUT -m policy --dir out --pol ipsec --proto esp -j ACCEPT -A OUTPUT -o lo -m comment --comment "!fw3" -j ACCEPT -A OUTPUT -m comment --comment "!fw3: Custom output rule chain" -j output_rule -A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT -A OUTPUT -o br-lan -m comment --comment "!fw3" -j zone_lan_output -A OUTPUT -o ipsec0 -m comment --comment "!fw3" -j zone_VPN_output -A OUTPUT -o tun0 -m comment --comment "!fw3" -j zone_vpn_output -A OUTPUT -o docker0 -m comment --comment "!fw3" -j zone_docker_output -A DOCKER-ISOLATION-STAGE-1 -i docker0 ! -o docker0 -j DOCKER-ISOLATION-STAGE-2 -A DOCKER-ISOLATION-STAGE-1 -j RETURN -A DOCKER-ISOLATION-STAGE-2 -o docker0 -j DROP -A DOCKER-ISOLATION-STAGE-2 -j RETURN -A DOCKER-MAN -i br-lan -o docker0 -j RETURN -A DOCKER-MAN -o docker0 -m conntrack --ctstate RELATED,ESTABLISHED -j RETURN -A DOCKER-MAN -o docker0 -m conntrack --ctstate INVALID,NEW -j DROP -A DOCKER-MAN -j RETURN -A DOCKER-USER -j DOCKER-MAN -A DOCKER-USER -j RETURN -A forwarding_rule -i pppoe+ -j RETURN -A forwarding_rule -o pppoe+ -j RETURN -A forwarding_rule -i ppp+ -m conntrack --ctstate NEW -j ACCEPT -A forwarding_rule -o ppp+ -m conntrack --ctstate NEW -j ACCEPT -A reject -p tcp -m comment --comment "!fw3" -j REJECT --reject-with tcp-reset -A reject -m comment --comment "!fw3" -j REJECT --reject-with icmp-port-unreachable -A syn_flood -m limit --limit 25/sec --limit-burst 50 -m comment --comment "!fw3" -j RETURN -A syn_flood -m comment --comment "!fw3" -j DROP -A zone_VPN_dest_ACCEPT -o ipsec0 -m comment --comment "!fw3" -j ACCEPT -A zone_VPN_forward -m comment --comment "!fw3: Custom VPN forwarding rule chain" -j forwarding_VPN_rule -A zone_VPN_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT -A zone_VPN_forward -m comment --comment "!fw3" -j zone_VPN_dest_ACCEPT -A zone_VPN_input -m comment --comment "!fw3: Custom VPN input rule chain" -j input_VPN_rule -A zone_VPN_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT -A zone_VPN_input -m comment --comment "!fw3" -j zone_VPN_src_ACCEPT -A zone_VPN_output -m comment --comment "!fw3: Custom VPN output rule chain" -j output_VPN_rule -A zone_VPN_output -m comment --comment "!fw3" -j zone_VPN_dest_ACCEPT -A zone_VPN_src_ACCEPT -i ipsec0 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT -A zone_docker_dest_ACCEPT -o docker0 -m comment --comment "!fw3" -j ACCEPT -A zone_docker_forward -m comment --comment "!fw3: Custom docker forwarding rule chain" -j forwarding_docker_rule -A zone_docker_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT -A zone_docker_forward -m comment --comment "!fw3" -j zone_docker_dest_ACCEPT -A zone_docker_input -m comment --comment "!fw3: Custom docker input rule chain" -j input_docker_rule -A zone_docker_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT -A zone_docker_input -m comment --comment "!fw3" -j zone_docker_src_ACCEPT -A zone_docker_output -m comment --comment "!fw3: Custom docker output rule chain" -j output_docker_rule -A zone_docker_output -m comment --comment "!fw3" -j zone_docker_dest_ACCEPT -A zone_docker_src_ACCEPT -i docker0 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT -A zone_lan_dest_ACCEPT -o br-lan -m comment --comment "!fw3" -j ACCEPT -A zone_lan_forward -j MINIUPNPD -A zone_lan_forward -m comment --comment "!fw3: Custom lan forwarding rule chain" -j forwarding_lan_rule -A zone_lan_forward -m comment --comment "!fw3: Zone lan to wan forwarding policy" -j zone_wan_dest_ACCEPT -A zone_lan_forward -m comment --comment "!fw3: Zone lan to vpn forwarding policy" -j zone_vpn_dest_ACCEPT -A zone_lan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT -A zone_lan_forward -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT -A zone_lan_input -m comment --comment "!fw3: Custom lan input rule chain" -j input_lan_rule -A zone_lan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT -A zone_lan_input -m comment --comment "!fw3" -j zone_lan_src_ACCEPT -A zone_lan_output -m comment --comment "!fw3: Custom lan output rule chain" -j output_lan_rule -A zone_lan_output -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT -A zone_lan_src_ACCEPT -i br-lan -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT -A zone_vpn_dest_ACCEPT -o tun0 -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP -A zone_vpn_dest_ACCEPT -o tun0 -m comment --comment "!fw3" -j ACCEPT -A zone_vpn_forward -m comment --comment "!fw3: Custom vpn forwarding rule chain" -j forwarding_vpn_rule -A zone_vpn_forward -m comment --comment "!fw3: Zone vpn to wan forwarding policy" -j zone_wan_dest_ACCEPT -A zone_vpn_forward -m comment --comment "!fw3: Zone vpn to lan forwarding policy" -j zone_lan_dest_ACCEPT -A zone_vpn_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT -A zone_vpn_forward -m comment --comment "!fw3" -j zone_vpn_dest_ACCEPT -A zone_vpn_input -m comment --comment "!fw3: Custom vpn input rule chain" -j input_vpn_rule -A zone_vpn_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT -A zone_vpn_input -m comment --comment "!fw3" -j zone_vpn_src_ACCEPT -A zone_vpn_output -m comment --comment "!fw3: Custom vpn output rule chain" -j output_vpn_rule -A zone_vpn_output -m comment --comment "!fw3" -j zone_vpn_dest_ACCEPT -A zone_vpn_src_ACCEPT -i tun0 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT -A zone_wan_forward -m comment --comment "!fw3: Custom wan forwarding rule chain" -j forwarding_wan_rule -A zone_wan_forward -p esp -m comment --comment "!fw3: Allow-IPSec-ESP" -j zone_lan_dest_ACCEPT -A zone_wan_forward -p udp -m udp --dport 500 -m comment --comment "!fw3: Allow-ISAKMP" -j zone_lan_dest_ACCEPT -A zone_wan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT -A zone_wan_forward -m comment --comment "!fw3" -j zone_wan_dest_REJECT -A zone_wan_input -m comment --comment "!fw3: Custom wan input rule chain" -j input_wan_rule -A zone_wan_input -p udp -m udp --dport 68 -m comment --comment "!fw3: Allow-DHCP-Renew" -j ACCEPT -A zone_wan_input -p icmp -m icmp --icmp-type 8 -m comment --comment "!fw3: Allow-Ping" -j ACCEPT -A zone_wan_input -p igmp -m comment --comment "!fw3: Allow-IGMP" -j ACCEPT -A zone_wan_input -p tcp -m tcp --dport 8118 -m comment --comment "!fw3: adblock" -j DROP -A zone_wan_input -p udp -m udp --dport 500 -m comment --comment "!fw3: ike" -j ACCEPT -A zone_wan_input -p udp -m udp --dport 4500 -m comment --comment "!fw3: ipsec" -j ACCEPT -A zone_wan_input -p ah -m comment --comment "!fw3: ah" -j ACCEPT -A zone_wan_input -p esp -m comment --comment "!fw3: esp" -j ACCEPT -A zone_wan_input -p tcp -m tcp --dport 1194 -m comment --comment "!fw3: openvpn" -j ACCEPT -A zone_wan_input -p udp -m udp --dport 1194 -m comment --comment "!fw3: openvpn" -j ACCEPT -A zone_wan_input -p tcp -m tcp --dport 1723 -m comment --comment "!fw3: pptp" -j ACCEPT -A zone_wan_input -p gre -m comment --comment "!fw3: gre" -j ACCEPT -A zone_wan_input -p tcp -m tcp --dport 10240 -m comment --comment "!fw3: ssrs" -j ACCEPT -A zone_wan_input -p tcp -m tcp --dport 1688 -m comment --comment "!fw3: kms" -j ACCEPT -A zone_wan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT -A zone_wan_input -m comment --comment "!fw3" -j zone_wan_src_REJECT -A zone_wan_output -m comment --comment "!fw3: Custom wan output rule chain" -j output_wan_rule -A zone_wan_output -m comment --comment "!fw3" -j zone_wan_dest_ACCEPT COMMIT # Completed on Fri Sep 8 01:02:14 2023 #IPv6 NAT chain # Generated by ip6tables-save v1.8.7 on Fri Sep 8 01:02:14 2023 *nat :PREROUTING ACCEPT [799:131047] :INPUT ACCEPT [407:34378] :OUTPUT ACCEPT [655:62117] :POSTROUTING ACCEPT [1453:192933] -A PREROUTING -p udp -m udp --dport 53 -j REDIRECT --to-ports 53 -A PREROUTING -p tcp -m tcp --dport 53 -j REDIRECT --to-ports 53 COMMIT # Completed on Fri Sep 8 01:02:14 2023 #IPv6 Mangle chain # Generated by ip6tables-save v1.8.7 on Fri Sep 8 01:02:14 2023 *mangle :PREROUTING ACCEPT [11945:1914908] :INPUT ACCEPT [7350:1055681] :FORWARD ACCEPT [8866:1842322] :OUTPUT ACCEPT [4649:522900] :POSTROUTING ACCEPT [13543:2370854] :qos_Default - [0:0] :qos_Default_ct - [0:0] -A qos_Default -j CONNMARK --restore-mark --nfmask 0xf --ctmask 0xf -A qos_Default -m mark --mark 0x0/0xf -j qos_Default_ct -A qos_Default -p udp -m mark --mark 0x0/0xf0 -m length --length 0:500 -j MARK --set-xmark 0x22/0xff -A qos_Default -p icmp -j MARK --set-xmark 0x11/0xff -A qos_Default -p tcp -m mark --mark 0x0/0xf0 -m tcp --sport 1024:65535 --dport 1024:65535 -j MARK --set-xmark 0x44/0xff -A qos_Default -p udp -m mark --mark 0x0/0xf0 -m udp --sport 1024:65535 --dport 1024:65535 -j MARK --set-xmark 0x44/0xff -A qos_Default -j CONNMARK --save-mark --nfmask 0xff --ctmask 0xff -A qos_Default_ct -p tcp -m mark --mark 0x0/0xf -m tcp -m multiport --ports 22,53 -m comment --comment "ssh, dns" -j MARK --set-xmark 0x11/0xff -A qos_Default_ct -p udp -m mark --mark 0x0/0xf -m udp -m multiport --ports 22,53 -m comment --comment "ssh, dns" -j MARK --set-xmark 0x11/0xff -A qos_Default_ct -p tcp -m mark --mark 0x0/0xf -m tcp -m multiport --ports 20,21,25,80,110,443,993,995 -m comment --comment "ftp, smtp, http(s), imap" -j MARK --set-xmark 0x33/0xff -A qos_Default_ct -p tcp -m mark --mark 0x0/0xf -m tcp -m multiport --ports 5190 -m comment --comment "AOL, iChat, ICQ" -j MARK --set-xmark 0x22/0xff -A qos_Default_ct -p udp -m mark --mark 0x0/0xf -m udp -m multiport --ports 5190 -m comment --comment "AOL, iChat, ICQ" -j MARK --set-xmark 0x22/0xff -A qos_Default_ct -j CONNMARK --save-mark --nfmask 0xff --ctmask 0xff COMMIT # Completed on Fri Sep 8 01:02:14 2023 #IPv6 Filter chain # Generated by ip6tables-save v1.8.7 on Fri Sep 8 01:02:14 2023 *filter :INPUT ACCEPT [9:3224] :FORWARD DROP [0:0] :OUTPUT ACCEPT [18:4244] :MINIUPNPD - [0:0] :SOCAT - [0:0] :forwarding_VPN_rule - [0:0] :forwarding_docker_rule - [0:0] :forwarding_lan_rule - [0:0] :forwarding_rule - [0:0] :forwarding_vpn_rule - [0:0] :forwarding_wan_rule - [0:0] :input_VPN_rule - [0:0] :input_docker_rule - [0:0] :input_lan_rule - [0:0] :input_rule - [0:0] :input_vpn_rule - [0:0] :input_wan_rule - [0:0] :output_VPN_rule - [0:0] :output_docker_rule - [0:0] :output_lan_rule - [0:0] :output_rule - [0:0] :output_vpn_rule - [0:0] :output_wan_rule - [0:0] :reject - [0:0] :syn_flood - [0:0] :zone_VPN_dest_ACCEPT - [0:0] :zone_VPN_forward - [0:0] :zone_VPN_input - [0:0] :zone_VPN_output - [0:0] :zone_VPN_src_ACCEPT - [0:0] :zone_docker_dest_ACCEPT - [0:0] :zone_docker_forward - [0:0] :zone_docker_input - [0:0] :zone_docker_output - [0:0] :zone_docker_src_ACCEPT - [0:0] :zone_lan_dest_ACCEPT - [0:0] :zone_lan_forward - [0:0] :zone_lan_input - [0:0] :zone_lan_output - [0:0] :zone_lan_src_ACCEPT - [0:0] :zone_vpn_dest_ACCEPT - [0:0] :zone_vpn_forward - [0:0] :zone_vpn_input - [0:0] :zone_vpn_output - [0:0] :zone_vpn_src_ACCEPT - [0:0] :zone_wan_dest_ACCEPT - [0:0] :zone_wan_dest_DROP - [0:0] :zone_wan_dest_REJECT - [0:0] :zone_wan_forward - [0:0] :zone_wan_input - [0:0] :zone_wan_output - [0:0] :zone_wan_src_REJECT - [0:0] -A INPUT -j SOCAT -A INPUT -i lo -m comment --comment "!fw3" -j ACCEPT -A INPUT -m comment --comment "!fw3: Custom input rule chain" -j input_rule -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT -A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m comment --comment "!fw3" -j syn_flood -A INPUT -i br-lan -m comment --comment "!fw3" -j zone_lan_input -A INPUT -i ipsec0 -m comment --comment "!fw3" -j zone_VPN_input -A INPUT -i tun0 -m comment --comment "!fw3" -j zone_vpn_input -A INPUT -i docker0 -m comment --comment "!fw3" -j zone_docker_input -A FORWARD -m comment --comment "!fw3: Custom forwarding rule chain" -j forwarding_rule -A FORWARD -m comment --comment "!fw3: Traffic offloading" -m conntrack --ctstate RELATED,ESTABLISHED -j FLOWOFFLOAD -A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT -A FORWARD -p tcp -m tcp --dport 22 -m comment --comment "!fw3: drop-wan-ssh" -j zone_wan_dest_DROP -A FORWARD -i br-lan -m comment --comment "!fw3" -j zone_lan_forward -A FORWARD -i ipsec0 -m comment --comment "!fw3" -j zone_VPN_forward -A FORWARD -i tun0 -m comment --comment "!fw3" -j zone_vpn_forward -A FORWARD -i docker0 -m comment --comment "!fw3" -j zone_docker_forward -A FORWARD -m comment --comment "!fw3" -j reject -A OUTPUT -o lo -m comment --comment "!fw3" -j ACCEPT -A OUTPUT -m comment --comment "!fw3: Custom output rule chain" -j output_rule -A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT -A OUTPUT -o br-lan -m comment --comment "!fw3" -j zone_lan_output -A OUTPUT -o ipsec0 -m comment --comment "!fw3" -j zone_VPN_output -A OUTPUT -o tun0 -m comment --comment "!fw3" -j zone_vpn_output -A OUTPUT -o docker0 -m comment --comment "!fw3" -j zone_docker_output -A reject -p tcp -m comment --comment "!fw3" -j REJECT --reject-with tcp-reset -A reject -m comment --comment "!fw3" -j REJECT --reject-with icmp6-port-unreachable -A syn_flood -m limit --limit 25/sec --limit-burst 50 -m comment --comment "!fw3" -j RETURN -A syn_flood -m comment --comment "!fw3" -j DROP -A zone_VPN_dest_ACCEPT -o ipsec0 -m comment --comment "!fw3" -j ACCEPT -A zone_VPN_forward -m comment --comment "!fw3: Custom VPN forwarding rule chain" -j forwarding_VPN_rule -A zone_VPN_forward -m comment --comment "!fw3" -j zone_VPN_dest_ACCEPT -A zone_VPN_input -m comment --comment "!fw3: Custom VPN input rule chain" -j input_VPN_rule -A zone_VPN_input -m comment --comment "!fw3" -j zone_VPN_src_ACCEPT -A zone_VPN_output -m comment --comment "!fw3: Custom VPN output rule chain" -j output_VPN_rule -A zone_VPN_output -m comment --comment "!fw3" -j zone_VPN_dest_ACCEPT -A zone_VPN_src_ACCEPT -i ipsec0 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT -A zone_docker_dest_ACCEPT -o docker0 -m comment --comment "!fw3" -j ACCEPT -A zone_docker_forward -m comment --comment "!fw3: Custom docker forwarding rule chain" -j forwarding_docker_rule -A zone_docker_forward -m comment --comment "!fw3" -j zone_docker_dest_ACCEPT -A zone_docker_input -m comment --comment "!fw3: Custom docker input rule chain" -j input_docker_rule -A zone_docker_input -m comment --comment "!fw3" -j zone_docker_src_ACCEPT -A zone_docker_output -m comment --comment "!fw3: Custom docker output rule chain" -j output_docker_rule -A zone_docker_output -m comment --comment "!fw3" -j zone_docker_dest_ACCEPT -A zone_docker_src_ACCEPT -i docker0 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT -A zone_lan_dest_ACCEPT -o br-lan -m comment --comment "!fw3" -j ACCEPT -A zone_lan_forward -j MINIUPNPD -A zone_lan_forward -m comment --comment "!fw3: Custom lan forwarding rule chain" -j forwarding_lan_rule -A zone_lan_forward -m comment --comment "!fw3: Zone lan to wan forwarding policy" -j zone_wan_dest_ACCEPT -A zone_lan_forward -m comment --comment "!fw3: Zone lan to vpn forwarding policy" -j zone_vpn_dest_ACCEPT -A zone_lan_forward -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT -A zone_lan_input -m comment --comment "!fw3: Custom lan input rule chain" -j input_lan_rule -A zone_lan_input -m comment --comment "!fw3" -j zone_lan_src_ACCEPT -A zone_lan_output -m comment --comment "!fw3: Custom lan output rule chain" -j output_lan_rule -A zone_lan_output -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT -A zone_lan_src_ACCEPT -i br-lan -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT -A zone_vpn_dest_ACCEPT -o tun0 -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP -A zone_vpn_dest_ACCEPT -o tun0 -m comment --comment "!fw3" -j ACCEPT -A zone_vpn_forward -m comment --comment "!fw3: Custom vpn forwarding rule chain" -j forwarding_vpn_rule -A zone_vpn_forward -m comment --comment "!fw3: Zone vpn to wan forwarding policy" -j zone_wan_dest_ACCEPT -A zone_vpn_forward -m comment --comment "!fw3: Zone vpn to lan forwarding policy" -j zone_lan_dest_ACCEPT -A zone_vpn_forward -m comment --comment "!fw3" -j zone_vpn_dest_ACCEPT -A zone_vpn_input -m comment --comment "!fw3: Custom vpn input rule chain" -j input_vpn_rule -A zone_vpn_input -m comment --comment "!fw3" -j zone_vpn_src_ACCEPT -A zone_vpn_output -m comment --comment "!fw3: Custom vpn output rule chain" -j output_vpn_rule -A zone_vpn_output -m comment --comment "!fw3" -j zone_vpn_dest_ACCEPT -A zone_vpn_src_ACCEPT -i tun0 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT -A zone_wan_forward -m comment --comment "!fw3: Custom wan forwarding rule chain" -j forwarding_wan_rule -A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 128 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT -A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 129 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT -A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT -A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 2 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT -A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 3 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT -A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 4/0 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT -A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 4/1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT -A zone_wan_forward -p esp -m comment --comment "!fw3: Allow-IPSec-ESP" -j zone_lan_dest_ACCEPT -A zone_wan_forward -p udp -m udp --dport 500 -m comment --comment "!fw3: Allow-ISAKMP" -j zone_lan_dest_ACCEPT -A zone_wan_forward -m comment --comment "!fw3" -j zone_wan_dest_REJECT -A zone_wan_input -m comment --comment "!fw3: Custom wan input rule chain" -j input_wan_rule -A zone_wan_input -s fc00::/6 -d fc00::/6 -p udp -m udp --dport 546 -m comment --comment "!fw3: Allow-DHCPv6" -j ACCEPT -A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 130/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT -A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 131/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT -A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 132/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT -A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 143/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT -A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 128 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT -A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 129 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT -A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT -A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 2 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT -A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 3 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT -A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 4/0 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT -A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 4/1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT -A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 133 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT -A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 135 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT -A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 134 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT -A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 136 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT -A zone_wan_input -p tcp -m tcp --dport 8118 -m comment --comment "!fw3: adblock" -j DROP -A zone_wan_input -p udp -m udp --dport 500 -m comment --comment "!fw3: ike" -j ACCEPT -A zone_wan_input -p udp -m udp --dport 4500 -m comment --comment "!fw3: ipsec" -j ACCEPT -A zone_wan_input -p ah -m comment --comment "!fw3: ah" -j ACCEPT -A zone_wan_input -p esp -m comment --comment "!fw3: esp" -j ACCEPT -A zone_wan_input -p tcp -m tcp --dport 1194 -m comment --comment "!fw3: openvpn" -j ACCEPT -A zone_wan_input -p udp -m udp --dport 1194 -m comment --comment "!fw3: openvpn" -j ACCEPT -A zone_wan_input -p tcp -m tcp --dport 1723 -m comment --comment "!fw3: pptp" -j ACCEPT -A zone_wan_input -p gre -m comment --comment "!fw3: gre" -j ACCEPT -A zone_wan_input -p tcp -m tcp --dport 10240 -m comment --comment "!fw3: ssrs" -j ACCEPT -A zone_wan_input -p tcp -m tcp --dport 1688 -m comment --comment "!fw3: kms" -j ACCEPT -A zone_wan_input -m comment --comment "!fw3" -j zone_wan_src_REJECT -A zone_wan_output -m comment --comment "!fw3: Custom wan output rule chain" -j output_wan_rule -A zone_wan_output -m comment --comment "!fw3" -j zone_wan_dest_ACCEPT COMMIT # Completed on Fri Sep 8 01:02:14 2023 #===================== IPSET状态 =====================# Name: cn Name: ct Name: cnc Name: cmcc Name: crtc Name: cernet Name: gwbn Name: othernet Name: music Name: mwan3_connected_v4 Name: mwan3_connected_v6 Name: mwan3_source_v6 Name: mwan3_dynamic_v4 Name: mwan3_dynamic_v6 Name: mwan3_custom_v4 Name: mwan3_custom_v6 Name: china_ip_route Name: localnetwork Name: mwan3_connected #===================== 路由表状态 =====================# #route -n Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 0.0.0.0 10.0.0.1 0.0.0.0 UG 0 0 0 br-lan 10.0.0.0 0.0.0.0 255.255.255.0 U 0 0 0 br-lan 172.31.0.0 0.0.0.0 255.255.255.0 U 0 0 0 docker0 #ip route list default via 10.0.0.1 dev br-lan proto static 10.0.0.0/24 dev br-lan proto kernel scope link src 10.0.0.88 172.31.0.0/24 dev docker0 proto kernel scope link src 172.31.0.1 linkdown #ip rule show 0: from all lookup local 32765: from all fwmark 0x162 lookup 354 32766: from all lookup main 32767: from all lookup default #===================== Tun设备状态 =====================# #===================== 端口占用状态 =====================# tcp 0 0 :::7890 :::* LISTEN 18842/clash tcp 0 0 :::7891 :::* LISTEN 18842/clash tcp 0 0 :::7892 :::* LISTEN 18842/clash tcp 0 0 :::7893 :::* LISTEN 18842/clash tcp 0 0 :::7895 :::* LISTEN 18842/clash tcp 0 0 :::9090 :::* LISTEN 18842/clash udp 0 0 :::7874 :::* 18842/clash udp 0 0 :::7891 :::* 18842/clash udp 0 0 :::7892 :::* 18842/clash udp 0 0 :::7893 :::* 18842/clash udp 0 0 :::7895 :::* 18842/clash #===================== 测试本机DNS查询 =====================# Server: 127.0.0.1 Address: 127.0.0.1:53 Name: www.baidu.com Address: 198.18.0.13 #===================== resolv.conf.d =====================# # Interface lan nameserver 10.0.0.1 #===================== 测试本机网络连接 =====================# #===================== 测试本机网络下载 =====================# #===================== 最近运行日志 =====================# 2023-09-08 00:42:44 OpenClash Start Successful! 2023-09-08 00:43:30 OpenClash Stoping... 2023-09-08 00:43:30 Step 1: Backup The Current Groups State... 2023-09-08 00:43:30 Step 2: Delete OpenClash Firewall Rules... 2023-09-08 00:43:32 Step 3: Close The OpenClash Daemons... 2023-09-08 00:43:32 Step 4: Close The Clash Core Process... 2023-09-08 00:43:32 Step 5: Restart Dnsmasq... 2023-09-08 00:43:32 Step 6: Delete OpenClash Residue File... 2023-09-08 00:43:32 OpenClash Start Running... 2023-09-08 00:43:32 Step 1: Get The Configuration... 2023-09-08 00:43:33 Step 2: Check The Components... 2023-09-08 00:43:34 Setting Fake IP Filter... 2023-09-08 00:43:35 Tip: Because of the file【 /etc/config/openclash 】modificated, Pause quick start... 2023-09-08 00:43:35 Step 3: Modify The Config File... 2023-09-08 00:43:41 Step 4: Start Running The Clash Core... 2023-09-08 00:43:41 Tip: Detected The Exclusive Function of The TUN Core, Use TUN Core to Start... 2023-09-08 00:43:42 Step 5: Check The Core Status... time="2023-09-08T00:43:42+08:00" level=info msg="Start initial compatible provider 🍂 Domestic" time="2023-09-08T00:43:42+08:00" level=info msg="Start initial compatible provider ☁️ Others" time="2023-09-08T00:43:42+08:00" level=info msg="Start initial compatible provider ⭐️ Auto" time="2023-09-08T00:43:42+08:00" level=info msg="Start initial compatible provider 🍃 Proxies" 2023-09-08 00:43:45 Step 6: Wait For The File Downloading... 2023-09-08 00:43:46 Step 7: Set Control Panel... 2023-09-08 00:43:46 Step 8: Set Firewall Rules... 2023-09-08 00:43:55 Step 9: Restart Dnsmasq... 2023-09-08 00:43:55 Step 10: Add Cron Rules, Start Daemons... 2023-09-08 00:43:55 OpenClash Start Successful! 2023-09-08 00:49:32 OpenClash Stoping... 2023-09-08 00:49:32 Step 1: Backup The Current Groups State... 2023-09-08 00:49:32 Step 2: Delete OpenClash Firewall Rules... 2023-09-08 00:49:33 Step 3: Close The OpenClash Daemons... 2023-09-08 00:49:33 Step 4: Close The Clash Core Process... 2023-09-08 00:49:33 Step 5: Restart Dnsmasq... 2023-09-08 00:49:33 Step 6: Delete OpenClash Residue File... 2023-09-08 00:49:34 OpenClash Start Running... 2023-09-08 00:49:34 Step 1: Get The Configuration... 2023-09-08 00:49:34 Step 2: Check The Components... 2023-09-08 00:49:35 Step 4: Start Running The Clash Core... 2023-09-08 00:49:35 Tip: Detected The Exclusive Function of The TUN Core, Use TUN Core to Start... 2023-09-08 00:49:36 Step 5: Check The Core Status... time="2023-09-08T00:49:37+08:00" level=info msg="Start initial compatible provider ⭐️ Auto" time="2023-09-08T00:49:37+08:00" level=info msg="Start initial compatible provider 🍃 Proxies" time="2023-09-08T00:49:37+08:00" level=info msg="Start initial compatible provider ☁️ Others" time="2023-09-08T00:49:37+08:00" level=info msg="Start initial compatible provider 🍂 Domestic" 2023-09-08 00:49:39 Step 6: Wait For The File Downloading... 2023-09-08 00:49:40 Step 7: Set Control Panel... 2023-09-08 00:49:40 Step 8: Set Firewall Rules... 2023-09-08 00:49:49 Step 9: Restart Dnsmasq... 2023-09-08 00:49:49 Step 10: Add Cron Rules, Start Daemons... 2023-09-08 00:49:49 OpenClash Start Successful! #===================== 活动连接信息 =====================#
No response
可以在TUN模式上外网
相同问题
This issue is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 5 days
Verify Steps
OpenClash Version
v0.45.02-beta
Bug on Environment
Other
Bug on Platform
Linux-armv7
To Reproduce
openclash 在redir的兼容模式,可以正常上内外网。启用TUN模式后,不管是fake-ip还是redir,都上不了外网。
Describe the Bug
openclash 在redir的兼容模式,可以正常上内外网。启用TUN模式后,不管是fake-ip还是redir,都上不了外网。 有一个我自己发现的问题,不知道有没有关系。配置文件里tun的auto-route相关的都是false,我发现mac上的是true。 但我找了半天,没发现哪里可以改,在配置文件里直接改,也不生效。
tun: enable: true stack: gvisor auto-route: false auto-detect-interface: false dns-hijack:
OpenClash Log
OpenClash 调试日志
生成时间: 2023-09-08 01:02:11 插件版本: v0.45.02-beta 隐私提示: 上传此日志前请注意检查、屏蔽公网IP、节点、密码等相关敏感信息
OpenClash Config
No response
Expected Behavior
可以在TUN模式上外网
Screenshots
No response