vernesong / OpenClash

A Clash Client For OpenWrt
MIT License
16.55k stars 3.06k forks source link

[Bug] dns开启劫持就失败 #3535

Closed xiaolongzhou123 closed 9 months ago

xiaolongzhou123 commented 11 months ago

Verify Steps

OpenClash Version

v0.45.141-beta

Bug on Environment

Lean

Bug on Platform

Linux-amd64(x86-64)

To Reproduce

不用什么dns,只用Dnsmasq 和openclash

只要开启openclash。劫持。就失法解析dns

国内的域名解析都是正常的。只是国外的不行

Describe the Bug

以用openclash很久了。从来没有遇到过这个问题。 dns无法解析。解析失败

  1. openclash只要开启dns劫持,它就无法解析dns.
  2. 为此我重新刷机也无法生效
  3. 我也重新编辑了安装了openclash最新版本也是一样。我郁闷了

OpenClash Log

OpenClash 调试日志

生成时间: 2023-09-29 00:37:01 插件版本: v0.45.141-beta 隐私提示: 上传此日志前请注意检查、屏蔽公网IP、节点、密码等相关敏感信息


#===================== 系统信息 =====================#

主机型号: Intel(R) Client Systems NUC7i5BNH - Intel(R) Core(TM) i5-7260U CPU @ 2.20GHz : 2 Core 4 Thread
固件版本: OpenWrt SNAPSHOT r5804-e643c1b72
LuCI版本: git-23.198.59743-991daf5-1
内核版本: 5.15.98
处理器架构: x86_64

#此项有值时,如不使用IPv6,建议到网络-接口-lan的设置中禁用IPV6的DHCP
IPV6-DHCP: 

DNS劫持: Dnsmasq 转发
#DNS劫持为Dnsmasq时,此项结果应仅有配置文件的DNS监听地址
Dnsmasq转发设置: 127.0.0.1#7874

#===================== 依赖检查 =====================#

dnsmasq-full: 已安装
coreutils: 已安装
coreutils-nohup: 已安装
bash: 已安装
curl: 已安装
ca-certificates: 已安装
ipset: 已安装
ip-full: 已安装
libcap: 已安装
libcap-bin: 已安装
ruby: 已安装
ruby-yaml: 已安装
ruby-psych: 已安装
ruby-pstore: 已安装
kmod-tun(TUN模式): 已安装
luci-compat(Luci >= 19.07): 已安装
kmod-inet-diag(PROCESS-NAME): 未安装
unzip: 已安装
iptables-mod-tproxy: 已安装
kmod-ipt-tproxy: 已安装
iptables-mod-extra: 已安装
kmod-ipt-extra: 已安装
kmod-ipt-nat: 已安装

#===================== 内核检查 =====================#

运行状态: 运行中
运行内核:Dev
进程pid: 17812
运行权限: 17812: cap_dac_override,cap_net_bind_service,cap_net_admin,cap_net_raw,cap_sys_ptrace,cap_sys_resource=eip
运行用户: nobody
已选择的架构: linux-amd64

#下方无法显示内核版本号时请确认您的内核版本是否正确或者有无权限
Tun内核版本: 
Tun内核文件: 不存在
Tun内核运行权限: 否

Dev内核版本: v1.15.1-7-g6eee226
Dev内核文件: 存在
Dev内核运行权限: 正常

Meta内核版本: 
Meta内核文件: 不存在
Meta内核运行权限: 否

#===================== 插件设置 =====================#

当前配置文件: /etc/openclash/config/wgetcloud.yaml
启动配置文件: /etc/openclash/wgetcloud.yaml
运行模式: redir-host
默认代理模式: rule
UDP流量转发(tproxy): 启用
自定义DNS: 启用
IPV6代理: 停用
IPV6-DNS解析: 停用
禁用Dnsmasq缓存: 启用
自定义规则: 停用
仅允许内网: 停用
仅代理命中规则流量: 停用
仅允许常用端口流量: 停用
绕过中国大陆IP: 启用
路由本机代理: 启用

#启动异常时建议关闭此项后重试
混合节点: 停用
保留配置: 停用

#启动异常时建议关闭此项后重试
第三方规则: 停用

#===================== 配置文件 =====================#

port: 7890
socks-port: 7891
allow-lan: true
mode: rule
log-level: info
external-controller: 0.0.0.0:9090
proxy-groups:
- name: "\U0001F530 节点选择"
  type: select
  proxies:
  - "♻️ 自动选择"
  - "\U0001F3AF 全球直连"
  - "\U0001F1ED\U0001F1F0 香港 01"
  - "\U0001F1ED\U0001F1F0 香港 02"
  - "\U0001F1ED\U0001F1F0 香港 03"
  - "\U0001F1E8\U0001F1F3 台湾 01"
  - "\U0001F1E8\U0001F1F3 台湾 02"
  - "\U0001F1E8\U0001F1F3 台湾 03"
  - "\U0001F1F3\U0001F1F1 荷兰 01 5"
  - "\U0001F1F5\U0001F1ED 菲律宾 01 5"
  - "\U0001F1F2\U0001F1FE 马来西亚 01 5"
- name: "♻️ 自动选择"
  type: url-test
  url: http://www.gstatic.com/generate_204
  interval: 300
  proxies:
  - "\U0001F1ED\U0001F1F0 香港 01"
  - "\U0001F1ED\U0001F1F0 香港 02"
  - "\U0001F1ED\U0001F1F0 香港 03"
  - "\U0001F1E8\U0001F1F3 台湾 01"
  - "\U0001F1F3\U0001F1F1 荷兰 01 5"
  - "\U0001F1F5\U0001F1ED 菲律宾 01 5"
  - "\U0001F1F2\U0001F1FE 马来西亚 01 5"
- name: "\U0001F3A5 NETFLIX"
  type: select
  proxies:
  - "\U0001F530 节点选择"
  - "♻️ 自动选择"
  - "\U0001F3AF 全球直连"
  - "\U0001F1ED\U0001F1F0 香港 01"
  - "\U0001F1ED\U0001F1F0 香港 02"
  - "\U0001F1ED\U0001F1F0 香港 03"
  - "\U0001F1E8\U0001F1F3 台湾 01"
  - "\U0001F1E8\U0001F1F3 台湾 02"
  - "\U0001F1EC\U0001F1E7 英国 01 5"
  - "\U0001F1F3\U0001F1F1 荷兰 01 5"
  - "\U0001F1F5\U0001F1ED 菲律宾 01 5"
  - "\U0001F1F2\U0001F1FE 马来西亚 01 5"
- name: "\U0001F525 CHATGPT"
  type: select
  proxies:
  - "\U0001F530 节点选择"
  - "♻️ 自动选择"
  - "\U0001F3AF 全球直连"
  - "\U0001F1ED\U0001F1F0 香港 01"
  - "\U0001F1ED\U0001F1F0 香港 02"
  - "\U0001F1ED\U0001F1F0 香港 03"
  - "\U0001F1E8\U0001F1F3 台湾 01"
  - "\U0001F1E8\U0001F1F3 台湾 02"
  - "\U0001F1F3\U0001F1F1 荷兰 01 5"
  - "\U0001F1F5\U0001F1ED 菲律宾 01 5"
  - "\U0001F1F2\U0001F1FE 马来西亚 01 5"
- name: "\U0001F30D 国外媒体"
  type: select
  proxies:
  - "\U0001F530 节点选择"
  - "♻️ 自动选择"
  - "\U0001F3AF 全球直连"
  - "\U0001F1ED\U0001F1F0 香港 01"
  - "\U0001F1ED\U0001F1F0 香港 02"
  - "\U0001F1ED\U0001F1F0 香港 03"
  - "\U0001F1E8\U0001F1F3 台湾 01"
  - "\U0001F1F9\U0001F1ED 泰国 01 5"
  - "\U0001F1E6\U0001F1FA 澳大利亚 01 5"
  - "\U0001F1EC\U0001F1E7 英国 01 5"
  - "\U0001F1F3\U0001F1F1 荷兰 01 5"
  - "\U0001F1F5\U0001F1ED 菲律宾 01 5"
  - "\U0001F1F2\U0001F1FE 马来西亚 01 5"
- name: "\U0001F30F 国内媒体"
  type: select
  proxies:
  - "\U0001F3AF 全球直连"
  - "\U0001F1ED\U0001F1F0 香港 01"
  - "\U0001F1ED\U0001F1F0 香港 02"
  - "\U0001F1ED\U0001F1F0 香港 03"
  - "\U0001F1E8\U0001F1F3 台湾 01"
  - "\U0001F1E8\U0001F1F3 台湾 02"
  - "\U0001F1E8\U0001F1F3 台湾 02 5"
  - "\U0001F1E8\U0001F1F3 台湾 03 5"
  - "\U0001F530 节点选择"
- name: Ⓜ️ 微软服务
  type: select
  proxies:
  - "\U0001F3AF 全球直连"
  - "\U0001F530 节点选择"
  - "\U0001F1ED\U0001F1F0 香港 01"
  - "\U0001F1ED\U0001F1F0 香港 02"
  - "\U0001F1ED\U0001F1F0 香港 03"
  - "\U0001F1E8\U0001F1F3 台湾 01"
  - "\U0001F1E8\U0001F1F3 台湾 02"
  - "\U0001F1E8\U0001F1F3 台湾 03"
  - "\U0001F1F8\U0001F1EC 新加坡 01"
  - "\U0001F1F8\U0001F1EC 新加坡 02"
  - "\U0001F1F8\U0001F1EC 新加坡 03"
  - "\U0001F1EF\U0001F1F5 日本 01"
  - "\U0001F1EF\U0001F1F5 日本 02"
  - "\U0001F1EF\U0001F1F5 日本 03"
  - "\U0001F1F9\U0001F1ED 泰国 01 5"
  - "\U0001F1E6\U0001F1FA 澳大利亚 01 5"
  - "\U0001F1EC\U0001F1E7 英国 01 5"
  - "\U0001F1F3\U0001F1F1 荷兰 01 5"
  - "\U0001F1F5\U0001F1ED 菲律宾 01 5"
  - "\U0001F1F2\U0001F1FE 马来西亚 01 5"
- name: "\U0001F4F2 电报信息"
  type: select
  proxies:
  - "\U0001F530 节点选择"
  - "\U0001F3AF 全球直连"
  - "\U0001F1ED\U0001F1F0 香港 01"
  - "\U0001F1ED\U0001F1F0 香港 02"
  - "\U0001F1ED\U0001F1F0 香港 03"
  - "\U0001F1E8\U0001F1F3 台湾 01"
  - "\U0001F1E8\U0001F1F3 台湾 02"
  - "\U0001F1E8\U0001F1F3 台湾 03"
  - "\U0001F1F8\U0001F1EC 新加坡 01"
  - "\U0001F1E6\U0001F1FA 澳大利亚 01 5"
  - "\U0001F1EC\U0001F1E7 英国 01 5"
  - "\U0001F1F3\U0001F1F1 荷兰 01 5"
  - "\U0001F1F5\U0001F1ED 菲律宾 01 5"
  - "\U0001F1F2\U0001F1FE 马来西亚 01 5"
- name: "\U0001F34E 苹果服务"
  type: select
  proxies:
  - "\U0001F530 节点选择"
  - "\U0001F3AF 全球直连"
  - "♻️ 自动选择"
  - "\U0001F1ED\U0001F1F0 香港 01"
  - "\U0001F1E8\U0001F1F3 台湾 01 4"
  - "\U0001F1E8\U0001F1F3 台湾 02 4"
  - "\U0001F1E8\U0001F1F3 台湾 03 4"
  - "\U0001F1F8\U0001F1EC 新加坡 01 4"
  - "\U0001F1F8\U0001F1EC 新加坡 02 4"
  - "\U0001F1F8\U0001F1EC 新加坡 03 4"
  - "\U0001F1EF\U0001F1F5 日本 01 4"
  - "\U0001F1EC\U0001F1E7 英国 01 5"
  - "\U0001F1F3\U0001F1F1 荷兰 01 5"
  - "\U0001F1F5\U0001F1ED 菲律宾 01 5"
  - "\U0001F1F2\U0001F1FE 马来西亚 01 5"
- name: "\U0001F3AF 全球直连"
  type: select
  proxies:
  - DIRECT
- name: "\U0001F6D1 全球拦截"
  type: select
  proxies:
  - REJECT
  - DIRECT
- name: "\U0001F41F 漏网之鱼"
  type: select
  proxies:
  - "\U0001F530 节点选择"
  - "\U0001F3AF 全球直连"
  - "♻️ 自动选择"
  - "\U0001F1ED\U0001F1F0 香港 01"
  - "\U0001F1ED\U0001F1F0 香港 02"
  - "\U0001F1ED\U0001F1F0 香港 03"
  - "\U0001F1E8\U0001F1F3 台湾 01"
  - "\U0001F1E8\U0001F1F3 台湾 02"
  - "\U0001F1E8\U0001F1F3 台湾 03"
  - "\U0001F1F8\U0001F1EC 新加坡 01"
  - "\U0001F1F8\U0001F1EC 新加坡 02"
  - "\U0001F1F8\U0001F1EC 新加坡 03"
  - "\U0001F1EF\U0001F1F5 日本 01"
  - "\U0001F1EF\U0001F1F5 日本 02"
  - "\U0001F1EF\U0001F1F5 日本 03"
  - "\U0001F1FA\U0001F1F8 美国 01"
  - "\U0001F1FA\U0001F1F8 美国 02"
  - "\U0001F1FA\U0001F1F8 美国 03"
  - "\U0001F1F0\U0001F1F7 韩国 01"
  - "\U0001F1F7\U0001F1FA 俄罗斯 01"
  - "\U0001F1E8\U0001F1E6 加拿大 01"
  - "\U0001F1EE\U0001F1E9 印尼 01"
  - "\U0001F1EE\U0001F1F3 印度 01"
  - "\U0001F1F9\U0001F1F7 土耳其 01"
  - "\U0001F1F5\U0001F1ED 菲律宾 01 5"
  - "\U0001F1F2\U0001F1FE 马来西亚 01 5"
rules:
- DST-PORT,7895,REJECT
- DST-PORT,7892,REJECT
- IP-CIDR,198.18.0.1/16,REJECT,no-resolve
- "DOMAIN-SUFFIX,local,\U0001F3AF 全球直连"
- "IP-CIDR,192.168.0.0/16,\U0001F3AF 全球直连,no-resolve"
- "IP-CIDR,11.11.0.0/16,\U0001F3AF 全球直连,no-resolve"
- "IP-CIDR,18.18.0.0/16,\U0001F3AF 全球直连,no-resolve"
- "IP-CIDR,10.0.0.0/8,\U0001F3AF 全球直连,no-resolve"
- "IP-CIDR,172.16.0.0/12,\U0001F3AF 全球直连,no-resolve"
- "IP-CIDR,127.0.0.0/8,\U0001F3AF 全球直连,no-resolve"
- "IP-CIDR,100.64.0.0/10,\U0001F3AF 全球直连,no-resolve"
- "IP-CIDR6,::1/128,\U0001F3AF 全球直连,no-resolve"
- "IP-CIDR6,fc00::/7,\U0001F3AF 全球直连,no-resolve"
- "IP-CIDR6,fe80::/10,\U0001F3AF 全球直连,no-resolve"
- "IP-CIDR6,fd00::/8,\U0001F3AF 全球直连,no-resolve"
- DOMAIN-KEYWORD,1drv,Ⓜ️ 微软服务
- DOMAIN-KEYWORD,microsoft,Ⓜ️ 微软服务
- DOMAIN-SUFFIX,aadrm.com,Ⓜ️ 微软服务
- DOMAIN-SUFFIX,acompli.com,Ⓜ️ 微软服务
- DOMAIN-SUFFIX,acompli.net,Ⓜ️ 微软服务
- DOMAIN-SUFFIX,aka.ms,Ⓜ️ 微软服务
- DOMAIN-SUFFIX,akadns.net,Ⓜ️ 微软服务
- "DOMAIN-SUFFIX,chromium.org,\U0001F530 节点选择"
- "DOMAIN-SUFFIX,creativelab5.com,\U0001F530 节点选择"
- "DOMAIN-SUFFIX,debug.com,\U0001F530 节点选择"
- "DOMAIN-SUFFIX,deepmind.com,\U0001F530 节点选择"
- "DOMAIN-SUFFIX,waymo.com,\U0001F530 节点选择"
- "DOMAIN-SUFFIX,webmproject.org,\U0001F530 节点选择"
- "DOMAIN-SUFFIX,webrtc.org,\U0001F530 节点选择"
- "DOMAIN-SUFFIX,whatbrowser.org,\U0001F530 节点选择"
- "DOMAIN-SUFFIX,widevine.com,\U0001F530 节点选择"
- "DOMAIN,news-client-search.apple.com,\U0001F530 节点选择"
- "DOMAIN,crl4.digicert.com,\U0001F530 节点选择"
- "DOMAIN,ocsp.digicert.com,\U0001F530 节点选择"
- "DOMAIN-SUFFIX,inkbunny.net,\U0001F530 节点选择"
- "DOMAIN-SUFFIX,metapix.net,\U0001F530 节点选择"
- "DOMAIN-SUFFIX,s3.amazonaws.com,\U0001F530 节点选择"
- "DOMAIN-SUFFIX,zaobao.com.sg,\U0001F530 节点选择"
- "DOMAIN,international-gfe.download.nvidia.com,\U0001F530 节点选择"
- "DOMAIN-SUFFIX,aaplimg.com,\U0001F34E 苹果服务"
- "DOMAIN-SUFFIX,apple.co,\U0001F34E 苹果服务"
- "DOMAIN-SUFFIX,apple.com,\U0001F34E 苹果服务"
- "DOMAIN-SUFFIX,apple.com.cn,\U0001F34E 苹果服务"
- "DOMAIN-SUFFIX,apple-cloudkit.com,\U0001F34E 苹果服务"
- "DOMAIN-SUFFIX,appstore.com,\U0001F34E 苹果服务"
- "DOMAIN-SUFFIX,cdn-apple.com,\U0001F34E 苹果服务"
- "DOMAIN-SUFFIX,icloud.com,\U0001F34E 苹果服务"
- "DOMAIN-SUFFIX,icloud.com.cn,\U0001F34E 苹果服务"
- "DOMAIN-SUFFIX,icloud-content.com,\U0001F34E 苹果服务"
- "DOMAIN-SUFFIX,me.com,\U0001F34E 苹果服务"
- "DOMAIN-SUFFIX,mzstatic.com,\U0001F34E 苹果服务"
- "DOMAIN-KEYWORD,apple.com.akadns.net,\U0001F34E 苹果服务"
- "DOMAIN-KEYWORD,icloud.com.akadns.net,\U0001F34E 苹果服务"
- "IP-CIDR,17.0.0.0/8,\U0001F34E 苹果服务,no-resolve"
- "IP-CIDR,63.92.224.0/19,\U0001F34E 苹果服务,no-resolve"
- "IP-CIDR,65.199.22.0/23,\U0001F34E 苹果服务,no-resolve"
- "IP-CIDR,139.178.128.0/18,\U0001F34E 苹果服务,no-resolve"
- "IP-CIDR,144.178.0.0/19,\U0001F34E 苹果服务,no-resolve"
- "IP-CIDR,192.35.50.0/24,\U0001F34E 苹果服务,no-resolve"
- "IP-CIDR,198.183.17.0/24,\U0001F34E 苹果服务,no-resolve"
- "IP-CIDR,205.180.175.0/24,\U0001F34E 苹果服务,no-resolve"
- "DOMAIN-SUFFIX,zenki.cn,\U0001F3AF 全球直连"
- "DOMAIN-SUFFIX,fastseer.cn,\U0001F3AF 全球直连"
- "DOMAIN-SUFFIX,qhres.com,\U0001F3AF 全球直连"
- "DOMAIN-SUFFIX,qhimg.com,\U0001F3AF 全球直连"
- "DOMAIN-SUFFIX,alibaba.com,\U0001F3AF 全球直连"

- "PROCESS-NAME,Weiyun,\U0001F3AF 全球直连"
- "DOMAIN-KEYWORD,aria2,\U0001F3AF 全球直连"
- "DOMAIN-KEYWORD,xunlei,\U0001F3AF 全球直连"
- "DOMAIN-KEYWORD,yunpan,\U0001F3AF 全球直连"
- "DOMAIN-KEYWORD,Thunder,\U0001F3AF 全球直连"
- "DOMAIN-KEYWORD,XLLiveUD,\U0001F3AF 全球直连"
- "GEOIP,CN,\U0001F3AF 全球直连"
- "MATCH,\U0001F41F 漏网之鱼"
redir-port: 7892
tproxy-port: 7895
mixed-port: 7893
bind-address: "*"
external-ui: "/usr/share/openclash/ui"
ipv6: false
dns:
  enable: true
  ipv6: false
  enhanced-mode: fake-ip
  fake-ip-range: 198.18.0.1/16
  listen: 0.0.0.0:7874
  nameserver:
  - 202.106.195.68
  - 192.168.24.1
  - 119.29.29.29
  - 223.5.5.5
  - https://doh.pub/dns-query
  - https://dns.alidns.com/dns-query
  fallback:
  - https://dns.cloudflare.com/dns-query
  - https://public.dns.iij.jp/dns-query
  - https://dns.oszx.co/dns-query
  default-nameserver:
  - 202.106.195.68
  - 192.168.24.1
  - 119.29.29.29
  - 223.5.5.5
  fake-ip-filter:
  - "+.*"
profile:
  store-selected: true
authentication:
- Clash:n8VvRAAv

#===================== 自定义覆写设置 =====================#

#!/bin/sh
. /usr/share/openclash/ruby.sh
. /usr/share/openclash/log.sh
. /lib/functions.sh

# This script is called by /etc/init.d/openclash
# Add your custom overwrite scripts here, they will be take effict after the OpenClash own srcipts

LOG_OUT "Tip: Start Running Custom Overwrite Scripts..."
LOGTIME=$(echo $(date "+%Y-%m-%d %H:%M:%S"))
LOG_FILE="/tmp/openclash.log"
CONFIG_FILE="$1" #config path

#Simple Demo:
    #General Demo
    #1--config path
    #2--key name
    #3--value
    #ruby_edit "$CONFIG_FILE" "['redir-port']" "7892"
    #ruby_edit "$CONFIG_FILE" "['secret']" "123456"
    #ruby_edit "$CONFIG_FILE" "['dns']['enable']" "true"

    #Hash Demo
    #1--config path
    #2--key name
    #3--hash type value
    #ruby_edit "$CONFIG_FILE" "['experimental']" "{'sniff-tls-sni'=>true}"
    #ruby_edit "$CONFIG_FILE" "['sniffer']" "{'sniffing'=>['tls','http']}"

    #Array Demo:
    #1--config path
    #2--key name
    #3--position(start from 0, end with -1)
    #4--value
    #ruby_arr_insert "$CONFIG_FILE" "['dns']['nameserver']" "0" "114.114.114.114"

    #Array Add From Yaml File Demo:
    #1--config path
    #2--key name
    #3--position(start from 0, end with -1)
    #4--value file path
    #5--value key name in #4 file
    #ruby_arr_add_file "$CONFIG_FILE" "['dns']['fallback-filter']['ipcidr']" "0" "/etc/openclash/custom/openclash_custom_fallback_filter.yaml" "['fallback-filter']['ipcidr']"

#Ruby Script Demo:
    #ruby -ryaml -rYAML -I "/usr/share/openclash" -E UTF-8 -e "
    #   begin
    #      Value = YAML.load_file('$CONFIG_FILE');
    #   rescue Exception => e
    #      puts '${LOGTIME} Error: Load File Failed,【' + e.message + '】';
    #   end;

        #General
    #   begin
    #   Thread.new{
    #      Value['redir-port']=7892;
    #      Value['tproxy-port']=7895;
    #      Value['port']=7890;
    #      Value['socks-port']=7891;
    #      Value['mixed-port']=7893;
    #   }.join;

    #   rescue Exception => e
    #      puts '${LOGTIME} Error: Set General Failed,【' + e.message + '】';
    #   ensure
    #      File.open('$CONFIG_FILE','w') {|f| YAML.dump(Value, f)};
    #   end" 2>/dev/null >> $LOG_FILE

exit 0
#===================== 自定义防火墙设置 =====================#

#!/bin/sh
. /usr/share/openclash/log.sh
. /lib/functions.sh

# This script is called by /etc/init.d/openclash
# Add your custom firewall rules here, they will be added after the end of the OpenClash iptables rules

LOG_OUT "Tip: Start Add Custom Firewall Rules..."

exit 0
#===================== IPTABLES 防火墙设置 =====================#

#IPv4 NAT chain

# Generated by iptables-save v1.8.7 on Fri Sep 29 00:37:01 2023
*nat
:PREROUTING ACCEPT [7:404]
:INPUT ACCEPT [84:4568]
:OUTPUT ACCEPT [334:20680]
:POSTROUTING ACCEPT [339:20980]
:DOCKER - [0:0]
:MINIUPNPD - [0:0]
:MINIUPNPD-POSTROUTING - [0:0]
:openclash - [0:0]
:openclash_output - [0:0]
:openclash_post - [0:0]
:postrouting_lan_rule - [0:0]
:postrouting_rule - [0:0]
:postrouting_vpn_rule - [0:0]
:prerouting_lan_rule - [0:0]
:prerouting_rule - [0:0]
:prerouting_vpn_rule - [0:0]
:zone_lan_postrouting - [0:0]
:zone_lan_prerouting - [0:0]
:zone_vpn_postrouting - [0:0]
:zone_vpn_prerouting - [0:0]
-A PREROUTING -d 8.8.4.4/32 -p tcp -m comment --comment "OpenClash Google DNS Hijack" -m tcp --dport 53 -j REDIRECT --to-ports 7892
-A PREROUTING -d 8.8.8.8/32 -p tcp -m comment --comment "OpenClash Google DNS Hijack" -m tcp --dport 53 -j REDIRECT --to-ports 7892
-A PREROUTING -p tcp -m tcp --dport 53 -m comment --comment "OpenClash DNS Hijack" -j REDIRECT --to-ports 53
-A PREROUTING -p udp -m udp --dport 53 -m comment --comment "OpenClash DNS Hijack" -j REDIRECT --to-ports 53
-A PREROUTING -p udp -m udp --dport 53 -j REDIRECT --to-ports 53
-A PREROUTING -p tcp -m tcp --dport 53 -j REDIRECT --to-ports 53
-A PREROUTING -m addrtype --dst-type LOCAL -j DOCKER
-A PREROUTING -m comment --comment "!fw3: Custom prerouting rule chain" -j prerouting_rule
-A PREROUTING -i eth0 -m comment --comment "!fw3" -j zone_lan_prerouting
-A PREROUTING -i tun0 -m comment --comment "!fw3" -j zone_vpn_prerouting
-A PREROUTING -p tcp -j openclash
-A OUTPUT ! -d 127.0.0.0/8 -m addrtype --dst-type LOCAL -j DOCKER
-A OUTPUT -j openclash_output
-A POSTROUTING -s 172.22.0.0/16 ! -o br-631d0ee64951 -j MASQUERADE
-A POSTROUTING -s 172.17.0.0/16 ! -o docker0 -j MASQUERADE
-A POSTROUTING -s 172.22.0.5/32 -d 172.22.0.5/32 -p tcp -m tcp --dport 80 -j MASQUERADE
-A POSTROUTING -s 172.22.0.7/32 -d 172.22.0.7/32 -p tcp -m tcp --dport 80 -j MASQUERADE
-A POSTROUTING -s 172.22.0.8/32 -d 172.22.0.8/32 -p tcp -m tcp --dport 20005 -j MASQUERADE
-A POSTROUTING -m comment --comment "!fw3: Custom postrouting rule chain" -j postrouting_rule
-A POSTROUTING -o eth0 -m comment --comment "!fw3" -j zone_lan_postrouting
-A POSTROUTING -o tun0 -m comment --comment "!fw3" -j zone_vpn_postrouting
-A POSTROUTING -m comment --comment "OpenClash Bypass Gateway Compatible" -j openclash_post
-A DOCKER -i br-631d0ee64951 -j RETURN
-A DOCKER -i docker0 -j RETURN
-A DOCKER ! -i br-631d0ee64951 -p tcp -m tcp --dport 9009 -j DNAT --to-destination 172.22.0.5:80
-A DOCKER ! -i br-631d0ee64951 -p tcp -m tcp --dport 9998 -j DNAT --to-destination 172.22.0.7:80
-A DOCKER ! -i br-631d0ee64951 -p tcp -m tcp --dport 20005 -j DNAT --to-destination 172.22.0.8:20005
-A openclash -m set --match-set localnetwork dst -j RETURN
-A openclash -m set --match-set localnetwork src -m set --match-set lan_ac_black_ports src -j RETURN
-A openclash -m set --match-set china_ip_route dst -m set ! --match-set china_ip_route_pass dst -j RETURN
-A openclash -p tcp -j REDIRECT --to-ports 7892
-A openclash_output -m set --match-set localnetwork dst -j RETURN
-A openclash_output -m set --match-set localnetwork src -m set --match-set lan_ac_black_ports src -j RETURN
-A openclash_output -m owner ! --uid-owner 65534 -m set --match-set china_ip_route dst -m set ! --match-set china_ip_route_pass dst -j RETURN
-A openclash_output -p tcp -m owner ! --uid-owner 65534 -j REDIRECT --to-ports 7892
-A openclash_post -m set --match-set localnetwork src -m set --match-set lan_ac_black_ports src -j RETURN
-A openclash_post -m mark --mark 0x162 -j ACCEPT
-A openclash_post -m set --match-set localnetwork dst -j RETURN
-A openclash_post -m addrtype ! --src-type LOCAL -m owner ! --uid-owner 65534 -j MASQUERADE
-A zone_lan_postrouting -j MINIUPNPD-POSTROUTING
-A zone_lan_postrouting -m comment --comment "!fw3: Custom lan postrouting rule chain" -j postrouting_lan_rule
-A zone_lan_prerouting -j MINIUPNPD
-A zone_lan_prerouting -m comment --comment "!fw3: Custom lan prerouting rule chain" -j prerouting_lan_rule
-A zone_vpn_postrouting -m comment --comment "!fw3: Custom vpn postrouting rule chain" -j postrouting_vpn_rule
-A zone_vpn_postrouting -m comment --comment "!fw3" -j MASQUERADE --mode fullcone
-A zone_vpn_prerouting -m comment --comment "!fw3: Custom vpn prerouting rule chain" -j prerouting_vpn_rule
COMMIT
# Completed on Fri Sep 29 00:37:01 2023

#IPv4 Mangle chain

# Generated by iptables-save v1.8.7 on Fri Sep 29 00:37:01 2023
*mangle
:PREROUTING ACCEPT [2950:611149]
:INPUT ACCEPT [2758:586476]
:FORWARD ACCEPT [186:24232]
:OUTPUT ACCEPT [2785:228701]
:POSTROUTING ACCEPT [2971:252933]
:openclash - [0:0]
:openclash_output - [0:0]
:openclash_upnp - [0:0]
:qos_Default - [0:0]
:qos_Default_ct - [0:0]
-A PREROUTING -p udp -j openclash
-A OUTPUT -p udp -j openclash_output
-A openclash -i lo -j RETURN
-A openclash -m set --match-set localnetwork dst -j RETURN
-A openclash -p udp -m udp --dport 53 -j RETURN
-A openclash -m set --match-set localnetwork src -m set --match-set lan_ac_black_ports src -j RETURN
-A openclash -m set --match-set china_ip_route dst -m set ! --match-set china_ip_route_pass dst -j RETURN
-A openclash -p udp -j openclash_upnp
-A openclash -p udp -j TPROXY --on-port 7895 --on-ip 0.0.0.0 --tproxy-mark 0x162/0xffffffff
-A openclash_output -d 198.18.0.0/16 -p udp -m owner ! --uid-owner 65534 -j MARK --set-xmark 0x162/0xffffffff
-A qos_Default -j CONNMARK --restore-mark --nfmask 0xf --ctmask 0xf
-A qos_Default -m mark --mark 0x0/0xf -j qos_Default_ct
-A qos_Default -p udp -m mark --mark 0x0/0xf0 -m length --length 0:500 -j MARK --set-xmark 0x22/0xff
-A qos_Default -p icmp -j MARK --set-xmark 0x11/0xff
-A qos_Default -p tcp -m mark --mark 0x0/0xf0 -m tcp --sport 1024:65535 --dport 1024:65535 -j MARK --set-xmark 0x44/0xff
-A qos_Default -p udp -m mark --mark 0x0/0xf0 -m udp --sport 1024:65535 --dport 1024:65535 -j MARK --set-xmark 0x44/0xff
-A qos_Default -j CONNMARK --save-mark --nfmask 0xff --ctmask 0xff
-A qos_Default_ct -p tcp -m mark --mark 0x0/0xf -m tcp -m multiport --ports 22,53 -m comment --comment "ssh, dns" -j MARK --set-xmark 0x11/0xff
-A qos_Default_ct -p udp -m mark --mark 0x0/0xf -m udp -m multiport --ports 22,53 -m comment --comment "ssh, dns" -j MARK --set-xmark 0x11/0xff
-A qos_Default_ct -p tcp -m mark --mark 0x0/0xf -m tcp -m multiport --ports 20,21,25,80,110,443,993,995 -m comment --comment "ftp, smtp, http(s), imap" -j MARK --set-xmark 0x33/0xff
-A qos_Default_ct -p tcp -m mark --mark 0x0/0xf -m tcp -m multiport --ports 5190 -m comment --comment "AOL, iChat, ICQ" -j MARK --set-xmark 0x22/0xff
-A qos_Default_ct -p udp -m mark --mark 0x0/0xf -m udp -m multiport --ports 5190 -m comment --comment "AOL, iChat, ICQ" -j MARK --set-xmark 0x22/0xff
-A qos_Default_ct -j CONNMARK --save-mark --nfmask 0xff --ctmask 0xff
COMMIT
# Completed on Fri Sep 29 00:37:01 2023

#IPv4 Filter chain

# Generated by iptables-save v1.8.7 on Fri Sep 29 00:37:01 2023
*filter
:INPUT ACCEPT [0:0]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [0:0]
:DOCKER - [0:0]
:DOCKER-ISOLATION-STAGE-1 - [0:0]
:DOCKER-ISOLATION-STAGE-2 - [0:0]
:DOCKER-MAN - [0:0]
:DOCKER-USER - [0:0]
:MINIUPNPD - [0:0]
:forwarding_lan_rule - [0:0]
:forwarding_rule - [0:0]
:forwarding_vpn_rule - [0:0]
:input_lan_rule - [0:0]
:input_rule - [0:0]
:input_vpn_rule - [0:0]
:output_lan_rule - [0:0]
:output_rule - [0:0]
:output_vpn_rule - [0:0]
:reject - [0:0]
:syn_flood - [0:0]
:zone_lan_dest_ACCEPT - [0:0]
:zone_lan_forward - [0:0]
:zone_lan_input - [0:0]
:zone_lan_output - [0:0]
:zone_lan_src_ACCEPT - [0:0]
:zone_vpn_dest_ACCEPT - [0:0]
:zone_vpn_forward - [0:0]
:zone_vpn_input - [0:0]
:zone_vpn_output - [0:0]
:zone_vpn_src_ACCEPT - [0:0]
-A INPUT -p udp -m udp --dport 443 -m comment --comment "OpenClash QUIC REJECT" -m set ! --match-set china_ip_route dst -j REJECT --reject-with icmp-port-unreachable
-A INPUT -i lo -m comment --comment "!fw3" -j ACCEPT
-A INPUT -m comment --comment "!fw3: Custom input rule chain" -j input_rule
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m comment --comment "!fw3" -j syn_flood
-A INPUT -i eth0 -m comment --comment "!fw3" -j zone_lan_input
-A INPUT -i tun0 -m comment --comment "!fw3" -j zone_vpn_input
-A FORWARD -j DOCKER-USER
-A FORWARD -j DOCKER-ISOLATION-STAGE-1
-A FORWARD -o br-631d0ee64951 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -o br-631d0ee64951 -j DOCKER
-A FORWARD -i br-631d0ee64951 ! -o br-631d0ee64951 -j ACCEPT
-A FORWARD -i br-631d0ee64951 -o br-631d0ee64951 -j ACCEPT
-A FORWARD -o docker0 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -o docker0 -j DOCKER
-A FORWARD -i docker0 ! -o docker0 -j ACCEPT
-A FORWARD -i docker0 -o docker0 -j ACCEPT
-A FORWARD -m comment --comment "!fw3: Custom forwarding rule chain" -j forwarding_rule
-A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A FORWARD -i eth0 -m comment --comment "!fw3" -j zone_lan_forward
-A FORWARD -i tun0 -m comment --comment "!fw3" -j zone_vpn_forward
-A FORWARD -m comment --comment "!fw3" -j reject
-A OUTPUT -o lo -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -m comment --comment "!fw3: Custom output rule chain" -j output_rule
-A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -o eth0 -m comment --comment "!fw3" -j zone_lan_output
-A OUTPUT -o tun0 -m comment --comment "!fw3" -j zone_vpn_output
-A DOCKER -d 172.22.0.5/32 ! -i br-631d0ee64951 -o br-631d0ee64951 -p tcp -m tcp --dport 80 -j ACCEPT
-A DOCKER -d 172.22.0.7/32 ! -i br-631d0ee64951 -o br-631d0ee64951 -p tcp -m tcp --dport 80 -j ACCEPT
-A DOCKER -d 172.22.0.8/32 ! -i br-631d0ee64951 -o br-631d0ee64951 -p tcp -m tcp --dport 20005 -j ACCEPT
-A DOCKER-ISOLATION-STAGE-1 -i br-631d0ee64951 ! -o br-631d0ee64951 -j DOCKER-ISOLATION-STAGE-2
-A DOCKER-ISOLATION-STAGE-1 -i docker0 ! -o docker0 -j DOCKER-ISOLATION-STAGE-2
-A DOCKER-ISOLATION-STAGE-1 -j RETURN
-A DOCKER-ISOLATION-STAGE-2 -o br-631d0ee64951 -j DROP
-A DOCKER-ISOLATION-STAGE-2 -o docker0 -j DROP
-A DOCKER-ISOLATION-STAGE-2 -j RETURN
-A DOCKER-MAN -i br-lan -o docker0 -j RETURN
-A DOCKER-MAN -o docker0 -m conntrack --ctstate RELATED,ESTABLISHED -j RETURN
-A DOCKER-MAN -o docker0 -m conntrack --ctstate INVALID,NEW -j DROP
-A DOCKER-MAN -j RETURN
-A DOCKER-USER -j DOCKER-MAN
-A DOCKER-USER -j RETURN
-A reject -p tcp -m comment --comment "!fw3" -j REJECT --reject-with tcp-reset
-A reject -m comment --comment "!fw3" -j REJECT --reject-with icmp-port-unreachable
-A syn_flood -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m limit --limit 25/sec --limit-burst 50 -m comment --comment "!fw3" -j RETURN
-A syn_flood -m comment --comment "!fw3" -j DROP
-A zone_lan_dest_ACCEPT -o eth0 -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_forward -j MINIUPNPD
-A zone_lan_forward -m comment --comment "!fw3: Custom lan forwarding rule chain" -j forwarding_lan_rule
-A zone_lan_forward -m comment --comment "!fw3: Zone lan to vpn forwarding policy" -j zone_vpn_dest_ACCEPT
-A zone_lan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_lan_forward -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_input -m comment --comment "!fw3: Custom lan input rule chain" -j input_lan_rule
-A zone_lan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_lan_input -m comment --comment "!fw3" -j zone_lan_src_ACCEPT
-A zone_lan_output -m comment --comment "!fw3: Custom lan output rule chain" -j output_lan_rule
-A zone_lan_output -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_src_ACCEPT -i eth0 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_vpn_dest_ACCEPT -o tun0 -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
-A zone_vpn_dest_ACCEPT -o tun0 -m comment --comment "!fw3" -j ACCEPT
-A zone_vpn_forward -m comment --comment "!fw3: Custom vpn forwarding rule chain" -j forwarding_vpn_rule
-A zone_vpn_forward -m comment --comment "!fw3: Zone vpn to lan forwarding policy" -j zone_lan_dest_ACCEPT
-A zone_vpn_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_vpn_forward -m comment --comment "!fw3" -j zone_vpn_dest_ACCEPT
-A zone_vpn_input -m comment --comment "!fw3: Custom vpn input rule chain" -j input_vpn_rule
-A zone_vpn_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_vpn_input -m comment --comment "!fw3" -j zone_vpn_src_ACCEPT
-A zone_vpn_output -m comment --comment "!fw3: Custom vpn output rule chain" -j output_vpn_rule
-A zone_vpn_output -m comment --comment "!fw3" -j zone_vpn_dest_ACCEPT
-A zone_vpn_src_ACCEPT -i tun0 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
COMMIT
# Completed on Fri Sep 29 00:37:01 2023

#IPv6 NAT chain

# Generated by ip6tables-save v1.8.7 on Fri Sep 29 00:37:01 2023
*nat
:PREROUTING ACCEPT [0:0]
:INPUT ACCEPT [0:0]
:OUTPUT ACCEPT [84:24967]
:POSTROUTING ACCEPT [84:24967]
-A PREROUTING -p udp -m udp --dport 53 -j REDIRECT --to-ports 53
-A PREROUTING -p tcp -m tcp --dport 53 -j REDIRECT --to-ports 53
COMMIT
# Completed on Fri Sep 29 00:37:01 2023

#IPv6 Mangle chain

# Generated by ip6tables-save v1.8.7 on Fri Sep 29 00:37:01 2023
*mangle
:PREROUTING ACCEPT [48:7116]
:INPUT ACCEPT [48:7116]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [50:7508]
:POSTROUTING ACCEPT [50:7508]
:qos_Default - [0:0]
:qos_Default_ct - [0:0]
-A qos_Default -j CONNMARK --restore-mark --nfmask 0xf --ctmask 0xf
-A qos_Default -m mark --mark 0x0/0xf -j qos_Default_ct
-A qos_Default -p udp -m mark --mark 0x0/0xf0 -m length --length 0:500 -j MARK --set-xmark 0x22/0xff
-A qos_Default -p icmp -j MARK --set-xmark 0x11/0xff
-A qos_Default -p tcp -m mark --mark 0x0/0xf0 -m tcp --sport 1024:65535 --dport 1024:65535 -j MARK --set-xmark 0x44/0xff
-A qos_Default -p udp -m mark --mark 0x0/0xf0 -m udp --sport 1024:65535 --dport 1024:65535 -j MARK --set-xmark 0x44/0xff
-A qos_Default -j CONNMARK --save-mark --nfmask 0xff --ctmask 0xff
-A qos_Default_ct -p tcp -m mark --mark 0x0/0xf -m tcp -m multiport --ports 22,53 -m comment --comment "ssh, dns" -j MARK --set-xmark 0x11/0xff
-A qos_Default_ct -p udp -m mark --mark 0x0/0xf -m udp -m multiport --ports 22,53 -m comment --comment "ssh, dns" -j MARK --set-xmark 0x11/0xff
-A qos_Default_ct -p tcp -m mark --mark 0x0/0xf -m tcp -m multiport --ports 20,21,25,80,110,443,993,995 -m comment --comment "ftp, smtp, http(s), imap" -j MARK --set-xmark 0x33/0xff
-A qos_Default_ct -p tcp -m mark --mark 0x0/0xf -m tcp -m multiport --ports 5190 -m comment --comment "AOL, iChat, ICQ" -j MARK --set-xmark 0x22/0xff
-A qos_Default_ct -p udp -m mark --mark 0x0/0xf -m udp -m multiport --ports 5190 -m comment --comment "AOL, iChat, ICQ" -j MARK --set-xmark 0x22/0xff
-A qos_Default_ct -j CONNMARK --save-mark --nfmask 0xff --ctmask 0xff
COMMIT
# Completed on Fri Sep 29 00:37:01 2023

#IPv6 Filter chain

# Generated by ip6tables-save v1.8.7 on Fri Sep 29 00:37:01 2023
*filter
:INPUT ACCEPT [0:0]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [0:0]
:MINIUPNPD - [0:0]
:forwarding_lan_rule - [0:0]
:forwarding_rule - [0:0]
:forwarding_vpn_rule - [0:0]
:input_lan_rule - [0:0]
:input_rule - [0:0]
:input_vpn_rule - [0:0]
:output_lan_rule - [0:0]
:output_rule - [0:0]
:output_vpn_rule - [0:0]
:reject - [0:0]
:syn_flood - [0:0]
:zone_lan_dest_ACCEPT - [0:0]
:zone_lan_forward - [0:0]
:zone_lan_input - [0:0]
:zone_lan_output - [0:0]
:zone_lan_src_ACCEPT - [0:0]
:zone_vpn_dest_ACCEPT - [0:0]
:zone_vpn_forward - [0:0]
:zone_vpn_input - [0:0]
:zone_vpn_output - [0:0]
:zone_vpn_src_ACCEPT - [0:0]
-A INPUT -i lo -m comment --comment "!fw3" -j ACCEPT
-A INPUT -m comment --comment "!fw3: Custom input rule chain" -j input_rule
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m comment --comment "!fw3" -j syn_flood
-A INPUT -i eth0 -m comment --comment "!fw3" -j zone_lan_input
-A INPUT -i tun0 -m comment --comment "!fw3" -j zone_vpn_input
-A FORWARD -m comment --comment "!fw3: Custom forwarding rule chain" -j forwarding_rule
-A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A FORWARD -i eth0 -m comment --comment "!fw3" -j zone_lan_forward
-A FORWARD -i tun0 -m comment --comment "!fw3" -j zone_vpn_forward
-A FORWARD -m comment --comment "!fw3" -j reject
-A OUTPUT -o lo -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -m comment --comment "!fw3: Custom output rule chain" -j output_rule
-A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -o eth0 -m comment --comment "!fw3" -j zone_lan_output
-A OUTPUT -o tun0 -m comment --comment "!fw3" -j zone_vpn_output
-A reject -p tcp -m comment --comment "!fw3" -j REJECT --reject-with tcp-reset
-A reject -m comment --comment "!fw3" -j REJECT --reject-with icmp6-port-unreachable
-A syn_flood -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m limit --limit 25/sec --limit-burst 50 -m comment --comment "!fw3" -j RETURN
-A syn_flood -m comment --comment "!fw3" -j DROP
-A zone_lan_dest_ACCEPT -o eth0 -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_forward -j MINIUPNPD
-A zone_lan_forward -m comment --comment "!fw3: Custom lan forwarding rule chain" -j forwarding_lan_rule
-A zone_lan_forward -m comment --comment "!fw3: Zone lan to vpn forwarding policy" -j zone_vpn_dest_ACCEPT
-A zone_lan_forward -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_input -m comment --comment "!fw3: Custom lan input rule chain" -j input_lan_rule
-A zone_lan_input -m comment --comment "!fw3" -j zone_lan_src_ACCEPT
-A zone_lan_output -m comment --comment "!fw3: Custom lan output rule chain" -j output_lan_rule
-A zone_lan_output -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_src_ACCEPT -i eth0 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_vpn_dest_ACCEPT -o tun0 -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
-A zone_vpn_dest_ACCEPT -o tun0 -m comment --comment "!fw3" -j ACCEPT
-A zone_vpn_forward -m comment --comment "!fw3: Custom vpn forwarding rule chain" -j forwarding_vpn_rule
-A zone_vpn_forward -m comment --comment "!fw3: Zone vpn to lan forwarding policy" -j zone_lan_dest_ACCEPT
-A zone_vpn_forward -m comment --comment "!fw3" -j zone_vpn_dest_ACCEPT
-A zone_vpn_input -m comment --comment "!fw3: Custom vpn input rule chain" -j input_vpn_rule
-A zone_vpn_input -m comment --comment "!fw3" -j zone_vpn_src_ACCEPT
-A zone_vpn_output -m comment --comment "!fw3: Custom vpn output rule chain" -j output_vpn_rule
-A zone_vpn_output -m comment --comment "!fw3" -j zone_vpn_dest_ACCEPT
-A zone_vpn_src_ACCEPT -i tun0 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
COMMIT
# Completed on Fri Sep 29 00:37:01 2023

#===================== IPSET状态 =====================#

Name: music
Type: hash:ip
Revision: 5
Header: family inet hashsize 1024 maxelem 65536 bucketsize 12 initval 0xe9beb304
Size in memory: 208
References: 0
Number of entries: 0

Name: mwan3_connected_v4
Type: hash:net
Revision: 7
Header: family inet hashsize 1024 maxelem 65536 bucketsize 12 initval 0xa58f6a12
Size in memory: 944
References: 1
Number of entries: 10

Name: mwan3_connected_v6
Type: hash:net
Revision: 7
Header: family inet6 hashsize 1024 maxelem 65536 bucketsize 12 initval 0x56e8bf35
Size in memory: 1320
References: 1
Number of entries: 1

Name: mwan3_source_v6
Type: hash:net
Revision: 7
Header: family inet6 hashsize 1024 maxelem 65536 bucketsize 12 initval 0xb40303b9
Size in memory: 1248
References: 0
Number of entries: 0

Name: mwan3_dynamic_v4
Type: hash:net
Revision: 7
Header: family inet hashsize 1024 maxelem 65536 bucketsize 12 initval 0x572ab054
Size in memory: 464
References: 1
Number of entries: 0

Name: mwan3_dynamic_v6
Type: hash:net
Revision: 7
Header: family inet6 hashsize 1024 maxelem 65536 bucketsize 12 initval 0x095c60d8
Size in memory: 1248
References: 1
Number of entries: 0

Name: mwan3_custom_v4
Type: hash:net
Revision: 7
Header: family inet hashsize 1024 maxelem 65536 bucketsize 12 initval 0x464ff0de
Size in memory: 464
References: 1
Number of entries: 0

Name: mwan3_custom_v6
Type: hash:net
Revision: 7
Header: family inet6 hashsize 1024 maxelem 65536 bucketsize 12 initval 0x5260b8f9
Size in memory: 1248
References: 1
Number of entries: 0

Name: lan_ac_black_ports
Type: bitmap:port
Revision: 3
Header: range 0-65535
Size in memory: 8272
References: 4
Number of entries: 1

Name: localnetwork
Type: hash:net
Revision: 7
Header: family inet hashsize 1024 maxelem 65536 bucketsize 12 initval 0xbf26589f
Size in memory: 896
References: 8
Number of entries: 9

Name: china_ip_route
Type: hash:net
Revision: 7
Header: family inet hashsize 4096 maxelem 1000000 bucketsize 12 initval 0x32fbdf45
Size in memory: 256712
References: 4
Number of entries: 8616

Name: china_ip_route_pass
Type: hash:net
Revision: 7
Header: family inet hashsize 1024 maxelem 1000000 bucketsize 12 initval 0xea4d34ca
Size in memory: 464
References: 3
Number of entries: 0

Name: mwan3_connected
Type: list:set
Revision: 3
Header: size 8
Size in memory: 376
References: 0
Number of entries: 6

#===================== 路由表状态 =====================#

#IPv4

#route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
0.0.0.0         192.168.24.1    0.0.0.0         UG    0      0        0 eth0
172.17.0.0      0.0.0.0         255.255.0.0     U     0      0        0 docker0
172.22.0.0      0.0.0.0         255.255.0.0     U     0      0        0 br-631d0ee64951
192.168.24.0    0.0.0.0         255.255.255.0   U     0      0        0 eth0

#ip route list
default via 192.168.24.1 dev eth0 proto static 
172.17.0.0/16 dev docker0 proto kernel scope link src 172.17.0.1 linkdown 
172.22.0.0/16 dev br-631d0ee64951 proto kernel scope link src 172.22.0.1 
192.168.24.0/24 dev eth0 proto kernel scope link src 192.168.24.2 

#ip rule show
0:  from all lookup local
219:    from all fwmark 0x162 lookup 354
220:    from all lookup 220
32766:  from all lookup main
32767:  from all lookup default

#IPv6

#route -A inet6
Kernel IPv6 routing table
Destination                                 Next Hop                                Flags Metric Ref    Use Iface
::/0                                        ::                                      !n    -1     1        0 lo      
fe80::/64                                   ::                                      U     256    1        0 ipsec0  
fe80::/64                                   ::                                      U     256    1        0 eth0    
fe80::/64                                   ::                                      U     256    1        0 br-631d0ee64951
fe80::/64                                   ::                                      U     256    1        0 vethd297b29
fe80::/64                                   ::                                      U     256    1        0 veth5173f32
fe80::/64                                   ::                                      U     256    1        0 vethdba6b59
fe80::/64                                   ::                                      U     256    1        0 veth4becd55
fe80::/64                                   ::                                      U     256    1        0 vethc4796f6
fe80::/64                                   ::                                      U     256    1        0 veth45cc2c7
fe80::/64                                   ::                                      U     256    1        0 veth01f9b57
::/0                                        ::                                      !n    -1     1        0 lo      
::1/128                                     ::                                      Un    0      6        0 lo      
fe80::/128                                  ::                                      Un    0      7        0 ipsec0  
fe80::/128                                  ::                                      Un    0      3        0 eth0    
fe80::/128                                  ::                                      Un    0      3        0 vethd297b29
fe80::/128                                  ::                                      Un    0      3        0 br-631d0ee64951
fe80::/128                                  ::                                      Un    0      3        0 veth4becd55
fe80::/128                                  ::                                      Un    0      3        0 vethdba6b59
fe80::/128                                  ::                                      Un    0      3        0 veth5173f32
fe80::/128                                  ::                                      Un    0      3        0 vethc4796f6
fe80::/128                                  ::                                      Un    0      3        0 veth45cc2c7
fe80::/128                                  ::                                      Un    0      3        0 veth01f9b57
fe80::42:c2ff:fe6a:cd79/128                 ::                                      Un    0      2        0 br-631d0ee64951
fe80::28cf:1cff:fe8b:af4a/128               ::                                      Un    0      2        0 veth5173f32
fe80::3c6e:3dff:fe2b:4bca/128               ::                                      Un    0      3        0 veth4becd55
fe80::4c1e:f0ff:fe83:7f49/128               ::                                      Un    0      2        0 veth45cc2c7
fe80::6c36:b3ff:fe0d:70d/128                ::                                      Un    0      4        0 vethd297b29
fe80::708c:8bff:fe2d:7ca/128                ::                                      Un    0      2        0 vethc4796f6
fe80::96c6:91ff:fea8:4180/128               ::                                      Un    0      4        0 eth0    
fe80::a8a5:d3ff:feb9:a068/128               ::                                      Un    0      2        0 veth01f9b57
fe80::c641:b1bf:93cd:88db/128               ::                                      Un    0      3        0 ipsec0  
fe80::fc6c:b2ff:fee5:e033/128               ::                                      Un    0      2        0 vethdba6b59
ff00::/8                                    ::                                      U     256    5        0 ipsec0  
ff00::/8                                    ::                                      U     256    5        0 eth0    
ff00::/8                                    ::                                      U     256    5        0 br-631d0ee64951
ff00::/8                                    ::                                      U     256    5        0 vethd297b29
ff00::/8                                    ::                                      U     256    4        0 veth5173f32
ff00::/8                                    ::                                      U     256    4        0 vethdba6b59
ff00::/8                                    ::                                      U     256    4        0 veth4becd55
ff00::/8                                    ::                                      U     256    4        0 vethc4796f6
ff00::/8                                    ::                                      U     256    3        0 veth45cc2c7
ff00::/8                                    ::                                      U     256    2        0 veth01f9b57
::/0                                        ::                                      !n    -1     1        0 lo      

#ip -6 route list
fe80::/64 dev ipsec0 proto kernel metric 256 pref medium
fe80::/64 dev eth0 proto kernel metric 256 pref medium
fe80::/64 dev br-631d0ee64951 proto kernel metric 256 pref medium
fe80::/64 dev vethd297b29 proto kernel metric 256 pref medium
fe80::/64 dev veth5173f32 proto kernel metric 256 pref medium
fe80::/64 dev vethdba6b59 proto kernel metric 256 pref medium
fe80::/64 dev veth4becd55 proto kernel metric 256 pref medium
fe80::/64 dev vethc4796f6 proto kernel metric 256 pref medium
fe80::/64 dev veth45cc2c7 proto kernel metric 256 pref medium
fe80::/64 dev veth01f9b57 proto kernel metric 256 pref medium

#ip -6 rule show
0:  from all lookup local
220:    from all lookup 220
32766:  from all lookup main
4200000001: from all iif lo failed_policy
4200000004: from all iif eth0 failed_policy

#===================== 端口占用状态 =====================#

tcp        0      0 :::9090                 :::*                    LISTEN      17812/clash
tcp        0      0 :::7895                 :::*                    LISTEN      17812/clash
tcp        0      0 :::7892                 :::*                    LISTEN      17812/clash
tcp        0      0 :::7893                 :::*                    LISTEN      17812/clash
tcp        0      0 :::7890                 :::*                    LISTEN      17812/clash
tcp        0      0 :::7891                 :::*                    LISTEN      17812/clash
udp        0      0 :::7874                 :::*                                17812/clash
udp        0      0 :::7891                 :::*                                17812/clash
udp        0      0 :::7892                 :::*                                17812/clash
udp        0      0 :::7893                 :::*                                17812/clash
udp        0      0 :::7895                 :::*                                17812/clash

#===================== 测试本机DNS查询(www.baidu.com) =====================#

Server:     127.0.0.1
Address:    127.0.0.1:53

www.baidu.com   canonical name = www.a.shifen.com
Name:   www.a.shifen.com
Address: 110.242.68.4
Name:   www.a.shifen.com
Address: 110.242.68.3

#===================== 测试内核DNS查询(www.instagram.com) =====================#

Dnsmasq 当前默认 resolv 文件:/tmp/resolv.conf.d/resolv.conf.auto

#===================== /tmp/resolv.conf.d/resolv.conf.auto =====================#

# Interface lan
nameserver 202.106.195.68

#===================== 测试本机网络连接(www.baidu.com) =====================#

HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: private, no-cache, no-store, proxy-revalidate, no-transform
Connection: keep-alive
Content-Length: 277
Content-Type: text/html
Date: Thu, 28 Sep 2023 16:37:04 GMT
Etag: "575e1f59-115"
Last-Modified: Mon, 13 Jun 2016 02:50:01 GMT
Pragma: no-cache
Server: bfe/1.0.8.18

#===================== 测试本机网络下载(raw.githubusercontent.com) =====================#

#===================== 最近运行日志(自动切换为Debug模式) =====================#

time="2023-09-28T16:34:11Z" level=debug msg="[Process] find process 172.217.145.40: socket: protocol not supported"
time="2023-09-28T16:34:11Z" level=info msg="[TCP] 192.168.22.220:52941 --> 172.217.145.40:443 match Match() using 🐟 漏网之鱼[🇨🇳 台湾 01 2]"
time="2023-09-28T16:34:12Z" level=debug msg="[Process] find process 142.251.85.167: socket: protocol not supported"
time="2023-09-28T16:34:12Z" level=info msg="[TCP] 192.168.22.220:52942 --> 142.251.85.167:443 match Match() using 🐟 漏网之鱼[🇨🇳 台湾 01 2]"
time="2023-09-28T16:34:12Z" level=debug msg="[Process] find process 142.251.85.167: socket: protocol not supported"
time="2023-09-28T16:34:12Z" level=debug msg="[Process] find process 172.217.160.78: socket: protocol not supported"
time="2023-09-28T16:34:12Z" level=info msg="[TCP] 192.168.22.220:52943 --> 142.251.85.167:443 match Match() using 🐟 漏网之鱼[🇨🇳 台湾 01 2]"
time="2023-09-28T16:34:12Z" level=debug msg="[Process] find process 142.251.85.167: socket: protocol not supported"
time="2023-09-28T16:34:12Z" level=info msg="[TCP] 192.168.22.220:65097 --> 172.217.160.78:443 match Match() using 🐟 漏网之鱼[🇨🇳 台湾 01 2]"
time="2023-09-28T16:34:12Z" level=info msg="[TCP] 192.168.22.220:52944 --> 142.251.85.167:443 match Match() using 🐟 漏网之鱼[🇨🇳 台湾 01 2]"
time="2023-09-28T16:34:13Z" level=debug msg="[Process] find process 64.233.187.100: socket: protocol not supported"
time="2023-09-28T16:34:13Z" level=debug msg="[Process] find process 142.251.43.22: socket: protocol not supported"
time="2023-09-28T16:34:13Z" level=debug msg="[Process] find process 172.217.163.33: socket: protocol not supported"
time="2023-09-28T16:34:13Z" level=info msg="[TCP] 192.168.22.220:65098 --> 64.233.187.100:443 match Match() using 🐟 漏网之鱼[🇨🇳 台湾 01 2]"
time="2023-09-28T16:34:13Z" level=info msg="[TCP] 192.168.22.220:65100 --> 142.251.43.22:443 match Match() using 🐟 漏网之鱼[🇨🇳 台湾 01 2]"
time="2023-09-28T16:34:13Z" level=info msg="[TCP] 192.168.22.220:65099 --> 172.217.163.33:443 match Match() using 🐟 漏网之鱼[🇨🇳 台湾 01 2]"
2023-09-29 00:36:31 OpenClash Restart...
2023-09-29 00:36:31 OpenClash Stoping...
2023-09-29 00:36:31 Step 1: Backup The Current Groups State...
2023-09-29 00:36:31 Step 2: Delete OpenClash Firewall Rules...
2023-09-29 00:36:32 Step 3: Close The OpenClash Daemons...
2023-09-29 00:36:32 Step 4: Close The Clash Core Process...
2023-09-29 00:36:32 Step 5: Restart Dnsmasq...
2023-09-29 00:36:32 Step 6: Delete OpenClash Residue File...
2023-09-29 00:36:32 OpenClash Start Running...
2023-09-29 00:36:32 Step 1: Get The Configuration...
2023-09-29 00:36:32 Step 2: Check The Components...
2023-09-29 00:36:32 Tip: Because of the file【 /etc/config/openclash 】modificated, Pause quick start...
2023-09-29 00:36:32 Step 3: Modify The Config File...
2023-09-29 00:36:33 Tip: You have seted the authentication of SOCKS5/HTTP(S) proxy with【Clash:n8VvRAAv】
2023-09-29 00:36:33 Tip: Start Running Custom Overwrite Scripts...
2023-09-29 00:36:33 Step 4: Start Running The Clash Core...
2023-09-29 00:36:33 Tip: No Special Configuration Detected, Use Dev Core to Start...
2023-09-29 00:36:33 Test The Config File First...
time="2023-09-28T16:36:33Z" level=info msg="Start initial compatible provider ♻️ 自动选择"
time="2023-09-28T16:36:33Z" level=info msg="Start initial compatible provider 🔰 节点选择"
time="2023-09-28T16:36:33Z" level=info msg="Start initial compatible provider 🌍 国外媒体"
time="2023-09-28T16:36:33Z" level=info msg="Start initial compatible provider 🛑 全球拦截"
time="2023-09-28T16:36:33Z" level=info msg="Start initial compatible provider 🍎 苹果服务"
time="2023-09-28T16:36:33Z" level=info msg="Start initial compatible provider 🔥 CHATGPT"
time="2023-09-28T16:36:33Z" level=info msg="Start initial compatible provider 🎯 全球直连"
time="2023-09-28T16:36:33Z" level=info msg="Start initial compatible provider Ⓜ️ 微软服务"
time="2023-09-28T16:36:33Z" level=info msg="Start initial compatible provider 📲 电报信息"
time="2023-09-28T16:36:33Z" level=info msg="Start initial compatible provider 🌏 国内媒体"
time="2023-09-28T16:36:33Z" level=info msg="Start initial compatible provider 🐟 漏网之鱼"
time="2023-09-28T16:36:33Z" level=info msg="Start initial compatible provider 🎥 NETFLIX"
2023-09-29 00:36:33 configuration file【/etc/openclash/wgetcloud.yaml】test is successful
2023-09-29 00:36:34 Step 5: Check The Core Status...
time="2023-09-28T16:36:35Z" level=info msg="Start initial compatible provider 🎥 NETFLIX"
time="2023-09-28T16:36:35Z" level=info msg="Start initial compatible provider 🔰 节点选择"
time="2023-09-28T16:36:35Z" level=info msg="Start initial compatible provider 🛑 全球拦截"
time="2023-09-28T16:36:35Z" level=info msg="Start initial compatible provider 🐟 漏网之鱼"
time="2023-09-28T16:36:35Z" level=info msg="Start initial compatible provider 🌍 国外媒体"
time="2023-09-28T16:36:35Z" level=info msg="Start initial compatible provider 🔥 CHATGPT"
time="2023-09-28T16:36:35Z" level=info msg="Start initial compatible provider 🍎 苹果服务"
time="2023-09-28T16:36:35Z" level=info msg="Start initial compatible provider 🌏 国内媒体"
time="2023-09-28T16:36:35Z" level=info msg="Start initial compatible provider 🎯 全球直连"
time="2023-09-28T16:36:35Z" level=info msg="Start initial compatible provider ♻️ 自动选择"
time="2023-09-28T16:36:35Z" level=info msg="Start initial compatible provider 📲 电报信息"
time="2023-09-28T16:36:35Z" level=info msg="Start initial compatible provider Ⓜ️ 微软服务"
time="2023-09-28T16:36:35Z" level=info msg="Authentication of local server updated"
time="2023-09-28T16:36:35Z" level=info msg="HTTP proxy listening at: [::]:7890"
time="2023-09-28T16:36:35Z" level=info msg="SOCKS proxy listening at: [::]:7891"
time="2023-09-28T16:36:35Z" level=info msg="RESTful API listening at: [::]:9090"
time="2023-09-28T16:36:35Z" level=info msg="Redirect proxy listening at: [::]:7892"
time="2023-09-28T16:36:35Z" level=info msg="TProxy server listening at: [::]:7895"
time="2023-09-28T16:36:35Z" level=info msg="Mixed(http+socks) proxy listening at: [::]:7893"
time="2023-09-28T16:36:35Z" level=info msg="DNS server listening at: [::]:7874"
2023-09-29 00:36:37 Step 6: Wait For The File Downloading...
2023-09-29 00:36:37 Step 7: Set Firewall Rules...
2023-09-29 00:36:37 Tip: DNS Hijacking Mode is Dnsmasq Redirect...
2023-09-29 00:36:38 Tip: Start Add Port Bypassing Rules For Firewall Redirect and Firewall Rules...
2023-09-29 00:36:38 Tip: Start Add Custom Firewall Rules...
2023-09-29 00:36:38 Step 8: Restart Dnsmasq...
2023-09-29 00:36:38 Step 9: Add Cron Rules, Start Daemons...
2023-09-29 00:36:38 OpenClash Start Successful!
time="2023-09-28T16:36:43Z" level=info msg="[TCP] 192.168.22.220:52950 --> 172.217.145.40:443 match Match() using 🐟 漏网之鱼[🇨🇳 台湾 01 2]"
time="2023-09-28T16:37:17Z" level=debug msg="[DNS Server] Exchange ;github.com.\tIN\t A failed: all DNS requests failed, first error: dns: bad rdata"
time="2023-09-28T16:37:17Z" level=debug msg="[DNS Server] Exchange ;github.com.\tIN\t A failed: all DNS requests failed, first error: dns: bad rdata"
time="2023-09-28T16:37:17Z" level=debug msg="[DNS Server] Exchange ;github.com.\tIN\t A failed: all DNS requests failed, first error: dns: bad rdata"
time="2023-09-28T16:37:17Z" level=debug msg="[DNS Server] Exchange ;github.com.\tIN\t A failed: all DNS requests failed, first error: dns: bad rdata"
time="2023-09-28T16:37:19Z" level=debug msg="[DNS Server] Exchange ;raw.githubusercontent.com.\tIN\t A failed: all DNS requests failed, first error: dns: bad rdata"
time="2023-09-28T16:37:19Z" level=debug msg="[DNS Server] Exchange ;raw.githubusercontent.com.\tIN\t A failed: all DNS requests failed, first error: dns: bad rdata"
time="2023-09-28T16:37:19Z" level=debug msg="[DNS Server] Exchange ;raw.githubusercontent.com.\tIN\t A failed: all DNS requests failed, first error: dns: bad rdata"
time="2023-09-28T16:37:21Z" level=debug msg="[DNS Server] Exchange ;edge.microsoft.com.\tIN\t A failed: all DNS requests failed, first error: dns: bad rdata"
time="2023-09-28T16:37:21Z" level=debug msg="[DNS Server] Exchange ;edge.microsoft.com.\tIN\t A failed: all DNS requests failed, first error: dns: bad rdata"
time="2023-09-28T16:37:21Z" level=debug msg="[DNS Server] Exchange ;edge.microsoft.com.\tIN\t A failed: all DNS requests failed, first error: dns: bad rdata"
time="2023-09-28T16:37:21Z" level=debug msg="[DNS Server] Exchange ;edge.microsoft.com.\tIN\t A failed: all DNS requests failed, first error: dns: bad rdata"
time="2023-09-28T16:37:21Z" level=debug msg="[DNS Server] Exchange ;api.trancy.org.\tIN\t A failed: all DNS requests failed, first error: dns: bad rdata"
time="2023-09-28T16:37:21Z" level=debug msg="[DNS Server] Exchange ;api.trancy.org.\tIN\t A failed: all DNS requests failed, first error: dns: bad rdata"
time="2023-09-28T16:37:21Z" level=debug msg="[DNS Server] Exchange ;api.trancy.org.\tIN\t A failed: all DNS requests failed, first error: dns: bad rdata"
time="2023-09-28T16:37:21Z" level=debug msg="[DNS Server] Exchange ;api.trancy.org.\tIN\t A failed: all DNS requests failed, first error: dns: bad rdata"
time="2023-09-28T16:37:24Z" level=debug msg="[Process] find process 35.190.80.1: socket: protocol not supported"
time="2023-09-28T16:37:24Z" level=debug msg="[Process] find process 35.190.80.1: socket: protocol not supported"
time="2023-09-28T16:37:24Z" level=info msg="[TCP] 192.168.22.219:4458 --> 35.190.80.1:443 match Match() using 🐟 漏网之鱼[🇨🇳 台湾 01 2]"
time="2023-09-28T16:37:24Z" level=info msg="[TCP] 192.168.22.219:4459 --> 35.190.80.1:443 match Match() using 🐟 漏网之鱼[🇨🇳 台湾 01 2]"
time="2023-09-28T16:37:26Z" level=debug msg="[DNS Server] Exchange ;www.youtube.com.\tIN\t A failed: all DNS requests failed, first error: dns: bad rdata"
time="2023-09-28T16:37:26Z" level=debug msg="[DNS Server] Exchange ;www.youtube.com.\tIN\t A failed: all DNS requests failed, first error: dns: bad rdata"
time="2023-09-28T16:37:26Z" level=debug msg="[DNS Server] Exchange ;www.youtube.com.\tIN\t A failed: all DNS requests failed, first error: dns: bad rdata"
time="2023-09-28T16:37:26Z" level=debug msg="[DNS Server] Exchange ;www.youtube.com.\tIN\t A failed: all DNS requests failed, first error: dns: bad rdata"

#===================== 最近运行日志获取完成(自动切换为silent模式) =====================#

#===================== 活动连接信息 =====================#

1. SourceIP:【192.168.22.220】 - Host:【Empty】 - DestinationIP:【172.217.145.40】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【🇨🇳 台湾 01 2】
2. SourceIP:【192.168.22.219】 - Host:【Empty】 - DestinationIP:【35.190.80.1】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【🇨🇳 台湾 01 2】
3. SourceIP:【192.168.22.219】 - Host:【Empty】 - DestinationIP:【35.190.80.1】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【🇨🇳 台湾 01 2】

OpenClash Config

No response

Expected Behavior

Screenshots

No response

vernesong commented 11 months ago

你那dns不通,建议fakeip

github-actions[bot] commented 9 months ago

This issue is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 5 days