vernesong / OpenClash

A Clash Client For OpenWrt
MIT License
16.02k stars 2.98k forks source link

[Bug] epicgames无法下载客户端,网页可以正常访问但无法购买游戏 #3677

Closed 1394805163 closed 5 months ago

1394805163 commented 7 months ago

Verify Steps

OpenClash Version

v0.45.157-beta

Bug on Environment

Lean

Bug on Platform

Linux-arm64

To Reproduce

在fakeip tun混合模式下 epicgames 走代理商城可以正常访问,但是无法下单结算也无法下载客户端 下载则会显示无法访问此网站,关闭clash则正常,使用客户端的例如cfw也正常

Describe the Bug

bug 为epicgames域名无法正常访问 网页仅有部分可以访问

OpenClash Log

OpenClash 调试日志

生成时间: 2023-12-15 00:50:56 插件版本: v0.45.157-beta 隐私提示: 上传此日志前请注意检查、屏蔽公网IP、节点、密码等相关敏感信息


#===================== 系统信息 =====================#

主机型号: Xiaomi Redmi Router AX6000
固件版本: ImmortalWrt 18.06-5.4-SNAPSHOT r11894-90339193f
LuCI版本: git-23.178.42687-494cc11-1
内核版本: 5.4.224
处理器架构: 

#此项有值时,如不使用IPv6,建议到网络-接口-lan的设置中禁用IPV6的DHCP
IPV6-DHCP: 

DNS劫持: Dnsmasq 转发
#DNS劫持为Dnsmasq时,此项结果应仅有配置文件的DNS监听地址
Dnsmasq转发设置: 127.0.0.1#7874

#===================== 依赖检查 =====================#

dnsmasq-full: 已安装
coreutils: 已安装
coreutils-nohup: 已安装
bash: 已安装
curl: 已安装
ca-certificates: 已安装
ipset: 已安装
ip-full: 已安装
libcap: 已安装
libcap-bin: 已安装
ruby: 已安装
ruby-yaml: 已安装
ruby-psych: 已安装
ruby-pstore: 已安装
kmod-tun(TUN模式): 已安装
luci-compat(Luci >= 19.07): 已安装
kmod-inet-diag(PROCESS-NAME): 已安装
unzip: 已安装
iptables-mod-tproxy: 已安装
kmod-ipt-tproxy: 已安装
iptables-mod-extra: 已安装
kmod-ipt-extra: 已安装
kmod-ipt-nat: 已安装

#===================== 内核检查 =====================#

运行状态: 运行中
运行内核:TUN
进程pid: 9360
运行权限: 9360: cap_dac_override,cap_net_bind_service,cap_net_admin,cap_net_raw,cap_sys_ptrace,cap_sys_resource=eip
运行用户: nobody
已选择的架构: linux-arm64

#下方无法显示内核版本号时请确认您的内核版本是否正确或者有无权限
Tun内核版本: 2023.08.17-13-gdcc8d87
Tun内核文件: 存在
Tun内核运行权限: 正常

Dev内核版本: v1.18.0-13-gd034a40
Dev内核文件: 存在
Dev内核运行权限: 正常

Meta内核版本: 
Meta内核文件: 不存在
Meta内核运行权限: 否

#===================== 插件设置 =====================#

当前配置文件: /etc/openclash/config/xfss.yaml
启动配置文件: /etc/openclash/xfss.yaml
运行模式: fake-ip-mix
默认代理模式: rule
UDP流量转发(tproxy): 停用
自定义DNS: 启用
IPV6代理: 停用
IPV6-DNS解析: 停用
禁用Dnsmasq缓存: 启用
自定义规则: 启用
仅允许内网: 启用
仅代理命中规则流量: 停用
仅允许常用端口流量: 停用
绕过中国大陆IP: 启用
路由本机代理: 启用

#启动异常时建议关闭此项后重试
混合节点: 停用
保留配置: 停用

#启动异常时建议关闭此项后重试
第三方规则: 停用

#===================== 自定义规则 一 =====================#
script:
##  shortcuts:
##    Notice: The core timezone is UTC
##    CST 20:00-24:00 = time.now().hour > 12 and time.now().hour < 16
##    内核时区为UTC,故以下time.now()函数的取值需要根据本地时区进行转换
##    北京时间(CST) 20:00-24:00 = time.now().hour > 12 and time.now().hour < 16
##    quic: network == 'udp' and dst_port == 443 and (geoip(resolve_ip(host)) != 'CN' or geoip(dst_ip) != 'CN')
##    time-limit: in_cidr(src_ip,'192.168.1.2/32') and time.now().hour < 20 or time.now().hour > 21
##    time-limit: src_ip == '192.168.1.2' and time.now().hour < 20 or time.now().hour > 21

##  code: |
##    def main(ctx, metadata):
##        directkeywordlist = ["baidu"]
##        for directkeyword in directkeywordlist:
##          if directkeyword in metadata["host"]:
##            ctx.log('[Script] matched keyword %s use direct' % directkeyword)
##            return "DIRECT"

rules:
##- SCRIPT,quic,REJECT #shortcuts rule
##- SCRIPT,time-limit,REJECT #shortcuts rule

##- PROCESS-NAME,curl,DIRECT #匹配路由自身进程(curl直连)
##- DOMAIN-SUFFIX,google.com,Proxy #匹配域名后缀(交由Proxy代理服务器组)
##- DOMAIN-KEYWORD,google,Proxy #匹配域名关键字(交由Proxy代理服务器组)
##- DOMAIN,google.com,Proxy #匹配域名(交由Proxy代理服务器组)
##- DOMAIN-SUFFIX,ad.com,REJECT #匹配域名后缀(拒绝)
##- IP-CIDR,127.0.0.0/8,DIRECT #匹配数据目标IP(直连)
##- SRC-IP-CIDR,192.168.1.201/32,DIRECT #匹配数据发起IP(直连)
##- DST-PORT,80,DIRECT #匹配数据目标端口(直连)
##- SRC-PORT,7777,DIRECT #匹配数据源端口(直连)

##排序在上的规则优先生效,如添加(去除规则前的#号):
##IP段:192.168.1.2-192.168.1.200 直连
##- SRC-IP-CIDR,192.168.1.2/31,DIRECT
##- SRC-IP-CIDR,192.168.1.4/30,DIRECT
##- SRC-IP-CIDR,192.168.1.8/29,DIRECT
##- SRC-IP-CIDR,192.168.1.16/28,DIRECT
##- SRC-IP-CIDR,192.168.1.32/27,DIRECT
##- SRC-IP-CIDR,192.168.1.64/26,DIRECT
##- SRC-IP-CIDR,192.168.1.128/26,DIRECT
##- SRC-IP-CIDR,192.168.1.192/29,DIRECT
##- SRC-IP-CIDR,192.168.1.200/32,DIRECT

##Steam 直连规则
- DOMAIN,csgo.wmsj.cn,🎯 全球直连
- DOMAIN,dl.steam.clngaa.com,🎯 全球直连
- DOMAIN,dl.steam.ksyna.com,🎯 全球直连
- DOMAIN,dota2.wmsj.cn,🎯 全球直连
- DOMAIN,st.dl.bscstorage.net,🎯 全球直连
- DOMAIN,st.dl.eccdnx.com,🎯 全球直连
- DOMAIN,st.dl.pinyuncloud.com,🎯 全球直连
- DOMAIN,steampipe.steamcontent.tnkjmec.com,🎯 全球直连
- DOMAIN,steampowered.com.8686c.com,🎯 全球直连
- DOMAIN,steamstatic.com.8686c.com,🎯 全球直连
- DOMAIN,wmsjsteam.com,🎯 全球直连
- DOMAIN,xz.pphimalayanrt.com,🎯 全球直连
- DOMAIN-SUFFIX,cm.steampowered.com,🎯 全球直连
- DOMAIN-SUFFIX,steamchina.com,🎯 全球直连
- DOMAIN-SUFFIX,steamcontent.com,🎯 全球直连
- DOMAIN-SUFFIX,steamserver.net,🎯 全球直连
- DOMAIN-SUFFIX,steamusercontent.com,🎯 全球直连
## E绅士规则
- DOMAIN-SUFFIX,e-hentai.org,🐟 漏网之鱼
- DOMAIN-SUFFIX,exhentai.org,🐟 漏网之鱼
## epic直连规则

##IP段:192.168.1.202-192.168.1.255 直连
##- SRC-IP-CIDR,192.168.1.202/31,DIRECT
##- SRC-IP-CIDR,192.168.1.204/30,DIRECT
##- SRC-IP-CIDR,192.168.1.208/28,DIRECT
##- SRC-IP-CIDR,192.168.1.224/27,DIRECT

##此时IP为192.168.1.1和192.168.1.201的客户端流量走代理(策略),其余客户端不走代理
##因为Fake-IP模式下,IP地址为192.168.1.1的路由器自身流量可走代理(策略),所以需要排除

##仅设置路由器自身直连:
##- SRC-IP-CIDR,192.168.1.1/32,DIRECT
##- SRC-IP-CIDR,198.18.0.1/32,DIRECT

##DDNS
##- DOMAIN-SUFFIX,checkip.dyndns.org,DIRECT
##- DOMAIN-SUFFIX,checkipv6.dyndns.org,DIRECT
##- DOMAIN-SUFFIX,checkip.synology.com,DIRECT
##- DOMAIN-SUFFIX,ifconfig.co,DIRECT
##- DOMAIN-SUFFIX,api.myip.com,DIRECT
##- DOMAIN-SUFFIX,ip-api.com,DIRECT
##- DOMAIN-SUFFIX,ipapi.co,DIRECT
##- DOMAIN-SUFFIX,ip6.seeip.org,DIRECT
##- DOMAIN-SUFFIX,members.3322.org,DIRECT

##在线IP段转CIDR地址:http://ip2cidr.com
#===================== 自定义规则 二 =====================#
script:
##  shortcuts:
##    common_port: dst_port not in [21, 22, 23, 53, 80, 123, 143, 194, 443, 465, 587, 853, 993, 995, 998, 2052, 2053, 2082, 2083, 2086, 2095, 2096, 5222, 5228, 5229, 5230, 8080, 8443, 8880, 8888, 8889]

##  code: |
##    def main(ctx, metadata):
##        directkeywordlist = ["baidu"]
##        for directkeyword in directkeywordlist:
##          if directkeyword in metadata["host"]:
##            ctx.log('[Script] matched keyword %s use direct' % directkeyword)
##            return "DIRECT"

rules:
##- SCRIPT,common_port,DIRECT #shortcuts rule

##- DOMAIN-SUFFIX,google.com,Proxy #匹配域名后缀(交由Proxy代理服务器组)
##- DOMAIN-KEYWORD,google,Proxy #匹配域名关键字(交由Proxy代理服务器组)
##- DOMAIN,google.com,Proxy #匹配域名(交由Proxy代理服务器组)
##- DOMAIN-SUFFIX,ad.com,REJECT #匹配域名后缀(拒绝)
##- IP-CIDR,127.0.0.0/8,DIRECT #匹配数据目标IP(直连)
##- SRC-IP-CIDR,192.168.1.201/32,DIRECT #匹配数据发起IP(直连)
##- DST-PORT,80,DIRECT #匹配数据目标端口(直连)
##- SRC-PORT,7777,DIRECT #匹配数据源端口(直连)

#===================== 配置文件 =====================#

port: 7890
socks-port: 7891
allow-lan: true
mode: rule
log-level: silent
external-controller: 0.0.0.0:9090
proxy-groups:
- name: "\U0001F680 节点选择"
  type: select
  proxies:
  - "♻️ 自动选择"
  - "\U0001F1ED\U0001F1F0 香港节点"
  - "\U0001F1E8\U0001F1F3 台湾节点"
  - "\U0001F1F8\U0001F1EC 狮城节点"
  - "\U0001F1EF\U0001F1F5 日本节点"
  - "\U0001F1FA\U0001F1F2 美国节点"
  - "\U0001F1F0\U0001F1F7 韩国节点"
  - "\U0001F680 手动切换"
  - DIRECT
- name: "\U0001F680 手动切换"
  type: select
  proxies:

- name: "♻️ 自动选择"
  type: url-test
  url: http://www.gstatic.com/generate_204
  interval: 300
  tolerance: 50
  proxies:
  - 官址:XFLTD.cc
  - 备用官址:XFLTD.NET
  - 香港 IEPL 01 | x4
  - 香港 IEPL 02 | x4
  - 新加坡 IEPL 01 | x4
  - 新加坡 IEPL 02 | x4
  - 日本 IEPL 01 | x4
  - 日本 IEPL 02 | x4
  - 台湾 IEPL 01 | x4
  - 台湾 IEPL 02 | x4
  - 香港 01
  - 香港 02
  - 香港 03
  - 香港 04
  - 香港 05
  - 台湾 01
  - 台湾 02
  - 新加坡 01
  - 新加坡 02
  - 新加坡 03
  - 新加坡 04
  - 新加坡 05
  - 日本 01
  - 日本 02
  - 日本 03
  - 日本 04
  - 日本 05
  - 美国 01
  - 美国 02
  - 美国 03
  - 美国 04
  - 美国 05
  - 韩国 01
  - 韩国 02
  - 印尼 01
  - 巴基斯坦 01
  - 土耳其 01
  - 土耳其 02
  - 法国 01
  - 阿根廷 01
  - 马来西亚 01
  - 澳大利亚 01
  - 英国 01
  - 德国 01
  - 埃及 01
  - 印度 01
  - 尼日利亚 01
  - 荷兰 01
  - 俄罗斯01
- name: "\U0001F4F2 电报消息"
  type: select
  proxies:
  - "\U0001F680 节点选择"
  - "♻️ 自动选择"
  - "\U0001F1F8\U0001F1EC 狮城节点"
  - "\U0001F1ED\U0001F1F0 香港节点"
  - "\U0001F1E8\U0001F1F3 台湾节点"
  - "\U0001F1EF\U0001F1F5 日本节点"
  - "\U0001F1FA\U0001F1F2 美国节点"
  - "\U0001F1F0\U0001F1F7 韩国节点"
  - "\U0001F680 手动切换"
  - DIRECT
- name: "\U0001F4AC OpenAi"
  type: select
  proxies:
  - "\U0001F680 节点选择"
  - "♻️ 自动选择"
  - "\U0001F1F8\U0001F1EC 狮城节点"
  - "\U0001F1ED\U0001F1F0 香港节点"
  - "\U0001F1E8\U0001F1F3 台湾节点"
  - "\U0001F1EF\U0001F1F5 日本节点"
  - "\U0001F1FA\U0001F1F2 美国节点"
  - "\U0001F1F0\U0001F1F7 韩国节点"
  - "\U0001F680 手动切换"
  - DIRECT
- name: "\U0001F4F9 油管视频"
  type: select
  proxies:
  - "\U0001F680 节点选择"
  - "♻️ 自动选择"
  - "\U0001F1F8\U0001F1EC 狮城节点"
  - "\U0001F1ED\U0001F1F0 香港节点"
  - "\U0001F1E8\U0001F1F3 台湾节点"
  - "\U0001F1EF\U0001F1F5 日本节点"
  - "\U0001F1FA\U0001F1F2 美国节点"
  - "\U0001F1F0\U0001F1F7 韩国节点"
  - "\U0001F680 手动切换"
  - DIRECT
- name: "\U0001F3A5 奈飞视频"
  type: select
  proxies:
  - "\U0001F3A5 奈飞节点"
  - "\U0001F680 节点选择"
  - "♻️ 自动选择"
  - "\U0001F1F8\U0001F1EC 狮城节点"
  - "\U0001F1ED\U0001F1F0 香港节点"
  - "\U0001F1E8\U0001F1F3 台湾节点"
  - "\U0001F1EF\U0001F1F5 日本节点"
  - "\U0001F1FA\U0001F1F2 美国节点"
  - "\U0001F1F0\U0001F1F7 韩国节点"
  - "\U0001F680 手动切换"
  - DIRECT
- name: "\U0001F4FA 巴哈姆特"
  type: select
  proxies:
  - "\U0001F1E8\U0001F1F3 台湾节点"
  - "\U0001F680 节点选择"
  - "\U0001F680 手动切换"
  - DIRECT
- name: "\U0001F4FA 哔哩哔哩"
  type: select
  proxies:
  - "\U0001F3AF 全球直连"
  - "\U0001F1E8\U0001F1F3 台湾节点"
  - "\U0001F1ED\U0001F1F0 香港节点"
- name: "\U0001F30D 国外媒体"
  type: select
  proxies:
  - "\U0001F680 节点选择"
  - "♻️ 自动选择"
  - "\U0001F1ED\U0001F1F0 香港节点"
  - "\U0001F1E8\U0001F1F3 台湾节点"
  - "\U0001F1F8\U0001F1EC 狮城节点"
  - "\U0001F1EF\U0001F1F5 日本节点"
  - "\U0001F1FA\U0001F1F2 美国节点"
  - "\U0001F1F0\U0001F1F7 韩国节点"
  - "\U0001F680 手动切换"
  - DIRECT
- name: "\U0001F30F 国内媒体"
  type: select
  proxies:
  - DIRECT
  - "\U0001F1ED\U0001F1F0 香港节点"
  - "\U0001F1E8\U0001F1F3 台湾节点"
  - "\U0001F1F8\U0001F1EC 狮城节点"
  - "\U0001F1EF\U0001F1F5 日本节点"
  - "\U0001F680 手动切换"
- name: "\U0001F4E2 谷歌FCM"
  type: select
  proxies:
  - DIRECT
  - "\U0001F680 节点选择"
  - "\U0001F1FA\U0001F1F2 美国节点"
  - "\U0001F1ED\U0001F1F0 香港节点"
  - "\U0001F1E8\U0001F1F3 台湾节点"
  - "\U0001F1F8\U0001F1EC 狮城节点"
  - "\U0001F1EF\U0001F1F5 日本节点"
  - "\U0001F1F0\U0001F1F7 韩国节点"
  - "\U0001F680 手动切换"
- name: Ⓜ️ 微软Bing
  type: select
  proxies:
  - DIRECT
  - "\U0001F680 节点选择"
  - "\U0001F1FA\U0001F1F2 美国节点"
  - "\U0001F1ED\U0001F1F0 香港节点"
  - "\U0001F1E8\U0001F1F3 台湾节点"
  - "\U0001F1F8\U0001F1EC 狮城节点"
  - "\U0001F1EF\U0001F1F5 日本节点"
  - "\U0001F1F0\U0001F1F7 韩国节点"
  - "\U0001F680 手动切换"
- name: Ⓜ️ 微软云盘
  type: select
  proxies:
  - DIRECT
  - "\U0001F680 节点选择"
  - "\U0001F1FA\U0001F1F2 美国节点"
  - "\U0001F1ED\U0001F1F0 香港节点"
  - "\U0001F1E8\U0001F1F3 台湾节点"
  - "\U0001F1F8\U0001F1EC 狮城节点"
  - "\U0001F1EF\U0001F1F5 日本节点"
  - "\U0001F1F0\U0001F1F7 韩国节点"
  - "\U0001F680 手动切换"
- name: Ⓜ️ 微软服务
  type: select
  proxies:
  - DIRECT
  - "\U0001F680 节点选择"
  - "\U0001F1FA\U0001F1F2 美国节点"
  - "\U0001F1ED\U0001F1F0 香港节点"
  - "\U0001F1E8\U0001F1F3 台湾节点"
  - "\U0001F1F8\U0001F1EC 狮城节点"
  - "\U0001F1EF\U0001F1F5 日本节点"
  - "\U0001F1F0\U0001F1F7 韩国节点"
  - "\U0001F680 手动切换"
- name: "\U0001F34E 苹果服务"
  type: select
  proxies:
  - DIRECT
  - "\U0001F680 节点选择"
  - "\U0001F1FA\U0001F1F2 美国节点"
  - "\U0001F1ED\U0001F1F0 香港节点"
  - "\U0001F1E8\U0001F1F3 台湾节点"
  - "\U0001F1F8\U0001F1EC 狮城节点"
  - "\U0001F1EF\U0001F1F5 日本节点"
  - "\U0001F1F0\U0001F1F7 韩国节点"
  - "\U0001F680 手动切换"
- name: "\U0001F3AE 游戏平台"
  type: select
  proxies:
  - DIRECT
  - "\U0001F680 节点选择"
  - "\U0001F1FA\U0001F1F2 美国节点"
  - "\U0001F1ED\U0001F1F0 香港节点"
  - "\U0001F1E8\U0001F1F3 台湾节点"
  - "\U0001F1F8\U0001F1EC 狮城节点"
  - "\U0001F1EF\U0001F1F5 日本节点"
  - "\U0001F1F0\U0001F1F7 韩国节点"
  - "\U0001F680 手动切换"
- name: "\U0001F3B6 网易音乐"
  type: select
  proxies:
  - DIRECT
  - "\U0001F680 节点选择"
  - "♻️ 自动选择"
- name: "\U0001F3AF 全球直连"
  type: select
  proxies:
  - DIRECT
  - "\U0001F680 节点选择"
  - "♻️ 自动选择"
- name: "\U0001F6D1 广告拦截"
  type: select
  proxies:
  - REJECT
  - DIRECT
- name: "\U0001F343 应用净化"
  type: select
  proxies:
  - REJECT
  - DIRECT
- name: "\U0001F41F 漏网之鱼"
  type: select
  proxies:
  - "\U0001F680 节点选择"
  - "♻️ 自动选择"
  - DIRECT
  - "\U0001F1ED\U0001F1F0 香港节点"
  - "\U0001F1E8\U0001F1F3 台湾节点"
  - "\U0001F1F8\U0001F1EC 狮城节点"
  - "\U0001F1EF\U0001F1F5 日本节点"
  - "\U0001F1FA\U0001F1F2 美国节点"
  - "\U0001F1F0\U0001F1F7 韩国节点"
  - "\U0001F680 手动切换"
- name: "\U0001F1ED\U0001F1F0 香港节点"
  type: url-test
  url: http://www.gstatic.com/generate_204
  interval: 300
  tolerance: 50
  proxies:
  - 香港 IEPL 01 | x4
  - 香港 IEPL 02 | x4
  - 香港 01
  - 香港 02
  - 香港 03
  - 香港 04
  - 香港 05
- name: "\U0001F1EF\U0001F1F5 日本节点"
  type: url-test
  url: http://www.gstatic.com/generate_204
  interval: 300
  tolerance: 50
  proxies:
  - 日本 IEPL 01 | x4
  - 日本 IEPL 02 | x4
  - 日本 01
  - 日本 02
  - 日本 03
  - 日本 04
  - 日本 05
  - 尼日利亚 01
- name: "\U0001F1FA\U0001F1F2 美国节点"
  type: url-test
  url: http://www.gstatic.com/generate_204
  interval: 300
  tolerance: 150
  proxies:
  - 美国 01
  - 美国 02
  - 美国 03
  - 美国 04
  - 美国 05
- name: "\U0001F1E8\U0001F1F3 台湾节点"
  type: url-test
  url: http://www.gstatic.com/generate_204
  interval: 300
  tolerance: 50
  proxies:
  - 台湾 IEPL 01 | x4
  - 台湾 IEPL 02 | x4
  - 台湾 01
  - 台湾 02
- name: "\U0001F1F8\U0001F1EC 狮城节点"
  type: url-test
  url: http://www.gstatic.com/generate_204
  interval: 300
  tolerance: 50
  proxies:
  - 新加坡 IEPL 01 | x4
  - 新加坡 IEPL 02 | x4
  - 新加坡 01
  - 新加坡 02
  - 新加坡 03
  - 新加坡 04
  - 新加坡 05
- name: "\U0001F1F0\U0001F1F7 韩国节点"
  type: url-test
  url: http://www.gstatic.com/generate_204
  interval: 300
  tolerance: 50
  proxies:
  - 韩国 01
  - 韩国 02
- name: "\U0001F3A5 奈飞节点"
  type: select
  proxies:
  - DIRECT
rules:
- DST-PORT,7895,REJECT
- DST-PORT,7892,REJECT
- IP-CIDR,198.18.0.1/16,REJECT,no-resolve
- "DOMAIN,csgo.wmsj.cn,\U0001F3AF 全球直连"
- "DOMAIN,dl.steam.clngaa.com,\U0001F3AF 全球直连"
- "DOMAIN,dl.steam.ksyna.com,\U0001F3AF 全球直连"
- "DOMAIN,dota2.wmsj.cn,\U0001F3AF 全球直连"
- "DOMAIN,st.dl.bscstorage.net,\U0001F3AF 全球直连"
- "DOMAIN,st.dl.eccdnx.com,\U0001F3AF 全球直连"
- "DOMAIN,st.dl.pinyuncloud.com,\U0001F3AF 全球直连"
- "DOMAIN,steampipe.steamcontent.tnkjmec.com,\U0001F3AF 全球直连"
- 
- "IP-CIDR,198.18.0.0/16,\U0001F3AF 全球直连,no-resolve"
- "IP-CIDR,224.0.0.0/4,\U0001F3AF 全球直连,no-resolve"
- "IP-CIDR6,::1/128,\U0001F3AF 全球直连,no-resolve"
- "IP-CIDR6,fc00::/7,\U0001F3AF 全球直连,no-resolve"
- "IP-CIDR6,fe80::/10,\U0001F3AF 全球直连,no-resolve"
- "IP-CIDR6,fd00::/8,\U0001F3AF 全球直连,no-resolve"
- "DOMAIN,instant.arubanetworks.com,\U0001F3AF 全球直连"
- "DOMAIN,setmeup.arubanetworks.com,\U0001F3AF 全球直连"
- "DOMAIN,router.asus.com,\U0001F3AF 全球直连"
- "DOMAIN,www.asusrouter.com,\U0001F3AF 全球直连"
- "DOMAIN-SUFFIX,hiwifi.com,\U0001F3AF 全球直连"
- "DOMAIN-SUFFIX,leike.cc,\U0001F3AF 全球直连"
- "DOMAIN-SUFFIX,miwifi.com,\U0001F3AF 全球直连"
- "DOMAIN-SUFFIX,my.router,\U0001F3AF 全球直连"
- "DOMAIN-SUFFIX,p.to,\U0001F3AF 全球直连"
- "DOMAIN-SUFFIX,peiluyou.com,\U0001F3AF 全球直连"
- "DOMAIN-SUFFIX,phicomm.me,\U0001F3AF 全球直连"

redir-port: 7892
tproxy-port: 7895
mixed-port: 7893
bind-address: "*"
external-ui: "/usr/share/openclash/ui"
ipv6: false
dns:
  enable: true
  ipv6: false
  enhanced-mode: fake-ip
  fake-ip-range: 198.18.0.1/16
  listen: 0.0.0.0:7874
  nameserver:
  - dhcp://"eth1"
  - 192.168.1.1
  - 114.114.114.114
  - 119.29.29.29
  - 223.5.5.5
  - https://doh.pub/dns-query
  - https://dns.alidns.com/dns-query
  fallback:
  - https://dns.cloudflare.com/dns-query
  - https://public.dns.iij.jp/dns-query
  - https://jp.tiar.app/dns-query
  - https://jp.tiarap.org/dns-query
  - tls://dot.tiar.app
  fallback-filter:
    geoip: true
    geoip-code: CN
    ipcidr:
    - 0.0.0.0/8
    - 10.0.0.0/8
    - 100.64.0.0/10
    - 127.0.0.0/8
    - 169.254.0.0/16
    - 172.16.0.0/12
    - 192.0.0.0/24
    - 192.0.2.0/24
    - 192.88.99.0/24
    - 192.168.0.0/16
    - 198.18.0.0/15
    - 198.51.100.0/24
    - 203.0.113.0/24
    - 224.0.0.0/4
    - 240.0.0.0/4
    - 255.255.255.255/32
    domain:
    - "+.google.com"
    - "+.facebook.com"
    - "+.youtube.com"
    - "+.githubusercontent.com"
    - "+.googlevideo.com"
    - "+.msftconnecttest.com"
    - "+.msftncsi.com"
    - msftconnecttest.com
    - msftncsi.com
  fake-ip-filter:
  - "*.lan"
  - "*.localdomain"
  - "*.example"
  - "*.invalid"
  - "*.localhost"
  - "*.test"
  - "*.local"
  - "*.home.arpa"
  - time.*.com
  - time.*.gov
  - time.*.edu.cn
  - time.*.apple.com
  - time-ios.apple.com
  - time1.*.com
  - time2.*.com
  - time3.*.com
  - time4.*.com
  - time5.*.com
  - time6.*.com
  - time7.*.com
  - ntp.*.com
  - ntp1.*.com
  - ntp2.*.com
  - ntp3.*.com
  - ntp4.*.com
  - ntp5.*.com
  - ntp6.*.com
  - ntp7.*.com
  - "*.time.edu.cn"
  - "*.ntp.org.cn"
  - "+.pool.ntp.org"
  - time1.cloud.tencent.com
  - music.163.com
  - "*.music.163.com"
  - "*.126.net"
  - musicapi.taihe.com
  - music.taihe.com
  - songsearch.kugou.com
  - trackercdn.kugou.com
  - "*.kuwo.cn"
  - api-jooxtt.sanook.com
  - api.joox.com
  - joox.com
  - y.qq.com
  - "*.y.qq.com"
  - streamoc.music.tc.qq.com
  - mobileoc.music.tc.qq.com
  - isure.stream.qqmusic.qq.com
  - dl.stream.qqmusic.qq.com
  - aqqmusic.tc.qq.com
  - amobile.music.tc.qq.com
  - "*.xiami.com"
  - "*.music.migu.cn"
  - music.migu.cn
  - "+.msftconnecttest.com"
  - "+.msftncsi.com"
  - msftconnecttest.com
  - msftncsi.com
  - localhost.ptlogin2.qq.com
  - localhost.sec.qq.com
  - "+.srv.nintendo.net"
  - "*.n.n.srv.nintendo.net"
  - "+.stun.playstation.net"
  - xbox.*.*.microsoft.com
  - "*.*.xboxlive.com"
  - xbox.*.microsoft.com
  - xnotify.xboxlive.com
  - "+.battlenet.com.cn"
  - "+.wotgame.cn"
  - "+.wggames.cn"
  - "+.wowsgame.cn"
  - "+.wargaming.net"
  - proxy.golang.org
  - stun.*.*
  - stun.*.*.*
  - "+.stun.*.*"
  - "+.stun.*.*.*"
  - "+.stun.*.*.*.*"
  - "+.stun.*.*.*.*.*"
  - heartbeat.belkin.com
  - "*.linksys.com"
  - "*.linksyssmartwifi.com"
  - "*.router.asus.com"
  - mesu.apple.com
  - swscan.apple.com
  - swquery.apple.com
  - swdownload.apple.com
  - swcdn.apple.com
  - swdist.apple.com
  - lens.l.google.com
  - stun.l.google.com
  - "+.nflxvideo.net"
  - "*.square-enix.com"
  - "*.finalfantasyxiv.com"
  - "*.ffxiv.com"
  - "*.ff14.sdo.com"
  - ff.dorado.sdo.com
  - "*.mcdn.bilivideo.cn"
  - "+.media.dssott.com"
  - shark007.net
  - Mijia Cloud
  - "+.cmbchina.com"
  - "+.cmbimg.com"
  - "+.msftconnecttest.com"
  - "+.msftncsi.com"
experimental:
  sniff-tls-sni: true
tun:
  enable: true
  stack: system
  auto-route: false
  auto-detect-interface: false
  dns-hijack:
  - tcp://any:53
profile:
  store-selected: true
  store-fake-ip: true
authentication:
- Clash:tBo2eYUn

#===================== 自定义覆写设置 =====================#

#!/bin/sh
. /usr/share/openclash/ruby.sh
. /usr/share/openclash/log.sh
. /lib/functions.sh

# This script is called by /etc/init.d/openclash
# Add your custom overwrite scripts here, they will be take effict after the OpenClash own srcipts

LOG_OUT "Tip: Start Running Custom Overwrite Scripts..."
LOGTIME=$(echo $(date "+%Y-%m-%d %H:%M:%S"))
LOG_FILE="/tmp/openclash.log"
CONFIG_FILE="$1" #config path

#Simple Demo:
    #General Demo
    #1--config path
    #2--key name
    #3--value
    #ruby_edit "$CONFIG_FILE" "['redir-port']" "7892"
    #ruby_edit "$CONFIG_FILE" "['secret']" "123456"
    #ruby_edit "$CONFIG_FILE" "['dns']['enable']" "true"

    #Hash Demo
    #1--config path
    #2--key name
    #3--hash type value
    #ruby_edit "$CONFIG_FILE" "['experimental']" "{'sniff-tls-sni'=>true}"
    #ruby_edit "$CONFIG_FILE" "['sniffer']" "{'sniffing'=>['tls','http']}"

    #Array Demo:
    #1--config path
    #2--key name
    #3--position(start from 0, end with -1)
    #4--value
    #ruby_arr_insert "$CONFIG_FILE" "['dns']['nameserver']" "0" "114.114.114.114"

    #Array Add From Yaml File Demo:
    #1--config path
    #2--key name
    #3--position(start from 0, end with -1)
    #4--value file path
    #5--value key name in #4 file
    #ruby_arr_add_file "$CONFIG_FILE" "['dns']['fallback-filter']['ipcidr']" "0" "/etc/openclash/custom/openclash_custom_fallback_filter.yaml" "['fallback-filter']['ipcidr']"

#Ruby Script Demo:
    #ruby -ryaml -rYAML -I "/usr/share/openclash" -E UTF-8 -e "
    #   begin
    #      Value = YAML.load_file('$CONFIG_FILE');
    #   rescue Exception => e
    #      puts '${LOGTIME} Error: Load File Failed,【' + e.message + '】';
    #   end;

        #General
    #   begin
    #   Thread.new{
    #      Value['redir-port']=7892;
    #      Value['tproxy-port']=7895;
    #      Value['port']=7890;
    #      Value['socks-port']=7891;
    #      Value['mixed-port']=7893;
    #   }.join;

    #   rescue Exception => e
    #      puts '${LOGTIME} Error: Set General Failed,【' + e.message + '】';
    #   ensure
    #      File.open('$CONFIG_FILE','w') {|f| YAML.dump(Value, f)};
    #   end" 2>/dev/null >> $LOG_FILE

exit 0
#===================== 自定义防火墙设置 =====================#

#!/bin/sh
. /usr/share/openclash/log.sh
. /lib/functions.sh

# This script is called by /etc/init.d/openclash
# Add your custom firewall rules here, they will be added after the end of the OpenClash iptables rules

LOG_OUT "Tip: Start Add Custom Firewall Rules..."

exit 0
#===================== IPTABLES 防火墙设置 =====================#

#IPv4 NAT chain

# Generated by iptables-save v1.8.7 on Fri Dec 15 00:50:59 2023
*nat
:PREROUTING ACCEPT [72:8099]
:INPUT ACCEPT [197:15623]
:OUTPUT ACCEPT [658:40171]
:POSTROUTING ACCEPT [159:9951]
:MINIUPNPD - [0:0]
:MINIUPNPD-POSTROUTING - [0:0]
:openclash - [0:0]
:openclash_output - [0:0]
:postrouting_lan_rule - [0:0]
:postrouting_rule - [0:0]
:postrouting_wan_rule - [0:0]
:prerouting_lan_rule - [0:0]
:prerouting_rule - [0:0]
:prerouting_wan_rule - [0:0]
:zone_lan_postrouting - [0:0]
:zone_lan_prerouting - [0:0]
:zone_wan_postrouting - [0:0]
:zone_wan_prerouting - [0:0]
-A PREROUTING -p tcp -m comment --comment "OpenClash TCP DNS Hijack" -m tcp --dport 53 -j ACCEPT
-A PREROUTING -p tcp -m tcp --dport 53 -m comment --comment "OpenClash DNS Hijack" -j REDIRECT --to-ports 53
-A PREROUTING -p udp -m udp --dport 53 -m comment --comment "OpenClash DNS Hijack" -j REDIRECT --to-ports 53
-A PREROUTING -m comment --comment "!fw3: Custom prerouting rule chain" -j prerouting_rule
-A PREROUTING -i br-lan -m comment --comment "!fw3" -j zone_lan_prerouting
-A PREROUTING -i utun -m comment --comment "!fw3" -j zone_lan_prerouting
-A PREROUTING -i eth1 -m comment --comment "!fw3" -j zone_wan_prerouting
-A PREROUTING -p udp -m comment --comment DNSMASQ -m udp --dport 53 -j REDIRECT --to-ports 53
-A PREROUTING -p tcp -j openclash
-A OUTPUT -j openclash_output
-A POSTROUTING -m comment --comment "!fw3: Custom postrouting rule chain" -j postrouting_rule
-A POSTROUTING -o br-lan -m comment --comment "!fw3" -j zone_lan_postrouting
-A POSTROUTING -o utun -m comment --comment "!fw3" -j zone_lan_postrouting
-A POSTROUTING -o eth1 -m comment --comment "!fw3" -j zone_wan_postrouting
-A MINIUPNPD -p udp -m udp --dport 26751 -j DNAT --to-destination 192.168.6.185:26751
-A MINIUPNPD -p udp -m udp --dport 50914 -j DNAT --to-destination 192.168.6.185:50914
-A MINIUPNPD -p udp -m udp --dport 39029 -j DNAT --to-destination 192.168.6.185:39029
-A MINIUPNPD -p udp -m udp --dport 27491 -j DNAT --to-destination 192.168.6.185:27491
-A MINIUPNPD -p udp -m udp --dport 20922 -j DNAT --to-destination 192.168.6.185:20922
-A openclash -m set --match-set localnetwork dst -j RETURN
-A openclash -m set --match-set china_ip_route dst -m set ! --match-set china_ip_route_pass dst -j RETURN
-A openclash -p tcp -j REDIRECT --to-ports 7892
-A openclash_output -d 198.18.0.0/16 -p tcp -m owner ! --uid-owner 65534 -j REDIRECT --to-ports 7892
-A openclash_output -m set --match-set localnetwork dst -j RETURN
-A openclash_output -m owner ! --uid-owner 65534 -m set --match-set china_ip_route dst -m set ! --match-set china_ip_route_pass dst -j RETURN
-A openclash_output -p tcp -m owner ! --uid-owner 65534 -j REDIRECT --to-ports 7892
-A zone_lan_postrouting -m comment --comment "!fw3: Custom lan postrouting rule chain" -j postrouting_lan_rule
-A zone_lan_prerouting -m comment --comment "!fw3: Custom lan prerouting rule chain" -j prerouting_lan_rule
-A zone_wan_postrouting -j MINIUPNPD-POSTROUTING
-A zone_wan_postrouting -m comment --comment "!fw3: Custom wan postrouting rule chain" -j postrouting_wan_rule
-A zone_wan_postrouting -m comment --comment "!fw3" -j MASQUERADE --mode fullcone 
-A zone_wan_prerouting -j MINIUPNPD
-A zone_wan_prerouting -m comment --comment "!fw3: Custom wan prerouting rule chain" -j prerouting_wan_rule
COMMIT
# Completed on Fri Dec 15 00:50:59 2023

#IPv4 Mangle chain

# Generated by iptables-save v1.8.7 on Fri Dec 15 00:50:59 2023
*mangle
:PREROUTING ACCEPT [25535:6039198]
:INPUT ACCEPT [23238:5529289]
:FORWARD ACCEPT [2295:509807]
:OUTPUT ACCEPT [26539:30973041]
:POSTROUTING ACCEPT [28833:31482504]
:openclash - [0:0]
:openclash_dns_hijack - [0:0]
:openclash_output - [0:0]
:openclash_upnp - [0:0]
-A PREROUTING -p udp -j openclash
-A PREROUTING -p tcp -m tcp --dport 53 -j openclash_dns_hijack
-A FORWARD -o eth1 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -i eth1 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A OUTPUT -j openclash_output
-A openclash -p udp -m udp --sport 500 -j RETURN
-A openclash -p udp -m udp --sport 68 -j RETURN
-A openclash -i utun -j RETURN
-A openclash -m set --match-set localnetwork dst -j RETURN
-A openclash -m set --match-set china_ip_route dst -m set ! --match-set china_ip_route_pass dst -j RETURN
-A openclash -p udp -j openclash_upnp
-A openclash -j MARK --set-xmark 0x162/0xffffffff
-A openclash_dns_hijack -p tcp -m comment --comment "OpenClash TCP DNS Hijack" -m tcp --dport 53 -j MARK --set-xmark 0x162/0xffffffff
-A openclash_output -p udp -m udp --sport 500 -j RETURN
-A openclash_output -p udp -m udp --sport 68 -j RETURN
-A openclash_output -m set --match-set localnetwork dst -j RETURN
-A openclash_output -d 198.18.0.0/16 -p udp -m owner ! --uid-owner 65534 -j MARK --set-xmark 0x162/0xffffffff
-A openclash_upnp -s 192.168.6.185/32 -p udp -m udp --sport 26751 -j RETURN
-A openclash_upnp -s 192.168.6.185/32 -p udp -m udp --sport 50914 -j RETURN
-A openclash_upnp -s 192.168.6.185/32 -p udp -m udp --sport 39029 -j RETURN
-A openclash_upnp -s 192.168.6.185/32 -p udp -m udp --sport 27491 -j RETURN
-A openclash_upnp -s 192.168.6.185/32 -p udp -m udp --sport 20922 -j RETURN
COMMIT
# Completed on Fri Dec 15 00:50:59 2023

#IPv4 Filter chain

# Generated by iptables-save v1.8.7 on Fri Dec 15 00:50:59 2023
*filter
:INPUT ACCEPT [0:0]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [0:0]
:MINIUPNPD - [0:0]
:forwarding_lan_rule - [0:0]
:forwarding_rule - [0:0]
:forwarding_wan_rule - [0:0]
:input_lan_rule - [0:0]
:input_rule - [0:0]
:input_wan_rule - [0:0]
:openclash_wan_input - [0:0]
:output_lan_rule - [0:0]
:output_rule - [0:0]
:output_wan_rule - [0:0]
:reject - [0:0]
:syn_flood - [0:0]
:zone_lan_dest_ACCEPT - [0:0]
:zone_lan_forward - [0:0]
:zone_lan_input - [0:0]
:zone_lan_output - [0:0]
:zone_lan_src_ACCEPT - [0:0]
:zone_wan_dest_ACCEPT - [0:0]
:zone_wan_dest_REJECT - [0:0]
:zone_wan_forward - [0:0]
:zone_wan_input - [0:0]
:zone_wan_output - [0:0]
:zone_wan_src_REJECT - [0:0]
-A INPUT -i eth1 -m set ! --match-set localnetwork src -j openclash_wan_input
-A INPUT -i lo -m comment --comment "!fw3" -j ACCEPT
-A INPUT -m comment --comment "!fw3: Custom input rule chain" -j input_rule
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m comment --comment "!fw3" -j syn_flood
-A INPUT -i br-lan -m comment --comment "!fw3" -j zone_lan_input
-A INPUT -i utun -m comment --comment "!fw3" -j zone_lan_input
-A INPUT -i eth1 -m comment --comment "!fw3" -j zone_wan_input
-A FORWARD -o utun -p udp -m udp --dport 443 -m comment --comment "OpenClash QUIC REJECT" -m set ! --match-set china_ip_route dst -j REJECT --reject-with icmp-port-unreachable
-A FORWARD -o utun -m comment --comment "OpenClash TUN Forward" -j ACCEPT
-A FORWARD -m comment --comment "!fw3: Custom forwarding rule chain" -j forwarding_rule
-A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A FORWARD -i br-lan -m comment --comment "!fw3" -j zone_lan_forward
-A FORWARD -i utun -m comment --comment "!fw3" -j zone_lan_forward
-A FORWARD -i eth1 -m comment --comment "!fw3" -j zone_wan_forward
-A FORWARD -m comment --comment "!fw3" -j reject
-A OUTPUT -o lo -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -m comment --comment "!fw3: Custom output rule chain" -j output_rule
-A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -o br-lan -m comment --comment "!fw3" -j zone_lan_output
-A OUTPUT -o utun -m comment --comment "!fw3" -j zone_lan_output
-A OUTPUT -o eth1 -m comment --comment "!fw3" -j zone_wan_output
-A MINIUPNPD -d 192.168.6.185/32 -p udp -m udp --dport 26751 -j ACCEPT
-A MINIUPNPD -d 192.168.6.185/32 -p udp -m udp --dport 50914 -j ACCEPT
-A MINIUPNPD -d 192.168.6.185/32 -p udp -m udp --dport 39029 -j ACCEPT
-A MINIUPNPD -d 192.168.6.185/32 -p udp -m udp --dport 27491 -j ACCEPT
-A MINIUPNPD -d 192.168.6.185/32 -p udp -m udp --dport 20922 -j ACCEPT
-A openclash_wan_input -p udp -m multiport --dports 7892,7895,9090,7890,7891,7893,7874 -j REJECT --reject-with icmp-port-unreachable
-A openclash_wan_input -p tcp -m multiport --dports 7892,7895,9090,7890,7891,7893,7874 -j REJECT --reject-with icmp-port-unreachable
-A reject -p tcp -m comment --comment "!fw3" -j REJECT --reject-with tcp-reset
-A reject -m comment --comment "!fw3" -j REJECT --reject-with icmp-port-unreachable
-A syn_flood -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m limit --limit 25/sec --limit-burst 50 -m comment --comment "!fw3" -j RETURN
-A syn_flood -m comment --comment "!fw3" -j DROP
-A zone_lan_dest_ACCEPT -o br-lan -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_dest_ACCEPT -o utun -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_forward -m comment --comment "!fw3: Custom lan forwarding rule chain" -j forwarding_lan_rule
-A zone_lan_forward -m comment --comment "!fw3: Zone lan to wan forwarding policy" -j zone_wan_dest_ACCEPT
-A zone_lan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_lan_forward -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_input -m comment --comment "!fw3: Custom lan input rule chain" -j input_lan_rule
-A zone_lan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_lan_input -m comment --comment "!fw3" -j zone_lan_src_ACCEPT
-A zone_lan_output -m comment --comment "!fw3: Custom lan output rule chain" -j output_lan_rule
-A zone_lan_output -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_src_ACCEPT -i br-lan -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_src_ACCEPT -i utun -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_ACCEPT -o eth1 -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
-A zone_wan_dest_ACCEPT -o eth1 -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_REJECT -o eth1 -m comment --comment "!fw3" -j reject
-A zone_wan_forward -j MINIUPNPD
-A zone_wan_forward -m comment --comment "!fw3: Custom wan forwarding rule chain" -j forwarding_wan_rule
-A zone_wan_forward -p esp -m comment --comment "!fw3: Allow-IPSec-ESP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -p udp -m udp --dport 500 -m comment --comment "!fw3: Allow-ISAKMP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_wan_forward -m comment --comment "!fw3" -j zone_wan_dest_REJECT
-A zone_wan_input -m comment --comment "!fw3: Custom wan input rule chain" -j input_wan_rule
-A zone_wan_input -p udp -m udp --dport 68 -m comment --comment "!fw3: Allow-DHCP-Renew" -j ACCEPT
-A zone_wan_input -p icmp -m icmp --icmp-type 8 -m comment --comment "!fw3: Allow-Ping" -j ACCEPT
-A zone_wan_input -p igmp -m comment --comment "!fw3: Allow-IGMP" -j ACCEPT
-A zone_wan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_wan_input -m comment --comment "!fw3" -j zone_wan_src_REJECT
-A zone_wan_output -m comment --comment "!fw3: Custom wan output rule chain" -j output_wan_rule
-A zone_wan_output -m comment --comment "!fw3" -j zone_wan_dest_ACCEPT
-A zone_wan_src_REJECT -i eth1 -m comment --comment "!fw3" -j reject
COMMIT
# Completed on Fri Dec 15 00:50:59 2023

#IPv6 NAT chain

# Generated by ip6tables-save v1.8.7 on Fri Dec 15 00:50:59 2023
*nat
:PREROUTING ACCEPT [0:0]
:INPUT ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]
-A PREROUTING -p udp -m comment --comment DNSMASQ -m udp --dport 53 -j REDIRECT --to-ports 53
COMMIT
# Completed on Fri Dec 15 00:50:59 2023

#IPv6 Mangle chain

# Generated by ip6tables-save v1.8.7 on Fri Dec 15 00:50:59 2023
*mangle
:PREROUTING ACCEPT [9:820]
:INPUT ACCEPT [9:820]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [198:24219]
:POSTROUTING ACCEPT [198:24219]
-A FORWARD -o eth1 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -i eth1 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
COMMIT
# Completed on Fri Dec 15 00:50:59 2023

#IPv6 Filter chain

# Generated by ip6tables-save v1.8.7 on Fri Dec 15 00:50:59 2023
*filter
:INPUT ACCEPT [0:0]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [0:0]
:MINIUPNPD - [0:0]
:forwarding_lan_rule - [0:0]
:forwarding_rule - [0:0]
:forwarding_wan_rule - [0:0]
:input_lan_rule - [0:0]
:input_rule - [0:0]
:input_wan_rule - [0:0]
:output_lan_rule - [0:0]
:output_rule - [0:0]
:output_wan_rule - [0:0]
:reject - [0:0]
:syn_flood - [0:0]
:zone_lan_dest_ACCEPT - [0:0]
:zone_lan_forward - [0:0]
:zone_lan_input - [0:0]
:zone_lan_output - [0:0]
:zone_lan_src_ACCEPT - [0:0]
:zone_wan_dest_ACCEPT - [0:0]
:zone_wan_dest_REJECT - [0:0]
:zone_wan_forward - [0:0]
:zone_wan_input - [0:0]
:zone_wan_output - [0:0]
:zone_wan_src_REJECT - [0:0]
-A INPUT -i lo -m comment --comment "!fw3" -j ACCEPT
-A INPUT -m comment --comment "!fw3: Custom input rule chain" -j input_rule
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m comment --comment "!fw3" -j syn_flood
-A INPUT -i br-lan -m comment --comment "!fw3" -j zone_lan_input
-A INPUT -i utun -m comment --comment "!fw3" -j zone_lan_input
-A INPUT -i eth1 -m comment --comment "!fw3" -j zone_wan_input
-A FORWARD -m comment --comment "!fw3: Custom forwarding rule chain" -j forwarding_rule
-A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A FORWARD -i br-lan -m comment --comment "!fw3" -j zone_lan_forward
-A FORWARD -i utun -m comment --comment "!fw3" -j zone_lan_forward
-A FORWARD -i eth1 -m comment --comment "!fw3" -j zone_wan_forward
-A FORWARD -m comment --comment "!fw3" -j reject
-A OUTPUT -o lo -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -m comment --comment "!fw3: Custom output rule chain" -j output_rule
-A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -o br-lan -m comment --comment "!fw3" -j zone_lan_output
-A OUTPUT -o utun -m comment --comment "!fw3" -j zone_lan_output
-A OUTPUT -o eth1 -m comment --comment "!fw3" -j zone_wan_output
-A reject -p tcp -m comment --comment "!fw3" -j REJECT --reject-with tcp-reset
-A reject -m comment --comment "!fw3" -j REJECT --reject-with icmp6-port-unreachable
-A syn_flood -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m limit --limit 25/sec --limit-burst 50 -m comment --comment "!fw3" -j RETURN
-A syn_flood -m comment --comment "!fw3" -j DROP
-A zone_lan_dest_ACCEPT -o br-lan -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_dest_ACCEPT -o utun -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_forward -m comment --comment "!fw3: Custom lan forwarding rule chain" -j forwarding_lan_rule
-A zone_lan_forward -m comment --comment "!fw3: Zone lan to wan forwarding policy" -j zone_wan_dest_ACCEPT
-A zone_lan_forward -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_input -m comment --comment "!fw3: Custom lan input rule chain" -j input_lan_rule
-A zone_lan_input -m comment --comment "!fw3" -j zone_lan_src_ACCEPT
-A zone_lan_output -m comment --comment "!fw3: Custom lan output rule chain" -j output_lan_rule
-A zone_lan_output -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_src_ACCEPT -i br-lan -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_src_ACCEPT -i utun -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_ACCEPT -o eth1 -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
-A zone_wan_dest_ACCEPT -o eth1 -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_REJECT -o eth1 -m comment --comment "!fw3" -j reject
-A zone_wan_forward -j MINIUPNPD
-A zone_wan_forward -m comment --comment "!fw3: Custom wan forwarding rule chain" -j forwarding_wan_rule
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 128 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 129 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 2 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 3 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 4/0 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 4/1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p esp -m comment --comment "!fw3: Allow-IPSec-ESP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -p udp -m udp --dport 500 -m comment --comment "!fw3: Allow-ISAKMP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -m comment --comment "!fw3" -j zone_wan_dest_REJECT
-A zone_wan_input -m comment --comment "!fw3: Custom wan input rule chain" -j input_wan_rule
-A zone_wan_input -p udp -m udp --dport 546 -m comment --comment "!fw3: Allow-DHCPv6" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 130/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 131/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 132/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 143/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 128 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 129 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 2 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 3 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 4/0 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 4/1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 133 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 135 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 134 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 136 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -m comment --comment "!fw3" -j zone_wan_src_REJECT
-A zone_wan_output -m comment --comment "!fw3: Custom wan output rule chain" -j output_wan_rule
-A zone_wan_output -m comment --comment "!fw3" -j zone_wan_dest_ACCEPT
-A zone_wan_src_REJECT -i eth1 -m comment --comment "!fw3" -j reject
COMMIT
# Completed on Fri Dec 15 00:50:59 2023

#===================== IPSET状态 =====================#

Name: localnetwork
Type: hash:net
Revision: 6
Header: family inet hashsize 1024 maxelem 65536
Size in memory: 3840
References: 5
Number of entries: 56

Name: china_ip_route
Type: hash:net
Revision: 6
Header: family inet hashsize 2048 maxelem 1000000
Size in memory: 187928
References: 4
Number of entries: 8649

Name: china_ip_route_pass
Type: hash:net
Revision: 6
Header: family inet hashsize 1024 maxelem 1000000
Size in memory: 448
References: 3
Number of entries: 0

#===================== 路由表状态 =====================#

#IPv4

#route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
0.0.0.0         192.168.1.1     0.0.0.0         UG    0      0        0 eth1
192.168.1.0     0.0.0.0         255.255.255.0   U     0      0        0 eth1
192.168.6.0     0.0.0.0         255.255.255.0   U     0      0        0 br-lan
198.18.0.0      0.0.0.0         255.255.0.0     U     0      0        0 utun

#ip route list
default via 192.168.1.1 dev eth1 proto static src 192.168.1.2 
192.168.1.0/24 dev eth1 proto kernel scope link src 192.168.1.2 
192.168.6.0/24 dev br-lan proto kernel scope link src 192.168.6.1 
198.18.0.0/16 dev utun proto kernel scope link src 198.18.0.1 

#ip rule show
0:  from all lookup local
32765:  from all fwmark 0x162 lookup 354
32766:  from all lookup main
32767:  from all lookup default

#IPv6

#route -A inet6
Kernel IPv6 routing table
Destination                                 Next Hop                                Flags Metric Ref    Use Iface
fdab:8b80:64fd::/48                         ::                                      !n    2147483647 2        0 lo      
fe80::/64                                   ::                                      U     256    1        0 br-lan  
fe80::/64                                   ::                                      U     256    5        0 eth1    
fe80::/64                                   ::                                      U     256    1        0 utun    
::/0                                        ::                                      !n    -1     1        0 lo      
::1/128                                     ::                                      Un    0      6        0 lo      
fe80::/128                                  ::                                      Un    0      6        0 br-lan  
fe80::/128                                  ::                                      Un    0      3        0 eth1    
fe80::/128                                  ::                                      Un    0      3        0 utun    
fe80::46df:65ff:fe2d:dec7/128               ::                                      Un    0      5        0 eth1    
fe80::46df:65ff:fe2d:dec8/128               ::                                      Un    0      3        0 br-lan  
fe80::a6d1:5f1:4e99:2437/128                ::                                      Un    0      2        0 utun    
ff00::/8                                    ::                                      U     256    5        0 br-lan  
ff00::/8                                    ::                                      U     256    5        0 eth1    
ff00::/8                                    ::                                      U     256    1        0 utun    
::/0                                        ::                                      !n    -1     1        0 lo      

#ip -6 route list
unreachable fdab:8b80:64fd::/48 dev lo proto static metric 2147483647 pref medium
fe80::/64 dev br-lan proto kernel metric 256 pref medium
fe80::/64 dev eth1 proto kernel metric 256 pref medium
fe80::/64 dev utun proto kernel metric 256 pref medium

#ip -6 rule show
0:  from all lookup local
32766:  from all lookup main
4200000001: from all iif lo failed_policy
4200000004: from all iif eth1 failed_policy
4200000017: from all iif br-lan failed_policy
4200000064: from all iif utun failed_policy

#===================== Tun设备状态 =====================#

utun: tun multi_queue vnet_hdr

#===================== 端口占用状态 =====================#

tcp        0      0 198.18.0.1:7777         0.0.0.0:*               LISTEN      9360/clash
tcp        0      0 :::7890                 :::*                    LISTEN      9360/clash
tcp        0      0 :::7891                 :::*                    LISTEN      9360/clash
tcp        0      0 :::7892                 :::*                    LISTEN      9360/clash
tcp        0      0 :::7893                 :::*                    LISTEN      9360/clash
tcp        0      0 :::7895                 :::*                    LISTEN      9360/clash
tcp        0      0 :::9090                 :::*                    LISTEN      9360/clash
udp        0      0 :::7874                 :::*                                9360/clash
udp        0      0 :::7891                 :::*                                9360/clash
udp        0      0 :::7892                 :::*                                9360/clash
udp        0      0 :::7893                 :::*                                9360/clash
udp        0      0 :::7895                 :::*                                9360/clash

#===================== 测试本机DNS查询(www.baidu.com) =====================#

Server:     127.0.0.1
Address:    127.0.0.1:53

Non-authoritative answer:
www.baidu.com   canonical name = www.a.shifen.com
Name:   www.a.shifen.com
Address: 2409:8c20:6:1d55:0:ff:b09c:7d77
Name:   www.a.shifen.com
Address: 2409:8c20:6:1135:0:ff:b027:210c

Non-authoritative answer:
www.baidu.com   canonical name = www.a.shifen.com
Name:   www.a.shifen.com
Address: 36.155.132.3
Name:   www.a.shifen.com
Address: 36.155.132.76

#===================== 测试内核DNS查询(www.instagram.com) =====================#

Dnsmasq 当前默认 resolv 文件:/tmp/resolv.conf.d/resolv.conf.auto

#===================== /tmp/resolv.conf.auto =====================#

# Interface lan
nameserver 114.114.114.114
nameserver 223.5.5.5
# Interface wan
nameserver 192.168.1.1

#===================== /tmp/resolv.conf.d/resolv.conf.auto =====================#

# Interface lan
nameserver 114.114.114.114
nameserver 223.5.5.5
# Interface wan
nameserver 192.168.1.1

#===================== 测试本机网络连接(www.baidu.com) =====================#

HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: private, no-cache, no-store, proxy-revalidate, no-transform
Connection: keep-alive
Content-Length: 277
Content-Type: text/html
Date: Thu, 14 Dec 2023 16:51:02 GMT
Etag: "575e1f60-115"
Last-Modified: Mon, 13 Jun 2016 02:50:08 GMT
Pragma: no-cache
Server: bfe/1.0.8.18

#===================== 测试本机网络下载(raw.githubusercontent.com) =====================#

HTTP/2 404 
content-security-policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
strict-transport-security: max-age=31536000
x-content-type-options: nosniff
x-frame-options: deny
x-xss-protection: 1; mode=block
content-type: text/plain; charset=utf-8
x-github-request-id: 2F48:3E0A49:5D2D79:64BD8F:657B3253
accept-ranges: bytes
date: Thu, 14 Dec 2023 16:51:03 GMT
via: 1.1 varnish
x-served-by: cache-nrt-rjtf7700050-NRT
x-cache: HIT
x-cache-hits: 1
x-timer: S1702572663.084428,VS0,VE1
vary: Authorization,Accept-Encoding,Origin
access-control-allow-origin: *
cross-origin-resource-policy: cross-origin
x-fastly-request-id: 22392d47d7c660fb157db02d8687abfe2129bec3
expires: Thu, 14 Dec 2023 16:56:03 GMT
source-age: 35
content-length: 14

#===================== 最近运行日志(自动切换为Debug模式) =====================#

2023-12-15 00:30:47 Watchdog: Setting Firewall For Enabling Redirect...
2023-12-15 00:31:47 Tip: Dnsmasq Work is Normal, Restore The Firewall DNS Hijacking Rules...
2023-12-15 00:35:32 OpenClash Restart...
2023-12-15 00:35:32 OpenClash Stoping...
2023-12-15 00:35:32 Step 1: Backup The Current Groups State...
2023-12-15 00:35:32 Step 2: Delete OpenClash Firewall Rules...
2023-12-15 00:35:33 Step 3: Close The OpenClash Daemons...
2023-12-15 00:35:33 Step 4: Close The Clash Core Process...
2023-12-15 00:35:33 Step 5: Restart Dnsmasq...
2023-12-15 00:35:38 Step 6: Delete OpenClash Residue File...
2023-12-15 00:35:39 OpenClash Start Running...
2023-12-15 00:35:39 Step 1: Get The Configuration...
2023-12-15 00:35:39 Step 2: Check The Components...
2023-12-15 00:35:40 Tip: Because of the file【 /etc/config/openclash 】modificated, Pause quick start...
2023-12-15 00:35:40 Step 3: Modify The Config File...
2023-12-15 00:35:42 Tip: You have seted the authentication of SOCKS5/HTTP(S) proxy with【Clash:tBo2eYUn】
2023-12-15 00:35:44 Tip: Start Running Custom Overwrite Scripts...
2023-12-15 00:35:44 Step 4: Start Running The Clash Core...
2023-12-15 00:35:44 Tip: Detected The Exclusive Function of The TUN Core, Use TUN Core to Start...
2023-12-15 00:35:44 Test The Config File First...
16:35:45 INF [Config] initial compatible provider name=🎥 奈飞视频
16:35:45 INF [Config] initial compatible provider name=🐟 漏网之鱼
16:35:45 INF [Config] initial compatible provider name=🍃 应用净化
16:35:45 INF [Config] initial compatible provider name=♻️ 自动选择
16:35:45 INF [Config] initial compatible provider name=🎥 奈飞节点
16:35:45 INF [Config] initial compatible provider name=🇺🇲 美国节点
16:35:45 INF [Config] initial compatible provider name=🇯🇵 日本节点
16:35:45 INF [Config] initial compatible provider name=📹 油管视频
16:35:45 INF [Config] initial compatible provider name=🎶 网易音乐
16:35:45 INF [Config] initial compatible provider name=🛑 广告拦截
16:35:45 INF [Config] initial compatible provider name=Ⓜ️ 微软云盘
16:35:45 INF [Config] initial compatible provider name=🌏 国内媒体
16:35:45 INF [Config] initial compatible provider name=🚀 手动切换
16:35:45 INF [Config] initial compatible provider name=🇰🇷 韩国节点
16:35:45 INF [Config] initial compatible provider name=📢 谷歌FCM
16:35:45 INF [Config] initial compatible provider name=📺 哔哩哔哩
16:35:45 INF [Config] initial compatible provider name=📺 巴哈姆特
16:35:45 INF [Config] initial compatible provider name=🚀 节点选择
16:35:45 INF [Config] initial compatible provider name=🌍 国外媒体
16:35:45 INF [Config] initial compatible provider name=🎯 全球直连
16:35:45 INF [Config] initial compatible provider name=💬 OpenAi
16:35:45 INF [Config] initial compatible provider name=Ⓜ️ 微软Bing
16:35:45 INF [Config] initial compatible provider name=🇸🇬 狮城节点
16:35:45 INF [Config] initial compatible provider name=🇨🇳 台湾节点
16:35:45 INF [Config] initial compatible provider name=📲 电报消息
16:35:45 INF [Config] initial compatible provider name=Ⓜ️ 微软服务
16:35:45 INF [Config] initial compatible provider name=🍎 苹果服务
16:35:45 INF [Config] initial compatible provider name=🇭🇰 香港节点
16:35:45 INF [Config] initial compatible provider name=🎮 游戏平台
16:35:46 WRN [CacheFile] can't open cache file error=timeout
2023-12-15 00:35:46 configuration file【/etc/openclash/xfss.yaml】test is successful
2023-12-15 00:35:47 Step 5: Check The Core Status...
16:35:48 INF [Config] initial compatible provider name=🇺🇲 美国节点
16:35:48 INF [Config] initial compatible provider name=🇨🇳 台湾节点
16:35:48 INF [Config] initial compatible provider name=🌍 国外媒体
16:35:48 INF [Config] initial compatible provider name=Ⓜ️ 微软云盘
16:35:48 INF [Config] initial compatible provider name=🚀 节点选择
16:35:48 INF [Config] initial compatible provider name=🎥 奈飞节点
16:35:48 INF [Config] initial compatible provider name=💬 OpenAi
16:35:48 INF [Config] initial compatible provider name=📲 电报消息
16:35:48 INF [Config] initial compatible provider name=🇯🇵 日本节点
16:35:48 INF [Config] initial compatible provider name=🇸🇬 狮城节点
16:35:48 INF [Config] initial compatible provider name=📹 油管视频
16:35:48 INF [Config] initial compatible provider name=🎮 游戏平台
16:35:48 INF [Config] initial compatible provider name=🍃 应用净化
16:35:48 INF [Config] initial compatible provider name=Ⓜ️ 微软服务
16:35:48 INF [Config] initial compatible provider name=🐟 漏网之鱼
16:35:48 INF [Config] initial compatible provider name=📺 巴哈姆特
16:35:48 INF [Config] initial compatible provider name=🇰🇷 韩国节点
16:35:48 INF [Config] initial compatible provider name=🇭🇰 香港节点
16:35:48 INF [Config] initial compatible provider name=📺 哔哩哔哩
16:35:48 INF [Config] initial compatible provider name=Ⓜ️ 微软Bing
16:35:48 INF [Config] initial compatible provider name=🚀 手动切换
16:35:48 INF [Config] initial compatible provider name=🎯 全球直连
16:35:48 INF [Config] initial compatible provider name=♻️ 自动选择
16:35:48 INF [Config] initial compatible provider name=📢 谷歌FCM
16:35:48 INF [Config] initial compatible provider name=🌏 国内媒体
16:35:48 INF [Config] initial compatible provider name=🍎 苹果服务
16:35:48 INF [Config] initial compatible provider name=🎶 网易音乐
16:35:48 INF [Config] initial compatible provider name=🎥 奈飞视频
16:35:48 INF [Config] initial compatible provider name=🛑 广告拦截
2023-12-15 00:35:50 Step 6: Wait For The File Downloading...
2023-12-15 00:35:51 Step 7: Set Firewall Rules...
2023-12-15 00:35:51 Tip: DNS Hijacking Mode is Dnsmasq Redirect...
2023-12-15 00:35:53 Tip: Bypass the China IP May Cause the Dnsmasq Load For a Long Time After Restart in FAKE-IP Mode, Hijack the DNS to Core Untill the Dnsmasq Works Well...
2023-12-15 00:35:53 Tip: Waiting for TUN Interface Start...
2023-12-15 00:35:53 Tip: Start Add Port Bypassing Rules For Firewall Redirect and Firewall Rules...
2023-12-15 00:35:53 Tip: Start Add Custom Firewall Rules...
2023-12-15 00:35:53 Step 8: Restart Dnsmasq...
2023-12-15 00:35:57 Step 9: Add Cron Rules, Start Daemons...
2023-12-15 00:35:57 OpenClash Start Successful!
2023-12-15 00:36:57 Watchdog: Setting Firewall For Enabling Redirect...
2023-12-15 00:37:57 Tip: Dnsmasq Work is Normal, Restore The Firewall DNS Hijacking Rules...
16:45:13 INF [TCP] connected lAddr=192.168.6.107:52688 rAddr=array508.prod.do.dsp.mp.microsoft.com:443 mode=rule rule=DomainKeyword(microsoft) proxy=Ⓜ️ 微软服务[台湾 01]
16:47:32 DBG [TCP] accept connection lAddr=192.168.6.107:52793 rAddr=www.youtube.com:443 inbound=Redir
16:47:32 DBG [Matcher] find process failed error=process not found addr=www.youtube.com
16:47:32 INF [TCP] connected lAddr=192.168.6.107:52793 rAddr=www.youtube.com:443 mode=rule rule=DomainKeyword(youtube) proxy=📹 油管视频[台湾 01]
16:47:36 DBG [TCP] accept connection lAddr=192.168.6.107:52800 rAddr=www.youtube.com:443 inbound=Redir
16:47:36 DBG [Matcher] find process failed error=process not found addr=www.youtube.com
16:47:36 INF [TCP] connected lAddr=192.168.6.107:52800 rAddr=www.youtube.com:443 mode=rule rule=DomainKeyword(youtube) proxy=📹 油管视频[台湾 01]

#===================== 最近运行日志获取完成(自动切换为silent模式) =====================#

#===================== 活动连接信息 =====================#

1. SourceIP:【192.168.6.107】 - Host:【www.youtube.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【youtube】 - Lastchain:【台湾 01】
2. SourceIP:【192.168.6.107】 - Host:【alive.github.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【github】 - Lastchain:【日本 05】
3. SourceIP:【192.168.6.107】 - Host:【content-autofill.googleapis.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【google】 - Lastchain:【台湾 01】
4. SourceIP:【192.168.6.107】 - Host:【www.google.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【google】 - Lastchain:【台湾 01】
5. SourceIP:【192.168.6.107】 - Host:【clients4.google.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【google】 - Lastchain:【香港 03】
6. SourceIP:【192.168.6.107】 - Host:【api.ipify.org】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【新加坡 05】
7. SourceIP:【192.168.6.107】 - Host:【api.codelife.cc】 - DestinationIP:【221.130.19.95】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】
8. SourceIP:【192.168.6.107】 - Host:【v10.events.data.microsoft.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【microsoft】 - Lastchain:【香港 03】
9. SourceIP:【192.168.6.107】 - Host:【www.youtube.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【youtube】 - Lastchain:【台湾 01】
10. SourceIP:【192.168.6.107】 - Host:【api.clearlyreader.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【新加坡 05】
11. SourceIP:【192.168.6.107】 - Host:【api.codelife.cc】 - DestinationIP:【221.130.19.96】 - Network:【tcp】 - RulePayload:【CN】 - Lastchain:【DIRECT】

OpenClash Config

No response

Expected Behavior

希望可以得到相关的说明或者解决方法

Screenshots

No response

ghost commented 7 months ago

你这是把rule里的信息手动删了一半?连match都删了?

只看下仅剩几个名字啊 有一行## epic直连规则 反正我是不能直连的,必须挂代理或者加速器,不知道你是不这个情况

1394805163 commented 7 months ago

你这是把rule里的信息手动删了一半?连match都删了?

只看下仅剩几个名字啊 有一行## epic直连规则 反正我是不能直连的,必须挂代理或者加速器,不知道你是不这个情况

emm昨天太晚了米有发现,能给我看一下域名规则吗顺便问下怎么控制epic下载直连 我用的acl4ssr的默认规则没有魔改

ghost commented 7 months ago

啊?这是你自己填的啊!我只是复制下来了,你自己ctrl+f上去看

这些内容应该是你填到覆写-自定义规则里的

而且你发的日志规则部分缺失的太多了

1394805163 commented 7 months ago

啊?这是你自己填的啊!我只是复制下来了,你自己ctrl+f上去看

这些内容应该是你填到覆写-自定义规则里的

而且你发的日志规则部分缺失的太多了

我试试看再次发一下日志因为之前提示日志太长了

ghost commented 7 months ago

咱俩仿佛都还是没理解对方的意思 这样说吧 你覆写-自定义规则里是否有意的将epic填写为直连了,如- DOMAIN-SUFFIX,epicgames.com,🎯 全球直连 是的话,直接问搜索引擎epic无法购买游戏可能得到回复会更快一些。


另外,日志不是必须得全部复制上来,完整的可以作为附件上传,写明就好。

1394805163 commented 7 months ago

咱俩仿佛都还是没理解对方的意思 这样说吧 你覆写-自定义规则里是否有意的将epic填写为直连了,如- DOMAIN-SUFFIX,epicgames.com,🎯 全球直连 是的话,直接问搜索引擎epic无法购买游戏可能得到回复会更快一些。

另外,日志不是必须得全部复制上来,完整的可以作为附件上传,写明就好。

我直接推倒重来吗每一步都测试过去那种最后发现是 自定义了上游dns导致的很奇怪不知道原因

ghost commented 7 months ago

教程的这套dns逻辑简单粗暴。

dns:
  enable: true
  listen: :1053
  ipv6: true
  enhanced-mode: fake-ip
  fake-ip-filter:
    - '*'
    - '+.lan'
    - '+.local'
  nameserver:
    - https://doh.pub/dns-query
    - https://dns.alidns.com/dns-query
  proxy-server-nameserver:
    - https://doh.pub/dns-query
  nameserver-policy:
    "geosite:private":
      - https://doh.pub/dns-query
      - https://dns.alidns.com/dns-query
    "geosite:geolocation-!cn":
      - 'https://dns.cloudflare.com/dns-query#dns'
      - 'https://dns.google/dns-query#dns'

有兴趣可以看文档自学一下写规则,用起来能顺手好多。


我去,回错了,不过有兴趣自学一下也没啥问题

1394805163 commented 7 months ago

教程的这套dns逻辑简单粗暴。

dns:
  enable: true
  listen: :1053
  ipv6: true
  enhanced-mode: fake-ip
  fake-ip-filter:
    - '*'
    - '+.lan'
    - '+.local'
  nameserver:
    - https://doh.pub/dns-query
    - https://dns.alidns.com/dns-query
  proxy-server-nameserver:
    - https://doh.pub/dns-query
  nameserver-policy:
    "geosite:private":
      - https://doh.pub/dns-query
      - https://dns.alidns.com/dns-query
    "geosite:geolocation-!cn":
      - 'https://dns.cloudflare.com/dns-query#dns'
      - 'https://dns.google/dns-query#dns'

有兴趣可以看文档自学一下写规则,用起来能顺手好多。

我去,回错了,不过有兴趣自学一下也没啥问题

谢谢大佬解答不过我现在这个问题解决yacd面板更新玩了呼不出来了咋弄啊

ghost commented 7 months ago

换设备或换浏览器隐私模式试过吗?或者dashboard能开吗? 多数这种情况是因为浏览器cookies和缓存没清干净。

1394805163 commented 7 months ago

换设备或换浏览器隐私模式试过吗?或者dashboard能开吗? 多数这种情况是因为浏览器cookies和缓存没清干净。

隐私模式试过了 能打开 metacubexd 和dashboard 都可以打开就是 一个看不见规则 一个是没有搜索功能 都用的没有yacd舒服

ghost commented 7 months ago

隐私模式能打开就是纯纯的cookie和缓存问题

问dashboard能否开启单纯是确认是否为路由器或oc的问题。

个人来说我还是觉得 metacubexd 比较好,可以在 fakeip 下查网址真实ip,可以批量断开筛选结果的连接。其余该有的功能也都有,移动端管理比较舒服。你说的看不见规则我不清除什么情况,可能是原版和M核不兼容吧,我好久没用过原版了。

github-actions[bot] commented 5 months ago

This issue is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 5 days