vernesong / OpenClash

A Clash Client For OpenWrt
MIT License
17.5k stars 3.18k forks source link

openclash 启动配置文件时,出现配置文件测试失败 #3679

Closed zwyyy456 closed 8 months ago

zwyyy456 commented 11 months ago

Verify Steps

OpenClash Version

v0.45.141-beta

Bug on Environment

Official OpenWrt

Bug on Platform

Linux-arm64

To Reproduce

启用自己编写的配置文件 op-tao.yaml,点击启动 openclash 就会出现;

Describe the Bug

启动 openclash 时,运行日志中会提示 "配置文件测试失败" 的报错,查看内核日志,提示 level=error msg="key 'path' missing";

这个问题我在使用 clash meta for android 时曾经碰到过,相同的配置文件,也是提示 key 'path' missing,当时 clash meta for android 时 google play 上的最新测试版,当我从 github 上下载了 clash meta for android 的最新版之后解决了;

openclash 所使用的内核为两周前更新的 mihomo 1.17.0

OpenClash Log

OpenClash 调试日志

生成时间: 2023-12-15 12:22:53 插件版本: v0.45.141-beta 隐私提示: 上传此日志前请注意检查、屏蔽公网IP、节点、密码等相关敏感信息


#===================== 系统信息 =====================#

主机型号: 360 T7
固件版本: ImmortalWrt 21.02-SNAPSHOT r20376-358c1fa651
LuCI版本: git-20.074.84698-ead5e81
内核版本: 5.4.255
处理器架构: aarch64_cortex-a53

#此项有值时,如不使用IPv6,建议到网络-接口-lan的设置中禁用IPV6的DHCP
IPV6-DHCP: hybrid

DNS劫持: Dnsmasq 转发
#DNS劫持为Dnsmasq时,此项结果应仅有配置文件的DNS监听地址
Dnsmasq转发设置: 

#===================== 依赖检查 =====================#

dnsmasq-full: 已安装
coreutils: 已安装
coreutils-nohup: 已安装
bash: 已安装
curl: 已安装
ca-certificates: 已安装
ipset: 已安装
ip-full: 已安装
libcap: 已安装
libcap-bin: 已安装
ruby: 已安装
ruby-yaml: 已安装
ruby-psych: 已安装
ruby-pstore: 已安装
kmod-tun(TUN模式): 已安装
luci-compat(Luci >= 19.07): 已安装
kmod-inet-diag(PROCESS-NAME): 已安装
unzip: 已安装
iptables-mod-tproxy: 已安装
kmod-ipt-tproxy: 已安装
iptables-mod-extra: 已安装
kmod-ipt-extra: 已安装
kmod-ipt-nat: 已安装

#===================== 内核检查 =====================#

运行状态: 未运行
已选择的架构: linux-arm64

#下方无法显示内核版本号时请确认您的内核版本是否正确或者有无权限
Tun内核版本: 
Tun内核文件: 不存在
Tun内核运行权限: 否

Dev内核版本: 
Dev内核文件: 不存在
Dev内核运行权限: 否

Meta内核版本: alpha-gefcb278
Meta内核文件: 存在
Meta内核运行权限: 正常

#===================== 插件设置 =====================#

当前配置文件: /etc/openclash/config/op-tao.yaml
启动配置文件: /etc/openclash/op-tao.yaml
运行模式: fake-ip
默认代理模式: rule
UDP流量转发(tproxy): 启用
自定义DNS: 停用
IPV6代理: 停用
IPV6-DNS解析: 停用
禁用Dnsmasq缓存: 启用
自定义规则: 停用
仅允许内网: 启用
仅代理命中规则流量: 停用
仅允许常用端口流量: 停用
绕过中国大陆IP: 停用
路由本机代理: 启用

#启动异常时建议关闭此项后重试
混合节点: 停用
保留配置: 停用

#启动异常时建议关闭此项后重试
第三方规则: 停用

#===================== 配置文件 =====================#

mixed-port: 7893
bind-address: "*"
allow-lan: true
mode: rule
log-level: info
external-controller: 0.0.0.0:9090
find-process-mode: strict
tcp-concurrent: true
ipv6: false
geodata-mode: true
geox-url:
  geoip: https://gcore.jsdelivr.net/gh/MetaCubeX/meta-rules-dat@release/geoip.dat
  geosite: https://gcore.jsdelivr.net/gh/MetaCubeX/meta-rules-dat@release/geosite.dat
  mmdb: https://gcore.jsdelivr.net/gh/MetaCubeX/meta-rules-dat@release/country.mmdb
profile:
  store-selected: true
  store-fake-ip: true
dns:
  enable: true
  prefer-h3: true
  listen: 0.0.0.0:7874
  ipv6: false
  default-nameserver:
  - https://223.5.5.5/dns-query
  - https://1.12.12.12/dns-query
  fake-ip-range: 198.18.0.1/16
  fake-ip-filter:
  - "*.lan"
  - "*.battlenet.com.cn"
  - "*.battlenet.com"
  - "*.blzstatic.cn"
  - "*.battle.net"
  - "*.linksys.com"
  - "*.linksyssmartwifi.com"
  - swscan.apple.com
  - mesu.apple.com
  - "*.msftconnecttest.com"
  - "*.msftncsi.com"
  - time.*.com
  - time.*.gov
  - time.*.edu.cn
  - time.*.apple.com
  - time1.*.com
  - time2.*.com
  - time3.*.com
  - time4.*.com
  - time5.*.com
  - time6.*.com
  - time7.*.com
  - ntp.*.com
  - ntp.*.com
  - ntp1.*.com
  - ntp2.*.com
  - ntp3.*.com
  - ntp4.*.com
  - ntp5.*.com
  - ntp6.*.com
  - ntp7.*.com
  - "*.time.edu.cn"
  - "*.ntp.org.cn"
  - "+.pool.ntp.org"
  - time1.cloud.tencent.com
  - "+.music.163.com"
  - "*.126.net"
  - musicapi.taihe.com
  - music.taihe.com
  - songsearch.kugou.com
  - trackercdn.kugou.com
  - "*.kuwo.cn"
  - api-jooxtt.sanook.com
  - api.joox.com
  - joox.com
  - "+.y.qq.com"
  - "+.music.tc.qq.com"
  - aqqmusic.tc.qq.com
  - "+.stream.qqmusic.qq.com"
  - "*.xiami.com"
  - "+.music.migu.cn"
  - "+.srv.nintendo.net"
  - "+.playstation.net"
  - "+.playstation.com"
  - "+.stun.playstation.net"
  - localhost.ptlogin2.qq.com
  - proxy.golang.org
  - stun.*.*
  - stun.*.*.*
  - "*.mcdn.bilivideo.cn"
  - "*.bilibili.com"
  - "*.1huizhan.com"
  - "*.3.cn"
  - "*.300hu.com"
  - "*.360buy.cn"
  - "*.360buy.com"
  - "*.360buy.com.cn"
  - "*.360buyimg.com"
  - "*.360buyinternational.com"
  - "*.360top.com"
  - "*.jd.com"
  nameserver:
  - https://223.5.5.5/dns-query
  - https://1.12.12.12/dns-query
  - https://doh.pub/dns-query
  fallback:
  - https://1.0.0.1/dns-query
  - tls://dns.google
  enhanced-mode: fake-ip
pr:
  type: select
  proxies: &2
  - Auto
  - inp
  - wap
  - lw
  - gr
  use: &3
  - tao
auto:
  type: url-test
  proxies:
  use: &1
  - tao
  url: http://connectivitycheck.gstatic.com/generate_204
  interval: 300
pr1:
  type: select
  proxies: &4
  - PROXY
  - inp
  - wap
  - lw
  - gr
  - DIRECT
  use: &5
  - tao
pr2:
  type: select
  proxies: &6
  - PROXY
  - inp
  - wap
  - lw
  - gr
  use: &7
  - beta
  - tao
prp:
  type: http
  interval: 86400
  health-check:
    enable: true
    interval: 300
    url: http://connectivitycheck.gstatic.com/generate_204
rl1:
  type: http
  interval: 86400
  behavior: classical
rl2:
  type: http
  interval: 86400
  behavior: domain
proxy-groups:
- name: Auto
  type: url-test
  proxies:
  use: *1
  url: http://connectivitycheck.gstatic.com/generate_204
  interval: 300
- name: PROXY
  type: select
  proxies: *2
  use: *3
- name: youtube
  type: select
  proxies: *4
  use: *5
- name: telegram
  type: select
  proxies: *4
  use: *5
- name: apple
  type: select
  proxies: *4
  use: *5
- name: microsoft
  type: select
  proxies: *4
  use: *5
- name: openai
  type: select
  proxies: *6
  use: *7
- name: emby
  type: select
  proxies: *4
  use: *5
- name: spotify
  type: select
  proxies: *4
  use: *5
- name: gscholar
  type: select
  proxies: *4
  use: *5
- name: google
  type: select
  proxies: *4
  use: *5
- name: github
  type: select
  proxies: *4
  use: *5
- name: bilius
  type: select
  proxies: *4
  use: *5
- name: mdirect
  type: select
  proxies: *4
  use: *5
rule-providers:
  reject:
    url: https://cdn.jsdelivr.net/gh/Loyalsoldier/clash-rules@release/reject.txt
    type: http
    interval: 86400
    behavior: domain
  direct:
    url: https://cdn.jsdelivr.net/gh/Loyalsoldier/clash-rules@release/direct.txt
    type: http
    interval: 86400
    behavior: domain
  gfw:
    url: https://cdn.jsdelivr.net/gh/Loyalsoldier/clash-rules@release/gfw.txt
    type: http
    interval: 86400
    behavior: domain
  applecn:
    url: https://cdn.jsdelivr.net/gh/Loyalsoldier/clash-rules@release/apple.txt
    type: http
    interval: 86400
    behavior: domain
  cndirect:
    url: https://cdn.jsdelivr.net/gh/Loyalsoldier/clash-rules@release/cncidr.txt
    type: http
    interval: 86400
    behavior: domain
  applications:
    url: https://cdn.jsdelivr.net/gh/Loyalsoldier/clash-rules@release/applications.txt
    type: http
    interval: 86400
    behavior: domain
  private:
    url: https://cdn.jsdelivr.net/gh/Loyalsoldier/clash-rules@release/private.txt
    type: http
    interval: 86400
    behavior: domain
  gscholar:
    url: https://cdn.jsdelivr.net/gh/blackmatrix7/ios_rule_script@master/rule/Clash/GlobalScholar/GlobalScholar.yaml
    type: http
    interval: 86400
    behavior: classical
  openai:
    url: https://cdn.jsdelivr.net/gh/blackmatrix7/ios_rule_script@master/rule/Clash/OpenAI/OpenAI.yaml
    type: http
    interval: 86400
    behavior: classical
  microsoft:
    url: https://cdn.jsdelivr.net/gh/blackmatrix7/ios_rule_script@master/rule/Clash/Microsoft/Microsoft.yaml
    type: http
    interval: 86400
    behavior: classical
  youtube:
    url: https://cdn.jsdelivr.net/gh/blackmatrix7/ios_rule_script@master/rule/Clash/YouTube/YouTube.yaml
    type: http
    interval: 86400
    behavior: classical
  google:
    url: https://cdn.jsdelivr.net/gh/blackmatrix7/ios_rule_script@master/rule/Clash/Google/Google.yaml
    type: http
    interval: 86400
    behavior: classical
  github:
    url: https://cdn.jsdelivr.net/gh/blackmatrix7/ios_rule_script@master/rule/Clash/GitHub/GitHub.yaml
    type: http
    interval: 86400
    behavior: classical
  apple:
    url: https://cdn.jsdelivr.net/gh/blackmatrix7/ios_rule_script@master/rule/Clash/Apple/Apple.yaml
    type: http
    interval: 86400
    behavior: classical
  bili_us:
    url: https://cdn.jsdelivr.net/gh/blackmatrix7/ios_rule_script@master/rule/Clash/BiliBiliIntl/BiliBiliIntl.yaml
    type: http
    interval: 86400
    behavior: classical
  spotify:
    url: https://cdn.jsdelivr.net/gh/blackmatrix7/ios_rule_script@master/rule/Clash/Spotify/Spotify.yaml
    type: http
    interval: 86400
    behavior: classical
  telegram:
    url: https://cdn.jsdelivr.net/gh/blackmatrix7/ios_rule_script@master/rule/Clash/Telegram/Telegram.yaml
    type: http
    interval: 86400
    behavior: classical
  emby:
    url: https://cdn.jsdelivr.net/gh/blackmatrix7/ios_rule_script@master/rule/Clash/Emby/Emby.yaml
    type: http
    interval: 86400
    behavior: classical
rules:
- DST-PORT,7895,REJECT
- DST-PORT,7892,REJECT
- IP-CIDR,198.18.0.1/16,REJECT,no-resolve
- RULE-SET,cndirect,DIRECT
- RULE-SET,direct,DIRECT
- RULE-SET,applecn,DIRECT
- RULE-SET,applications,DIRECT
- DOMAIN-SUFFIX,tracker.pterclub.com,DIRECT
- DOMAIN-KEYWORD,tracker,DIRECT
- DOMAIN-SUFFIX,pterclub.com,PROXY
- DOMAIN-SUFFIX,open.cd,PROXY
- GEOSITE,cn,DIRECT
- GEOIP, cn, DIRECT
- DOMAIN-SUFFIX,cdn.staticfile.org,mdirect
- DOMAIN-SUFFIX,cdn.jsdelivr.net,DIRECT
- DOMAIN-SUFFIX,sub2.smallstrawberry.com,DIRECT
- DOMAIN-SUFFIX,www.hneko.world,DIRECT
- DOMAIN-SUFFIX,v2sub.betac1ouds.top,DIRECT
- RULE-SET,gscholar,gscholar
- RULE-SET,openai,openai
- RULE-SET,microsoft,microsoft
- RULE-SET,youtube,youtube
- RULE-SET,google,google
- RULE-SET,github,github
- RULE-SET,apple,apple
- RULE-SET,bili_us,bilius
- RULE-SET,spotify,spotify
- RULE-SET,telegram,telegram
- RULE-SET,emby,emby
- RULE-SET,gfw,PROXY
- GEOSITE,geolocation-!cn,PROXY
- RULE-SET,reject,REJECT
- SRC-IP-CIDR,192.168.6.155/32,DIRECT
- MATCH,PROXY
redir-port: 7892
tproxy-port: 7895
port: 7890
socks-port: 7891
external-ui: "/usr/share/openclash/ui"
authentication:
- Clash:8YFFXChm

#===================== 自定义覆写设置 =====================#

#!/bin/sh
. /usr/share/openclash/ruby.sh
. /usr/share/openclash/log.sh
. /lib/functions.sh

# This script is called by /etc/init.d/openclash
# Add your custom overwrite scripts here, they will be take effict after the OpenClash own srcipts

LOG_OUT "Tip: Start Running Custom Overwrite Scripts..."
LOGTIME=$(echo $(date "+%Y-%m-%d %H:%M:%S"))
LOG_FILE="/tmp/openclash.log"
CONFIG_FILE="$1" #config path

#Simple Demo:
    #General Demo
    #1--config path
    #2--key name
    #3--value
    #ruby_edit "$CONFIG_FILE" "['redir-port']" "7892"
    #ruby_edit "$CONFIG_FILE" "['secret']" "123456"
    #ruby_edit "$CONFIG_FILE" "['dns']['enable']" "true"

    #Hash Demo
    #1--config path
    #2--key name
    #3--hash type value
    #ruby_edit "$CONFIG_FILE" "['experimental']" "{'sniff-tls-sni'=>true}"
    #ruby_edit "$CONFIG_FILE" "['sniffer']" "{'sniffing'=>['tls','http']}"

    #Array Demo:
    #1--config path
    #2--key name
    #3--position(start from 0, end with -1)
    #4--value
    #ruby_arr_insert "$CONFIG_FILE" "['dns']['nameserver']" "0" "114.114.114.114"

    #Array Add From Yaml File Demo:
    #1--config path
    #2--key name
    #3--position(start from 0, end with -1)
    #4--value file path
    #5--value key name in #4 file
    #ruby_arr_add_file "$CONFIG_FILE" "['dns']['fallback-filter']['ipcidr']" "0" "/etc/openclash/custom/openclash_custom_fallback_filter.yaml" "['fallback-filter']['ipcidr']"

#Ruby Script Demo:
    #ruby -ryaml -rYAML -I "/usr/share/openclash" -E UTF-8 -e "
    #   begin
    #      Value = YAML.load_file('$CONFIG_FILE');
    #   rescue Exception => e
    #      puts '${LOGTIME} Error: Load File Failed,【' + e.message + '】';
    #   end;

        #General
    #   begin
    #   Thread.new{
    #      Value['redir-port']=7892;
    #      Value['tproxy-port']=7895;
    #      Value['port']=7890;
    #      Value['socks-port']=7891;
    #      Value['mixed-port']=7893;
    #   }.join;

    #   rescue Exception => e
    #      puts '${LOGTIME} Error: Set General Failed,【' + e.message + '】';
    #   ensure
    #      File.open('$CONFIG_FILE','w') {|f| YAML.dump(Value, f)};
    #   end" 2>/dev/null >> $LOG_FILE

exit 0
#===================== 自定义防火墙设置 =====================#

#!/bin/sh
. /usr/share/openclash/log.sh
. /lib/functions.sh

# This script is called by /etc/init.d/openclash
# Add your custom firewall rules here, they will be added after the end of the OpenClash iptables rules

LOG_OUT "Tip: Start Add Custom Firewall Rules..."

exit 0
#===================== IPTABLES 防火墙设置 =====================#

#IPv4 NAT chain

# Generated by iptables-save v1.8.7 on Fri Dec 15 12:22:57 2023
*nat
:PREROUTING ACCEPT [9879:1223987]
:INPUT ACCEPT [242:17524]
:OUTPUT ACCEPT [232:16631]
:POSTROUTING ACCEPT [13:897]
:MINIUPNPD - [0:0]
:MINIUPNPD-POSTROUTING - [0:0]
:postrouting_lan_rule - [0:0]
:postrouting_rule - [0:0]
:postrouting_wan_rule - [0:0]
:prerouting_lan_rule - [0:0]
:prerouting_rule - [0:0]
:prerouting_wan_rule - [0:0]
:zone_lan_postrouting - [0:0]
:zone_lan_prerouting - [0:0]
:zone_wan_postrouting - [0:0]
:zone_wan_prerouting - [0:0]
-A PREROUTING -m comment --comment "!fw3: Custom prerouting rule chain" -j prerouting_rule
-A PREROUTING -i br-lan -m comment --comment "!fw3" -j zone_lan_prerouting
-A PREROUTING -i eth1 -m comment --comment "!fw3" -j zone_wan_prerouting
-A PREROUTING -p udp -m comment --comment DNSMASQ -m udp --dport 53 -j REDIRECT --to-ports 53
-A PREROUTING -p udp -m comment --comment DNSMASQ -m udp --dport 53 -j REDIRECT --to-ports 53
-A POSTROUTING -m comment --comment "!fw3: Custom postrouting rule chain" -j postrouting_rule
-A POSTROUTING -o br-lan -m comment --comment "!fw3" -j zone_lan_postrouting
-A POSTROUTING -o eth1 -m comment --comment "!fw3" -j zone_wan_postrouting
-A zone_lan_postrouting -m comment --comment "!fw3: Custom lan postrouting rule chain" -j postrouting_lan_rule
-A zone_lan_prerouting -m comment --comment "!fw3: Custom lan prerouting rule chain" -j prerouting_lan_rule
-A zone_wan_postrouting -m comment --comment "!fw3: Custom wan postrouting rule chain" -j postrouting_wan_rule
-A zone_wan_postrouting -j MINIUPNPD-POSTROUTING
-A zone_wan_postrouting -m comment --comment "!fw3" -j FULLCONENAT
-A zone_wan_prerouting -m comment --comment "!fw3: Custom wan prerouting rule chain" -j prerouting_wan_rule
-A zone_wan_prerouting -m comment --comment "!fw3" -j FULLCONENAT
-A zone_wan_prerouting -j MINIUPNPD
COMMIT
# Completed on Fri Dec 15 12:22:57 2023

#IPv4 Mangle chain

# Generated by iptables-save v1.8.7 on Fri Dec 15 12:22:57 2023
*mangle
:PREROUTING ACCEPT [261244:78542535]
:INPUT ACCEPT [19706:3217817]
:FORWARD ACCEPT [235002:74222393]
:OUTPUT ACCEPT [18371:5921228]
:POSTROUTING ACCEPT [252844:80105562]
-A FORWARD -o eth1 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -i eth1 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
COMMIT
# Completed on Fri Dec 15 12:22:57 2023

#IPv4 Filter chain

# Generated by iptables-save v1.8.7 on Fri Dec 15 12:22:57 2023
*filter
:INPUT ACCEPT [0:0]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [0:0]
:MINIUPNPD - [0:0]
:forwarding_lan_rule - [0:0]
:forwarding_rule - [0:0]
:forwarding_wan_rule - [0:0]
:input_lan_rule - [0:0]
:input_rule - [0:0]
:input_wan_rule - [0:0]
:output_lan_rule - [0:0]
:output_rule - [0:0]
:output_wan_rule - [0:0]
:reject - [0:0]
:syn_flood - [0:0]
:zone_lan_dest_ACCEPT - [0:0]
:zone_lan_forward - [0:0]
:zone_lan_input - [0:0]
:zone_lan_output - [0:0]
:zone_lan_src_ACCEPT - [0:0]
:zone_wan_dest_ACCEPT - [0:0]
:zone_wan_dest_REJECT - [0:0]
:zone_wan_forward - [0:0]
:zone_wan_input - [0:0]
:zone_wan_output - [0:0]
:zone_wan_src_REJECT - [0:0]
-A INPUT -i lo -m comment --comment "!fw3" -j ACCEPT
-A INPUT -m comment --comment "!fw3: Custom input rule chain" -j input_rule
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m comment --comment "!fw3" -j syn_flood
-A INPUT -i br-lan -m comment --comment "!fw3" -j zone_lan_input
-A INPUT -i eth1 -m comment --comment "!fw3" -j zone_wan_input
-A FORWARD -m comment --comment "!fw3: Custom forwarding rule chain" -j forwarding_rule
-A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A FORWARD -i br-lan -m comment --comment "!fw3" -j zone_lan_forward
-A FORWARD -i eth1 -m comment --comment "!fw3" -j zone_wan_forward
-A FORWARD -m comment --comment "!fw3" -j reject
-A OUTPUT -o lo -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -m comment --comment "!fw3: Custom output rule chain" -j output_rule
-A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -o br-lan -m comment --comment "!fw3" -j zone_lan_output
-A OUTPUT -o eth1 -m comment --comment "!fw3" -j zone_wan_output
-A reject -p tcp -m comment --comment "!fw3" -j REJECT --reject-with tcp-reset
-A reject -m comment --comment "!fw3" -j REJECT --reject-with icmp-port-unreachable
-A syn_flood -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m limit --limit 25/sec --limit-burst 50 -m comment --comment "!fw3" -j RETURN
-A syn_flood -m comment --comment "!fw3" -j DROP
-A zone_lan_dest_ACCEPT -o br-lan -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_forward -m comment --comment "!fw3: Custom lan forwarding rule chain" -j forwarding_lan_rule
-A zone_lan_forward -m comment --comment "!fw3: Zone lan to wan forwarding policy" -j zone_wan_dest_ACCEPT
-A zone_lan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_lan_forward -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_input -m comment --comment "!fw3: Custom lan input rule chain" -j input_lan_rule
-A zone_lan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_lan_input -m comment --comment "!fw3" -j zone_lan_src_ACCEPT
-A zone_lan_output -m comment --comment "!fw3: Custom lan output rule chain" -j output_lan_rule
-A zone_lan_output -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_src_ACCEPT -i br-lan -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_ACCEPT -o eth1 -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
-A zone_wan_dest_ACCEPT -o eth1 -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_REJECT -o eth1 -m comment --comment "!fw3" -j reject
-A zone_wan_forward -m comment --comment "!fw3: Custom wan forwarding rule chain" -j forwarding_wan_rule
-A zone_wan_forward -d 224.0.0.0/4 -p udp -m comment --comment "!fw3: ubus:omcproxy[instance1] rule 2" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -d 224.0.0.0/4 -p udp -m comment --comment "!fw3: ubus:omcproxy[instance1] rule 6" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -p esp -m comment --comment "!fw3: Allow-IPSec-ESP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -p udp -m udp --dport 500 -m comment --comment "!fw3: Allow-ISAKMP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_wan_forward -j MINIUPNPD
-A zone_wan_forward -m comment --comment "!fw3" -j zone_wan_dest_REJECT
-A zone_wan_input -m comment --comment "!fw3: Custom wan input rule chain" -j input_wan_rule
-A zone_wan_input -p igmp -m comment --comment "!fw3: ubus:omcproxy[instance1] rule 0" -j ACCEPT
-A zone_wan_input -p igmp -m comment --comment "!fw3: ubus:omcproxy[instance1] rule 4" -j ACCEPT
-A zone_wan_input -p udp -m udp --dport 68 -m comment --comment "!fw3: Allow-DHCP-Renew" -j ACCEPT
-A zone_wan_input -p icmp -m icmp --icmp-type 8 -m comment --comment "!fw3: Allow-Ping" -j ACCEPT
-A zone_wan_input -p igmp -m comment --comment "!fw3: Allow-IGMP" -j ACCEPT
-A zone_wan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_wan_input -j MINIUPNPD
-A zone_wan_input -m comment --comment "!fw3" -j zone_wan_src_REJECT
-A zone_wan_output -m comment --comment "!fw3: Custom wan output rule chain" -j output_wan_rule
-A zone_wan_output -m comment --comment "!fw3" -j zone_wan_dest_ACCEPT
-A zone_wan_src_REJECT -i eth1 -m comment --comment "!fw3" -j reject
COMMIT
# Completed on Fri Dec 15 12:22:57 2023

#IPv6 NAT chain

# Generated by ip6tables-save v1.8.7 on Fri Dec 15 12:22:57 2023
*nat
:PREROUTING ACCEPT [943:240565]
:INPUT ACCEPT [229:19719]
:OUTPUT ACCEPT [13:1762]
:POSTROUTING ACCEPT [13:1762]
-A PREROUTING -p udp -m comment --comment DNSMASQ -m udp --dport 53 -j REDIRECT --to-ports 53
-A PREROUTING -p udp -m comment --comment DNSMASQ -m udp --dport 53 -j REDIRECT --to-ports 53
COMMIT
# Completed on Fri Dec 15 12:22:57 2023

#IPv6 Mangle chain

# Generated by ip6tables-save v1.8.7 on Fri Dec 15 12:22:57 2023
*mangle
:PREROUTING ACCEPT [2379154:521290319]
:INPUT ACCEPT [660223:61907897]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [562316:79591030]
:POSTROUTING ACCEPT [582244:82580230]
-A FORWARD -o eth1 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -i eth1 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
COMMIT
# Completed on Fri Dec 15 12:22:57 2023

#IPv6 Filter chain

# Generated by ip6tables-save v1.8.7 on Fri Dec 15 12:22:57 2023
*filter
:INPUT ACCEPT [24:1624]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [4:424]
:MINIUPNPD - [0:0]
:forwarding_lan_rule - [0:0]
:forwarding_rule - [0:0]
:forwarding_wan_rule - [0:0]
:input_lan_rule - [0:0]
:input_rule - [0:0]
:input_wan_rule - [0:0]
:output_lan_rule - [0:0]
:output_rule - [0:0]
:output_wan_rule - [0:0]
:reject - [0:0]
:syn_flood - [0:0]
:zone_lan_dest_ACCEPT - [0:0]
:zone_lan_forward - [0:0]
:zone_lan_input - [0:0]
:zone_lan_output - [0:0]
:zone_lan_src_ACCEPT - [0:0]
:zone_wan_dest_ACCEPT - [0:0]
:zone_wan_dest_REJECT - [0:0]
:zone_wan_forward - [0:0]
:zone_wan_input - [0:0]
:zone_wan_output - [0:0]
:zone_wan_src_REJECT - [0:0]
-A INPUT -i lo -m comment --comment "!fw3" -j ACCEPT
-A INPUT -m comment --comment "!fw3: Custom input rule chain" -j input_rule
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m comment --comment "!fw3" -j syn_flood
-A INPUT -i br-lan -m comment --comment "!fw3" -j zone_lan_input
-A INPUT -i eth1 -m comment --comment "!fw3" -j zone_wan_input
-A FORWARD -m comment --comment "!fw3: Custom forwarding rule chain" -j forwarding_rule
-A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A FORWARD -i br-lan -m comment --comment "!fw3" -j zone_lan_forward
-A FORWARD -i eth1 -m comment --comment "!fw3" -j zone_wan_forward
-A FORWARD -m comment --comment "!fw3" -j reject
-A OUTPUT -o lo -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -m comment --comment "!fw3: Custom output rule chain" -j output_rule
-A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -o br-lan -m comment --comment "!fw3" -j zone_lan_output
-A OUTPUT -o eth1 -m comment --comment "!fw3" -j zone_wan_output
-A reject -p tcp -m comment --comment "!fw3" -j REJECT --reject-with tcp-reset
-A reject -m comment --comment "!fw3" -j REJECT --reject-with icmp6-port-unreachable
-A syn_flood -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m limit --limit 25/sec --limit-burst 50 -m comment --comment "!fw3" -j RETURN
-A syn_flood -m comment --comment "!fw3" -j DROP
-A zone_lan_dest_ACCEPT -o br-lan -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_forward -m comment --comment "!fw3: Custom lan forwarding rule chain" -j forwarding_lan_rule
-A zone_lan_forward -m comment --comment "!fw3: Zone lan to wan forwarding policy" -j zone_wan_dest_ACCEPT
-A zone_lan_forward -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_input -m comment --comment "!fw3: Custom lan input rule chain" -j input_lan_rule
-A zone_lan_input -m comment --comment "!fw3" -j zone_lan_src_ACCEPT
-A zone_lan_output -m comment --comment "!fw3: Custom lan output rule chain" -j output_lan_rule
-A zone_lan_output -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_src_ACCEPT -i br-lan -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_ACCEPT -o eth1 -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
-A zone_wan_dest_ACCEPT -o eth1 -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_REJECT -o eth1 -m comment --comment "!fw3" -j reject
-A zone_wan_forward -m comment --comment "!fw3: Custom wan forwarding rule chain" -j forwarding_wan_rule
-A zone_wan_forward -d ff00::/8 -p udp -m comment --comment "!fw3: ubus:omcproxy[instance1] rule 3" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -d ff00::/8 -p udp -m comment --comment "!fw3: ubus:omcproxy[instance1] rule 7" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 128 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 129 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 2 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 3 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 4/0 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 4/1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p esp -m comment --comment "!fw3: Allow-IPSec-ESP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -p udp -m udp --dport 500 -m comment --comment "!fw3: Allow-ISAKMP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -j MINIUPNPD
-A zone_wan_forward -m comment --comment "!fw3" -j zone_wan_dest_REJECT
-A zone_wan_input -m comment --comment "!fw3: Custom wan input rule chain" -j input_wan_rule
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 130/0 -m comment --comment "!fw3: ubus:omcproxy[instance1] rule 1" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 131/0 -m comment --comment "!fw3: ubus:omcproxy[instance1] rule 1" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 132/0 -m comment --comment "!fw3: ubus:omcproxy[instance1] rule 1" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 143/0 -m comment --comment "!fw3: ubus:omcproxy[instance1] rule 1" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 130/0 -m comment --comment "!fw3: ubus:omcproxy[instance1] rule 5" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 131/0 -m comment --comment "!fw3: ubus:omcproxy[instance1] rule 5" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 132/0 -m comment --comment "!fw3: ubus:omcproxy[instance1] rule 5" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 143/0 -m comment --comment "!fw3: ubus:omcproxy[instance1] rule 5" -j ACCEPT
-A zone_wan_input -p udp -m udp --dport 546 -m comment --comment "!fw3: Allow-DHCPv6" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 130/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 131/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 132/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 143/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 128 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 129 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 2 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 3 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 4/0 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 4/1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 133 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 135 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 134 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 136 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -j MINIUPNPD
-A zone_wan_input -m comment --comment "!fw3" -j zone_wan_src_REJECT
-A zone_wan_output -m comment --comment "!fw3: Custom wan output rule chain" -j output_wan_rule
-A zone_wan_output -m comment --comment "!fw3" -j zone_wan_dest_ACCEPT
-A zone_wan_src_REJECT -i eth1 -m comment --comment "!fw3" -j reject
COMMIT
# Completed on Fri Dec 15 12:22:57 2023

#===================== IPSET状态 =====================#

Name: passwall_shuntlist
Type: hash:net
Revision: 6
Header: family inet hashsize 1024 maxelem 1048576
Size in memory: 4288
References: 0
Number of entries: 64

Name: passwall_gfwlist
Type: hash:net
Revision: 6
Header: family inet hashsize 1024 maxelem 1048576
Size in memory: 448
References: 0
Number of entries: 0

Name: passwall_chnroute
Type: hash:net
Revision: 6
Header: family inet hashsize 4096 maxelem 1048576
Size in memory: 247816
References: 0
Number of entries: 8660

Name: passwall_blacklist
Type: hash:net
Revision: 6
Header: family inet hashsize 1024 maxelem 1048576
Size in memory: 1344
References: 0
Number of entries: 14

Name: passwall_shuntlist6
Type: hash:net
Revision: 6
Header: family inet6 hashsize 1024 maxelem 1048576
Size in memory: 2128
References: 0
Number of entries: 9

Name: passwall_gfwlist6
Type: hash:net
Revision: 6
Header: family inet6 hashsize 1024 maxelem 1048576
Size in memory: 1232
References: 0
Number of entries: 0

Name: passwall_chnroute6
Type: hash:net
Revision: 6
Header: family inet6 hashsize 1024 maxelem 1048576
Size in memory: 106400
References: 0
Number of entries: 1984

Name: passwall_blacklist6
Type: hash:net
Revision: 6
Header: family inet6 hashsize 1024 maxelem 1048576
Size in memory: 1680
References: 0
Number of entries: 5

#===================== 路由表状态 =====================#

#IPv4

#route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
0.0.0.0         10.80.17.1      0.0.0.0         UG    0      0        0 eth1
10.80.17.0      0.0.0.0         255.255.255.0   U     0      0        0 eth1
192.168.6.0     0.0.0.0         255.255.255.0   U     0      0        0 br-lan

#ip route list
default via 10.80.17.1 dev eth1 proto static src 10.80.17.6 
10.80.17.0/24 dev eth1 proto kernel scope link src 10.80.17.6 
192.168.6.0/24 dev br-lan proto kernel scope link src 192.168.6.1 

#ip rule show
0:  from all lookup local
220:    from all lookup 220
32766:  from all lookup main
32767:  from all lookup default

#IPv6

#route -A inet6
Kernel IPv6 routing table
Destination                                 Next Hop                                Flags Metric Ref    Use Iface
::/0                                        ::                                      !n    -1     1        0 lo      
::/0                                        ::                                      !n    -1     1        0 lo      
fda9:a7a9:fb8::/64                          ::                                      U     1024   3        0 br-lan  
fda9:a7a9:fb8::/48                          ::                                      !n    2147483647 2        0 lo      
fe80::/64                                   ::                                      U     256    3        0 br-lan  
fe80::/64                                   ::                                      U     256    1        0 eth1    
fe80::/64                                   ::                                      U     256    1        0 ipsec0  
::/0                                        ::                                      !n    -1     1        0 lo      
::1/128                                     ::                                      Un    0      4        0 lo      
fda9:a7a9:fb8::/128                         ::                                      Un    0      3        0 br-lan  
fda9:a7a9:fb8::1/128                        ::                                      Un    0      5        0 br-lan  
fe80::/128                                  ::                                      Un    0      3        0 ipsec0  
fe80::/128                                  ::                                      Un    0      3        0 eth1    
fe80::/128                                  ::                                      Un    0      3        0 br-lan  
fe80::2365:595c:ff5e:7c05/128               ::                                      Un    0      4        0 ipsec0  
fe80::e2ef:2ff:fe63:3288/128                ::                                      Un    0      4        0 br-lan  
fe80::e2ef:2ff:fe63:3289/128                ::                                      Un    0      3        0 eth1    
ff00::/8                                    ::                                      U     256    5        0 br-lan  
ff00::/8                                    ::                                      U     256    3        0 eth1    
ff00::/8                                    ::                                      U     256    1        0 ipsec0  
::/0                                        ::                                      !n    -1     1        0 lo      

#ip -6 route list
fda9:a7a9:fb8::/64 dev br-lan proto static metric 1024 pref medium
unreachable fda9:a7a9:fb8::/48 dev lo proto static metric 2147483647 pref medium
fe80::/64 dev br-lan proto kernel metric 256 pref medium
fe80::/64 dev eth1 proto kernel metric 256 pref medium
fe80::/64 dev ipsec0 proto kernel metric 256 pref medium

#ip -6 rule show
0:  from all lookup local
220:    from all lookup 220
32766:  from all lookup main
4200000001: from all iif lo failed_policy
4200000003: from all iif eth1 failed_policy
4200000008: from all iif br-lan failed_policy

#===================== 端口占用状态 =====================#

#===================== 测试本机DNS查询(www.baidu.com) =====================#

Server:     127.0.0.1
Address:    127.0.0.1#53

Name:      www.baidu.com
www.baidu.com   canonical name = www.a.shifen.com
Name:      www.a.shifen.com
Address 1: 36.155.132.76
Address 2: 36.155.132.3
www.baidu.com   canonical name = www.a.shifen.com
Address 3: 2409:8c20:6:1d55:0:ff:b09c:7d77
Address 4: 2409:8c20:6:1135:0:ff:b027:210c

#===================== 测试内核DNS查询(www.instagram.com) =====================#

Dnsmasq 当前默认 resolv 文件:/tmp/resolv.conf.d/resolv.conf.auto

#===================== /tmp/resolv.conf.auto =====================#

# Interface lan
nameserver 119.29.29.29
nameserver 8.8.8.8

#===================== /tmp/resolv.conf.d/resolv.conf.auto =====================#

# Interface lan
nameserver 119.29.29.29
nameserver 8.8.8.8

#===================== 测试本机网络连接(www.baidu.com) =====================#

HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: private, no-cache, no-store, proxy-revalidate, no-transform
Connection: keep-alive
Content-Length: 277
Content-Type: text/html
Date: Fri, 15 Dec 2023 04:22:58 GMT
Etag: "575e1f60-115"
Last-Modified: Mon, 13 Jun 2016 02:50:08 GMT
Pragma: no-cache
Server: bfe/1.0.8.18

#===================== 测试本机网络下载(raw.githubusercontent.com) =====================#

#===================== 最近运行日志(自动切换为Debug模式) =====================#

2023-12-15 12:02:23 Step 3: Close The OpenClash Daemons...
2023-12-15 12:02:23 Step 4: Close The Clash Core Process...
2023-12-15 12:02:23 Step 5: Restart Dnsmasq...
2023-12-15 12:02:26 Step 6: Delete OpenClash Residue File...
2023-12-15 12:02:51 OpenClash Restart...
2023-12-15 12:02:51 OpenClash Stoping...
2023-12-15 12:02:51 Step 1: Backup The Current Groups State...
2023-12-15 12:02:51 Step 2: Delete OpenClash Firewall Rules...
2023-12-15 12:02:53 Step 3: Close The OpenClash Daemons...
2023-12-15 12:02:53 Step 4: Close The Clash Core Process...
2023-12-15 12:02:53 Step 5: Restart Dnsmasq...
2023-12-15 12:02:56 Step 6: Delete OpenClash Residue File...
2023-12-15 12:02:56 OpenClash Start Running...
2023-12-15 12:02:56 Step 1: Get The Configuration...
2023-12-15 12:02:56 Step 2: Check The Components...
2023-12-15 12:02:56 Step 3: Modify The Config File...
2023-12-15 12:02:57 Tip: You have seted the authentication of SOCKS5/HTTP(S) proxy with【Clash:8YFFXChm】
2023-12-15 12:02:58 Tip: Start Running Custom Overwrite Scripts...
2023-12-15 12:02:58 Step 4: Start Running The Clash Core...
2023-12-15 12:02:58 Tip: Detected The Exclusive Function of The Meta Core, Use Meta Core to Start...
2023-12-15 12:02:58 Test The Config File First...
time="2023-12-15T04:02:59.776769631Z" level=info msg="Start initial configuration in progress"
time="2023-12-15T04:02:59.777250135Z" level=warning msg="To use xtls-rprx-vision, ensure your server is upgrade to Xray-core v1.8.0+"
time="2023-12-15T04:02:59.777563366Z" level=warning msg="To use xtls-rprx-vision, ensure your server is upgrade to Xray-core v1.8.0+"
time="2023-12-15T04:02:59.777875366Z" level=warning msg="To use xtls-rprx-vision, ensure your server is upgrade to Xray-core v1.8.0+"
time="2023-12-15T04:02:59.778121812Z" level=warning msg="To use xtls-rprx-vision, ensure your server is upgrade to Xray-core v1.8.0+"
time="2023-12-15T04:02:59.781361845Z" level=info msg="Geodata Loader mode: memconservative"
time="2023-12-15T04:02:59.781483414Z" level=error msg="key 'path' missing"
2023-12-15 12:02:59 configuration file【/etc/openclash/op-tao.yaml】test failed
2023-12-15 12:02:59 Error: Config File Tested Faild, Please Check The Log Infos!
2023-12-15 12:03:00 OpenClash Stoping...
2023-12-15 12:03:00 Step 1: Backup The Current Groups State...
2023-12-15 12:03:00 Step 2: Delete OpenClash Firewall Rules...
2023-12-15 12:03:02 Step 3: Close The OpenClash Daemons...
2023-12-15 12:03:02 Step 4: Close The Clash Core Process...
2023-12-15 12:03:02 Step 5: Restart Dnsmasq...
2023-12-15 12:03:05 Step 6: Delete OpenClash Residue File...

#===================== 最近运行日志获取完成(自动切换为silent模式) =====================#

#===================== 活动连接信息 =====================#

OpenClash Config

No response

Expected Behavior

能正常启动即可

Screenshots

No response

ghost commented 11 months ago

path? 是proxy里少写了吧? 我建议去内核那边问

zwyyy456 commented 11 months ago

path? 是proxy里少写了吧? 我建议去内核那边问

配置文件应该是没有问题的。 proxy-group 和 proxies 里面是有内容的

ghost commented 11 months ago

我本来想说有些协议的配置文件需要填path 然后突然发现你oc版本是141,然后顺藤摸瓜发现你内核是八个月前的版本 兄弟,你稍微尊重下第二个勾行不行

  • [x] Latest 我已经使用最新 Dev 版本测试过,问题依旧存在

答案也就出来了 你是跟着meta的文档改的,但provider可以不填path的功能应该才出来不到6个月,所以更新内核就好了。


我感觉真准,6月15号,刚好6个月🤪

zwyyy456 commented 11 months ago

我本来想说有些协议的配置文件需要填path 然后突然发现你oc版本是141,然后顺藤摸瓜发现你内核是八个月前的版本 兄弟,你稍微尊重下第二个勾行不行

  • [x] Latest 我已经使用最新 Dev 版本测试过,问题依旧存在

答案也就出来了 你是跟着meta的文档改的,但provider可以不填path的功能应该才出来不到6个月,所以更新内核就好了。

我感觉真准,6月15号,刚好6个月🤪

这个 clash_meta 内核是我手在 mihomo 那里手动下载,然后传到 /etc/openclash/core 目录下并重命名为 clash_meta 的呀,难不成是 openclash 自己又下载了 clash_meta 内核覆盖掉了?

ghost commented 11 months ago

额,那就不清楚了。

你这样操作试试 去配置管理-上传文件类型-Meta内核选择你手动下载的上传试试

zwyyy456 commented 11 months ago

额,那就不清楚了。

你这样操作试试 去配置管理-上传文件类型-Meta内核选择你手动下载的上传试试

好的,我自己估计应该也是 meta 内核版本的问题,很奇怪。

ghost commented 11 months ago

如果还是不行的话试试用alpha或者1.16,1.17可能受删库影响了,发布时那边issue提了一大串,我就没用

github-actions[bot] commented 9 months ago

This issue is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 5 days