Closed wy19xx closed 8 months ago
v0.46.003-beta
Lean
2024.03.16 OpenWrt Li [2024] Compiled by Li OpenWrt R24.2.2 / Lede - 18.06
Linux-amd64(x86-64)
如题,每重启一次openWrt,openclash会自动给“SOCKS5/HTTP(S) 认证信息”栏多添加一对用户名密码,且实际生效的是最后一次添加的认证,以前添加的虽然在UI中显示出来,但实际上无效。 不重启openWrt,只重启openclash则功能正常。
ps: 由订阅地址下载的配置文件中默认没有配置authentication项,第一次运行openclash后自动添加了authentication,但我重启前没有手动删除过。
不关openclash,直接重启openWrt,让openclash自启动。
OpenClash 调试日志 生成时间: 2024-03-17 13:32:35 插件版本: v0.46.003-beta 隐私提示: 上传此日志前请注意检查、屏蔽公网IP、节点、密码等相关敏感信息 #===================== 系统信息 =====================# 主机型号: QEMU Standard PC (i440FX + PIIX - Intel(R) Atom(TM) CPU C3538 @ 2.10GHz : 4C4T 固件版本: OpenWrt SNAPSHOT r6496-3b5f54d82 LuCI版本: git-24.071.74519-c79d23b-1 内核版本: 6.1.81 处理器架构: #此项有值时,如不使用IPv6,建议到网络-接口-lan的设置中禁用IPV6的DHCP IPV6-DHCP: DNS劫持: Dnsmasq 转发 #DNS劫持为Dnsmasq时,此项结果应仅有配置文件的DNS监听地址 Dnsmasq转发设置: 127.0.0.1#7874 #===================== 依赖检查 =====================# dnsmasq-full: 已安装 coreutils: 已安装 coreutils-nohup: 已安装 bash: 已安装 curl: 已安装 ca-certificates: 已安装 ipset: 已安装 ip-full: 已安装 libcap: 已安装 libcap-bin: 已安装 ruby: 已安装 ruby-yaml: 已安装 ruby-psych: 已安装 ruby-pstore: 已安装 kmod-tun(TUN模式): 已安装 luci-compat(Luci >= 19.07): 已安装 kmod-inet-diag(PROCESS-NAME): 已安装 unzip: 已安装 iptables-mod-tproxy: 已安装 kmod-ipt-tproxy: 已安装 iptables-mod-extra: 已安装 kmod-ipt-extra: 已安装 kmod-ipt-nat: 已安装 #===================== 内核检查 =====================# 运行状态: 运行中 运行内核:TUN 进程pid: 13489 运行权限: 13489: cap_dac_override,cap_net_bind_service,cap_net_admin,cap_net_raw,cap_sys_ptrace,cap_sys_resource=eip 运行用户: nobody 已选择的架构: linux-amd64 #下方无法显示内核版本号时请确认您的内核版本是否正确或者有无权限 Tun内核版本: 2023.08.17-13-gdcc8d87 Tun内核文件: 存在 Tun内核运行权限: 正常 Dev内核版本: v1.18.0-13-gd034a40 Dev内核文件: 存在 Dev内核运行权限: 正常 Meta内核版本: alpha-gb3db113 Meta内核文件: 存在 Meta内核运行权限: 正常 #===================== 插件设置 =====================# 当前配置文件: /etc/openclash/config/SSR.yaml 启动配置文件: /etc/openclash/SSR.yaml 运行模式: redir-host-mix 默认代理模式: rule UDP流量转发(tproxy): 停用 自定义DNS: 停用 IPV6代理: 停用 IPV6-DNS解析: 停用 禁用Dnsmasq缓存: 启用 自定义规则: 启用 仅允许内网: 启用 仅代理命中规则流量: 停用 仅允许常用端口流量: 停用 绕过中国大陆IP: 启用 路由本机代理: 启用 #启动异常时建议关闭此项后重试 混合节点: 停用 保留配置: 启用 #启动异常时建议关闭此项后重试 第三方规则: 停用 #===================== 自定义规则 一 =====================# script: ## shortcuts: ## Notice: The core timezone is UTC ## CST 20:00-24:00 = time.now().hour > 12 and time.now().hour < 16 ## 内核时区为UTC,故以下time.now()函数的取值需要根据本地时区进行转换 ## 北京时间(CST) 20:00-24:00 = time.now().hour > 12 and time.now().hour < 16 ## quic: network == 'udp' and dst_port == 443 and (geoip(resolve_ip(host)) != 'CN' or geoip(dst_ip) != 'CN') ## time-limit: in_cidr(src_ip,'192.168.1.2/32') and time.now().hour < 20 or time.now().hour > 21 ## time-limit: src_ip == '192.168.1.2' and time.now().hour < 20 or time.now().hour > 21 ## code: | ## def main(ctx, metadata): ## directkeywordlist = ["baidu"] ## for directkeyword in directkeywordlist: ## if directkeyword in metadata["host"]: ## ctx.log('[Script] matched keyword %s use direct' % directkeyword) ## return "DIRECT" rules: - DOMAIN,www.comicat.org,始终代理 - DOMAIN,github.com,始终代理 - DOMAIN,github.githubassets.com,始终代理 - DOMAIN,raw.githubusercontent.com,始终代理 - DOMAIN-SUFFIX,tmdb.org,始终代理 - DOMAIN-SUFFIX,themoviedb.org,始终代理 - DOMAIN-SUFFIX,githubusercontent.com,始终代理 - DOMAIN,thetvdb.com,始终代理 - DOMAIN-SUFFIX,docker.com,始终代理 - DOMAIN-SUFFIX,docker.io,始终代理 - DOMAIN-SUFFIX,fanart.tv,始终代理 - DOMAIN-SUFFIX,bgm.tv,始终代理 - DOMAIN-SUFFIX,thepiratebay.org,始终代理 ##- SCRIPT,quic,REJECT #shortcuts rule ##- SCRIPT,time-limit,REJECT #shortcuts rule ##- PROCESS-NAME,curl,DIRECT #匹配路由自身进程(curl直连) ##- DOMAIN-SUFFIX,google.com,Proxy #匹配域名后缀(交由Proxy代理服务器组) ##- DOMAIN-KEYWORD,google,Proxy #匹配域名关键字(交由Proxy代理服务器组) ##- DOMAIN,google.com,Proxy #匹配域名(交由Proxy代理服务器组) ##- DOMAIN-SUFFIX,ad.com,REJECT #匹配域名后缀(拒绝) ##- IP-CIDR,127.0.0.0/8,DIRECT #匹配数据目标IP(直连) ##- SRC-IP-CIDR,192.168.1.201/32,DIRECT #匹配数据发起IP(直连) ##- DST-PORT,80,DIRECT #匹配数据目标端口(直连) ##- SRC-PORT,7777,DIRECT #匹配数据源端口(直连) ##排序在上的规则优先生效,如添加(去除规则前的#号): ##IP段:192.168.1.2-192.168.1.200 直连 ##- SRC-IP-CIDR,192.168.1.2/31,DIRECT ##- SRC-IP-CIDR,192.168.1.4/30,DIRECT ##- SRC-IP-CIDR,192.168.1.8/29,DIRECT ##- SRC-IP-CIDR,192.168.1.16/28,DIRECT ##- SRC-IP-CIDR,192.168.1.32/27,DIRECT ##- SRC-IP-CIDR,192.168.1.64/26,DIRECT ##- SRC-IP-CIDR,192.168.1.128/26,DIRECT ##- SRC-IP-CIDR,192.168.1.192/29,DIRECT ##- SRC-IP-CIDR,192.168.1.200/32,DIRECT ##IP段:192.168.1.202-192.168.1.255 直连 ##- SRC-IP-CIDR,192.168.1.202/31,DIRECT ##- SRC-IP-CIDR,192.168.1.204/30,DIRECT ##- SRC-IP-CIDR,192.168.1.208/28,DIRECT ##- SRC-IP-CIDR,192.168.1.224/27,DIRECT ##此时IP为192.168.1.1和192.168.1.201的客户端流量走代理(策略),其余客户端不走代理 ##因为Fake-IP模式下,IP地址为192.168.1.1的路由器自身流量可走代理(策略),所以需要排除 ##仅设置路由器自身直连: ##- SRC-IP-CIDR,192.168.1.1/32,DIRECT ##- SRC-IP-CIDR,198.18.0.1/32,DIRECT ##DDNS ##- DOMAIN-SUFFIX,checkip.dyndns.org,DIRECT ##- DOMAIN-SUFFIX,checkipv6.dyndns.org,DIRECT ##- DOMAIN-SUFFIX,checkip.synology.com,DIRECT ##- DOMAIN-SUFFIX,ifconfig.co,DIRECT ##- DOMAIN-SUFFIX,api.myip.com,DIRECT ##- DOMAIN-SUFFIX,ip-api.com,DIRECT ##- DOMAIN-SUFFIX,ipapi.co,DIRECT ##- DOMAIN-SUFFIX,ip6.seeip.org,DIRECT ##- DOMAIN-SUFFIX,members.3322.org,DIRECT ##在线IP段转CIDR地址:http://ip2cidr.com #===================== 自定义规则 二 =====================# script: ## shortcuts: ## common_port: dst_port not in [21, 22, 23, 53, 80, 123, 143, 194, 443, 465, 587, 853, 993, 995, 998, 2052, 2053, 2082, 2083, 2086, 2095, 2096, 5222, 5228, 5229, 5230, 8080, 8443, 8880, 8888, 8889] ## code: | ## def main(ctx, metadata): ## directkeywordlist = ["baidu"] ## for directkeyword in directkeywordlist: ## if directkeyword in metadata["host"]: ## ctx.log('[Script] matched keyword %s use direct' % directkeyword) ## return "DIRECT" rules: ##- SCRIPT,common_port,DIRECT #shortcuts rule ##- DOMAIN-SUFFIX,google.com,Proxy #匹配域名后缀(交由Proxy代理服务器组) ##- DOMAIN-KEYWORD,google,Proxy #匹配域名关键字(交由Proxy代理服务器组) ##- DOMAIN,google.com,Proxy #匹配域名(交由Proxy代理服务器组) ##- DOMAIN-SUFFIX,ad.com,REJECT #匹配域名后缀(拒绝) ##- IP-CIDR,127.0.0.0/8,DIRECT #匹配数据目标IP(直连) ##- SRC-IP-CIDR,192.168.1.201/32,DIRECT #匹配数据发起IP(直连) ##- DST-PORT,80,DIRECT #匹配数据目标端口(直连) ##- SRC-PORT,7777,DIRECT #匹配数据源端口(直连) #===================== 配置文件 =====================# port: 7890 socks-port: 7891 redir-port: 7892 mixed-port: 7893 allow-lan: true mode: rule log-level: info external-controller: 0.0.0.0:9090 dns: enable: true ipv6: false fake-ip-range: 198.18.0.1/16 use-hosts: true default-nameserver: - 223.5.5.5 - 119.29.29.29 nameserver: - https://dns.alidns.com/dns-query - https://doh.pub/dns-query fallback: - 1.1.1.1 - 8.8.8.8 fallback-filter: geoip: true ipcidr: - 240.0.0.0/4 - 0.0.0.0/32 enhanced-mode: fake-ip listen: 0.0.0.0:7874 fake-ip-filter: - "+.*" proxy-groups: - name: "\U0001F680节点选择" type: select disable-udp: false proxies: - "\U0001F9F1直接连接" - 最快节点 - 负载均衡 - 轮询(轮流使用全部代理) - 负载均衡 - 哈希匹配(访问相同网站时使用同一个代理) - 香港01-IEPL-倍率1.0 - 香港02-IEPL-倍率1.0 - name: "\U0001F30D国外媒体" type: select proxies: - "\U0001F680节点选择" - "\U0001F9F1直接连接" - 香港01-IEPL-倍率1.0 - 香港02-IEPL-倍率1.0 - name: "✈️电报信息" type: select disable-udp: false proxies: - 最快节点 - 负载均衡 - 轮询(轮流使用全部代理) - 负载均衡 - 哈希匹配(访问相同网站时使用同一个代理) - "\U0001F680节点选择" - "\U0001F9F1直接连接" - 香港01-IEPL-倍率1.0 - 香港02-IEPL-倍率1.0 - name: "\U0001F4E2谷歌fCM" type: select proxies: - "\U0001F680节点选择" - "\U0001F9F1直接连接" - 香港01-IEPL-倍率1.0 - 香港02-IEPL-倍率1.0 - name: "\U0001F41F漏网之鱼" type: select proxies: - "\U0001F680节点选择" - "\U0001F9F1直接连接" - 香港01-IEPL-倍率1.0 - 香港02-IEPL-倍率1.0 - name: "\U0001F3AC国内媒体" type: select proxies: - "\U0001F9F1直接连接" - "\U0001F680节点选择" - 香港01-IEPL-倍率1.0 - 香港02-IEPL-倍率1.0 - name: Ⓜ️微软服务 type: select proxies: - "\U0001F9F1直接连接" - "\U0001F680节点选择" - 香港01-IEPL-倍率1.0 - 香港02-IEPL-倍率1.0 - name: "\U0001F34E苹果服务" type: select proxies: - "\U0001F9F1直接连接" - "\U0001F680节点选择" - 香港01-IEPL-倍率1.0 - 香港02-IEPL-倍率1.0 - name: "\U0001F6D1全球拦截" type: select proxies: - REJECT - DIRECT - 香港01-IEPL-倍率1.0 - 香港02-IEPL-倍率1.0 - name: "\U0001F343应用净化" type: select proxies: - REJECT - DIRECT - 香港01-IEPL-倍率1.0 - 香港02-IEPL-倍率1.0 - name: "\U0001F9F1直接连接" type: select proxies: - DIRECT - 香港01-IEPL-倍率1.0 - 香港02-IEPL-倍率1.0 - name: 最快节点 type: url-test disable-udp: false proxies: - 香港01-IEPL-倍率1.0 - 香港02-IEPL-倍率1.0 url: https://cp.cloudflare.com/generate_204 interval: '300' tolerance: '100' - name: 负载均衡 - 轮询(轮流使用全部代理) type: load-balance strategy: round-robin disable-udp: false proxies: - 香港01-IEPL-倍率1.0 - 香港02-IEPL-倍率1.0 url: https://cp.cloudflare.com/generate_204 interval: '300' - name: 负载均衡 - 哈希匹配(访问相同网站时使用同一个代理) type: load-balance strategy: consistent-hashing disable-udp: false proxies: - 香港01-IEPL-倍率1.0 - 香港02-IEPL-倍率1.0 url: https://cp.cloudflare.com/generate_204 interval: '300' - name: 始终代理 type: select disable-udp: false proxies: - 最快节点 - 负载均衡 - 轮询(轮流使用全部代理) - 负载均衡 - 哈希匹配(访问相同网站时使用同一个代理) - DIRECT - 香港01-IEPL-倍率1.0 - 香港02-IEPL-倍率1.0 rules: - DST-PORT,7895,REJECT - DST-PORT,7892,REJECT - IP-CIDR,198.18.0.1/16,REJECT,no-resolve - DOMAIN,www.comicat.org,始终代理 - DOMAIN,github.com,始终代理 - DOMAIN,github.githubassets.com,始终代理 - DOMAIN,raw.githubusercontent.com,始终代理 - DOMAIN-SUFFIX,tmdb.org,始终代理 - DOMAIN-SUFFIX,themoviedb.org,始终代理 - DOMAIN-SUFFIX,githubusercontent.com,始终代理 - DOMAIN,thetvdb.com,始终代理 - DOMAIN-SUFFIX,docker.com,始终代理 - DOMAIN-SUFFIX,docker.io,始终代理 - DOMAIN-SUFFIX,fanart.tv,始终代理 - DOMAIN-SUFFIX,bgm.tv,始终代理 - DOMAIN-SUFFIX,thepiratebay.org,始终代理 - "DOMAIN,xivanalysis.com,\U0001F9F1直接连接" - "DOMAIN,picanalysis.vivo.com.cn,\U0001F9F1直接连接" - "DOMAIN,fairplay.l.qq.com,\U0001F9F1直接连接" - "DOMAIN,livew.l.qq.com,\U0001F9F1直接连接" - "DOMAIN,vd.l.qq.com,\U0001F9F1直接连接" - "DOMAIN,analytics.strava.com,\U0001F9F1直接连接" - "DOMAIN,errlog.umeng.com,\U0001F9F1直接连接" - "DOMAIN,msg.umeng.com,\U0001F9F1直接连接" - "DOMAIN,msg.umengcloud.com,\U0001F9F1直接连接" - "DOMAIN,tracking.miui.com,\U0001F9F1直接连接" - "DOMAIN,app.adjust.com,\U0001F9F1直接连接" - "DOMAIN,bdtj.tagtic.cn,\U0001F9F1直接连接" - "DOMAIN-KEYWORD,admarvel,\U0001F6D1全球拦截" - "DOMAIN-KEYWORD,admaster,\U0001F6D1全球拦截" - "DOMAIN-KEYWORD,adsage,\U0001F6D1全球拦截" - "DOMAIN-KEYWORD,adsensor,\U0001F6D1全球拦截" - "DOMAIN-KEYWORD,adservice,\U0001F6D1全球拦截" - "DOMAIN-SUFFIX,union.mi.com,\U0001F343应用净化" - "DOMAIN-SUFFIX,wtradv.market.xiaomi.com,\U0001F343应用净化" - "DOMAIN-SUFFIX,xmpush.xiaomi.com,\U0001F343应用净化" - "DOMAIN-SUFFIX,ad.api.moji.com,\U0001F343应用净化" - "DOMAIN-SUFFIX,app.moji001.com,\U0001F343应用净化" - "DOMAIN-SUFFIX,cdn.moji002.com,\U0001F343应用净化" - "DOMAIN-SUFFIX,cdn2.moji002.com,\U0001F343应用净化" - "DOMAIN-SUFFIX,fds.api.moji.com,\U0001F343应用净化" - "DOMAIN-SUFFIX,cm.steampowered.com,\U0001F9F1直接连接" - "DOMAIN-SUFFIX,steamchina.com,\U0001F9F1直接连接" - "DOMAIN-SUFFIX,steamusercontent.com,\U0001F9F1直接连接" - DOMAIN-SUFFIX,1drv.ms,Ⓜ️微软服务 - DOMAIN-SUFFIX,a-msedge.net,Ⓜ️微软服务 - DOMAIN-SUFFIX,a1158.g.akamai.net,Ⓜ️微软服务 - DOMAIN-SUFFIX,a122.dscg3.akamai.net,Ⓜ️微软服务 - "IP-CIDR,101.198.128.0/18,\U0001F9F1直接连接,no-resolve" - "IP-CIDR,101.198.192.0/19,\U0001F9F1直接连接,no-resolve" - "IP-CIDR,101.199.196.0/22,\U0001F9F1直接连接,no-resolve" - "GEOIP,CN,\U0001F9F1直接连接" - "MATCH,\U0001F41F漏网之鱼" tproxy-port: 7895 bind-address: "*" external-ui: "/usr/share/openclash/ui" ipv6: false experimental: sniff-tls-sni: true tun: enable: true stack: system auto-route: false auto-detect-interface: false dns-hijack: - tcp://any:53 profile: store-selected: true authentication: - Clash:Pk46Ndfj - Clash:u4UhiA5Y #===================== 自定义覆写设置 =====================# #!/bin/sh . /usr/share/openclash/ruby.sh . /usr/share/openclash/log.sh . /lib/functions.sh # This script is called by /etc/init.d/openclash # Add your custom overwrite scripts here, they will be take effict after the OpenClash own srcipts LOG_OUT "Tip: Start Running Custom Overwrite Scripts..." LOGTIME=$(echo $(date "+%Y-%m-%d %H:%M:%S")) LOG_FILE="/tmp/openclash.log" CONFIG_FILE="$1" #config path #ruby_edit "$CONFIG_FILE" "['secret']" "tMd6Jgjw" #uci -q set openclash.config.dashboard_password="tMd6Jgjw" #Simple Demo: #General Demo #1--config path #2--key name #3--value #ruby_edit "$CONFIG_FILE" "['redir-port']" "7892" #ruby_edit "$CONFIG_FILE" "['secret']" "123456" #ruby_edit "$CONFIG_FILE" "['dns']['enable']" "true" #Hash Demo #1--config path #2--key name #3--hash type value #ruby_edit "$CONFIG_FILE" "['experimental']" "{'sniff-tls-sni'=>true}" #ruby_edit "$CONFIG_FILE" "['sniffer']" "{'sniffing'=>['tls','http']}" #Array Demo: #1--config path #2--key name #3--position(start from 0, end with -1) #4--value #ruby_arr_insert "$CONFIG_FILE" "['dns']['nameserver']" "0" "114.114.114.114" #Array Add From Yaml File Demo: #1--config path #2--key name #3--position(start from 0, end with -1) #4--value file path #5--value key name in #4 file #ruby_arr_add_file "$CONFIG_FILE" "['dns']['fallback-filter']['ipcidr']" "0" "/etc/openclash/custom/openclash_custom_fallback_filter.yaml" "['fallback-filter']['ipcidr']" #Ruby Script Demo: #ruby -ryaml -rYAML -I "/usr/share/openclash" -E UTF-8 -e " # begin # Value = YAML.load_file('$CONFIG_FILE'); # rescue Exception => e # puts '${LOGTIME} Error: Load File Failed,【' + e.message + '】'; # end; #General # begin # Thread.new{ # Value['redir-port']=7892; # Value['tproxy-port']=7895; # Value['port']=7890; # Value['socks-port']=7891; # Value['mixed-port']=7893; # }.join; # rescue Exception => e # puts '${LOGTIME} Error: Set General Failed,【' + e.message + '】'; # ensure # File.open('$CONFIG_FILE','w') {|f| YAML.dump(Value, f)}; # end" 2>/dev/null >> $LOG_FILE exit 0 #===================== 自定义防火墙设置 =====================# #!/bin/sh . /usr/share/openclash/log.sh . /lib/functions.sh # This script is called by /etc/init.d/openclash # Add your custom firewall rules here, they will be added after the end of the OpenClash iptables rules LOG_OUT "Tip: Start Add Custom Firewall Rules..." exit 0 #===================== IPTABLES 防火墙设置 =====================# #IPv4 NAT chain # Generated by iptables-save v1.8.7 on Sun Mar 17 13:32:39 2024 *nat :PREROUTING ACCEPT [488:53552] :INPUT ACCEPT [329:21893] :OUTPUT ACCEPT [498:41698] :POSTROUTING ACCEPT [969:90764] :DOCKER - [0:0] :MINIUPNPD - [0:0] :MINIUPNPD-POSTROUTING - [0:0] :openclash - [0:0] :openclash_output - [0:0] :postrouting_docker_rule - [0:0] :postrouting_ipsecserver_rule - [0:0] :postrouting_lan_rule - [0:0] :postrouting_rule - [0:0] :postrouting_vpn_rule - [0:0] :postrouting_wan_rule - [0:0] :prerouting_docker_rule - [0:0] :prerouting_ipsecserver_rule - [0:0] :prerouting_lan_rule - [0:0] :prerouting_rule - [0:0] :prerouting_vpn_rule - [0:0] :prerouting_wan_rule - [0:0] :zone_docker_postrouting - [0:0] :zone_docker_prerouting - [0:0] :zone_ipsecserver_postrouting - [0:0] :zone_ipsecserver_prerouting - [0:0] :zone_lan_postrouting - [0:0] :zone_lan_prerouting - [0:0] :zone_vpn_postrouting - [0:0] :zone_vpn_prerouting - [0:0] :zone_wan_postrouting - [0:0] :zone_wan_prerouting - [0:0] -A PREROUTING -p tcp -m comment --comment "OpenClash TCP DNS Hijack" -m tcp --dport 53 -j ACCEPT -A PREROUTING -p tcp -m tcp --dport 53 -m comment --comment "OpenClash DNS Hijack" -j REDIRECT --to-ports 53 -A PREROUTING -p udp -m udp --dport 53 -m comment --comment "OpenClash DNS Hijack" -j REDIRECT --to-ports 53 -A PREROUTING -m addrtype --dst-type LOCAL -j DOCKER -A PREROUTING -m comment --comment "!fw3: Custom prerouting rule chain" -j prerouting_rule -A PREROUTING -i br-lan -m comment --comment "!fw3" -j zone_lan_prerouting -A PREROUTING -i ipsec0 -m comment --comment "!fw3" -j zone_ipsecserver_prerouting -A PREROUTING -i docker0 -m comment --comment "!fw3" -j zone_docker_prerouting -A PREROUTING -i tun0 -m comment --comment "!fw3" -j zone_vpn_prerouting -A PREROUTING -p tcp -j openclash -A OUTPUT ! -d 127.0.0.0/8 -m addrtype --dst-type LOCAL -j DOCKER -A OUTPUT -j openclash_output -A POSTROUTING -s 172.17.0.0/16 ! -o docker0 -j MASQUERADE -A POSTROUTING -m comment --comment "!fw3: Custom postrouting rule chain" -j postrouting_rule -A POSTROUTING -o br-lan -m comment --comment "!fw3" -j zone_lan_postrouting -A POSTROUTING -o ipsec0 -m comment --comment "!fw3" -j zone_ipsecserver_postrouting -A POSTROUTING -o docker0 -m comment --comment "!fw3" -j zone_docker_postrouting -A POSTROUTING -o tun0 -m comment --comment "!fw3" -j zone_vpn_postrouting -A DOCKER -i docker0 -j RETURN -A openclash -p tcp -m tcp --sport 1688 -j RETURN -A openclash -p tcp -m tcp --sport 1194 -j RETURN -A openclash -m set --match-set localnetwork dst -j RETURN -A openclash -m set --match-set china_ip_route dst -m set ! --match-set china_ip_route_pass dst -j RETURN -A openclash -p tcp -j REDIRECT --to-ports 7892 -A openclash_output -p tcp -m tcp --sport 1688 -j RETURN -A openclash_output -p tcp -m tcp --sport 1194 -j RETURN -A openclash_output -m set --match-set localnetwork dst -j RETURN -A openclash_output -m owner ! --uid-owner 65534 -m set --match-set china_ip_route dst -m set ! --match-set china_ip_route_pass dst -j RETURN -A openclash_output -p tcp -m owner ! --uid-owner 65534 -j REDIRECT --to-ports 7892 -A zone_docker_postrouting -m comment --comment "!fw3: Custom docker postrouting rule chain" -j postrouting_docker_rule -A zone_docker_prerouting -m comment --comment "!fw3: Custom docker prerouting rule chain" -j prerouting_docker_rule -A zone_ipsecserver_postrouting -m comment --comment "!fw3: Custom ipsecserver postrouting rule chain" -j postrouting_ipsecserver_rule -A zone_ipsecserver_prerouting -m comment --comment "!fw3: Custom ipsecserver prerouting rule chain" -j prerouting_ipsecserver_rule -A zone_lan_postrouting -j MINIUPNPD-POSTROUTING -A zone_lan_postrouting -m comment --comment "!fw3: Custom lan postrouting rule chain" -j postrouting_lan_rule -A zone_lan_prerouting -j MINIUPNPD -A zone_lan_prerouting -m comment --comment "!fw3: Custom lan prerouting rule chain" -j prerouting_lan_rule -A zone_vpn_postrouting -m comment --comment "!fw3: Custom vpn postrouting rule chain" -j postrouting_vpn_rule -A zone_vpn_postrouting -m comment --comment "!fw3" -j MASQUERADE --mode fullcone -A zone_vpn_prerouting -m comment --comment "!fw3: Custom vpn prerouting rule chain" -j prerouting_vpn_rule -A zone_wan_postrouting -m comment --comment "!fw3: Custom wan postrouting rule chain" -j postrouting_wan_rule -A zone_wan_postrouting -m comment --comment "!fw3" -j MASQUERADE --mode fullcone -A zone_wan_prerouting -m comment --comment "!fw3: Custom wan prerouting rule chain" -j prerouting_wan_rule COMMIT # Completed on Sun Mar 17 13:32:39 2024 #IPv4 Mangle chain # Generated by iptables-save v1.8.7 on Sun Mar 17 13:32:39 2024 *mangle :PREROUTING ACCEPT [6231:2019523] :INPUT ACCEPT [2758:363982] :FORWARD ACCEPT [3469:1655162] :OUTPUT ACCEPT [3242:657240] :POSTROUTING ACCEPT [6708:2310772] :RRDIPT_FORWARD - [0:0] :RRDIPT_INPUT - [0:0] :RRDIPT_OUTPUT - [0:0] :openclash - [0:0] :openclash_dns_hijack - [0:0] :openclash_upnp - [0:0] -A PREROUTING -p udp -j openclash -A PREROUTING -p tcp -m tcp --dport 53 -j openclash_dns_hijack -A INPUT -j RRDIPT_INPUT -A FORWARD -j RRDIPT_FORWARD -A OUTPUT -j RRDIPT_OUTPUT -A RRDIPT_FORWARD -s 192.168.1.32/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.1.32/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.1.100/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.1.100/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.1.50/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.1.50/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.1.51/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.1.51/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.1.104/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.1.104/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.1.130/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.1.130/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.1.142/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.1.142/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.1.215/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.1.215/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.1.143/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.1.143/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.1.136/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.1.136/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.1.145/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.1.145/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.1.146/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.1.146/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.1.226/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.1.226/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.1.2/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.1.2/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.1.170/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.1.170/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.1.5/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.1.5/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.1.99/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.1.99/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.1.238/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.1.238/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.1.159/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.1.159/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.1.189/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.1.189/32 -j RETURN -A RRDIPT_FORWARD -s 192.168.1.10/32 -j RETURN -A RRDIPT_FORWARD -d 192.168.1.10/32 -j RETURN -A RRDIPT_INPUT -i eth0 -j RETURN -A RRDIPT_INPUT -i br-lan -j RETURN -A RRDIPT_OUTPUT -o eth0 -j RETURN -A RRDIPT_OUTPUT -o br-lan -j RETURN -A openclash -p udp -m udp --sport 1194 -j RETURN -A openclash -p udp -m udp --sport 500 -j RETURN -A openclash -p udp -m udp --sport 68 -j RETURN -A openclash -i utun -j RETURN -A openclash -m set --match-set localnetwork dst -j RETURN -A openclash -m set --match-set china_ip_route dst -m set ! --match-set china_ip_route_pass dst -j RETURN -A openclash -p udp -j openclash_upnp -A openclash -j MARK --set-xmark 0x162/0xffffffff -A openclash_dns_hijack -p tcp -m comment --comment "OpenClash TCP DNS Hijack" -m tcp --dport 53 -j MARK --set-xmark 0x162/0xffffffff COMMIT # Completed on Sun Mar 17 13:32:39 2024 #IPv4 Filter chain # Generated by iptables-save v1.8.7 on Sun Mar 17 13:32:39 2024 *filter :INPUT ACCEPT [2:80] :FORWARD DROP [0:0] :OUTPUT ACCEPT [0:0] :DOCKER - [0:0] :DOCKER-ISOLATION-STAGE-1 - [0:0] :DOCKER-ISOLATION-STAGE-2 - [0:0] :DOCKER-MAN - [0:0] :DOCKER-USER - [0:0] :MINIUPNPD - [0:0] :SOCAT - [0:0] :forwarding_docker_rule - [0:0] :forwarding_ipsecserver_rule - [0:0] :forwarding_lan_rule - [0:0] :forwarding_rule - [0:0] :forwarding_vpn_rule - [0:0] :forwarding_wan_rule - [0:0] :input_docker_rule - [0:0] :input_ipsecserver_rule - [0:0] :input_lan_rule - [0:0] :input_rule - [0:0] :input_vpn_rule - [0:0] :input_wan_rule - [0:0] :output_docker_rule - [0:0] :output_ipsecserver_rule - [0:0] :output_lan_rule - [0:0] :output_rule - [0:0] :output_vpn_rule - [0:0] :output_wan_rule - [0:0] :reject - [0:0] :syn_flood - [0:0] :zone_docker_dest_ACCEPT - [0:0] :zone_docker_forward - [0:0] :zone_docker_input - [0:0] :zone_docker_output - [0:0] :zone_docker_src_ACCEPT - [0:0] :zone_ipsecserver_dest_ACCEPT - [0:0] :zone_ipsecserver_forward - [0:0] :zone_ipsecserver_input - [0:0] :zone_ipsecserver_output - [0:0] :zone_ipsecserver_src_ACCEPT - [0:0] :zone_lan_dest_ACCEPT - [0:0] :zone_lan_forward - [0:0] :zone_lan_input - [0:0] :zone_lan_output - [0:0] :zone_lan_src_ACCEPT - [0:0] :zone_vpn_dest_ACCEPT - [0:0] :zone_vpn_forward - [0:0] :zone_vpn_input - [0:0] :zone_vpn_output - [0:0] :zone_vpn_src_ACCEPT - [0:0] :zone_wan_dest_ACCEPT - [0:0] :zone_wan_dest_REJECT - [0:0] :zone_wan_forward - [0:0] :zone_wan_input - [0:0] :zone_wan_output - [0:0] :zone_wan_src_REJECT - [0:0] -A INPUT -j SOCAT -A INPUT -i lo -m comment --comment "!fw3" -j ACCEPT -A INPUT -m comment --comment "!fw3: Custom input rule chain" -j input_rule -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT -A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m comment --comment "!fw3" -j syn_flood -A INPUT -i br-lan -m comment --comment "!fw3" -j zone_lan_input -A INPUT -i ipsec0 -m comment --comment "!fw3" -j zone_ipsecserver_input -A INPUT -i docker0 -m comment --comment "!fw3" -j zone_docker_input -A INPUT -i tun0 -m comment --comment "!fw3" -j zone_vpn_input -A FORWARD -o utun -p udp -m udp --dport 443 -m comment --comment "OpenClash QUIC REJECT" -m set ! --match-set china_ip_route dst -j REJECT --reject-with icmp-port-unreachable -A FORWARD -o utun -m comment --comment "OpenClash TUN Forward" -j ACCEPT -A FORWARD -j DOCKER-USER -A FORWARD -j DOCKER-ISOLATION-STAGE-1 -A FORWARD -o docker0 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT -A FORWARD -o docker0 -j DOCKER -A FORWARD -i docker0 ! -o docker0 -j ACCEPT -A FORWARD -i docker0 -o docker0 -j ACCEPT -A FORWARD -m comment --comment "!fw3: Custom forwarding rule chain" -j forwarding_rule -A FORWARD -m comment --comment "!fw3: Traffic offloading" -m conntrack --ctstate RELATED,ESTABLISHED -j FLOWOFFLOAD --hw -A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT -A FORWARD -i br-lan -m comment --comment "!fw3" -j zone_lan_forward -A FORWARD -i ipsec0 -m comment --comment "!fw3" -j zone_ipsecserver_forward -A FORWARD -i docker0 -m comment --comment "!fw3" -j zone_docker_forward -A FORWARD -i tun0 -m comment --comment "!fw3" -j zone_vpn_forward -A FORWARD -m comment --comment "!fw3" -j reject -A OUTPUT -o lo -m comment --comment "!fw3" -j ACCEPT -A OUTPUT -m comment --comment "!fw3: Custom output rule chain" -j output_rule -A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT -A OUTPUT -o br-lan -m comment --comment "!fw3" -j zone_lan_output -A OUTPUT -o ipsec0 -m comment --comment "!fw3" -j zone_ipsecserver_output -A OUTPUT -o docker0 -m comment --comment "!fw3" -j zone_docker_output -A OUTPUT -o tun0 -m comment --comment "!fw3" -j zone_vpn_output -A DOCKER-ISOLATION-STAGE-1 -i docker0 ! -o docker0 -j DOCKER-ISOLATION-STAGE-2 -A DOCKER-ISOLATION-STAGE-1 -j RETURN -A DOCKER-ISOLATION-STAGE-2 -o docker0 -j DROP -A DOCKER-ISOLATION-STAGE-2 -j RETURN -A DOCKER-MAN -i br-lan -o docker0 -j RETURN -A DOCKER-MAN -o docker0 -m conntrack --ctstate RELATED,ESTABLISHED -j RETURN -A DOCKER-MAN -o docker0 -m conntrack --ctstate INVALID,NEW -j DROP -A DOCKER-MAN -j RETURN -A DOCKER-USER -j DOCKER-MAN -A DOCKER-USER -j RETURN -A reject -p tcp -m comment --comment "!fw3" -j REJECT --reject-with tcp-reset -A reject -m comment --comment "!fw3" -j REJECT --reject-with icmp-port-unreachable -A syn_flood -m limit --limit 25/sec --limit-burst 50 -m comment --comment "!fw3" -j RETURN -A syn_flood -m comment --comment "!fw3" -j DROP -A zone_docker_dest_ACCEPT -o docker0 -m comment --comment "!fw3" -j ACCEPT -A zone_docker_forward -m comment --comment "!fw3: Custom docker forwarding rule chain" -j forwarding_docker_rule -A zone_docker_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT -A zone_docker_forward -m comment --comment "!fw3" -j zone_docker_dest_ACCEPT -A zone_docker_input -m comment --comment "!fw3: Custom docker input rule chain" -j input_docker_rule -A zone_docker_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT -A zone_docker_input -m comment --comment "!fw3" -j zone_docker_src_ACCEPT -A zone_docker_output -m comment --comment "!fw3: Custom docker output rule chain" -j output_docker_rule -A zone_docker_output -m comment --comment "!fw3" -j zone_docker_dest_ACCEPT -A zone_docker_src_ACCEPT -i docker0 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT -A zone_ipsecserver_dest_ACCEPT -o ipsec0 -m comment --comment "!fw3" -j ACCEPT -A zone_ipsecserver_forward -m comment --comment "!fw3: Custom ipsecserver forwarding rule chain" -j forwarding_ipsecserver_rule -A zone_ipsecserver_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT -A zone_ipsecserver_forward -m comment --comment "!fw3" -j zone_ipsecserver_dest_ACCEPT -A zone_ipsecserver_input -m comment --comment "!fw3: Custom ipsecserver input rule chain" -j input_ipsecserver_rule -A zone_ipsecserver_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT -A zone_ipsecserver_input -m comment --comment "!fw3" -j zone_ipsecserver_src_ACCEPT -A zone_ipsecserver_output -m comment --comment "!fw3: Custom ipsecserver output rule chain" -j output_ipsecserver_rule -A zone_ipsecserver_output -m comment --comment "!fw3" -j zone_ipsecserver_dest_ACCEPT -A zone_ipsecserver_src_ACCEPT -i ipsec0 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT -A zone_lan_dest_ACCEPT -o br-lan -m comment --comment "!fw3" -j ACCEPT -A zone_lan_forward -j MINIUPNPD -A zone_lan_forward -m comment --comment "!fw3: Custom lan forwarding rule chain" -j forwarding_lan_rule -A zone_lan_forward -m comment --comment "!fw3: Zone lan to wan forwarding policy" -j zone_wan_dest_ACCEPT -A zone_lan_forward -m comment --comment "!fw3: Zone lan to vpn forwarding policy" -j zone_vpn_dest_ACCEPT -A zone_lan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT -A zone_lan_forward -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT -A zone_lan_input -m comment --comment "!fw3: Custom lan input rule chain" -j input_lan_rule -A zone_lan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT -A zone_lan_input -m comment --comment "!fw3" -j zone_lan_src_ACCEPT -A zone_lan_output -m comment --comment "!fw3: Custom lan output rule chain" -j output_lan_rule -A zone_lan_output -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT -A zone_lan_src_ACCEPT -i br-lan -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT -A zone_vpn_dest_ACCEPT -o tun0 -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP -A zone_vpn_dest_ACCEPT -o tun0 -m comment --comment "!fw3" -j ACCEPT -A zone_vpn_forward -m comment --comment "!fw3: Custom vpn forwarding rule chain" -j forwarding_vpn_rule -A zone_vpn_forward -m comment --comment "!fw3: Zone vpn to wan forwarding policy" -j zone_wan_dest_ACCEPT -A zone_vpn_forward -m comment --comment "!fw3: Zone vpn to lan forwarding policy" -j zone_lan_dest_ACCEPT -A zone_vpn_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT -A zone_vpn_forward -m comment --comment "!fw3" -j zone_vpn_dest_ACCEPT -A zone_vpn_input -m comment --comment "!fw3: Custom vpn input rule chain" -j input_vpn_rule -A zone_vpn_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT -A zone_vpn_input -m comment --comment "!fw3" -j zone_vpn_src_ACCEPT -A zone_vpn_output -m comment --comment "!fw3: Custom vpn output rule chain" -j output_vpn_rule -A zone_vpn_output -m comment --comment "!fw3" -j zone_vpn_dest_ACCEPT -A zone_vpn_src_ACCEPT -i tun0 -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT -A zone_wan_forward -m comment --comment "!fw3: Custom wan forwarding rule chain" -j forwarding_wan_rule -A zone_wan_forward -p esp -m comment --comment "!fw3: Allow-IPSec-ESP" -j zone_lan_dest_ACCEPT -A zone_wan_forward -p udp -m udp --dport 500 -m comment --comment "!fw3: Allow-ISAKMP" -j zone_lan_dest_ACCEPT -A zone_wan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT -A zone_wan_forward -m comment --comment "!fw3" -j zone_wan_dest_REJECT -A zone_wan_input -m comment --comment "!fw3: Custom wan input rule chain" -j input_wan_rule -A zone_wan_input -p udp -m udp --dport 68 -m comment --comment "!fw3: Allow-DHCP-Renew" -j ACCEPT -A zone_wan_input -p icmp -m icmp --icmp-type 8 -m comment --comment "!fw3: Allow-Ping" -j ACCEPT -A zone_wan_input -p igmp -m comment --comment "!fw3: Allow-IGMP" -j ACCEPT -A zone_wan_input -p tcp -m tcp --dport 8118 -m comment --comment "!fw3: adblock" -j DROP -A zone_wan_input -p tcp -m tcp --dport 1194 -m comment --comment "!fw3: openvpn" -j ACCEPT -A zone_wan_input -p udp -m udp --dport 1194 -m comment --comment "!fw3: openvpn" -j ACCEPT -A zone_wan_input -p tcp -m tcp --dport 1688 -m comment --comment "!fw3: kms" -j ACCEPT -A zone_wan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT -A zone_wan_input -m comment --comment "!fw3" -j zone_wan_src_REJECT -A zone_wan_output -m comment --comment "!fw3: Custom wan output rule chain" -j output_wan_rule -A zone_wan_output -m comment --comment "!fw3" -j zone_wan_dest_ACCEPT COMMIT # Completed on Sun Mar 17 13:32:39 2024 #IPv6 NAT chain #IPv6 Mangle chain #IPv6 Filter chain #===================== IPSET状态 =====================# Name: cn Type: hash:net Revision: 7 Header: family inet hashsize 4096 maxelem 65536 bucketsize 12 initval 0xeb0e8c6b Size in memory: 257472 References: 0 Number of entries: 8618 Name: ct Type: hash:net Revision: 7 Header: family inet hashsize 1024 maxelem 65536 bucketsize 12 initval 0xffd8dc35 Size in memory: 59496 References: 0 Number of entries: 1962 Name: cnc Type: hash:net Revision: 7 Header: family inet hashsize 1024 maxelem 65536 bucketsize 12 initval 0xe94f511d Size in memory: 32040 References: 0 Number of entries: 915 Name: cmcc Type: hash:net Revision: 7 Header: family inet hashsize 1024 maxelem 65536 bucketsize 12 initval 0x3039226e Size in memory: 3096 References: 0 Number of entries: 55 Name: crtc Type: hash:net Revision: 7 Header: family inet hashsize 1024 maxelem 65536 bucketsize 12 initval 0x87b5741d Size in memory: 1224 References: 0 Number of entries: 16 Name: cernet Type: hash:net Revision: 7 Header: family inet hashsize 1024 maxelem 65536 bucketsize 12 initval 0xe5409030 Size in memory: 8040 References: 0 Number of entries: 171 Name: gwbn Type: hash:net Revision: 7 Header: family inet hashsize 1024 maxelem 65536 bucketsize 12 initval 0x61ef23ef Size in memory: 12984 References: 0 Number of entries: 290 Name: othernet Type: hash:net Revision: 7 Header: family inet hashsize 2048 maxelem 65536 bucketsize 12 initval 0x58dbb719 Size in memory: 150384 References: 0 Number of entries: 5209 Name: music Type: hash:ip Revision: 5 Header: family inet hashsize 1024 maxelem 65536 bucketsize 12 initval 0xb0aee46e Size in memory: 880 References: 0 Number of entries: 17 Name: mwan3_connected_v4 Type: hash:net Revision: 7 Header: family inet hashsize 1024 maxelem 65536 bucketsize 12 initval 0xde4cc7bb Size in memory: 936 References: 1 Number of entries: 10 Name: mwan3_connected_v6 Type: hash:net Revision: 7 Header: family inet6 hashsize 1024 maxelem 65536 bucketsize 12 initval 0x167c2439 Size in memory: 1384 References: 1 Number of entries: 2 Name: mwan3_source_v6 Type: hash:net Revision: 7 Header: family inet6 hashsize 1024 maxelem 65536 bucketsize 12 initval 0x27704272 Size in memory: 1312 References: 0 Number of entries: 1 Name: mwan3_dynamic_v4 Type: hash:net Revision: 7 Header: family inet hashsize 1024 maxelem 65536 bucketsize 12 initval 0x72bd6793 Size in memory: 456 References: 1 Number of entries: 0 Name: mwan3_dynamic_v6 Type: hash:net Revision: 7 Header: family inet6 hashsize 1024 maxelem 65536 bucketsize 12 initval 0x46e60294 Size in memory: 1240 References: 1 Number of entries: 0 Name: mwan3_custom_v4 Type: hash:net Revision: 7 Header: family inet hashsize 1024 maxelem 65536 bucketsize 12 initval 0xb4e399e9 Size in memory: 456 References: 1 Number of entries: 0 Name: mwan3_custom_v6 Type: hash:net Revision: 7 Header: family inet6 hashsize 1024 maxelem 65536 bucketsize 12 initval 0xf1f55660 Size in memory: 1240 References: 1 Number of entries: 0 Name: localnetwork Type: hash:net Revision: 7 Header: family inet hashsize 1024 maxelem 65536 bucketsize 12 initval 0xe0517f48 Size in memory: 888 References: 3 Number of entries: 9 Name: china_ip_route Type: hash:net Revision: 7 Header: family inet hashsize 4096 maxelem 1000000 bucketsize 12 initval 0x986c1f25 Size in memory: 257088 References: 4 Number of entries: 8665 Name: china_ip_route_pass Type: hash:net Revision: 7 Header: family inet hashsize 1024 maxelem 1000000 bucketsize 12 initval 0x826d605d Size in memory: 456 References: 3 Number of entries: 0 Name: mwan3_connected Type: list:set Revision: 3 Header: size 8 Size in memory: 368 References: 0 Number of entries: 6 #===================== 路由表状态 =====================# #IPv4 #route -n Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 0.0.0.0 192.168.1.2 0.0.0.0 UG 0 0 0 br-lan 172.17.0.0 0.0.0.0 255.255.0.0 U 0 0 0 docker0 192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0 br-lan 198.18.0.0 0.0.0.0 255.255.0.0 U 0 0 0 utun #ip route list default via 192.168.1.2 dev br-lan proto static 172.17.0.0/16 dev docker0 proto kernel scope link src 172.17.0.1 linkdown 192.168.1.0/24 dev br-lan proto kernel scope link src 192.168.1.30 198.18.0.0/16 dev utun proto kernel scope link src 198.18.0.1 #ip rule show 0: from all lookup local 32765: from all fwmark 0x162 lookup 354 32766: from all lookup main 32767: from all lookup default #IPv6 #route -A inet6 Kernel IPv6 routing table Destination Next Hop Flags Metric Ref Use Iface fd27:1c6a:118c::/64 :: U 1024 1 0 br-lan fd27:1c6a:118c::/48 :: !n 2147483647 2 0 lo fe80::/64 :: U 256 4 0 br-lan fe80::/64 :: U 256 1 0 utun ::/0 :: !n -1 1 0 lo ::1/128 :: Un 0 6 0 lo fd27:1c6a:118c::/128 :: Un 0 3 0 br-lan fd27:1c6a:118c::1/128 :: Un 0 3 0 br-lan fe80::/128 :: Un 0 3 0 br-lan fe80::/128 :: Un 0 3 0 utun fe80::11:32ff:fe22:cd1d/128 :: Un 0 6 0 br-lan fe80::7a1a:de69:732:13af/128 :: Un 0 2 0 utun ff00::/8 :: U 256 7 0 br-lan ff00::/8 :: U 256 4 0 utun ::/0 :: !n -1 1 0 lo #ip -6 route list fd27:1c6a:118c::/64 dev br-lan proto static metric 1024 pref medium unreachable fd27:1c6a:118c::/48 dev lo proto static metric 2147483647 pref medium fe80::/64 dev br-lan proto kernel metric 256 pref medium fe80::/64 dev utun proto kernel metric 256 pref medium #ip -6 rule show 0: from all lookup local 32766: from all lookup main 4200000001: from all iif lo failed_policy 4200000009: from all iif br-lan failed_policy #===================== Tun设备状态 =====================# utun: tun multi_queue vnet_hdr #===================== 端口占用状态 =====================# tcp 0 0 198.18.0.1:7777 0.0.0.0:* LISTEN 13489/clash tcp 0 0 :::9090 :::* LISTEN 13489/clash tcp 0 0 :::7891 :::* LISTEN 13489/clash tcp 0 0 :::7890 :::* LISTEN 13489/clash tcp 0 0 :::7893 :::* LISTEN 13489/clash tcp 0 0 :::7892 :::* LISTEN 13489/clash tcp 0 0 :::7895 :::* LISTEN 13489/clash udp 0 0 :::33431 :::* 13489/clash udp 0 0 :::7874 :::* 13489/clash udp 0 0 :::7891 :::* 13489/clash udp 0 0 :::7892 :::* 13489/clash udp 0 0 :::7893 :::* 13489/clash udp 0 0 :::7895 :::* 13489/clash udp 0 0 :::32991 :::* 13489/clash udp 0 0 :::49477 :::* 13489/clash udp 0 0 :::58204 :::* 13489/clash udp 0 0 :::42863 :::* 13489/clash udp 0 0 :::48005 :::* 13489/clash #===================== 测试本机DNS查询(www.baidu.com) =====================# Server: 127.0.0.1 Address: 127.0.0.1:53 www.baidu.com canonical name = www.a.shifen.com Name: www.a.shifen.com Address: 39.156.66.18 Name: www.a.shifen.com Address: 39.156.66.14 #===================== 测试内核DNS查询(www.instagram.com) =====================# Status: 0 TC: false RD: true RA: true AD: false CD: false Question: Name: www.instagram.com. Qtype: 1 Qclass: 1 Answer: TTL: 95 data: 69.63.184.14 name: www.instagram.com. type: 1 Dnsmasq 当前默认 resolv 文件:/tmp/resolv.conf.d/resolv.conf.auto #===================== /tmp/resolv.conf.d/resolv.conf.auto =====================# # Interface lan nameserver 114.114.114.114 #===================== 测试本机网络连接(www.baidu.com) =====================# HTTP/1.1 200 OK Accept-Ranges: bytes Cache-Control: private, no-cache, no-store, proxy-revalidate, no-transform Connection: keep-alive Content-Length: 277 Content-Type: text/html Date: Sun, 17 Mar 2024 05:32:40 GMT Etag: "575e1f60-115" Last-Modified: Mon, 13 Jun 2016 02:50:08 GMT Pragma: no-cache Server: bfe/1.0.8.18 #===================== 测试本机网络下载(raw.githubusercontent.com) =====================# HTTP/2 404 content-security-policy: default-src 'none'; style-src 'unsafe-inline'; sandbox strict-transport-security: max-age=31536000 x-content-type-options: nosniff x-frame-options: deny x-xss-protection: 1; mode=block content-type: text/plain; charset=utf-8 x-github-request-id: 8C86:1DEA03:16FE4B:1D88A2:65F6805D accept-ranges: bytes date: Sun, 17 Mar 2024 05:32:41 GMT via: 1.1 varnish x-served-by: cache-qpg1243-QPG x-cache: HIT x-cache-hits: 2 x-timer: S1710653561.142239,VS0,VE0 vary: Authorization,Accept-Encoding,Origin access-control-allow-origin: * cross-origin-resource-policy: cross-origin x-fastly-request-id: 85229716f1f74e4e848eb33c07fe36a630f993ba expires: Sun, 17 Mar 2024 05:37:41 GMT source-age: 26 content-length: 14 #===================== 最近运行日志(自动切换为Debug模式) =====================# 13:32:50 DBG [TCP] accept connection lAddr=192.168.1.10:41791 rAddr=36.234.223.128:11143 inbound=Redir 13:32:50 WRN [TCP] dial failed error=dial tcp4 223.18.255.164:52043: i/o timeout proxy=🐟漏网之鱼 lAddr=192.168.1.10:33720 rAddr=223.18.255.164:52043 rule=Match rulePayload= 13:32:50 DBG [Matcher] find process failed error=process not found addr=99.241.198.149 13:32:50 WRN [TCP] dial failed error=dial tcp4 111.252.198.19:25451: i/o timeout proxy=🐟漏网之鱼 lAddr=192.168.1.10:51384 rAddr=111.252.198.19:25451 rule=Match rulePayload= 13:32:50 WRN [TCP] dial failed error=dial tcp4 180.75.246.223:11976: i/o timeout proxy=🐟漏网之鱼 lAddr=192.168.1.10:60422 rAddr=180.75.246.223:11976 rule=Match rulePayload= 13:32:50 DBG [Matcher] find process failed error=process not found addr=36.234.223.128 13:32:50 WRN [TCP] dial failed error=dial tcp4 191.96.240.142:65535: i/o timeout proxy=🐟漏网之鱼 lAddr=192.168.1.10:48924 rAddr=191.96.240.142:65535 rule=Match rulePayload= 13:32:50 WRN [TCP] dial failed error=dial tcp4 112.119.174.248:9440: i/o timeout proxy=🐟漏网之鱼 lAddr=192.168.1.10:33358 rAddr=112.119.174.248:9440 rule=Match rulePayload= 13:32:50 DBG [Matcher] find process failed error=process not found addr=69.49.86.44 13:32:50 DBG [TCP] accept connection lAddr=192.168.1.10:32901 rAddr=5.15.218.103:46785 inbound=Redir 13:32:50 DBG [TCP] accept connection lAddr=192.168.1.10:49825 rAddr=218.250.188.76:3977 inbound=Redir 13:32:50 DBG [Matcher] find process failed error=process not found addr=5.15.218.103 13:32:50 DBG [Matcher] find process failed error=process not found addr=218.250.188.76 13:32:50 WRN [TCP] dial failed error=dial tcp4 129.213.88.72:9489: i/o timeout proxy=🐟漏网之鱼 lAddr=192.168.1.10:40978 rAddr=129.213.88.72:9489 rule=Match rulePayload= 13:32:50 WRN [TCP] dial failed error=dial tcp4 180.75.239.37:36225: i/o timeout proxy=🐟漏网之鱼 lAddr=192.168.1.10:52269 rAddr=180.75.239.37:36225 rule=Match rulePayload= 13:32:50 WRN [TCP] dial failed error=dial tcp4 49.159.1.19:52211: i/o timeout proxy=🐟漏网之鱼 lAddr=192.168.1.10:50901 rAddr=49.159.1.19:52211 rule=Match rulePayload= 13:32:50 WRN [TCP] dial failed error=dial tcp4 113.210.51.140:6255: i/o timeout proxy=🐟漏网之鱼 lAddr=192.168.1.10:54930 rAddr=113.210.51.140:6255 rule=Match rulePayload= 13:32:50 DBG [Matcher] find process failed error=process not found addr=46.20.109.77 13:32:50 WRN [TCP] dial failed error=dial tcp4 180.75.239.37:5216: i/o timeout proxy=🐟漏网之鱼 lAddr=192.168.1.10:49003 rAddr=180.75.239.37:5216 rule=Match rulePayload= 13:32:50 WRN [TCP] dial failed error=dial tcp4 125.229.154.238:1673: i/o timeout proxy=🐟漏网之鱼 lAddr=192.168.1.10:46600 rAddr=125.229.154.238:1673 rule=Match rulePayload= 13:32:50 INF [TCP] connected lAddr=192.168.1.100:11709 rAddr=signalrs2-relayhub-prod-as01-1.service.signalr.net:443 mode=rule rule=DomainSuffix(signalr.net) proxy=Ⓜ️微软服务[DIRECT] 13:32:50 DBG [TCP] accept connection lAddr=192.168.1.100:11711 rAddr=signalrs2-relayhub-prod-as01-1.service.signalr.net:443 inbound=Redir 13:32:50 INF [TCP] connected lAddr=192.168.1.10:45305 rAddr=51.159.107.184:54697 mode=rule rule=Match() proxy=🐟漏网之鱼[DIRECT] 13:32:50 INF [TCP] connected lAddr=192.168.1.100:11711 rAddr=signalrs2-relayhub-prod-as01-1.service.signalr.net:443 mode=rule rule=DomainSuffix(signalr.net) proxy=Ⓜ️微软服务[DIRECT] 13:32:50 WRN [TCP] dial failed error=dial tcp4 172.217.163.42:443: i/o timeout proxy=🚀节点选择 lAddr=192.168.1.142:58552 rAddr=gmscompliance-pa.googleapis.com:443 rule=DomainKeyword rulePayload=google 13:32:50 DBG [TCP] accept connection lAddr=192.168.1.142:58564 rAddr=gmscompliance-pa.googleapis.com:443 inbound=Redir 13:32:50 DBG [Matcher] find process failed error=process not found addr=gmscompliance-pa.googleapis.com 13:32:50 DBG [DNS] dns response source=8.8.8.8:53 qType=A name=24-courier.push.apple.com. answer=["17.57.145.133","17.57.145.134","17.57.145.137","17.57.145.132","17.57.145.136","17.57.145.138","17.57.145.135"] 13:32:50 DBG [TCP] accept connection lAddr=192.168.1.99:65119 rAddr=24-courier.push.apple.com:5223 inbound=Redir 13:32:50 DBG [Matcher] find process failed error=process not found addr=24-courier.push.apple.com 13:32:50 INF [TCP] connected lAddr=192.168.1.99:65119 rAddr=24-courier.push.apple.com:5223 mode=rule rule=DomainSuffix(apple.com) proxy=🍎苹果服务[DIRECT] 13:32:51 WRN [TCP] dial failed error=dial tcp4 184.146.125.152:17935: i/o timeout proxy=🐟漏网之鱼 lAddr=192.168.1.10:36142 rAddr=184.146.125.152:17935 rule=Match rulePayload= 13:32:51 DBG [TCP] accept connection lAddr=192.168.1.10:58272 rAddr=160.237.117.161:43920 inbound=Redir 13:32:51 WRN [TCP] dial failed error=dial tcp4 1.163.7.141:41584: i/o timeout proxy=🐟漏网之鱼 lAddr=192.168.1.10:55743 rAddr=1.163.7.141:41584 rule=Match rulePayload= 13:32:51 DBG [TCP] accept connection lAddr=192.168.1.10:52569 rAddr=194.26.74.61:6666 inbound=Redir 13:32:51 DBG [Matcher] find process failed error=process not found addr=160.237.117.161 13:32:51 DBG [TCP] accept connection lAddr=192.168.1.10:54036 rAddr=157.254.20.71:51413 inbound=Redir 13:32:51 DBG [Matcher] find process failed error=process not found addr=194.26.74.61 13:32:51 DBG [TCP] accept connection lAddr=192.168.1.10:40160 rAddr=38.59.242.65:6881 inbound=Redir 13:32:51 DBG [Matcher] find process failed error=process not found addr=157.254.20.71 13:32:51 DBG [Matcher] find process failed error=process not found addr=38.59.242.65 13:32:51 WRN [TCP] dial failed error=dial tcp4 123.192.189.20:32802: i/o timeout proxy=🐟漏网之鱼 lAddr=192.168.1.10:54137 rAddr=123.192.189.20:32802 rule=Match rulePayload= 13:32:51 WRN [TCP] dial failed error=dial tcp4 125.59.190.11:16605: i/o timeout proxy=🐟漏网之鱼 lAddr=192.168.1.10:51540 rAddr=125.59.190.11:16605 rule=Match rulePayload= 13:32:51 WRN [TCP] dial failed error=dial tcp4 36.239.239.69:57477: i/o timeout proxy=🐟漏网之鱼 lAddr=192.168.1.10:58244 rAddr=36.239.239.69:57477 rule=Match rulePayload= 13:32:51 DBG [TCP] accept connection lAddr=192.168.1.10:40839 rAddr=113.210.102.18:63040 inbound=Redir 13:32:51 WRN [TCP] dial failed error=dial tcp4 31.171.154.115:54521: i/o timeout proxy=🐟漏网之鱼 lAddr=192.168.1.10:58911 rAddr=31.171.154.115:54521 rule=Match rulePayload= 13:32:51 DBG [Matcher] find process failed error=process not found addr=113.210.102.18 13:32:51 DBG [TCP] accept connection lAddr=192.168.1.10:50334 rAddr=131.246.233.73:51637 inbound=Redir 13:32:51 DBG [TCP] accept connection lAddr=192.168.1.10:48249 rAddr=144.202.68.211:36729 inbound=Redir 13:32:51 DBG [TCP] accept connection lAddr=192.168.1.10:45693 rAddr=181.41.202.160:8922 inbound=Redir 13:32:51 DBG [TCP] accept connection lAddr=192.168.1.10:36384 rAddr=105.107.174.80:46785 inbound=Redir 13:32:51 DBG [Matcher] find process failed error=process not found addr=105.107.174.80 13:32:51 DBG [TCP] accept connection lAddr=192.168.1.10:45165 rAddr=184.146.125.152:17951 inbound=Redir 13:32:51 DBG [TCP] accept connection lAddr=192.168.1.10:41092 rAddr=218.250.188.76:29570 inbound=Redir 13:32:51 DBG [TCP] accept connection lAddr=192.168.1.10:47554 rAddr=107.189.4.70:6881 inbound=Redir 13:32:51 DBG [TCP] accept connection lAddr=192.168.1.10:34958 rAddr=185.209.198.72:53032 inbound=Redir 13:32:51 DBG [TCP] accept connection lAddr=192.168.1.10:58688 rAddr=121.200.6.152:63353 inbound=Redir 13:32:51 DBG [TCP] accept connection lAddr=192.168.1.10:58066 rAddr=89.213.164.71:6098 inbound=Redir 13:32:51 DBG [TCP] accept connection lAddr=192.168.1.10:41480 rAddr=108.181.255.9:12622 inbound=Redir 13:32:51 DBG [TCP] accept connection lAddr=192.168.1.10:37043 rAddr=36.234.223.128:33999 inbound=Redir 13:32:51 DBG [TCP] accept connection lAddr=192.168.1.10:41126 rAddr=112.120.89.229:39466 inbound=Redir 13:32:51 DBG [TCP] accept connection lAddr=192.168.1.10:50348 rAddr=172.111.38.128:13999 inbound=Redir 13:32:51 DBG [TCP] accept connection lAddr=192.168.1.10:43891 rAddr=18.183.161.223:22223 inbound=Redir 13:32:51 DBG [TCP] accept connection lAddr=192.168.1.10:54924 rAddr=154.16.81.85:46273 inbound=Redir 13:32:51 DBG [TCP] accept connection lAddr=192.168.1.10:40590 rAddr=178.51.169.59:18831 inbound=Redir 13:32:51 WRN [TCP] dial failed error=dial tcp4 168.70.17.237:15672: i/o timeout proxy=🐟漏网之鱼 lAddr=192.168.1.10:51535 rAddr=168.70.17.237:15672 rule=Match rulePayload= 13:32:51 WRN [TCP] dial failed error=dial tcp4 164.68.127.100:11999: i/o timeout proxy=🐟漏网之鱼 lAddr=192.168.1.10:42267 rAddr=164.68.127.100:11999 rule=Match rulePayload= 13:32:51 DBG [Matcher] find process failed error=process not found addr=184.146.125.152 13:32:51 DBG [Matcher] find process failed error=process not found addr=218.250.188.76 13:32:51 DBG [Matcher] find process failed error=process not found addr=107.189.4.70 13:32:51 DBG [Matcher] find process failed error=process not found addr=185.209.198.72 13:32:51 DBG [Matcher] find process failed error=process not found addr=121.200.6.152 13:32:51 DBG [Matcher] find process failed error=process not found addr=89.213.164.71 13:32:51 DBG [Matcher] find process failed error=process not found addr=108.181.255.9 13:32:51 DBG [Matcher] find process failed error=process not found addr=36.234.223.128 13:32:51 DBG [Matcher] find process failed error=process not found addr=112.120.89.229 13:32:51 DBG [Matcher] find process failed error=process not found addr=172.111.38.128 13:32:51 DBG [Matcher] find process failed error=process not found addr=18.183.161.223 13:32:51 DBG [Matcher] find process failed error=process not found addr=154.16.81.85 13:32:51 DBG [Matcher] find process failed error=process not found addr=178.51.169.59 13:32:51 WRN [TCP] dial failed error=dial tcp4 176.215.62.2:57477: i/o timeout proxy=🐟漏网之鱼 lAddr=192.168.1.10:33368 rAddr=176.215.62.2:57477 rule=Match rulePayload= 13:32:51 DBG [Matcher] find process failed error=process not found addr=131.246.233.73 13:32:51 WRN [TCP] dial failed error=dial tcp4 115.134.106.154:15000: i/o timeout proxy=🐟漏网之鱼 lAddr=192.168.1.10:54418 rAddr=115.134.106.154:15000 rule=Match rulePayload= 13:32:51 DBG [Matcher] find process failed error=process not found addr=144.202.68.211 13:32:51 WRN [TCP] dial failed error=dial tcp4 218.250.188.76:2734: i/o timeout proxy=🐟漏网之鱼 lAddr=192.168.1.10:59028 rAddr=218.250.188.76:2734 rule=Match rulePayload= 13:32:51 WRN [TCP] dial failed error=dial tcp4 180.75.233.61:54625: i/o timeout proxy=🐟漏网之鱼 lAddr=192.168.1.10:51196 rAddr=180.75.233.61:54625 rule=Match rulePayload= 13:32:51 DBG [Matcher] find process failed error=process not found addr=181.41.202.160 13:32:51 WRN [TCP] dial failed error=dial tcp4 185.135.76.54:22223: i/o timeout proxy=🐟漏网之鱼 lAddr=192.168.1.10:44517 rAddr=185.135.76.54:22223 rule=Match rulePayload= 13:32:51 DBG [TCP] accept connection lAddr=192.168.1.10:54786 rAddr=62.72.188.50:33500 inbound=Redir 13:32:51 WRN [TCP] dial failed error=dial tcp4 115.135.96.129:1171: i/o timeout proxy=🐟漏网之鱼 lAddr=192.168.1.10:59566 rAddr=115.135.96.129:1171 rule=Match rulePayload= 13:32:51 WRN [TCP] dial failed error=dial tcp4 165.3.122.205:34588: i/o timeout proxy=🐟漏网之鱼 lAddr=192.168.1.10:48403 rAddr=165.3.122.205:34588 rule=Match rulePayload= 13:32:51 DBG [Matcher] find process failed error=process not found addr=62.72.188.50 13:32:51 WRN [TCP] dial failed error=dial tcp4 95.17.113.197:22904: i/o timeout proxy=🐟漏网之鱼 lAddr=192.168.1.10:37041 rAddr=95.17.113.197:22904 rule=Match rulePayload= 13:32:51 WRN [TCP] dial failed error=dial tcp4 108.6.96.101:3773: i/o timeout proxy=🐟漏网之鱼 lAddr=192.168.1.10:47575 rAddr=108.6.96.101:3773 rule=Match rulePayload= 13:32:51 WRN [TCP] dial failed error=dial tcp4 24.77.1.180:7527: i/o timeout proxy=🐟漏网之鱼 lAddr=192.168.1.10:39996 rAddr=24.77.1.180:7527 rule=Match rulePayload= 13:32:51 WRN [TCP] dial failed error=dial tcp4 43.155.101.172:55639: i/o timeout proxy=🐟漏网之鱼 lAddr=192.168.1.10:39377 rAddr=43.155.101.172:55639 rule=Match rulePayload= 13:32:51 WRN [TCP] dial failed error=dial tcp4 95.17.113.197:5310: i/o timeout proxy=🐟漏网之鱼 lAddr=192.168.1.10:60382 rAddr=95.17.113.197:5310 rule=Match rulePayload= 13:32:51 DBG [TCP] accept connection lAddr=192.168.1.100:11712 rAddr=business.bing.com:443 inbound=Redir 13:32:51 INF [TCP] connected lAddr=192.168.1.100:11712 rAddr=business.bing.com:443 mode=rule rule=DomainSuffix(bing.com) proxy=Ⓜ️微软服务[DIRECT] 13:32:51 WRN [TCP] dial failed error=dial tcp4 144.202.68.211:36729: connect: no route to host proxy=🐟漏网之鱼 lAddr=192.168.1.10:48249 rAddr=144.202.68.211:36729 rule=Match rulePayload= #===================== 最近运行日志获取完成(自动切换为silent模式) =====================# #===================== 活动连接信息 =====================# 1. SourceIP:【192.168.1.10】 - Host:【Empty】 - DestinationIP:【107.175.78.232】 - Network:【udp】 - RulePayload:【】 - Lastchain:【DIRECT】 2. SourceIP:【192.168.1.10】 - Host:【Empty】 - DestinationIP:【193.32.87.148】 - Network:【udp】 - RulePayload:【】 - Lastchain:【DIRECT】 3. SourceIP:【192.168.1.100】 - Host:【api.ipify.org】 - DestinationIP:【172.67.74.152】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【DIRECT】 4. SourceIP:【192.168.1.100】 - Host:【edge.microsoft.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【microsoft.com】 - Lastchain:【DIRECT】 5. SourceIP:【192.168.1.100】 - Host:【api-ipv4.ip.sb】 - DestinationIP:【104.26.13.31】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【DIRECT】 6. SourceIP:【192.168.1.100】 - Host:【prod-eastasia.access-point.cloudmessaging.edge.microsoft.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【microsoft.com】 - Lastchain:【DIRECT】 7. SourceIP:【192.168.1.10】 - Host:【Empty】 - DestinationIP:【210.209.139.206】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【DIRECT】 8. SourceIP:【192.168.1.142】 - Host:【mtalk.google.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【mtalk.google.com】 - Lastchain:【DIRECT】 9. SourceIP:【192.168.1.99】 - Host:【bzib.nelreports.net】 - DestinationIP:【23.32.238.91】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【DIRECT】 10. SourceIP:【192.168.1.10】 - Host:【Empty】 - DestinationIP:【125.168.251.53】 - Network:【udp】 - RulePayload:【】 - Lastchain:【DIRECT】 11. SourceIP:【192.168.1.99】 - Host:【business.bing.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【bing.com】 - Lastchain:【DIRECT】 12. SourceIP:【192.168.1.100】 - Host:【signalrs2-relayhub-prod-as01-1.service.signalr.net】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【signalr.net】 - Lastchain:【DIRECT】 13. SourceIP:【192.168.1.99】 - Host:【24-courier.push.apple.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【apple.com】 - Lastchain:【DIRECT】 14. SourceIP:【192.168.1.10】 - Host:【Empty】 - DestinationIP:【61.62.144.104】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【DIRECT】 15. SourceIP:【192.168.1.100】 - Host:【qqwry.api.skk.moe】 - DestinationIP:【172.67.148.227】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【DIRECT】 16. SourceIP:【192.168.1.100】 - Host:【Empty】 - DestinationIP:【91.108.56.141】 - Network:【tcp】 - RulePayload:【91.108.0.0/16】 - Lastchain:【香港01-IEPL-倍率1.0】 17. SourceIP:【192.168.1.10】 - Host:【api.telegram.org】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【telegram.org】 - Lastchain:【香港01-IEPL-倍率1.0】 18. SourceIP:【192.168.1.100】 - Host:【Empty】 - DestinationIP:【103.28.54.173】 - Network:【udp】 - RulePayload:【】 - Lastchain:【DIRECT】 19. SourceIP:【192.168.1.142】 - Host:【signalrs2-relayhub-prod-as01-1.service.signalr.net】 - DestinationIP:【20.195.84.12】 - Network:【tcp】 - RulePayload:【signalr.net】 - Lastchain:【DIRECT】 20. SourceIP:【192.168.1.142】 - Host:【business.bing.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【bing.com】 - Lastchain:【DIRECT】 21. SourceIP:【192.168.1.100】 - Host:【signalrs2-relayhub-prod-as01-1.service.signalr.net】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【signalr.net】 - Lastchain:【DIRECT】 22. SourceIP:【192.168.1.100】 - Host:【graph.oculus.com】 - DestinationIP:【157.240.211.54】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【DIRECT】 23. SourceIP:【192.168.1.100】 - Host:【github.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【github.com】 - Lastchain:【香港01-IEPL-倍率1.0】 24. SourceIP:【192.168.1.10】 - Host:【Empty】 - DestinationIP:【88.198.55.6】 - Network:【udp】 - RulePayload:【】 - Lastchain:【DIRECT】 25. SourceIP:【192.168.1.100】 - Host:【avatars3.githubusercontent.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【githubusercontent.com】 - Lastchain:【香港01-IEPL-倍率1.0】 26. SourceIP:【192.168.1.142】 - Host:【signalrs2-relayhub-prod-as01-1.service.signalr.net】 - DestinationIP:【20.195.84.12】 - Network:【tcp】 - RulePayload:【signalr.net】 - Lastchain:【DIRECT】 27. SourceIP:【192.168.1.99】 - Host:【edge.microsoft.com】 - DestinationIP:【204.79.197.239】 - Network:【tcp】 - RulePayload:【microsoft.com】 - Lastchain:【DIRECT】 28. SourceIP:【192.168.1.10】 - Host:【t.nyaatracker.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【tracker】 - Lastchain:【DIRECT】 29. SourceIP:【192.168.1.10】 - Host:【Empty】 - DestinationIP:【183.179.193.172】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【DIRECT】 30. SourceIP:【192.168.1.100】 - Host:【business.bing.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【bing.com】 - Lastchain:【DIRECT】 31. SourceIP:【192.168.1.100】 - Host:【edge.microsoft.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【microsoft.com】 - Lastchain:【DIRECT】 32. SourceIP:【192.168.1.99】 - Host:【copilot.microsoft.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【microsoft.com】 - Lastchain:【DIRECT】 33. SourceIP:【192.168.1.100】 - Host:【d.skk.moe】 - DestinationIP:【172.67.187.219】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【DIRECT】 34. SourceIP:【192.168.1.100】 - Host:【business.bing.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【bing.com】 - Lastchain:【DIRECT】 35. SourceIP:【192.168.1.5】 - Host:【Empty】 - DestinationIP:【199.165.76.11】 - Network:【udp】 - RulePayload:【】 - Lastchain:【DIRECT】
### OpenClash Config _No response_ ### Expected Behavior openclash自启动时会检测“SOCKS5/HTTP(S) 认证信息”是否有配置项,如果没有则自动添加一行,如果有则不自动新增,只读取配置并写入yaml配置文件。 ### Additional Context _No response_
换了固件,运行正常。
我也一样,基于官方原版编译和LEDE编译都是这样。
Verify Steps
OpenClash Version
v0.46.003-beta
Bug on Environment
Lean
OpenWrt Version
2024.03.16 OpenWrt Li [2024] Compiled by Li OpenWrt R24.2.2 / Lede - 18.06
Bug on Platform
Linux-amd64(x86-64)
Describe the Bug
如题,每重启一次openWrt,openclash会自动给“SOCKS5/HTTP(S) 认证信息”栏多添加一对用户名密码,且实际生效的是最后一次添加的认证,以前添加的虽然在UI中显示出来,但实际上无效。 不重启openWrt,只重启openclash则功能正常。
ps: 由订阅地址下载的配置文件中默认没有配置authentication项,第一次运行openclash后自动添加了authentication,但我重启前没有手动删除过。
To Reproduce
不关openclash,直接重启openWrt,让openclash自启动。
OpenClash Log