D:\Program Files (x86)\v2rayN\kcpudp>udp2raw.exe -c -r 172.96.216.239:9898 -l 127.0.0.1:1087 --raw-mode faketcp -k -a "atrandys" --dev "\Device\NPF{1db25f28-4cbc-4017-802b-1287e73e8652}"
using system32/wpcap.dll
[2020-10-18 19:14:31][INFO]argc=13 udp2raw -c -r 172.96.216.239:9898 -l 127.0.0.1:1087 --raw-mode faketcp -k -a atrandys --dev \Device\NPF{1db25f28-4cbc-4017-802b-1287e73e8652}
[2020-10-18 19:14:31][INFO]parsing address: 172.96.216.239:9898
[2020-10-18 19:14:31][INFO]its an ipv4 adress
[2020-10-18 19:14:31][INFO]ip_address is {172.96.216.239}, port is {9898}
[2020-10-18 19:14:31][INFO]parsing address: 127.0.0.1:1087
[2020-10-18 19:14:31][INFO]its an ipv4 adress
[2020-10-18 19:14:31][INFO]ipaddress is {127.0.0.1}, port is {1087}
[2020-10-18 19:14:31][INFO]dev=[\Device\NPF{1db25f28-4cbc-4017-802b-1287e73e8652}]
[2020-10-18 19:14:31][INFO]important variables: log_level=4:INFO raw_mode=faketcp cipher_mode=aes128cbc auth_mode=md5 key=-a local_addr=127.0.0.1:1087 remote_addr=172.96.216.239:9898 socket_buf_size=1048576
[2020-10-18 19:14:31][WARN]root check failed, it seems like you are using a non-root account. we can try to continue, but it may fail. If you want to run udp2raw as non-root, you have to add iptables rule manually, and grant udp2raw CAP_NET_RAW capability, check README.md in repo for more info.
[2020-10-18 19:14:31][INFO]remote_ip=[172.96.216.239], make sure this is a vaild IP address
[2020-10-18 19:14:31][INFO]constid:b3442ac0
[2020-10-18 19:14:31][INFO]--dev has been manually set, using device:[\Device\NPF{1db25f28-4cbc-4017-802b-1287e73e8652}]
pcap_activate failed No such device exists
D:\Program Files (x86)\v2rayN\kcpudp>udp2raw.exe -c -r 172.96.216.239:9898 -l 127.0.0.1:1087 --raw-mode faketcp -k -a "atrandys" --dev "\Device\NPF{1db25f28-4cbc-4017-802b-1287e73e8652}" using system32/wpcap.dll [2020-10-18 19:14:31][INFO]argc=13 udp2raw -c -r 172.96.216.239:9898 -l 127.0.0.1:1087 --raw-mode faketcp -k -a atrandys --dev \Device\NPF{1db25f28-4cbc-4017-802b-1287e73e8652} [2020-10-18 19:14:31][INFO]parsing address: 172.96.216.239:9898 [2020-10-18 19:14:31][INFO]its an ipv4 adress [2020-10-18 19:14:31][INFO]ip_address is {172.96.216.239}, port is {9898} [2020-10-18 19:14:31][INFO]parsing address: 127.0.0.1:1087 [2020-10-18 19:14:31][INFO]its an ipv4 adress [2020-10-18 19:14:31][INFO]ipaddress is {127.0.0.1}, port is {1087} [2020-10-18 19:14:31][INFO]dev=[\Device\NPF{1db25f28-4cbc-4017-802b-1287e73e8652}] [2020-10-18 19:14:31][INFO]important variables: log_level=4:INFO raw_mode=faketcp cipher_mode=aes128cbc auth_mode=md5 key=-a local_addr=127.0.0.1:1087 remote_addr=172.96.216.239:9898 socket_buf_size=1048576 [2020-10-18 19:14:31][WARN]root check failed, it seems like you are using a non-root account. we can try to continue, but it may fail. If you want to run udp2raw as non-root, you have to add iptables rule manually, and grant udp2raw CAP_NET_RAW capability, check README.md in repo for more info. [2020-10-18 19:14:31][INFO]remote_ip=[172.96.216.239], make sure this is a vaild IP address [2020-10-18 19:14:31][INFO]constid:b3442ac0 [2020-10-18 19:14:31][INFO]--dev has been manually set, using device:[\Device\NPF{1db25f28-4cbc-4017-802b-1287e73e8652}] pcap_activate failed No such device exists