yanue / V2rayU

V2rayU,基于v2ray核心的mac版客户端,用于科学上网,使用swift编写,支持trojan,vmess,shadowsocks,socks5等服务协议,支持订阅, 支持二维码,剪贴板导入,手动配置,二维码分享等
https://github.com/yanue/V2rayU
18.85k stars 2.88k forks source link

bigsur无法使用 #803

Closed TinChiWay closed 3 years ago

TinChiWay commented 3 years ago

提交 Issue 之前请先在issue上搜索是否有相似问题, 看看能不能解决问题 (有太多相同的issue,没精力处理)。 除非特殊情况,请完整填写以下所有问题,不按模板发的 issue 将直接被关闭。

1) 你正在使用的 V2RayU 和 Mac 版本 ? V2rayU:v2.3.1 v2ray-core:v4.31.0 Mac:11.1 2) 你遇到的问题是什么?(请描述具体现象,比如访问超时,TLS 证书错误等) 可以正常订阅节点,正常测试延迟,但是无法建立链接 3) 请附上你的配置(提交 Issue 前请隐藏服务器端IP地址)。

    // 在这里附上配置信息
{
  "log": {
    "error": "",
    "loglevel": "debug",
    "access": ""
  },
  "inbounds": [
    {
      "sniffing": {
        "enabled": true,
        "destOverride": [
          "tls",
          "http"
        ]
      },
      "listen": "127.0.0.1",
      "protocol": "socks",
      "settings": {
        "udp": false,
        "auth": "noauth"
      },
      "port": "1080"
    },
    {
      "sniffing": {
        "enabled": true,
        "destOverride": [
          "tls",
          "http"
        ]
      },
      "listen": "127.0.0.1",
      "protocol": "http",
      "settings": {
        "timeout": 360
      },
      "port": "1087"
    }
  ],
  "outbounds": [
    {
      "protocol": "shadowsocks",
      "streamSettings": {
        "tcpSettings": {
          "header": {
            "type": "none"
          }
        },
        "tlsSettings": {
          "allowInsecure": true
        },
        "security": "none",
        "network": "tcp"
      },
      "tag": "proxy",
      "settings": {
        "servers": [
          {
            "port": 1019,
            "method": "chacha20",
            "password": "***",
            "address": "***",
            "level": 0,
            "email": "",
            "ota": false
          }
        ]
      }
    },
    {
      "tag": "direct",
      "protocol": "freedom",
      "settings": {
        "domainStrategy": "UseIP",
        "redirect": "",
        "userLevel": 0
      }
    },
    {
      "tag": "block",
      "protocol": "blackhole",
      "settings": {
        "response": {
          "type": "none"
        }
      }
    }
  ],
  "dns": {},
  "routing": {
    "settings": {
      "domainStrategy": "AsIs",
      "rules": []
    }
  },
  "transport": {}
}

4) 请附上出错时软件输出的错误日志。

    // 在这里附上日志信息

2020/12/24 14:09:11 [Info] v2ray.com/core/common/platform/ctlcmd: <v2ctl message> 
v2ctl> Read config:  /Applications/V2rayU.app/Contents/Resources/config.json
2020/12/24 14:09:11 [Debug] v2ray.com/core/app/log: Logger started
2020/12/24 14:09:11 [Info] v2ray.com/core/app/dns: DNS: created localhost client
2020/12/24 14:09:11 [Debug] v2ray.com/core/app/proxyman/inbound: creating stream worker on 127.0.0.1:1080
2020/12/24 14:09:11 [Debug] v2ray.com/core/app/proxyman/inbound: creating stream worker on 127.0.0.1:1087
2020/12/24 14:09:11 [Info] v2ray.com/core/transport/internet/tcp: listening TCP on 127.0.0.1:1080
2020/12/24 14:09:11 [Info] v2ray.com/core/transport/internet/tcp: listening TCP on 127.0.0.1:1087
2020/12/24 14:09:11 [Warning] v2ray.com/core: V2Ray 4.31.0 started
2020/12/24 14:09:27 [Debug] v2ray.com/core/app/log: Logger closing
V2Ray 4.31.0 (V2Fly, a community-driven edition of V2Ray.) Custom (go1.15.2 darwin/amd64)
A unified platform for anti-censorship.
2020/12/24 14:09:27 [Info] v2ray.com/core/common/platform/ctlcmd: <v2ctl message> 
v2ctl> Read config:  /Applications/V2rayU.app/Contents/Resources/config.json
2020/12/24 14:09:27 [Debug] v2ray.com/core/app/log: Logger started
2020/12/24 14:09:27 [Info] v2ray.com/core/app/dns: DNS: created localhost client
2020/12/24 14:09:27 [Debug] v2ray.com/core/app/proxyman/inbound: creating stream worker on 127.0.0.1:1080
2020/12/24 14:09:27 [Debug] v2ray.com/core/app/proxyman/inbound: creating stream worker on 127.0.0.1:1087
2020/12/24 14:09:27 [Info] v2ray.com/core/transport/internet/tcp: listening TCP on 127.0.0.1:1080
2020/12/24 14:09:27 [Info] v2ray.com/core/transport/internet/tcp: listening TCP on 127.0.0.1:1087
2020/12/24 14:09:27 [Warning] v2ray.com/core: V2Ray 4.31.0 started
2020/12/24 14:09:27 [Info] [2324100510] v2ray.com/core/proxy/http: request to Method [CONNECT] Host [bolt.dropbox.com:443] with URL [//bolt.dropbox.com:443]
2020/12/24 14:09:27 [Info] [2324100510] v2ray.com/core/app/dispatcher: sniffed domain: bolt.dropbox.com
2020/12/24 14:09:27 [Info] [2324100510] v2ray.com/core/app/dispatcher: default route for tcp:bolt.dropbox.com:443
2020/12/24 14:09:27 [Info] [2324100510] v2ray.com/core/transport/internet/tcp: dialing TCP to tcp:host:port
2020/12/24 14:09:27 127.0.0.1:54842 accepted //bolt.dropbox.com:443 [proxy] 
2020/12/24 14:09:27 [Info] [2324100510] v2ray.com/core/proxy/shadowsocks: tunneling request to tcp:bolt.dropbox.com:443 via tcp:host:port
2020/12/24 14:09:27 [Info] [2324100510] v2ray.com/core/app/proxyman/outbound: failed to process outbound traffic > v2ray.com/core/proxy/shadowsocks: connection ends > v2ray.com/core/proxy/shadowsocks: failed to read IV > EOF
2020/12/24 14:09:27 [Info] [2324100510] v2ray.com/core/app/proxyman/inbound: connection ends > v2ray.com/core/proxy/http: connection ends > io: read/write on closed pipe
2020/12/24 14:09:37 [Info] [3968672906] v2ray.com/core/proxy/http: request to Method [CONNECT] Host [telemetry.dropbox.com:443] with URL [//telemetry.dropbox.com:443]
2020/12/24 14:09:37 [Info] [3968672906] v2ray.com/core/app/dispatcher: sniffed domain: telemetry.dropbox.com
2020/12/24 14:09:37 127.0.0.1:54848 accepted //telemetry.dropbox.com:443 [proxy] 
2020/12/24 14:09:37 [Info] [3968672906] v2ray.com/core/app/dispatcher: default route for tcp:telemetry.dropbox.com:443
2020/12/24 14:09:37 [Info] [3968672906] v2ray.com/core/transport/internet/tcp: dialing TCP to tcp:host:port
2020/12/24 14:09:37 [Info] [3968672906] v2ray.com/core/proxy/shadowsocks: tunneling request to tcp:telemetry.dropbox.com:443 via tcp:host:port
2020/12/24 14:09:37 [Info] [3968672906] v2ray.com/core/app/proxyman/outbound: failed to process outbound traffic > v2ray.com/core/proxy/shadowsocks: connection ends > v2ray.com/core/proxy/shadowsocks: failed to read IV > EOF
2020/12/24 14:09:37 [Info] [3968672906] v2ray.com/core/app/proxyman/inbound: connection ends > v2ray.com/core/proxy/http: connection ends > io: read/write on closed pipe
2020/12/24 14:09:38 [Info] [3426639108] v2ray.com/core/proxy/socks: TCP Connect request to tcp:www.google.com:443
2020/12/24 14:09:38 [Info] [3426639108] v2ray.com/core/app/dispatcher: sniffed domain: www.google.com
2020/12/24 14:09:38 [Info] [3426639108] v2ray.com/core/app/dispatcher: default route for tcp:www.google.com:443
2020/12/24 14:09:38 [Info] [3426639108] v2ray.com/core/transport/internet/tcp: dialing TCP to tcp:host:port
2020/12/24 14:09:38 tcp:127.0.0.1:54850 accepted tcp:www.google.com:443 [proxy] 
2020/12/24 14:09:38 [Info] [3426639108] v2ray.com/core/proxy/shadowsocks: tunneling request to tcp:www.google.com:443 via tcp:host:port
2020/12/24 14:09:38 [Info] [3426639108] v2ray.com/core/app/proxyman/outbound: failed to process outbound traffic > v2ray.com/core/proxy/shadowsocks: connection ends > v2ray.com/core/proxy/shadowsocks: failed to read IV > EOF
2020/12/24 14:09:38 [Info] [3426639108] v2ray.com/core/app/proxyman/inbound: connection ends > v2ray.com/core/proxy/socks: connection ends > v2ray.com/core/proxy/socks: failed to transport all TCP response > io: read/write on closed pipe
2020/12/24 14:09:38 [Info] [1593577201] v2ray.com/core/proxy/socks: TCP Connect request to tcp:www.google.com:443
2020/12/24 14:09:38 [Info] [1593577201] v2ray.com/core/app/dispatcher: sniffed domain: www.google.com
2020/12/24 14:09:38 [Info] [1593577201] v2ray.com/core/app/dispatcher: default route for tcp:www.google.com:443
2020/12/24 14:09:38 [Info] [1593577201] v2ray.com/core/transport/internet/tcp: dialing TCP to tcp:host:port
2020/12/24 14:09:38 tcp:127.0.0.1:54852 accepted tcp:www.google.com:443 [proxy] 
2020/12/24 14:09:38 [Info] [1593577201] v2ray.com/core/proxy/shadowsocks: tunneling request to tcp:www.google.com:443 via tcp:host:port
2020/12/24 14:09:39 [Info] [1593577201] v2ray.com/core/app/proxyman/outbound: failed to process outbound traffic > v2ray.com/core/proxy/shadowsocks: connection ends > v2ray.com/core/proxy/shadowsocks: failed to read IV > EOF
2020/12/24 14:09:39 [Info] [1593577201] v2ray.com/core/app/proxyman/inbound: connection ends > v2ray.com/core/proxy/socks: connection ends > v2ray.com/core/proxy/socks: failed to transport all TCP response > io: read/write on closed pipe
2020/12/24 14:09:39 [Info] [442016835] v2ray.com/core/proxy/socks: TCP Connect request to tcp:clients4.google.com:443
2020/12/24 14:09:39 tcp:127.0.0.1:54854 accepted tcp:clients4.google.com:443 [proxy] 
2020/12/24 14:09:39 [Info] [442016835] v2ray.com/core/app/dispatcher: sniffed domain: clients4.google.com
2020/12/24 14:09:39 [Info] [442016835] v2ray.com/core/app/dispatcher: default route for tcp:clients4.google.com:443
2020/12/24 14:09:39 [Info] [442016835] v2ray.com/core/transport/internet/tcp: dialing TCP to tcp:host:port
2020/12/24 14:09:39 [Info] [442016835] v2ray.com/core/proxy/shadowsocks: tunneling request to tcp:clients4.google.com:443 via tcp:host:port
2020/12/24 14:09:39 [Info] [442016835] v2ray.com/core/app/proxyman/outbound: failed to process outbound traffic > v2ray.com/core/proxy/shadowsocks: connection ends > v2ray.com/core/proxy/shadowsocks: failed to read IV > EOF
2020/12/24 14:09:39 [Info] [442016835] v2ray.com/core/app/proxyman/inbound: connection ends > v2ray.com/core/proxy/socks: connection ends > v2ray.com/core/proxy/socks: failed to transport all TCP response > io: read/write on closed pipe
2020/12/24 14:09:39 [Info] [3866750778] v2ray.com/core/proxy/socks: TCP Connect request to tcp:clients4.google.com:443
2020/12/24 14:09:39 [Info] [3866750778] v2ray.com/core/app/dispatcher: sniffed domain: clients4.google.com
2020/12/24 14:09:39 [Info] [3866750778] v2ray.com/core/app/dispatcher: default route for tcp:clients4.google.com:443
2020/12/24 14:09:39 tcp:127.0.0.1:54856 accepted tcp:clients4.google.com:443 [proxy] 
2020/12/24 14:09:39 [Info] [3866750778] v2ray.com/core/transport/internet/tcp: dialing TCP to tcp:host:port
2020/12/24 14:09:39 [Info] [3866750778] v2ray.com/core/proxy/shadowsocks: tunneling request to tcp:clients4.google.com:443 via tcp:host:port
2020/12/24 14:09:40 [Info] [599320467] v2ray.com/core/proxy/socks: TCP Connect request to tcp:www.google.com:443
2020/12/24 14:09:40 [Info] [599320467] v2ray.com/core/app/dispatcher: sniffed domain: www.google.com
2020/12/24 14:09:40 [Info] [599320467] v2ray.com/core/app/dispatcher: default route for tcp:www.google.com:443
2020/12/24 14:09:40 [Info] [599320467] v2ray.com/core/transport/internet/tcp: dialing TCP to tcp:host:port
2020/12/24 14:09:40 tcp:127.0.0.1:54858 accepted tcp:www.google.com:443 [proxy] 
2020/12/24 14:09:40 [Info] [599320467] v2ray.com/core/proxy/shadowsocks: tunneling request to tcp:www.google.com:443 via tcp:host:port
2020/12/24 14:09:40 [Info] [3866750778] v2ray.com/core/app/proxyman/outbound: failed to process outbound traffic > v2ray.com/core/proxy/shadowsocks: connection ends > v2ray.com/core/proxy/shadowsocks: failed to read IV > EOF
2020/12/24 14:09:40 [Info] [3866750778] v2ray.com/core/app/proxyman/inbound: connection ends > v2ray.com/core/proxy/socks: connection ends > v2ray.com/core/proxy/socks: failed to transport all TCP response > io: read/write on closed pipe
2020/12/24 14:09:40 [Info] [3162059796] v2ray.com/core/proxy/socks: TCP Connect request to tcp:oauthaccountmanager.googleapis.com:443
2020/12/24 14:09:40 [Info] [3162059796] v2ray.com/core/app/dispatcher: sniffed domain: oauthaccountmanager.googleapis.com
2020/12/24 14:09:40 [Info] [3162059796] v2ray.com/core/app/dispatcher: default route for tcp:oauthaccountmanager.googleapis.com:443
2020/12/24 14:09:40 [Info] [3162059796] v2ray.com/core/transport/internet/tcp: dialing TCP to tcp:host:port
2020/12/24 14:09:40 tcp:127.0.0.1:54860 accepted tcp:oauthaccountmanager.googleapis.com:443 [proxy] 
2020/12/24 14:09:40 [Info] [3162059796] v2ray.com/core/proxy/shadowsocks: tunneling request to tcp:oauthaccountmanager.googleapis.com:443 via tcp:host:port
2020/12/24 14:09:40 [Info] [3162059796] v2ray.com/core/app/proxyman/outbound: failed to process outbound traffic > v2ray.com/core/proxy/shadowsocks: connection ends > v2ray.com/core/proxy/shadowsocks: failed to read IV > EOF
2020/12/24 14:09:40 [Info] [3162059796] v2ray.com/core/app/proxyman/inbound: connection ends > v2ray.com/core/proxy/socks: connection ends > v2ray.com/core/proxy/socks: failed to transport all TCP response > io: read/write on closed pipe
2020/12/24 14:09:40 [Info] [2902674754] v2ray.com/core/proxy/socks: TCP Connect request to tcp:oauthaccountmanager.googleapis.com:443
2020/12/24 14:09:40 [Info] [2902674754] v2ray.com/core/app/dispatcher: sniffed domain: oauthaccountmanager.googleapis.com
2020/12/24 14:09:40 tcp:127.0.0.1:54862 accepted tcp:oauthaccountmanager.googleapis.com:443 [proxy] 
2020/12/24 14:09:40 [Info] [2902674754] v2ray.com/core/app/dispatcher: default route for tcp:oauthaccountmanager.googleapis.com:443
2020/12/24 14:09:40 [Info] [2902674754] v2ray.com/core/transport/internet/tcp: dialing TCP to tcp:host:port
2020/12/24 14:09:40 [Info] [2902674754] v2ray.com/core/proxy/shadowsocks: tunneling request to tcp:oauthaccountmanager.googleapis.com:443 via tcp:host:port
2020/12/24 14:09:40 [Info] [599320467] v2ray.com/core/app/proxyman/outbound: failed to process outbound traffic > v2ray.com/core/proxy/shadowsocks: connection ends > v2ray.com/core/proxy/shadowsocks: failed to read IV > EOF
2020/12/24 14:09:40 [Info] [599320467] v2ray.com/core/app/proxyman/inbound: connection ends > v2ray.com/core/proxy/socks: connection ends > v2ray.com/core/proxy/socks: failed to transport all TCP response > io: read/write on closed pipe
2020/12/24 14:09:40 [Info] [599726642] v2ray.com/core/proxy/socks: TCP Connect request to tcp:www.google.com:443
2020/12/24 14:09:40 [Info] [599726642] v2ray.com/core/app/dispatcher: sniffed domain: www.google.com
2020/12/24 14:09:40 [Info] [599726642] v2ray.com/core/app/dispatcher: default route for tcp:www.google.com:443
2020/12/24 14:09:40 [Info] [599726642] v2ray.com/core/transport/internet/tcp: dialing TCP to tcp:host:port
2020/12/24 14:09:40 tcp:127.0.0.1:54864 accepted tcp:www.google.com:443 [proxy] 
2020/12/24 14:09:40 [Info] [599726642] v2ray.com/core/proxy/shadowsocks: tunneling request to tcp:www.google.com:443 via tcp:host:port
2020/12/24 14:09:41 [Info] [2902674754] v2ray.com/core/app/proxyman/outbound: failed to process outbound traffic > v2ray.com/core/proxy/shadowsocks: connection ends > v2ray.com/core/proxy/shadowsocks: failed to read IV > EOF
2020/12/24 14:09:41 [Info] [2902674754] v2ray.com/core/app/proxyman/inbound: connection ends > v2ray.com/core/proxy/socks: connection ends > v2ray.com/core/proxy/socks: failed to transport all TCP response > io: read/write on closed pipe
2020/12/24 14:09:41 [Info] [599726642] v2ray.com/core/app/proxyman/outbound: failed to process outbound traffic > v2ray.com/core/proxy/shadowsocks: connection ends > v2ray.com/core/proxy/shadowsocks: failed to read IV > EOF
2020/12/24 14:09:41 [Info] [599726642] v2ray.com/core/app/proxyman/inbound: connection ends > v2ray.com/core/proxy/socks: connection ends > v2ray.com/core/proxy/socks: failed to transport all TCP response > io: read/write on closed pipe
2020/12/24 14:09:46 [Info] [4031401629] v2ray.com/core/proxy/socks: TCP Connect request to tcp:www.google.com:443
2020/12/24 14:09:46 [Info] [4031401629] v2ray.com/core/app/dispatcher: sniffed domain: www.google.com
2020/12/24 14:09:46 [Info] [4031401629] v2ray.com/core/app/dispatcher: default route for tcp:www.google.com:443
2020/12/24 14:09:46 [Info] [4031401629] v2ray.com/core/transport/internet/tcp: dialing TCP to tcp:host:port
2020/12/24 14:09:46 tcp:127.0.0.1:54866 accepted tcp:www.google.com:443 [proxy] 
2020/12/24 14:09:46 [Info] [4031401629] v2ray.com/core/proxy/shadowsocks: tunneling request to tcp:www.google.com:443 via tcp:host:port
2020/12/24 14:09:46 [Info] [4031401629] v2ray.com/core/app/proxyman/outbound: failed to process outbound traffic > v2ray.com/core/proxy/shadowsocks: connection ends > v2ray.com/core/proxy/shadowsocks: failed to read IV > EOF
2020/12/24 14:09:46 [Info] [4031401629] v2ray.com/core/app/proxyman/inbound: connection ends > v2ray.com/core/proxy/socks: connection ends > v2ray.com/core/proxy/socks: failed to transport all TCP response > io: read/write on closed pipe
2020/12/24 14:09:46 [Info] [3904800418] v2ray.com/core/proxy/socks: TCP Connect request to tcp:www.google.com:443
2020/12/24 14:09:46 [Info] [3904800418] v2ray.com/core/app/dispatcher: sniffed domain: www.google.com
2020/12/24 14:09:46 tcp:127.0.0.1:54868 accepted tcp:www.google.com:443 [proxy] 
2020/12/24 14:09:46 [Info] [3904800418] v2ray.com/core/app/dispatcher: default route for tcp:www.google.com:443
2020/12/24 14:09:46 [Info] [3904800418] v2ray.com/core/transport/internet/tcp: dialing TCP to tcp:host:port
2020/12/24 14:09:46 [Info] [3904800418] v2ray.com/core/proxy/shadowsocks: tunneling request to tcp:www.google.com:443 via tcp:host:port
2020/12/24 14:09:46 [Info] [3904800418] v2ray.com/core/app/proxyman/outbound: failed to process outbound traffic > v2ray.com/core/proxy/shadowsocks: connection ends > v2ray.com/core/proxy/shadowsocks: failed to read IV > EOF
2020/12/24 14:09:46 [Info] [3904800418] v2ray.com/core/app/proxyman/inbound: connection ends > v2ray.com/core/proxy/socks: connection ends > v2ray.com/core/proxy/socks: failed to transport all TCP response > io: read/write on closed pipe
2020/12/24 14:09:50 [Info] [1632857927] v2ray.com/core/proxy/http: request to Method [CONNECT] Host [client.dropbox.com:443] with URL [//client.dropbox.com:443]
2020/12/24 14:09:50 [Info] [1632857927] v2ray.com/core/app/dispatcher: sniffed domain: client.dropbox.com
2020/12/24 14:09:50 127.0.0.1:54870 accepted //client.dropbox.com:443 [proxy] 
2020/12/24 14:09:50 [Info] [1632857927] v2ray.com/core/app/dispatcher: default route for tcp:client.dropbox.com:443
2020/12/24 14:09:50 [Info] [1632857927] v2ray.com/core/transport/internet/tcp: dialing TCP to tcp:host:port
2020/12/24 14:09:50 [Info] [1632857927] v2ray.com/core/proxy/shadowsocks: tunneling request to tcp:client.dropbox.com:443 via tcp:host:port

---
V2Ray 4.31.0 (V2Fly, a community-driven edition of V2Ray.) Custom (go1.15.2 darwin/amd64)
A unified platform for anti-censorship.
2020/12/24 14:22:26 [Info] v2ray.com/core/common/platform/ctlcmd: <v2ctl message> 
v2ctl> Read config:  /Applications/V2rayU.app/Contents/Resources/config.json
2020/12/24 14:22:26 [Debug] v2ray.com/core/app/log: Logger started
2020/12/24 14:22:26 [Info] v2ray.com/core/app/dns: DNS: created localhost client
2020/12/24 14:22:26 [Debug] v2ray.com/core/app/proxyman/inbound: creating stream worker on 127.0.0.1:1089
2020/12/24 14:22:26 [Debug] v2ray.com/core/app/proxyman/inbound: creating stream worker on 127.0.0.1:1088
2020/12/24 14:22:26 [Info] v2ray.com/core/transport/internet/tcp: listening TCP on 127.0.0.1:1089
2020/12/24 14:22:26 [Info] v2ray.com/core/transport/internet/tcp: listening TCP on 127.0.0.1:1088
2020/12/24 14:22:26 [Warning] v2ray.com/core: V2Ray 4.31.0 started
2020/12/24 14:23:33 [Debug] v2ray.com/core/app/log: Logger closing
V2Ray 4.31.0 (V2Fly, a community-driven edition of V2Ray.) Custom (go1.15.2 darwin/amd64)
A unified platform for anti-censorship.
2020/12/24 14:23:38 [Info] v2ray.com/core/common/platform/ctlcmd: <v2ctl message> 
v2ctl> Read config:  /Applications/V2rayU.app/Contents/Resources/config.json
2020/12/24 14:23:38 [Debug] v2ray.com/core/app/log: Logger started
2020/12/24 14:23:38 [Info] v2ray.com/core/app/dns: DNS: created localhost client
2020/12/24 14:23:38 [Debug] v2ray.com/core/app/proxyman/inbound: creating stream worker on 127.0.0.1:1089
2020/12/24 14:23:38 [Debug] v2ray.com/core/app/proxyman/inbound: creating stream worker on 127.0.0.1:1088
2020/12/24 14:23:38 [Info] v2ray.com/core/transport/internet/tcp: listening TCP on 127.0.0.1:1089
2020/12/24 14:23:38 [Info] v2ray.com/core/transport/internet/tcp: listening TCP on 127.0.0.1:1088
2020/12/24 14:23:38 [Warning] v2ray.com/core: V2Ray 4.31.0 started
2020/12/24 14:23:56 [Info] [3275393235] v2ray.com/core/proxy/socks: TCP Connect request to tcp:www.google.com:443
2020/12/24 14:23:56 [Info] [3275393235] v2ray.com/core/app/dispatcher: sniffed domain: www.google.com
2020/12/24 14:23:56 [Info] [3275393235] v2ray.com/core/app/dispatcher: default route for tcp:www.google.com:443
2020/12/24 14:23:56 [Info] [3275393235] v2ray.com/core/transport/internet/tcp: dialing TCP to tcp:8.8.1.1:443
2020/12/24 14:23:56 tcp:127.0.0.1:55840 accepted tcp:www.google.com:443 [proxy] 
2020/12/24 14:24:06 [Debug] v2ray.com/core/app/log: Logger closing
V2Ray 4.31.0 (V2Fly, a community-driven edition of V2Ray.) Custom (go1.15.2 darwin/amd64)
A unified platform for anti-censorship.
2020/12/24 14:24:06 [Info] v2ray.com/core/common/platform/ctlcmd: <v2ctl message> 
v2ctl> Read config:  /Applications/V2rayU.app/Contents/Resources/config.json
2020/12/24 14:24:06 [Debug] v2ray.com/core/app/log: Logger started
2020/12/24 14:24:06 [Info] v2ray.com/core/app/dns: DNS: created localhost client
2020/12/24 14:24:06 [Debug] v2ray.com/core/app/proxyman/inbound: creating stream worker on 127.0.0.1:1089
2020/12/24 14:24:06 [Debug] v2ray.com/core/app/proxyman/inbound: creating stream worker on 127.0.0.1:1088
2020/12/24 14:24:06 [Info] v2ray.com/core/transport/internet/tcp: listening TCP on 127.0.0.1:1089
2020/12/24 14:24:06 [Info] v2ray.com/core/transport/internet/tcp: listening TCP on 127.0.0.1:1088
2020/12/24 14:24:06 [Warning] v2ray.com/core: V2Ray 4.31.0 started
2020/12/24 14:24:16 [Info] [3018003824] v2ray.com/core/proxy/socks: TCP Connect request to tcp:www.google.com:443
2020/12/24 14:24:16 [Info] [3018003824] v2ray.com/core/app/dispatcher: sniffed domain: www.google.com
2020/12/24 14:24:16 [Info] [3018003824] v2ray.com/core/app/dispatcher: default route for tcp:www.google.com:443
2020/12/24 14:24:16 [Info] [3018003824] v2ray.com/core/transport/internet/tcp: dialing TCP to tcp:8.8.1.1:443
2020/12/24 14:24:16 tcp:127.0.0.1:55859 accepted tcp:www.google.com:443 [proxy] 
2020/12/24 14:24:26 [Info] [3294381222] v2ray.com/core/proxy/socks: TCP Connect request to tcp:clients4.google.com:443
2020/12/24 14:24:26 [Info] [3294381222] v2ray.com/core/app/dispatcher: sniffed domain: clients4.google.com
2020/12/24 14:24:26 [Info] [3294381222] v2ray.com/core/app/dispatcher: default route for tcp:clients4.google.com:443
2020/12/24 14:24:26 [Info] [3294381222] v2ray.com/core/transport/internet/tcp: dialing TCP to tcp:8.8.1.1:443
2020/12/24 14:24:26 tcp:127.0.0.1:55864 accepted tcp:clients4.google.com:443 [proxy] 
2020/12/24 14:24:32 [Info] [3018003824] v2ray.com/core/transport/internet/tcp: dialing TCP to tcp:8.8.1.1:443

请预览一下你填的内容再提交。

laotangyuan commented 3 years ago

可临时彻底卸载解决 访达卸载V2rayU 然后终端输入 cd ~/Library/LaunchAgents/ /bin/launchctl remove yanue.v2rayu.v2ray-core /bin/launchctl remove yanue.v2rayu.http

rm -f ~/Library/LaunchAgents/yanue.v2rayu.v2ray-core.plist rm -f ~/Library/Preferences/net.yanue.V2rayU.plist rm -f ~/Library/Logs/V2rayU.log 重新下载安装

TinChiWay commented 3 years ago

问题依然存在 并且首次使用订阅导入之后 ping speed 一直显示测试中,退出后重新ping正常 image

TinChiWay commented 3 years ago

可临时彻底卸载解决 访达卸载V2rayU 然后终端输入 cd ~/Library/LaunchAgents/ /bin/launchctl remove yanue.v2rayu.v2ray-core /bin/launchctl remove yanue.v2rayu.http

rm -f ~/Library/LaunchAgents/yanue.v2rayu.v2ray-core.plist rm -f ~/Library/Preferences/net.yanue.V2rayU.plist rm -f ~/Library/Logs/V2rayU.log 重新下载安装

我重新安装了很多遍,也在中间穿插着尝试重启但是都没有奏效,期间也替换过v2ray-core,都是显示可以ping通但是无法通过浏览器访问

samuelsze commented 3 years ago

我也遇到了同样的问题。没有升级big sur之前是正常的。

lingruizhong commented 3 years ago

有用

可临时彻底卸载解决 访达卸载V2rayU 然后终端输入 cd ~/Library/LaunchAgents/ /bin/launchctl remove yanue.v2rayu.v2ray-core /bin/launchctl remove yanue.v2rayu.http

rm -f ~/Library/LaunchAgents/yanue.v2rayu.v2ray-core.plist rm -f ~/Library/Preferences/net.yanue.V2rayU.plist rm -f ~/Library/Logs/V2rayU.log 重新下载安装

有用

row2noob commented 3 years ago

同样的问题,升级完big sur之后重新安装过各个版本,重新设置客户端时间都没法解决