vernesong/OpenClash

[Bug] IPv6 绕过大陆nftables 规则缺失

michaelchen644 opened this issue · 12 comments

Verify Steps

  • Tracker 我已经在 Issue Tracker 中找过我要提出的问题
  • Branch 我知道 OpenClash 的 Dev 分支切换开关位于插件设置-版本更新中,或者我会手动下载并安装 Dev 分支的 OpenClash
  • Latest 我已经使用最新 Dev 版本测试过,问题依旧存在
  • Relevant 我知道 OpenClash 与 内核(Core)、控制面板(Dashboard)、在线订阅转换(Subconverter)等项目之间无直接关系,仅相互调用
  • Definite 这确实是 OpenClash 出现的问题
  • Contributors 我有能力协助 OpenClash 开发并解决此问题
  • Meaningless 我提交的是无意义的催促更新或修复请求

OpenClash Version

v0.46.029

Bug on Environment

Official OpenWrt

OpenWrt Version

OpenWrt SnapShots

Bug on Platform

Linux-arm64

Describe the Bug

从v0.46.020之后版本ipv6绕过大陆选项失效,Dashboard里全是大陆连接。
对比两个版本防火墙规则发现新版本缺失chn_ip6_route规则
屏幕截图 2024-09-15 124314

临时解决办法:将国内ipv6网段手动加入【本地 IPv6 绕过地址】列表内,副作用为启动时间过长

To Reproduce

勾选绕过大陆ipv6启动即可出现

OpenClash Log

OpenClash 调试日志

生成时间: 2024-09-15 12:44:08
插件版本: v0.46.029-beta
隐私提示: 上传此日志前请注意检查、屏蔽公网IP、节点、密码等相关敏感信息



#===================== 系统信息 =====================#

主机型号: Xiaomi AX3600
固件版本: OpenWrt SNAPSHOT r0-ee169db
LuCI版本: 
内核版本: 6.6.50
处理器架构: aarch64_cortex-a53

#此项有值时,如不使用IPv6,建议到网络-接口-lan的设置中禁用IPV6的DHCP
IPV6-DHCP: server

DNS劫持: 停用
#DNS劫持为Dnsmasq时,此项结果应仅有配置文件的DNS监听地址
Dnsmasq转发设置: 127.0.0.1#7874 ::1#7874

#===================== 依赖检查 =====================#

dnsmasq-full: 已安装
coreutils: 已安装
coreutils-nohup: 已安装
bash: 已安装
curl: 已安装
ca-certificates: 已安装
ipset: 已安装
ip-full: 已安装
libcap: 已安装
libcap-bin: 已安装
ruby: 已安装
ruby-yaml: 已安装
ruby-psych: 已安装
ruby-pstore: 已安装
kmod-tun(TUN模式): 已安装
luci-compat(Luci >= 19.07): 已安装
kmod-inet-diag(PROCESS-NAME): 已安装
unzip: 已安装
kmod-nft-tproxy: 已安装

#===================== 内核检查 =====================#

运行状态: 运行中
运行内核:Meta
进程pid: 17118
运行权限: 17118: cap_dac_override,cap_net_bind_service,cap_net_admin,cap_net_raw,cap_sys_ptrace,cap_sys_admin,cap_sys_resource=eip
运行用户: 
已选择的架构: linux-arm64

#下方无法显示内核版本号时请确认您的内核版本是否正确或者有无权限

Meta内核版本: 
Meta内核文件: 存在
Meta内核运行权限: 正常

#===================== 插件设置 =====================#

当前配置文件: /etc/openclash/config/michael-ytoo.yaml
启动配置文件: /etc/openclash/michael-ytoo.yaml
运行模式: redir-host-mix
默认代理模式: rule
UDP流量转发(tproxy): 停用
自定义DNS: 启用
IPV6代理: 启用
IPV6-DNS解析: 启用
禁用Dnsmasq缓存: 启用
自定义规则: 停用
仅允许内网: 启用
仅代理命中规则流量: 停用
仅允许常用端口流量: 停用
绕过**大陆IP: 启用
路由本机代理: 启用

#启动异常时建议关闭此项后重试
混合节点: 停用
保留配置: 停用

#启动异常时建议关闭此项后重试
第三方规则: 停用

#===================== 配置文件 =====================#

port: 7890
redir-port: 7892
tproxy-port: 7895
socks-port: 7891
mixed-port: 7893
mode: rule
log-level: warning
allow-lan: true
external-controller: 0.0.0.0:9093
external-controller-tls: 0.0.0.0:9443
bind-address: "*"
lan-allowed-ips:
lan-disallowed-ips:
external-ui: "/usr/share/openclash/ui"
external-ui-url:
tls:
  certificate: "/etc/myfiles/certs/openwrt.crt"
  private-key: "/etc/myfiles/certs/openwrt.pem"
ipv6: true
geodata-mode: true
geodata-loader: standard
geo-auto-update: false
geo-update-interval:
geox-url:
  geoip: https://testingcf.jsdelivr.net/gh/MetaCubeX/meta-rules-dat@release/geoip.dat
  geosite: https://testingcf.jsdelivr.net/gh/MetaCubeX/meta-rules-dat@release/geosite.dat
  mmdb: https://testingcf.jsdelivr.net/gh/MetaCubeX/meta-rules-dat@release/country.mmdb
tcp-concurrent: true
find-process-mode:
keep-alive-interval:
sniffer:
  enable: true
  force-dns-mapping: true
  parse-pure-ip: true
  force-domain:
  - "+.netflix.com"
  - "+.nflxvideo.net"
  - "+.amazonaws.com"
  - "+.media.dssott.com"
  skip-domain:
  - "+.apple.com"
  - Mijia Cloud
  - dlg.io.mi.com
  - "+.oray.com"
  - "+.sunlogin.net"
  sniff:
    TLS:
    HTTP:
      ports:
      - 80
      - 8080-8880
      override-destination: true
tun:
  enable: true
  stack: mixed
  device: utun
  auto-route: false
  auto-detect-interface: false
  dns-hijack:
  - tcp://any:53
profile:
  store-selected: true
skip-auth-prefixes:
unified-delay: true
global-client-fingerprint:
dns:
  enable: true
  cache-algorithm: arc
  prefer-h3: true
  ipv6: true
  listen: 0.0.0.0:7874
  default-nameserver:
  - 223.5.5.5
  - 223.6.6.6
  - "[2400:3200::1]"
  - "[2400:3200:baba::1]"
  enhanced-mode: redir-host
  nameserver:
  - https://dns.alidns.com/dns-query#h3=true
  proxy-server-nameserver:
  - https://dns.alidns.com/dns-query#h3=true
  respect-rules: true
  fallback:
  - https://dns.cloudflare.com/dns-query#h3=true
  fallback-filter:
    geoip: true
    geoip-code: CN
    ipcidr:
    - 0.0.0.0/8
    - 10.0.0.0/8
    - 100.64.0.0/10
    - 127.0.0.0/8
    - 169.254.0.0/16
    - 172.16.0.0/12
    - 192.0.0.0/24
    - 192.0.2.0/24
    - 192.88.99.0/24
    - 192.168.0.0/16
    - 198.18.0.0/15
    - 198.51.100.0/24
    - 203.0.113.0/24
    - 224.0.0.0/4
    - 240.0.0.0/4
    - 255.255.255.255/32
    domain:
    - "+.google.com"
    - "+.facebook.com"
    - "+.youtube.com"
    - "+.githubusercontent.com"
    - "+.googlevideo.com"
    - "+.msftconnecttest.com"
    - "+.msftncsi.com"
  use-hosts: true
hosts:
  www.bing.com: 23.62.46.152
proxy-groups:

rule-providers:

rules:
- DST-PORT,7895,REJECT
- DST-PORT,7892,REJECT
- IP-CIDR,198.18.0.1/16,REJECT,no-resolve
- DOMAIN-KEYWORD,test-ipv6,DIRECT
- DOMAIN,repo.jellyfin.org,GitHub
- DOMAIN,global.synologydownload.com,GitHub
- GEOSITE,steam@cn,DIRECT
- GEOSITE,steam,Steam
- GEOSITE,openwrt,OpenWrt
- GEOSITE,github,GitHub
- GEOSITE,docker,GitHub
- GEOSITE,youtube,Youtube
- GEOSITE,google,Google
- GEOSITE,bing,Bing
- GEOSITE,yahoo,Yahoo
- GEOSITE,netflix,Netflix
- GEOSITE,primevideo,Primevideo
- GEOSITE,twitch,Twitch
- GEOSITE,spotify,Spotify
- GEOSITE,tiktok,TikTok
- GEOSITE,telegram,Telegram
- GEOSITE,twitter,Twitter
- GEOSITE,facebook,Facebook
- GEOSITE,instagram,Instagram
- GEOSITE,category-porn,Porn
- GEOSITE,speedtest,Speedtest
- DOMAIN-SUFFIX,openai.com,OpenAI
- GEOSITE,gfw,PROXY
- GEOSITE,cn,DIRECT
- GEOIP,telegram,Telegram,no-resolve
- GEOIP,cn,DIRECT

#===================== 自定义覆写设置 =====================#

#!/bin/sh
. /usr/share/openclash/ruby.sh
. /usr/share/openclash/log.sh
. /lib/functions.sh

# This script is called by /etc/init.d/openclash
# Add your custom overwrite scripts here, they will be take effict after the OpenClash own srcipts

LOG_OUT "Tip: Start Running Custom Overwrite Scripts..."
LOGTIME=$(echo $(date "+%Y-%m-%d %H:%M:%S"))
LOG_FILE="/tmp/openclash.log"
CONFIG_FILE="$1" #config path

#Simple Demo:
    #General Demo
    #1--config path
    #2--key name
    #3--value
    #ruby_edit "$CONFIG_FILE" "['redir-port']" "7892"
    #ruby_edit "$CONFIG_FILE" "['secret']" "123456"
    #ruby_edit "$CONFIG_FILE" "['dns']['enable']" "true"

    #Hash Demo
    #1--config path
    #2--key name
    #3--hash type value
    #ruby_edit "$CONFIG_FILE" "['experimental']" "{'sniff-tls-sni'=>true}"
    #ruby_edit "$CONFIG_FILE" "['sniffer']" "{'sniffing'=>['tls','http']}"

    #Array Demo:
    #1--config path
    #2--key name
    #3--position(start from 0, end with -1)
    #4--value
    #ruby_arr_insert "$CONFIG_FILE" "['dns']['nameserver']" "0" "114.114.114.114"

    #Array Add From Yaml File Demo:
    #1--config path
    #2--key name
    #3--position(start from 0, end with -1)
    #4--value file path
    #5--value key name in #4 file
    #ruby_arr_add_file "$CONFIG_FILE" "['dns']['fallback-filter']['ipcidr']" "0" "/etc/openclash/custom/openclash_custom_fallback_filter.yaml" "['fallback-filter']['ipcidr']"

#Ruby Script Demo:
    #ruby -ryaml -rYAML -I "/usr/share/openclash" -E UTF-8 -e "
    #   begin
    #      Value = YAML.load_file('$CONFIG_FILE');
    #   rescue Exception => e
    #      puts '${LOGTIME} Error: Load File Failed,【' + e.message + '】';
    #   end;

        #General
    #   begin
    #   Thread.new{
    #      Value['redir-port']=7892;
    #      Value['tproxy-port']=7895;
    #      Value['port']=7890;
    #      Value['socks-port']=7891;
    #      Value['mixed-port']=7893;
    #   }.join;

    #   rescue Exception => e
    #      puts '${LOGTIME} Error: Set General Failed,【' + e.message + '】';
    #   ensure
    #      File.open('$CONFIG_FILE','w') {|f| YAML.dump(Value, f)};
    #   end" 2>/dev/null >> $LOG_FILE

exit 0
#===================== 自定义防火墙设置 =====================#

#!/bin/sh
. /usr/share/openclash/log.sh
. /lib/functions.sh

# This script is called by /etc/init.d/openclash
# Add your custom firewall rules here, they will be added after the end of the OpenClash iptables rules

LOG_OUT "Tip: Start Add Custom Firewall Rules..."

exit 0
#===================== IPTABLES 防火墙设置 =====================#

#IPv4 NAT chain

# Generated by iptables-save v1.8.8 (nf_tables) on Sun Sep 15 12:44:12 2024
*nat
:PREROUTING ACCEPT [0:0]
:INPUT ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]
COMMIT
# Completed on Sun Sep 15 12:44:12 2024

#IPv4 Mangle chain

# Generated by iptables-save v1.8.8 (nf_tables) on Sun Sep 15 12:44:12 2024
*mangle
:PREROUTING ACCEPT [3404830:1167630194]
:INPUT ACCEPT [1076407:753597851]
:FORWARD ACCEPT [2061266:311287845]
:OUTPUT ACCEPT [777031:224987152]
:POSTROUTING ACCEPT [2852559:536676372]
:RRDIPT_FORWARD - [0:0]
:RRDIPT_INPUT - [0:0]
:RRDIPT_OUTPUT - [0:0]
-A INPUT -j RRDIPT_INPUT
-A FORWARD -j RRDIPT_FORWARD
-A OUTPUT -j RRDIPT_OUTPUT
-A RRDIPT_FORWARD -s 192.168.31.119/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.31.119/32 -j RETURN
-A RRDIPT_FORWARD -s 10.18.18.103/32 -j RETURN
-A RRDIPT_FORWARD -d 10.18.18.103/32 -j RETURN
-A RRDIPT_FORWARD -s 10.18.18.251/32 -j RETURN
-A RRDIPT_FORWARD -d 10.18.18.251/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.88.101/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.88.101/32 -j RETURN
-A RRDIPT_FORWARD -s 10.18.18.252/32 -j RETURN
-A RRDIPT_FORWARD -d 10.18.18.252/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.31.164/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.31.164/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.31.143/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.31.143/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.31.228/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.31.228/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.31.193/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.31.193/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.10.122/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.10.122/32 -j RETURN
-A RRDIPT_FORWARD -s 192.168.31.221/32 -j RETURN
-A RRDIPT_FORWARD -d 192.168.31.221/32 -j RETURN
-A RRDIPT_INPUT -i pppoe-wan -j RETURN
-A RRDIPT_OUTPUT -o pppoe-wan -j RETURN
COMMIT
# Completed on Sun Sep 15 12:44:12 2024

#IPv4 Filter chain

# Generated by iptables-save v1.8.8 (nf_tables) on Sun Sep 15 12:44:12 2024
*filter
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
COMMIT
# Completed on Sun Sep 15 12:44:12 2024

#IPv6 NAT chain

# Generated by ip6tables-save v1.8.8 (nf_tables) on Sun Sep 15 12:44:12 2024
*nat
:PREROUTING ACCEPT [0:0]
:INPUT ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]
COMMIT
# Completed on Sun Sep 15 12:44:12 2024

#IPv6 Mangle chain

# Generated by ip6tables-save v1.8.8 (nf_tables) on Sun Sep 15 12:44:12 2024
*mangle
:PREROUTING ACCEPT [4480726:676552044]
:INPUT ACCEPT [255049:91685288]
:FORWARD ACCEPT [4151041:568174800]
:OUTPUT ACCEPT [269790:537582888]
:POSTROUTING ACCEPT [4420374:1105721979]
:RRDIPT_FORWARD - [0:0]
:RRDIPT_INPUT - [0:0]
:RRDIPT_OUTPUT - [0:0]
-A INPUT -j RRDIPT_INPUT
-A FORWARD -j RRDIPT_FORWARD
-A OUTPUT -j RRDIPT_OUTPUT
-A RRDIPT_FORWARD -s fe80::8e53:c3ff:fed9:d8f4/128 -j RETURN
-A RRDIPT_FORWARD -d fe80::8e53:c3ff:fed9:d8f4/128 -j RETURN
-A RRDIPT_FORWARD -s 240e:34c:6010:8be4:2ec4:4fff:fea0:63de/128 -j RETURN
-A RRDIPT_FORWARD -d 240e:34c:6010:8be4:2ec4:4fff:fea0:63de/128 -j RETURN
-A RRDIPT_FORWARD -s fe80::41f:a4fe:2f73:7273/128 -j RETURN
-A RRDIPT_FORWARD -d fe80::41f:a4fe:2f73:7273/128 -j RETURN
-A RRDIPT_FORWARD -s 240e:34c:6010:4834:2ec4:4fff:fea0:63de/128 -j RETURN
-A RRDIPT_FORWARD -d 240e:34c:6010:4834:2ec4:4fff:fea0:63de/128 -j RETURN
-A RRDIPT_FORWARD -s fe80::d212:55ff:fef1:66de/128 -j RETURN
-A RRDIPT_FORWARD -d fe80::d212:55ff:fef1:66de/128 -j RETURN
-A RRDIPT_FORWARD -s fe80::b488:40ff:fe11:f296/128 -j RETURN
-A RRDIPT_FORWARD -d fe80::b488:40ff:fe11:f296/128 -j RETURN
-A RRDIPT_FORWARD -s fe80::2ec4:4fff:fea0:63de/128 -j RETURN
-A RRDIPT_FORWARD -d fe80::2ec4:4fff:fea0:63de/128 -j RETURN
-A RRDIPT_FORWARD -s fe80::165a:fcff:fee3:485c/128 -j RETURN
-A RRDIPT_FORWARD -d fe80::165a:fcff:fee3:485c/128 -j RETURN
-A RRDIPT_FORWARD -s fe80::d4e4:74c8:d722:9cb4/128 -j RETURN
-A RRDIPT_FORWARD -d fe80::d4e4:74c8:d722:9cb4/128 -j RETURN
-A RRDIPT_FORWARD -s fe80::c15b:535a:65c4:2ad5/128 -j RETURN
-A RRDIPT_FORWARD -d fe80::c15b:535a:65c4:2ad5/128 -j RETURN
-A RRDIPT_FORWARD -s 240e:34c:6010:4830:c861:f87b:7643:52d1/128 -j RETURN
-A RRDIPT_FORWARD -d 240e:34c:6010:4830:c861:f87b:7643:52d1/128 -j RETURN
-A RRDIPT_FORWARD -s fe80::6291:f3ff:fe80:e83c/128 -j RETURN
-A RRDIPT_FORWARD -d fe80::6291:f3ff:fe80:e83c/128 -j RETURN
-A RRDIPT_FORWARD -s 240e:34c:6010:4830:e86e:5e9a:6259:26b2/128 -j RETURN
-A RRDIPT_FORWARD -d 240e:34c:6010:4830:e86e:5e9a:6259:26b2/128 -j RETURN
-A RRDIPT_FORWARD -s 240e:34c:6010:4830:89ec:c320:4bf0:8a5/128 -j RETURN
-A RRDIPT_FORWARD -d 240e:34c:6010:4830:89ec:c320:4bf0:8a5/128 -j RETURN
-A RRDIPT_FORWARD -s 240e:34c:6010:4830:8850:2c59:69ba:7783/128 -j RETURN
-A RRDIPT_FORWARD -d 240e:34c:6010:4830:8850:2c59:69ba:7783/128 -j RETURN
-A RRDIPT_FORWARD -s 240e:34c:6010:4830:39d1:525d:3929:8770/128 -j RETURN
-A RRDIPT_FORWARD -d 240e:34c:6010:4830:39d1:525d:3929:8770/128 -j RETURN
-A RRDIPT_FORWARD -s 240e:34c:6010:4833:be9d:4eff:feee:f23e/128 -j RETURN
-A RRDIPT_FORWARD -d 240e:34c:6010:4833:be9d:4eff:feee:f23e/128 -j RETURN
-A RRDIPT_FORWARD -s fe80::be9d:4eff:feee:f23e/128 -j RETURN
-A RRDIPT_FORWARD -d fe80::be9d:4eff:feee:f23e/128 -j RETURN
-A RRDIPT_FORWARD -s 240e:34c:6010:4830:10fc:2ae8:4b06:f3e6/128 -j RETURN
-A RRDIPT_FORWARD -d 240e:34c:6010:4830:10fc:2ae8:4b06:f3e6/128 -j RETURN
-A RRDIPT_INPUT -i pppoe-wan -j RETURN
-A RRDIPT_OUTPUT -o pppoe-wan -j RETURN
COMMIT
# Completed on Sun Sep 15 12:44:12 2024

#IPv6 Filter chain

# Generated by ip6tables-save v1.8.8 (nf_tables) on Sun Sep 15 12:44:12 2024
*filter
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
COMMIT
# Completed on Sun Sep 15 12:44:12 2024

#===================== NFTABLES 防火墙设置 =====================#

table inet fw4 {
	chain input {
		type filter hook input priority filter; policy drop;
		meta l4proto { tcp, udp } iifname "utun" counter packets 0 bytes 0 accept comment "OpenClash TUN Input"
		iifname "pppoe-wan" ip saddr != @localnetwork counter packets 8487 bytes 3283346 jump openclash_wan_input
		iif "lo" accept comment "!fw4: Accept traffic from loopback"
		ct state vmap { established : accept, related : accept } comment "!fw4: Handle inbound flows"
		tcp flags syn / fin,syn,rst,ack jump syn_flood comment "!fw4: Rate limit TCP syn packets"
		iifname "lan1" jump input_lan comment "!fw4: Handle lan IPv4/IPv6 input traffic"
		iifname "pppoe-wan" jump input_wan comment "!fw4: Handle wan IPv4/IPv6 input traffic"
		iifname "wg0" jump input_vpn comment "!fw4: Handle vpn IPv4/IPv6 input traffic"
		iifname "lan1.2" jump input_tpdev comment "!fw4: Handle tpdev IPv4/IPv6 input traffic"
		iifname "lan1.3" jump input_modem comment "!fw4: Handle modem IPv4/IPv6 input traffic"
		iifname "lan1.3" jump input_guest comment "!fw4: Handle guest IPv4/IPv6 input traffic"
		iifname "lan2" jump input_itv comment "!fw4: Handle itv IPv4/IPv6 input traffic"
		iifname "lan3" jump input_wxy comment "!fw4: Handle wxy IPv4/IPv6 input traffic"
		jump handle_reject
	}
}
table inet fw4 {
	chain forward {
		type filter hook forward priority filter; policy drop;
		meta l4proto { tcp, udp } iifname "utun" counter packets 1 bytes 76 accept comment "OpenClash TUN Forward"
		meta l4proto { tcp, udp } oifname "utun" counter packets 7 bytes 7744 accept comment "OpenClash TUN Forward"
		ct state vmap { established : accept, related : accept } comment "!fw4: Handle forwarded flows"
		iifname "lan1" jump forward_lan comment "!fw4: Handle lan IPv4/IPv6 forward traffic"
		iifname "pppoe-wan" jump forward_wan comment "!fw4: Handle wan IPv4/IPv6 forward traffic"
		iifname "wg0" jump forward_vpn comment "!fw4: Handle vpn IPv4/IPv6 forward traffic"
		iifname "lan1.2" jump forward_tpdev comment "!fw4: Handle tpdev IPv4/IPv6 forward traffic"
		iifname "lan1.3" jump forward_modem comment "!fw4: Handle modem IPv4/IPv6 forward traffic"
		iifname "lan1.3" jump forward_guest comment "!fw4: Handle guest IPv4/IPv6 forward traffic"
		iifname "lan2" jump forward_itv comment "!fw4: Handle itv IPv4/IPv6 forward traffic"
		iifname "lan3" jump forward_wxy comment "!fw4: Handle wxy IPv4/IPv6 forward traffic"
		jump upnp_forward comment "Hook into miniupnpd forwarding chain"
		jump handle_reject
	}
}
table inet fw4 {
	chain dstnat {
		type nat hook prerouting priority dstnat; policy accept;
		iifname "pppoe-wan" jump dstnat_wan comment "!fw4: Handle wan IPv4/IPv6 dstnat traffic"
		iifname "lan1.3" jump dstnat_modem comment "!fw4: Handle modem IPv4/IPv6 dstnat traffic"
		jump upnp_prerouting comment "Hook into miniupnpd prerouting chain"
		ip protocol tcp counter packets 765 bytes 42304 jump openclash
	}
}
table inet fw4 {
	chain srcnat {
		type nat hook postrouting priority srcnat; policy accept;
		meta nfproto ipv4 oifname "utun" counter packets 2 bytes 1354 return comment "OpenClash TUN Postrouting"
		oifname "pppoe-wan" jump srcnat_wan comment "!fw4: Handle wan IPv4/IPv6 srcnat traffic"
		oifname "lan1.3" jump srcnat_modem comment "!fw4: Handle modem IPv4/IPv6 srcnat traffic"
		jump upnp_postrouting comment "Hook into miniupnpd postrouting chain"
	}
}
table inet fw4 {
	chain nat_output {
		type nat hook output priority filter - 1; policy accept;
		ip protocol tcp counter packets 718 bytes 43080 jump openclash_output
	}
}
table inet fw4 {
	chain mangle_prerouting {
		type filter hook prerouting priority mangle; policy accept;
		ip protocol udp counter packets 26156 bytes 6394587 jump openclash_mangle
	}
}
table inet fw4 {
	chain mangle_output {
		type route hook output priority mangle; policy accept;
		meta nfproto ipv4 meta l4proto { tcp, udp } counter packets 8849 bytes 1561669 jump openclash_mangle_output
	}
}
table inet fw4 {
	chain openclash {
		ip daddr @localnetwork counter packets 363 bytes 19396 return
		ip saddr @lan_ac_black_ips counter packets 214 bytes 12828 return
		ether saddr @lan_ac_black_macs counter packets 32 bytes 1536 return
		ip daddr @china_ip_route ip daddr != @china_ip_route_pass counter packets 11 bytes 1004 return
		ip protocol tcp counter packets 145 bytes 7540 redirect to :7892
	}
}
table inet fw4 {
	chain openclash_mangle {
		meta l4proto { tcp, udp } iifname "utun" counter packets 1 bytes 76 return
		ip daddr @localnetwork counter packets 17787 bytes 5454361 return
		ip saddr @lan_ac_black_ips counter packets 8359 bytes 931836 return
		ether saddr @lan_ac_black_macs counter packets 0 bytes 0 return
		ip daddr @china_ip_route ip daddr != @china_ip_route_pass counter packets 2 bytes 570 return
		ip protocol udp counter packets 7 bytes 7744 jump openclash_upnp
		meta l4proto { tcp, udp } th dport 0-65535 meta mark set 0x00000162 counter packets 7 bytes 7744
	}
}
table inet fw4 {
	chain openclash_mangle_output {
		ip daddr @localnetwork counter packets 2771 bytes 831992 return
	}
}
table inet fw4 {
	chain openclash_output {
		ip daddr @localnetwork counter packets 127 bytes 7620 return
		meta skuid != 65534 ip daddr @china_ip_route ip daddr != @china_ip_route_pass counter packets 0 bytes 0 return
		ip protocol tcp meta skuid != 65534 counter packets 4 bytes 240 redirect to :7892
	}
}
table inet fw4 {
	chain openclash_wan_input {
		udp dport { 7874, 7890, 7891, 7892, 7893, 7895, 9093 } counter packets 0 bytes 0 reject
		tcp dport { 7874, 7890, 7891, 7892, 7893, 7895, 9093 } counter packets 0 bytes 0 reject
	}
}
table inet fw4 {
	chain openclash_dns_hijack {
	}
}

#===================== IPSET状态 =====================#


#===================== 路由表状态 =====================#

#IPv4

#route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
0.0.0.0         100.64.72.1     0.0.0.0         UG    0      0        0 pppoe-wan
10.18.18.0      0.0.0.0         255.255.255.0   U     0      0        0 lan1.2
100.64.72.1     0.0.0.0         255.255.255.255 UH    0      0        0 pppoe-wan
172.16.31.0     0.0.0.0         255.255.255.0   U     0      0        0 wg0
192.168.1.0     0.0.0.0         255.255.255.0   U     0      0        0 lan1.3
192.168.10.0    0.0.0.0         255.255.255.0   U     0      0        0 lan2
192.168.31.0    0.0.0.0         255.255.255.0   U     0      0        0 lan1
192.168.88.0    0.0.0.0         255.255.255.0   U     0      0        0 lan3
192.168.254.0   0.0.0.0         255.255.255.0   U     0      0        0 lan1.3
198.18.0.0      0.0.0.0         255.255.255.252 U     0      0        0 utun

#ip route list
default via 100.64.72.1 dev pppoe-wan proto static 
10.18.18.0/24 dev lan1.2 proto kernel scope link src 10.18.18.1 
100.64.72.1 dev pppoe-wan proto kernel scope link src *WAN IP*.128 
172.16.31.0/24 dev wg0 proto static scope link 
192.168.1.0/24 dev lan1.3 proto kernel scope link src 192.168.1.100 
192.168.10.0/24 dev lan2 proto kernel scope link src 192.168.10.1 
192.168.31.0/24 dev lan1 proto kernel scope link src 192.168.31.1 
192.168.88.0/24 dev lan3 proto kernel scope link src 192.168.88.1 
192.168.254.0/24 dev lan1.3 proto kernel scope link src 192.168.254.1 
198.18.0.0/30 dev utun proto kernel scope link src 198.18.0.1 

#ip rule show
0:	from all lookup local
32765:	from all fwmark 0x162 lookup 354
32766:	from all lookup main
32767:	from all lookup default

#IPv6

#route -A inet6
Kernel IPv6 routing table
Destination                                 Next Hop                                Flags Metric Ref    Use Iface
::/0                                        ::                                      !n    -1     2        0 lo      
::/0                                        ::                                      U     1024   1        0 utun    
::/0                                        fe80::a66d:a4ff:fefc:d76                UG    512    5        0 pppoe-wan
::/0                                        fe80::a66d:a4ff:fefc:d76                UG    512    6        0 pppoe-wan
240e:34c:6001:21bf::/64                     ::                                      !n    2147483647 2        0 lo      
240e:34c:6010:4830::/64                     ::                                      U     1024   8        0 lan1    
240e:34c:6010:4831::/64                     ::                                      U     1024   1        0 lan1.2  
240e:34c:6010:4832::/64                     ::                                      U     1024   2        0 lan1.3  
240e:34c:6010:4833::/64                     ::                                      U     1024   1        0 lan2    
240e:34c:6010:4834::/64                     ::                                      U     1024   3        0 lan3    
240e:34c:6010:4830::/60                     ::                                      !n    2147483647 2        0 lo      
fd00:172:16:31f::/64                        ::                                      U     256    2        0 wg0     
fd00:172:16:31f::/64                        ::                                      U     1024   1        0 wg0     
fdc2:d36:f1a7::/48                          ::                                      !n    2147483647 3        0 lo      
fdfe:dcba:9876::/126                        ::                                      U     256    1        0 utun    
fe80::a66d:a4ff:fefc:d76/128                ::                                      U     256    2        0 pppoe-wan
fe80::e984:2f5b:677e:8e13/128               ::                                      U     256    2        0 pppoe-wan
fe80::/64                                   ::                                      U     256    5        0 lan1    
fe80::/64                                   ::                                      U     256    1        0 wan     
fe80::/64                                   ::                                      U     256    1        0 lan1.2  
fe80::/64                                   ::                                      U     256    1        0 lan1.3  
fe80::/64                                   ::                                      U     256    1        0 lan3    
fe80::/64                                   ::                                      U     256    5        0 lan2    
fe80::/64                                   ::                                      U     256    1        0 ifb@wan 
fe80::/64                                   ::                                      U     256    1        0 utun    
::/0                                        ::                                      !n    -1     2        0 lo      
::1/128                                     ::                                      Un    0      7        0 lo      
240e:34c:6001:21bf::/128                    ::                                      Un    0      3        0 pppoe-wan
*WAN IP*:8e13/128  ::                                      Un    0      4        0 pppoe-wan
240e:34c:6010:4830::/128                    ::                                      Un    0      3        0 lan1    
240e:34c:6010:4830::1/128                   ::                                      Un    0      10       0 lan1    
240e:34c:6010:4831::/128                    ::                                      Un    0      3        0 lan1.2  
240e:34c:6010:4831::1/128                   ::                                      Un    0      3        0 lan1.2  
240e:34c:6010:4832::/128                    ::                                      Un    0      3        0 lan1.3  
240e:34c:6010:4832::1/128                   ::                                      Un    0      4        0 lan1.3  
240e:34c:6010:4833::/128                    ::                                      Un    0      3        0 lan2    
240e:34c:6010:4833::1/128                   ::                                      Un    0      3        0 lan2    
240e:34c:6010:4834::/128                    ::                                      Un    0      3        0 lan3    
240e:34c:6010:4834::1/128                   ::                                      Un    0      3        0 lan3    
fd00:172:16:31f::/128                       ::                                      Un    0      3        0 wg0     
fd00:172:16:31f::1/128                      ::                                      Un    0      5        0 wg0     
fdfe:dcba:9876::/128                        ::                                      Un    0      3        0 utun    
fdfe:dcba:9876::1/128                       ::                                      Un    0      3        0 utun    
fe80::/128                                  ::                                      Un    0      6        0 wan     
fe80::/128                                  ::                                      Un    0      3        0 lan1.2  
fe80::/128                                  ::                                      Un    0      3        0 lan1    
fe80::/128                                  ::                                      Un    0      3        0 lan3    
fe80::/128                                  ::                                      Un    0      3        0 lan1.3  
fe80::/128                                  ::                                      Un    0      3        0 lan2    
fe80::/128                                  ::                                      Un    0      3        0 ifb@wan 
fe80::/128                                  ::                                      Un    0      3        0 utun    
fe80::4c8:c2ff:fe9c:50b1/128                ::                                      Un    0      2        0 ifb@wan 
fe80::7340:6b19:d2eb:1fc1/128               ::                                      Un    0      2        0 utun    
fe80::8e53:c3ff:feb3:896c/128               ::                                      Un    0      4        0 wan     
fe80::8e53:c3ff:fed9:d8f4/128               ::                                      Un    0      5        0 lan1.2  
fe80::8e53:c3ff:fed9:d8f4/128               ::                                      Un    0      5        0 lan1    
fe80::8e53:c3ff:fed9:d8f4/128               ::                                      Un    0      3        0 lan3    
fe80::8e53:c3ff:fed9:d8f4/128               ::                                      Un    0      2        0 lan1.3  
fe80::8e53:c3ff:fed9:d8f4/128               ::                                      Un    0      3        0 lan2    
fe80::e984:2f5b:677e:8e13/128               ::                                      Un    0      3        0 pppoe-wan
ff00::/8                                    ::                                      U     256    2        0 wg0     
ff00::/8                                    ::                                      U     256    5        0 lan1    
ff00::/8                                    ::                                      U     256    2        0 wan     
ff00::/8                                    ::                                      U     256    5        0 lan1.2  
ff00::/8                                    ::                                      U     256    5        0 lan1.3  
ff00::/8                                    ::                                      U     256    5        0 lan3    
ff00::/8                                    ::                                      U     256    4        0 pppoe-wan
ff00::/8                                    ::                                      U     256    5        0 lan2    
ff00::/8                                    ::                                      U     256    1        0 ifb@wan 
ff00::/8                                    ::                                      U     256    3        0 utun    
::/0                                        ::                                      !n    -1     2        0 lo      

#ip -6 route list
default from 240e:34c:6001:21bf::/64 via fe80::a66d:a4ff:fefc:d76 dev pppoe-wan proto static metric 512 pref medium
default from 240e:34c:6010:4830::/60 via fe80::a66d:a4ff:fefc:d76 dev pppoe-wan proto static metric 512 pref medium
unreachable 240e:34c:6001:21bf::/64 dev lo proto static metric 2147483647 pref medium
240e:34c:6010:4830::/64 dev lan1 proto static metric 1024 pref medium
240e:34c:6010:4831::/64 dev lan1.2 proto static metric 1024 pref medium
240e:34c:6010:4832::/64 dev lan1.3 proto static metric 1024 pref medium
240e:34c:6010:4833::/64 dev lan2 proto static metric 1024 pref medium
240e:34c:6010:4834::/64 dev lan3 proto static metric 1024 pref medium
unreachable 240e:34c:6010:4830::/60 dev lo proto static metric 2147483647 pref medium
fd00:172:16:31f::/64 dev wg0 proto kernel metric 256 pref medium
fd00:172:16:31f::/64 dev wg0 proto static metric 1024 pref medium
unreachable fdc2:d36:f1a7::/48 dev lo proto static metric 2147483647 pref medium
fdfe:dcba:9876::/126 dev utun proto kernel metric 256 pref medium
fe80::a66d:a4ff:fefc:d76 dev pppoe-wan proto kernel metric 256 pref medium
fe80::e984:2f5b:677e:8e13 dev pppoe-wan proto kernel metric 256 pref medium
fe80::/64 dev lan1 proto kernel metric 256 pref medium
fe80::/64 dev wan proto kernel metric 256 pref medium
fe80::/64 dev lan1.2 proto kernel metric 256 pref medium
fe80::/64 dev lan1.3 proto kernel metric 256 pref medium
fe80::/64 dev lan3 proto kernel metric 256 pref medium
fe80::/64 dev lan2 proto kernel metric 256 pref medium
fe80::/64 dev ifb@wan proto kernel metric 256 pref medium
fe80::/64 dev utun proto kernel metric 256 pref medium

#ip -6 rule show
0:	from all lookup local
32762:	from all oif utun lookup 2022
32763:	from all oif utun lookup 2022
32764:	from all oif utun lookup 2022
32765:	from all oif utun lookup 2022
32766:	from all lookup main
4200000000:	from 240e:34c:6010:4830::1/64 iif lan1 unreachable
4200000000:	from 240e:34c:6010:4831::1/64 iif lan1.2 unreachable
4200000000:	from 240e:34c:6010:4832::1/64 iif lan1.3 unreachable
4200000000:	from 240e:34c:6010:4833::1/64 iif lan2 unreachable
4200000000:	from 240e:34c:6010:4834::1/64 iif lan3 unreachable

#===================== Tun设备状态 =====================#

utun: tun

#===================== 端口占用状态 =====================#

tcp        0      0 198.18.0.1:44887        0.0.0.0:*               LISTEN      17118/clash
tcp        0      0 :::9093                 :::*                    LISTEN      17118/clash
tcp        0      0 fdfe:dcba:9876::1:44953 :::*                    LISTEN      17118/clash
tcp        0      0 :::9443                 :::*                    LISTEN      17118/clash
tcp        0      0 :::7893                 :::*                    LISTEN      17118/clash
tcp        0      0 :::7892                 :::*                    LISTEN      17118/clash
tcp        0      0 :::7895                 :::*                    LISTEN      17118/clash
tcp        0      0 :::7891                 :::*                    LISTEN      17118/clash
tcp        0      0 :::7890                 :::*                    LISTEN      17118/clash
udp        0      0 :::7891                 :::*                                17118/clash
udp        0      0 :::7892                 :::*                                17118/clash
udp        0      0 :::7893                 :::*                                17118/clash
udp        0      0 :::7895                 :::*                                17118/clash
udp        0      0 :::39859                :::*                                17118/clash
udp        0      0 :::51257                :::*                                17118/clash
udp        0      0 :::7874                 :::*                                17118/clash
udp        0      0 :::39109                :::*                                17118/clash

#===================== 测试本机DNS查询(www.baidu.com) =====================#

Server:		127.0.0.1
Address:	127.0.0.1#53

www.baidu.com	canonical name = www.a.shifen.com.
Name:	www.a.shifen.com
Address: 183.2.172.42
Name:	www.a.shifen.com
Address: 183.2.172.185
Name:	www.a.shifen.com
Address: 240e:ff:e020:9ae:0:ff:b014:8e8b
Name:	www.a.shifen.com
Address: 240e:ff:e020:966:0:ff:b042:f296


#===================== 测试内核DNS查询(www.instagram.com) =====================#

Status: 0
TC: false
RD: true
RA: true
AD: false
CD: false

Question: 
  Name: www.instagram.com.
  Qtype: 1
  Qclass: 1

Answer: 
  TTL: 3573
  data: z-p42-instagram.c10r.instagram.com.
  name: www.instagram.com.
  type: 5

  TTL: 33
  data: 157.240.22.174
  name: z-p42-instagram.c10r.instagram.com.
  type: 1

Status: 0
TC: false
RD: true
RA: true
AD: false
CD: false

Question: 
  Name: www.instagram.com.
  Qtype: 28
  Qclass: 1

Answer: 
  TTL: 309
  data: z-p42-instagram.c10r.instagram.com.
  name: www.instagram.com.
  type: 5

  TTL: 26
  data: 2a03:2880:f231:e5:face:b00c:0:4420
  name: z-p42-instagram.c10r.instagram.com.
  type: 28


Dnsmasq 当前默认 resolv 文件:/tmp/resolv.conf.d/resolv.conf.auto

#===================== /tmp/resolv.conf.d/resolv.conf.auto =====================#

# Interface wan
nameserver 222.172.200.68
nameserver 61.166.150.123
# Interface wan_6
nameserver 240e:52:4800::8888
nameserver 240e:52:4000::8888

#===================== 测试本机网络连接(www.baidu.com) =====================#

HTTP/1.1 200 OK
Bdpagetype: 1
Bdqid: 0xfbee275f0012fbdc
Connection: keep-alive
Content-Length: 413745
Content-Type: text/html; charset=utf-8
Date: Sun, 15 Sep 2024 04:44:13 GMT
Server: BWS/1.1
Set-Cookie: BIDUPSID=A75DE43E1FC08C863A9B76064BC96C85; expires=Thu, 31-Dec-37 23:55:55 GMT; max-age=2147483647; path=/; domain=.baidu.com
Set-Cookie: PSTM=1726375453; expires=Thu, 31-Dec-37 23:55:55 GMT; max-age=2147483647; path=/; domain=.baidu.com
Set-Cookie: BDSVRTM=0; path=/
Set-Cookie: BD_HOME=1; path=/
Set-Cookie: BAIDUID=A75DE43E1FC08C863A9B76064BC96C85:FG=1; Path=/; Domain=baidu.com; Max-Age=31536000
Set-Cookie: BAIDUID_BFESS=A75DE43E1FC08C863A9B76064BC96C85:FG=1; Path=/; Domain=baidu.com; Max-Age=31536000; Secure; SameSite=None
Traceid: 1726375453020531303418153490436953668572
Vary: Accept-Encoding
X-Ua-Compatible: IE=Edge,chrome=1
X-Xss-Protection: 1;mode=block


#===================== 测试本机网络下载(raw.githubusercontent.com) =====================#

HTTP/2 200 
cache-control: max-age=300
content-security-policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
content-type: text/plain; charset=utf-8
etag: "b2c0a69735ef2a21a922b31d65e860196df5472f50c3680978e2ac6fe3274d1d"
strict-transport-security: max-age=31536000
x-content-type-options: nosniff
x-frame-options: deny
x-xss-protection: 1; mode=block
x-github-request-id: 20E5:7CA7A:5E2C01:6EF224:66E6661D
accept-ranges: bytes
date: Sun, 15 Sep 2024 04:44:14 GMT
via: 1.1 varnish
x-served-by: cache-tyo11946-TYO
x-cache: MISS
x-cache-hits: 0
x-timer: S1726375455.700521,VS0,VE298
vary: Authorization,Accept-Encoding,Origin
access-control-allow-origin: *
cross-origin-resource-policy: cross-origin
x-fastly-request-id: e9883099108ad808ffe4b045b68f4cdfaed04622
expires: Sun, 15 Sep 2024 04:49:14 GMT
source-age: 0
content-length: 1066


#===================== 最近运行日志(自动切换为Debug模式) =====================#

time="2024-09-15T12:40:28.57476004+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57373 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:40:28.627576239+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57373 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:40:28.6774224+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57373 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:40:28.732271243+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57373 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:40:28.837582462+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57373 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:40:28.95357005+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57373 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:40:29.222861217+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57373 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:40:29.65968817+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57373 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:40:29.892963584+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57373 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:40:30.929720823+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57373 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:40:31.983198564+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57382 --> api.ipify.org:443 error: dial tcp 172.67.74.152:443: connect: connection refused\ndial tcp 104.26.12.205:443: connect: connection refused\ndial tcp 104.26.13.205:443: connect: connection refused"
time="2024-09-15T12:40:32.162710697+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57382 --> api.ipify.org:443 error: dial tcp 104.26.13.205:443: connect: connection refused\ndial tcp 172.67.74.152:443: connect: connection refused\ndial tcp 104.26.12.205:443: connect: connection refused"
time="2024-09-15T12:40:32.218974043+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57382 --> api.ipify.org:443 error: dial tcp 104.26.13.205:443: connect: connection refused\ndial tcp 104.26.12.205:443: connect: connection refused\ndial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:40:32.28904988+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57382 --> api.ipify.org:443 error: dial tcp 104.26.12.205:443: connect: connection refused\ndial tcp 172.67.74.152:443: connect: connection refused\ndial tcp 104.26.13.205:443: connect: connection refused"
time="2024-09-15T12:40:32.366727575+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57382 --> api.ipify.org:443 error: dial tcp 104.26.12.205:443: connect: connection refused\ndial tcp 172.67.74.152:443: connect: connection refused\ndial tcp 104.26.13.205:443: connect: connection refused"
time="2024-09-15T12:40:32.429503778+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57382 --> api.ipify.org:443 error: dial tcp 104.26.13.205:443: connect: connection refused\ndial tcp 104.26.12.205:443: connect: connection refused\ndial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:40:32.569399426+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57382 --> api.ipify.org:443 error: dial tcp 104.26.13.205:443: connect: connection refused\ndial tcp 172.67.74.152:443: connect: connection refused\ndial tcp 104.26.12.205:443: connect: connection refused"
time="2024-09-15T12:40:33.255828932+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57382 --> api.ipify.org:443 error: dial tcp 172.67.74.152:443: connect: connection refused\ndial tcp 104.26.13.205:443: connect: connection refused\ndial tcp 104.26.12.205:443: connect: connection refused"
time="2024-09-15T12:40:34.30210745+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57382 --> api.ipify.org:443 error: dial tcp 104.26.12.205:443: connect: connection refused\ndial tcp 172.67.74.152:443: connect: connection refused\ndial tcp 104.26.13.205:443: connect: connection refused"
time="2024-09-15T12:40:35.340222683+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57382 --> api.ipify.org:443 error: dial tcp 172.67.74.152:443: connect: connection refused\ndial tcp 104.26.13.205:443: connect: connection refused\ndial tcp 104.26.12.205:443: connect: connection refused"
time="2024-09-15T12:40:55.563079283+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57423 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:40:55.610282001+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57423 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:40:55.655264638+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57423 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:40:55.718300565+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57423 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:40:55.79871352+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57423 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:40:55.925293992+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57423 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:40:56.131703701+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57423 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:40:56.48510558+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57423 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:40:57.548074131+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57423 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:40:58.58676381+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57423 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:40:59.669892824+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57430 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:40:59.715953159+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57430 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:40:59.771999486+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57430 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:40:59.846088063+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57430 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:40:59.976493993+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57430 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:41:00.186851445+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57430 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:41:00.278679841+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57430 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:41:00.346191763+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57430 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:41:01.384520264+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57430 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:41:02.406367676+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57430 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:41:23.220333578+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57471 --> api.ipify.org:443 error: dial tcp 104.26.12.205:443: connect: connection refused\ndial tcp 104.26.13.205:443: connect: connection refused\ndial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:41:23.276503387+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57471 --> api.ipify.org:443 error: dial tcp 104.26.13.205:443: connect: connection refused\ndial tcp 104.26.12.205:443: connect: connection refused\ndial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:41:23.333941197+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57471 --> api.ipify.org:443 error: dial tcp 104.26.12.205:443: connect: connection refused\ndial tcp 172.67.74.152:443: connect: connection refused\ndial tcp 104.26.13.205:443: connect: connection refused"
time="2024-09-15T12:41:23.383571172+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57471 --> api.ipify.org:443 error: dial tcp 172.67.74.152:443: connect: connection refused\ndial tcp 104.26.12.205:443: connect: connection refused\ndial tcp 104.26.13.205:443: connect: connection refused"
time="2024-09-15T12:41:23.466875003+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57471 --> api.ipify.org:443 error: dial tcp 172.67.74.152:443: connect: connection refused\ndial tcp 104.26.12.205:443: connect: connection refused\ndial tcp 104.26.13.205:443: connect: connection refused"
time="2024-09-15T12:41:23.688552538+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57471 --> api.ipify.org:443 error: dial tcp 172.67.74.152:443: connect: connection refused\ndial tcp 104.26.13.205:443: connect: connection refused\ndial tcp 104.26.12.205:443: connect: connection refused"
time="2024-09-15T12:41:23.901596555+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57471 --> api.ipify.org:443 error: dial tcp 104.26.13.205:443: connect: connection refused\ndial tcp 172.67.74.152:443: connect: connection refused\ndial tcp 104.26.12.205:443: connect: connection refused"
time="2024-09-15T12:41:24.186376055+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57471 --> api.ipify.org:443 error: dial tcp 104.26.12.205:443: connect: connection refused\ndial tcp 172.67.74.152:443: connect: connection refused\ndial tcp 104.26.13.205:443: connect: connection refused"
time="2024-09-15T12:41:24.280907681+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57471 --> api.ipify.org:443 error: dial tcp 104.26.12.205:443: connect: connection refused\ndial tcp 172.67.74.152:443: connect: connection refused\ndial tcp 104.26.13.205:443: connect: connection refused"
time="2024-09-15T12:41:24.841514432+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57471 --> api.ipify.org:443 error: dial tcp 104.26.13.205:443: connect: connection refused\ndial tcp 172.67.74.152:443: connect: connection refused\ndial tcp 104.26.12.205:443: connect: connection refused"
time="2024-09-15T12:41:25.673756069+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57476 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:41:25.720082483+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57476 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:41:25.790326383+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57476 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:41:25.860584971+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57476 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:41:25.973560439+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57476 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:41:26.073451394+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57476 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:41:26.301559811+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57476 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:41:26.423117236+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57476 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:41:26.795224503+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57476 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:41:27.858194511+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57476 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:41:49.586987196+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57522 --> api.ipify.org:443 error: dial tcp 104.26.13.205:443: connect: connection refused\ndial tcp 172.67.74.152:443: connect: connection refused\ndial tcp 104.26.12.205:443: connect: connection refused"
time="2024-09-15T12:41:49.659128384+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57522 --> api.ipify.org:443 error: dial tcp 104.26.13.205:443: connect: connection refused\ndial tcp 104.26.12.205:443: connect: connection refused\ndial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:41:49.725087113+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57522 --> api.ipify.org:443 error: dial tcp 104.26.12.205:443: connect: connection refused\ndial tcp 104.26.13.205:443: connect: connection refused\ndial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:41:49.782541119+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57522 --> api.ipify.org:443 error: dial tcp 172.67.74.152:443: connect: connection refused\ndial tcp 104.26.12.205:443: connect: connection refused\ndial tcp 104.26.13.205:443: connect: connection refused"
time="2024-09-15T12:41:49.846342211+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57522 --> api.ipify.org:443 error: dial tcp 104.26.12.205:443: connect: connection refused\ndial tcp 104.26.13.205:443: connect: connection refused\ndial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:41:49.974277449+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57522 --> api.ipify.org:443 error: dial tcp 172.67.74.152:443: connect: connection refused\ndial tcp 104.26.13.205:443: connect: connection refused\ndial tcp 104.26.12.205:443: connect: connection refused"
time="2024-09-15T12:41:50.220162192+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57522 --> api.ipify.org:443 error: dial tcp 172.67.74.152:443: connect: connection refused\ndial tcp 104.26.12.205:443: connect: connection refused\ndial tcp 104.26.13.205:443: connect: connection refused"
time="2024-09-15T12:41:50.849919207+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57522 --> api.ipify.org:443 error: dial tcp 104.26.13.205:443: connect: connection refused\ndial tcp 104.26.12.205:443: connect: connection refused\ndial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:41:51.290208513+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57522 --> api.ipify.org:443 error: dial tcp 172.67.74.152:443: connect: connection refused\ndial tcp 104.26.13.205:443: connect: connection refused\ndial tcp 104.26.12.205:443: connect: connection refused"
time="2024-09-15T12:41:51.913412361+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57522 --> api.ipify.org:443 error: dial tcp 172.67.74.152:443: connect: connection refused\ndial tcp 104.26.13.205:443: connect: connection refused\ndial tcp 104.26.12.205:443: connect: connection refused"
time="2024-09-15T12:41:52.974373889+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57531 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:41:53.016437734+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57531 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:41:53.066027034+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57531 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:41:53.135297449+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57531 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:41:53.198752258+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57531 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:41:53.320570866+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57531 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:41:53.385139466+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57531 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:41:54.007101406+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57531 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:41:54.336722143+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57531 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:41:54.66181439+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57531 --> 172.67.74.152:443 error: dial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:43:44.244319545+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57731 --> api.ipify.org:443 error: dial tcp 104.26.12.205:443: connect: connection refused\ndial tcp 104.26.13.205:443: connect: connection refused\ndial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:43:44.302535748+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57731 --> api.ipify.org:443 error: dial tcp 172.67.74.152:443: connect: connection refused\ndial tcp 104.26.12.205:443: connect: connection refused\ndial tcp 104.26.13.205:443: connect: connection refused"
time="2024-09-15T12:43:44.36347669+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57731 --> api.ipify.org:443 error: dial tcp 104.26.12.205:443: connect: connection refused\ndial tcp 172.67.74.152:443: connect: connection refused\ndial tcp 104.26.13.205:443: connect: connection refused"
time="2024-09-15T12:43:44.427107271+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57731 --> api.ipify.org:443 error: dial tcp 172.67.74.152:443: connect: connection refused\ndial tcp 104.26.13.205:443: connect: connection refused\ndial tcp 104.26.12.205:443: connect: connection refused"
time="2024-09-15T12:43:44.551049923+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57731 --> api.ipify.org:443 error: dial tcp 172.67.74.152:443: connect: connection refused\ndial tcp 104.26.12.205:443: connect: connection refused\ndial tcp 104.26.13.205:443: connect: connection refused"
time="2024-09-15T12:43:44.664243295+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57731 --> api.ipify.org:443 error: dial tcp 172.67.74.152:443: connect: connection refused\ndial tcp 104.26.13.205:443: connect: connection refused\ndial tcp 104.26.12.205:443: connect: connection refused"
time="2024-09-15T12:43:44.91503359+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57731 --> api.ipify.org:443 error: dial tcp 104.26.13.205:443: connect: connection refused\ndial tcp 104.26.12.205:443: connect: connection refused\ndial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:43:45.22919172+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57731 --> api.ipify.org:443 error: dial tcp 104.26.12.205:443: connect: connection refused\ndial tcp 172.67.74.152:443: connect: connection refused\ndial tcp 104.26.13.205:443: connect: connection refused"
time="2024-09-15T12:43:45.928992799+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57731 --> api.ipify.org:443 error: dial tcp 104.26.12.205:443: connect: connection refused\ndial tcp 104.26.13.205:443: connect: connection refused\ndial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:43:46.685285127+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57731 --> api.ipify.org:443 error: dial tcp 104.26.13.205:443: connect: connection refused\ndial tcp 104.26.12.205:443: connect: connection refused\ndial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:43:47.7766409+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57739 --> api.ipify.org:443 error: dial tcp 104.26.12.205:443: connect: connection refused\ndial tcp 104.26.13.205:443: connect: connection refused\ndial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:43:47.866534927+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57739 --> api.ipify.org:443 error: dial tcp 172.67.74.152:443: connect: connection refused\ndial tcp 104.26.12.205:443: connect: connection refused\ndial tcp 104.26.13.205:443: connect: connection refused"
time="2024-09-15T12:43:47.921190239+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57739 --> api.ipify.org:443 error: dial tcp 172.67.74.152:443: connect: connection refused\ndial tcp 104.26.12.205:443: connect: connection refused\ndial tcp 104.26.13.205:443: connect: connection refused"
time="2024-09-15T12:43:47.996227511+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57739 --> api.ipify.org:443 error: dial tcp 104.26.13.205:443: connect: connection refused\ndial tcp 104.26.12.205:443: connect: connection refused\ndial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:43:48.128799149+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57739 --> api.ipify.org:443 error: dial tcp 172.67.74.152:443: connect: connection refused\ndial tcp 104.26.12.205:443: connect: connection refused\ndial tcp 104.26.13.205:443: connect: connection refused"
time="2024-09-15T12:43:48.260662807+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57739 --> api.ipify.org:443 error: dial tcp 104.26.13.205:443: connect: connection refused\ndial tcp 104.26.12.205:443: connect: connection refused\ndial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:43:48.49405566+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57739 --> api.ipify.org:443 error: dial tcp 104.26.12.205:443: connect: connection refused\ndial tcp 104.26.13.205:443: connect: connection refused\ndial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:43:48.785728097+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57739 --> api.ipify.org:443 error: dial tcp 104.26.13.205:443: connect: connection refused\ndial tcp 104.26.12.205:443: connect: connection refused\ndial tcp 172.67.74.152:443: connect: connection refused"
time="2024-09-15T12:43:49.756197032+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57739 --> api.ipify.org:443 error: dial tcp 104.26.12.205:443: connect: connection refused\ndial tcp 172.67.74.152:443: connect: connection refused\ndial tcp 104.26.13.205:443: connect: connection refused"
time="2024-09-15T12:43:50.200017644+08:00" level=warning msg="[TCP] dial DIRECT 192.168.31.164:57739 --> api.ipify.org:443 error: dial tcp 104.26.13.205:443: connect: connection refused\ndial tcp 172.67.74.152:443: connect: connection refused\ndial tcp 104.26.12.205:443: connect: connection refused"

#===================== 最近运行日志获取完成(自动切换为silent模式) =====================#


#===================== 活动连接信息 =====================#

1. SourceIP:【】 - Host:【Empty】 - DestinationIP:【104.16.133.229】 - Network:【udp】 - RulePayload:【】 - Lastchain:【DIRECT】
2. SourceIP:【192.168.31.164】 - Host:【www.bing.com】 - DestinationIP:【23.62.46.152】 - Network:【tcp】 - RulePayload:【bing】 - Lastchain:【🇺🇸 高级 专线 美国 06】
3. SourceIP:【192.168.31.164】 - Host:【fd.api.iris.microsoft.com】 - DestinationIP:【20.99.185.48】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【DIRECT】
4. SourceIP:【】 - Host:【Empty】 - DestinationIP:【223.5.5.5】 - Network:【udp】 - RulePayload:【cn】 - Lastchain:【DIRECT】
5. SourceIP:【192.168.31.164】 - Host:【nav-edge.smartscreen.microsoft.com】 - DestinationIP:【4.152.133.8】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【DIRECT】
6. SourceIP:【192.168.31.164】 - Host:【www.youtube.com】 - DestinationIP:【142.251.215.238】 - Network:【tcp】 - RulePayload:【youtube】 - Lastchain:【🇺🇸 标准 专线 美国 01】
7. SourceIP:【192.168.31.164】 - Host:【www.bing.com】 - DestinationIP:【23.62.46.152】 - Network:【tcp】 - RulePayload:【bing】 - Lastchain:【🇺🇸 高级 专线 美国 06】
8. SourceIP:【192.168.31.164】 - Host:【fp.msedge.net】 - DestinationIP:【204.79.197.222】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【DIRECT】



### OpenClash Config

_No response_

### Expected Behavior

正常绕过ipv6大陆网段

### Additional Context

_No response_

回头我看看

为啥一个v6的防火墙规则都没看到

为啥一个v6的防火墙规则都没看到
有的,忘记截了
屏幕截图 2024-09-16 114025

nft list set inet fw4 china_ip6_route

那你这个填了啥吗
image

没有image

nft "add rule inet fw4 openclash_mangle_v6 ip6 daddr @china_ip6_route ip6 daddr != @china_ip6_route_pass counter return"
root@OpenWrt:~# nft "add rule inet fw4 openclash_mangle_v6 ip6 daddr @china_ip6_route ip6 daddr != @china_ip6_route_pass counter return"
Error: No such file or directory; did you mean set ‘china_ip_route_pass’ in table inet ‘fw4’?
add rule inet fw4 openclash_mangle_v6 ip6 daddr @china_ip6_route ip6 daddr != @china_ip6_route_pass counter return
                                                                              ^^^^^^^^^^^^^^^^^^^^^
root@OpenWrt:~# nft "add rule inet fw4 openclash_mangle_v6 ip6 daddr @china_ip6_route counter return"
root@OpenWrt:~#

屏幕截图 2024-09-19 111539
屏幕截图 2024-09-19 111724

奇怪了,添加防火墙规则后显示set是0kb,绕过的v6流量也还是过核心了。还有绕过指定区域ipv6黑名单选项在哪啊😂我找不到了

nft list set inet fw4 china_ip6_route_pass

 -----------------------------------------------------
 OpenWrt SNAPSHOT, r0-afecbe7
 -----------------------------------------------------
root@OpenWrt:~# nft list set inet fw4 china_ip6_route_pass
Error: No such file or directory
list set inet fw4 china_ip6_route_pass
                  ^^^^^^^^^^^^^^^^^^^^
root@OpenWrt:~#