v2rayN
v2rayN copied to clipboard
[Bug]: Don't start TUN-mode
预期情况
Service start
实际情况
Service not started
复现方法
I tried everything, but the mode does not turn on.
日志信息
C:\Program Files\v2rayN\guiLogs
额外信息
Everything works for me in system proxy mode, but switching to TUN mode does not happen. The IKSray kernel does not start. I don’t understand where exactly something needs to be corrected.
Configuration successful
[VLESS] Earl.NB-DE(de***uk:443)
Microsoft Windows NT 10.0.22621.0 - 64
Start service (2024.05.09 08:53:22)...
2024.05.09 08:53:23 System proxy setting is changedForcedChange
+0300 2024-05-09 08:53:32 ERROR [2896928371 9.91s] dns: lookup failed for ssl.gstatic.com: EOF
2024.05.09 08:53:33 The ping of current service: -1 ms
+0300 2024-05-09 08:53:36 ERROR dns: exchange failed for detectportal.firefox.com. IN A: EOF
+0300 2024-05-09 08:53:36 ERROR dns: exchange failed for go.microsoft.com. IN A: EOF
+0300 2024-05-09 08:53:37 ERROR dns: exchange failed for geo.prod.do.dsp.mp.microsoft.com. IN A: EOF
and more log
FATAL[0000] start service: initialize rule-set[1]: initial rule-set: geosite-category-ads-all: Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-category-ads-all.srs": EOF | initialize rule-set[1]: initial rule-set: geosite-geolocation-!cn: Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-geolocation-!cn.srs": context canceled
FATAL[0000] start service: initialize rule-set[1]: initial rule-set: geosite-category-ads-all: Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-category-ads-all.srs": EOF | initialize rule-set[1]: initial rule-set: geosite-geolocation-!cn: Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-geolocation-!cn.srs": context canceled
Tun mode restart the core once
我确认已更新至最新版本
- [X] 是
我确认已查询历史issues
- [X] 是
I have the same problem. The tun mode does not work
FATAL[0000] start service: initialize rule-set[3]: initial rule-set: geosite-geolocation-!cn: 我也遇到类似的问题
config and log file sing-box
config and log file sing-box
The problem is that over the last 24 hours I have tried 15 or 20 different configurations, both from the sing-box branch and from this branch, and added something of my own, but NOT ONE option works. I’ll say more, I couldn’t launch the sing-box core even without the TUNE mode. and this suggests that the problem is not in the config at all, but in the code.
It should be admitted that V2RayN cannot work with either the sing-box core or the TUNE mode.
Last config WITHOUT TUN-mode
{ "servers": [ { "tag": "local", "address": "223.5.5.5", "strategy": "prefer_ipv4", "detour": "direct" }, { "tag": "remote", "address": "1.1.1.1", "strategy": "prefer_ipv4", "detour": "proxy" }, { "tag": "block", "address": "rcode://success" } ], "rules": [ { "outbound": "any", "server": "remote" } ], "final": "remote", "strategy": "prefer_ipv4" }
Log is EMPTY, but proxy not work!!!! And I'm tried "address": "tcp://1.1.1.1", not work also.
this config not work also (and log empty too)..
{ "servers": [ { "tag": "local", "address": "223.5.5.5", "address_resolver": "dns-resolver", "strategy": "prefer_ipv4", "detour": "direct" }, { "tag": "remote", "address": "1.1.1.1", "strategy": "prefer_ipv4", "address_resolver": "dns-resolver", "detour": "proxy" }, { "tag": "block", "address": "rcode://success" }, { "tag": "dns-resolver", "address": "tcp://1.1.1.1", "detour": "proxy" } ], "rules": [ { "outbound": "any", "server": "remote" } ], "final": "remote", "strategy": "prefer_ipv4" }
please turn on save log to file on v2rayn settings
please turn on save log to file on v2raynn settings
all enabled...
with warning level only this record
+0300 2024-05-10 09:44:21 WARN router: initialize rule-set take too much time to finish!
Upload your configuration information to remove your node information when tun mode is turned on
please turn on save log to file on v2raynn settings
all enabled... with warning level only this record
+0300 2024-05-10 09:44:21 WARN router: initialize rule-set take too much time to finish!
log file level should be to debug
please turn on save log to file on v2raynn settings
all enabled... with warning level only this record
+0300 2024-05-10 09:44:21 WARN router: initialize rule-set take too much time to finish!
log file level should be to debug
+0300 2024-05-10 13:12:45 INFO router: updated default interface Беспроводная сеть, index 27
+0300 2024-05-10 13:12:45 INFO clash-api: restful api listening at 127.0.0.1:10813
+0300 2024-05-10 13:12:45 INFO inbound/socks[socks]: tcp server started at [::]:10808
+0300 2024-05-10 13:12:45 INFO inbound/http[http]: tcp server started at [::]:10809
+0300 2024-05-10 13:12:45 INFO [2634312280 0ms] inbound/http[http]: inbound connection from 127.0.0.1:63680
+0300 2024-05-10 13:12:45 INFO [2634312280 0ms] inbound/http[http]: inbound connection to signaler-pa.clients6.google.com:443
+0300 2024-05-10 13:12:45 DEBUG [2634312280 1ms] router: sniffed protocol: tls, domain: signaler-pa.clients6.google.com
+0300 2024-05-10 13:12:45 DEBUG [2634312280 1ms] dns: lookup domain signaler-pa.clients6.google.com
+0300 2024-05-10 13:12:45 INFO outbound/vless[proxy]: outbound multiplex packet connection to 1.1.1.1:53
+0300 2024-05-10 13:12:45 DEBUG dns: lookup domain de.z*****b.uk
+0300 2024-05-10 13:12:45 DEBUG dns: match[0] outbound=any => remote
+0300 2024-05-10 13:12:45 INFO [555007031 0ms] inbound/http[http]: inbound connection from 127.0.0.1:63672
+0300 2024-05-10 13:12:45 INFO [555007031 0ms] inbound/http[http]: inbound connection to web-chat-e2ee.facebook.com:443
+0300 2024-05-10 13:12:45 DEBUG [555007031 1ms] router: sniffed protocol: tls, domain: web-chat-e2ee.facebook.com
+0300 2024-05-10 13:12:45 DEBUG [555007031 1ms] dns: lookup domain web-chat-e2ee.facebook.com
+0300 2024-05-10 13:12:45 INFO [3662596169 0ms] inbound/http[http]: inbound connection from 127.0.0.1:63673
+0300 2024-05-10 13:12:45 INFO [3662596169 0ms] inbound/http[http]: inbound connection to ipv4.icanhazip.com:443
+0300 2024-05-10 13:12:45 DEBUG [3662596169 0ms] router: sniffed protocol: tls, domain: ipv4.icanhazip.com
+0300 2024-05-10 13:12:45 DEBUG [3662596169 0ms] dns: lookup domain ipv4.icanhazip.com
+0300 2024-05-10 13:12:45 INFO [1960488965 0ms] inbound/http[http]: inbound connection from 127.0.0.1:63676
+0300 2024-05-10 13:12:45 INFO [3625670406 0ms] inbound/http[http]: inbound connection from 127.0.0.1:63677
+0300 2024-05-10 13:12:45 INFO [1362963062 0ms] inbound/http[http]: inbound connection from 127.0.0.1:63674
+0300 2024-05-10 13:12:45 INFO [1786317290 0ms] inbound/http[http]: inbound connection from 127.0.0.1:63675
+0300 2024-05-10 13:12:45 INFO [1786317290 0ms] inbound/http[http]: inbound connection to ipv4.icanhazip.com:443
+0300 2024-05-10 13:12:45 DEBUG [1786317290 0ms] router: sniffed protocol: tls, domain: ipv4.icanhazip.com
+0300 2024-05-10 13:12:45 DEBUG [1786317290 0ms] dns: lookup domain ipv4.icanhazip.com
+0300 2024-05-10 13:12:46 INFO [3232857642 0ms] inbound/http[http]: inbound connection from 127.0.0.1:63684
+0300 2024-05-10 13:12:46 DEBUG [3232857642 0ms] inbound/http[http]: connection closed: process connection from 127.0.0.1:63684: read http request: EOF
+0300 2024-05-10 13:12:46 INFO [1045591748 0ms] inbound/http[http]: inbound connection from 127.0.0.1:63685
+0300 2024-05-10 13:12:46 INFO [1045591748 0ms] inbound/http[http]: inbound connection to www.google.com:443
+0300 2024-05-10 13:12:46 DEBUG [1045591748 2ms] router: sniffed protocol: tls, domain: www.google.com
+0300 2024-05-10 13:12:46 DEBUG [1045591748 2ms] dns: lookup domain www.google.com
+0300 2024-05-10 13:12:47 INFO inbound/tun[tun-in]: started at singbox_tun
+0300 2024-05-10 13:12:47 INFO sing-box started (1.999s)
+0300 2024-05-10 13:12:47 INFO [3290383369 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:59047
+0300 2024-05-10 13:12:47 INFO [3290383369 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 13:12:47 DEBUG [3290383369 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 13:12:47 INFO [3290383369 1ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 13:12:47 DEBUG [3290383369 1ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 13:12:47 INFO [2084712713 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:55768
+0300 2024-05-10 13:12:47 INFO [2084712713 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 13:12:47 DEBUG dns: exchange www.msftconnecttest.com. IN A
+0300 2024-05-10 13:12:47 DEBUG [2084712713 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 13:12:47 INFO [2084712713 10ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 13:12:47 DEBUG [2084712713 10ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 13:12:47 DEBUG dns: exchange api.ipify.org. IN A
+0300 2024-05-10 13:12:47 INFO [4111878783 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:63792
+0300 2024-05-10 13:12:47 INFO [4111878783 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 13:12:47 DEBUG [4111878783 0ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 13:12:47 INFO [4111878783 0ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 13:12:47 INFO [4111878783 0ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 13:12:47 INFO [1619130076 2ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:65219
+0300 2024-05-10 13:12:47 INFO [1619130076 3ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 13:12:47 DEBUG [1619130076 3ms] router: sniffed packet protocol: dns
+0300 2024-05-10 13:12:47 INFO [743334590 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:49698
+0300 2024-05-10 13:12:47 INFO [743334590 1ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 13:12:47 DEBUG [743334590 1ms] router: sniffed packet protocol: dns
+0300 2024-05-10 13:12:47 INFO [1619130076 4ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 13:12:47 DEBUG [1619130076 4ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 13:12:47 DEBUG dns: exchange example.org. IN A
+0300 2024-05-10 13:12:47 INFO [743334590 1ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 13:12:47 DEBUG [743334590 1ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 13:12:47 DEBUG dns: exchange ipv4only.arpa. IN A
+0300 2024-05-10 13:12:47 INFO [1166345808 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:63795
+0300 2024-05-10 13:12:47 INFO [1166345808 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 13:12:47 INFO [3685172797 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:63794
+0300 2024-05-10 13:12:47 INFO [3685172797 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 13:12:47 DEBUG [3685172797 111ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 13:12:47 INFO [3685172797 111ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 13:12:47 INFO [3685172797 111ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 13:12:47 DEBUG [1166345808 116ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 13:12:47 INFO [1166345808 117ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 13:12:47 INFO [1166345808 117ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 13:12:47 INFO [726650415 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:63919
+0300 2024-05-10 13:12:47 INFO [726650415 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 13:12:47 DEBUG [726650415 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 13:12:47 INFO [726650415 0ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 13:12:47 DEBUG [726650415 0ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 13:12:47 DEBUG dns: exchange detectportal.firefox.com. IN A
+0300 2024-05-10 13:12:47 INFO [3769376391 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:63796
+0300 2024-05-10 13:12:47 INFO [3769376391 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 13:12:47 DEBUG [3769376391 13ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 13:12:47 INFO [3769376391 15ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 13:12:47 INFO [3769376391 15ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 13:12:47 DEBUG dns: exchange www.msftconnecttest.com. IN A
+0300 2024-05-10 13:12:48 DEBUG dns: exchange api.ipify.org. IN A
+0300 2024-05-10 13:12:48 DEBUG dns: exchange example.org. IN A
+0300 2024-05-10 13:12:48 DEBUG dns: exchange ipv4only.arpa. IN A
+0300 2024-05-10 13:12:48 INFO [4213639100 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:55251
+0300 2024-05-10 13:12:48 INFO [4213639100 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 13:12:48 DEBUG [4213639100 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 13:12:48 INFO [4213639100 0ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 13:12:48 DEBUG [4213639100 0ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 13:12:48 DEBUG dns: exchange mozilla.cloudflare-dns.com. IN A
+0300 2024-05-10 13:12:48 INFO [2746249138 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:63797
+0300 2024-05-10 13:12:48 INFO [2746249138 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 13:12:48 DEBUG [2746249138 0ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 13:12:48 INFO [2746249138 0ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 13:12:48 INFO [2746249138 0ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 13:12:48 DEBUG dns: exchange detectportal.firefox.com. IN A
+0300 2024-05-10 13:12:48 INFO [707036943 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:63991
+0300 2024-05-10 13:12:48 INFO [707036943 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 13:12:48 DEBUG [707036943 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 13:12:48 INFO [3394812257 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:63798
+0300 2024-05-10 13:12:48 INFO [3394812257 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 13:12:48 INFO [707036943 0ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 13:12:48 DEBUG [707036943 0ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 13:12:48 DEBUG dns: exchange geo.prod.do.dsp.mp.microsoft.com. IN A
+0300 2024-05-10 13:12:48 DEBUG [3394812257 1ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 13:12:48 INFO [3394812257 2ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 13:12:48 INFO [3394812257 2ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 13:12:48 DEBUG dns: exchange www.msftconnecttest.com. IN A
+0300 2024-05-10 13:12:49 DEBUG dns: exchange api.ipify.org. IN A
+0300 2024-05-10 13:12:49 DEBUG dns: exchange mozilla.cloudflare-dns.com. IN A
+0300 2024-05-10 13:12:49 DEBUG dns: exchange example.org. IN A
+0300 2024-05-10 13:12:49 DEBUG dns: exchange ipv4only.arpa. IN A
+0300 2024-05-10 13:12:49 DEBUG dns: exchange detectportal.firefox.com. IN A
+0300 2024-05-10 13:12:49 DEBUG dns: exchange geo.prod.do.dsp.mp.microsoft.com. IN A
+0300 2024-05-10 13:12:50 DEBUG dns: exchange mozilla.cloudflare-dns.com. IN A
+0300 2024-05-10 13:12:50 DEBUG [3625670406 5.1s] inbound/http[http]: connection closed: process connection from 127.0.0.1:63677: read http request: EOF
+0300 2024-05-10 13:12:50 DEBUG [1362963062 5.0s] inbound/http[http]: connection closed: process connection from 127.0.0.1:63674: read http request: EOF
+0300 2024-05-10 13:12:50 DEBUG [1960488965 5.5s] inbound/http[http]: connection closed: process connection from 127.0.0.1:63676: read http request: EOF
+0300 2024-05-10 13:12:50 DEBUG dns: exchange geo.prod.do.dsp.mp.microsoft.com. IN A
+0300 2024-05-10 13:12:50 DEBUG dns: exchange www.msftconnecttest.com. IN A
+0300 2024-05-10 13:12:51 DEBUG dns: exchange api.ipify.org. IN A
+0300 2024-05-10 13:12:51 DEBUG dns: exchange example.org. IN A
+0300 2024-05-10 13:12:51 DEBUG dns: exchange ipv4only.arpa. IN A
+0300 2024-05-10 13:12:51 DEBUG dns: exchange detectportal.firefox.com. IN A
+0300 2024-05-10 13:12:51 INFO [292424751 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:57504
+0300 2024-05-10 13:12:51 INFO [292424751 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 13:12:51 DEBUG [292424751 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 13:12:51 INFO [292424751 0ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 13:12:51 DEBUG [292424751 0ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 13:12:51 DEBUG dns: exchange alive.github.com. IN A
+0300 2024-05-10 13:12:51 INFO [1976341863 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:63800
+0300 2024-05-10 13:12:51 INFO [1976341863 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 13:12:51 DEBUG [1976341863 1ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 13:12:51 INFO [1976341863 1ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 13:12:51 INFO [1976341863 1ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 13:12:52 DEBUG dns: exchange mozilla.cloudflare-dns.com. IN A
+0300 2024-05-10 13:12:52 DEBUG dns: exchange alive.github.com. IN A
+0300 2024-05-10 13:12:52 DEBUG dns: exchange geo.prod.do.dsp.mp.microsoft.com. IN A
+0300 2024-05-10 13:12:53 DEBUG dns: exchange alive.github.com. IN A
+0300 2024-05-10 13:12:54 DEBUG dns: exchange www.msftconnecttest.com. IN A
+0300 2024-05-10 13:12:55 DEBUG dns: exchange api.ipify.org. IN A
+0300 2024-05-10 13:12:55 DEBUG dns: exchange ipv4only.arpa. IN A
+0300 2024-05-10 13:12:55 DEBUG dns: exchange example.org. IN A
+0300 2024-05-10 13:12:55 DEBUG dns: exchange detectportal.firefox.com. IN A
+0300 2024-05-10 13:12:55 DEBUG dns: exchange alive.github.com. IN A
+0300 2024-05-10 13:12:56 INFO [2089552918 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:64481
+0300 2024-05-10 13:12:56 INFO [2089552918 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 13:12:56 DEBUG [2089552918 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 13:12:56 INFO [3712155911 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:63801
+0300 2024-05-10 13:12:56 INFO [3712155911 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 13:12:56 INFO [2089552918 0ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 13:12:56 DEBUG [2089552918 0ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 13:12:56 DEBUG dns: exchange cdn.z*****b.uk. IN A
+0300 2024-05-10 13:12:56 DEBUG [3712155911 1ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 13:12:56 INFO [3712155911 1ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 13:12:56 INFO [3712155911 1ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 13:12:56 DEBUG dns: exchange mozilla.cloudflare-dns.com. IN A
+0300 2024-05-10 13:12:56 DEBUG dns: exchange geo.prod.do.dsp.mp.microsoft.com. IN A
DNS config
{ "servers": [ { "tag": "local", "address": "223.5.5.5", "address_resolver": "dns-resolver", "strategy": "prefer_ipv4", "detour": "direct" }, { "tag": "remote", "address": "1.1.1.1", "strategy": "prefer_ipv4", "address_resolver": "dns-resolver", "detour": "proxy" }, { "tag": "block", "address": "rcode://success" }, { "tag": "dns-resolver", "address": "tcp://1.1.1.1", "detour": "proxy" } ], "rules": [ { "outbound": "any", "server": "remote" } ], "final": "remote", "strategy": "prefer_ipv4" }
If you use a domain name to connect to your vps, it will cause the DNS to not resolve successfully, maybe you should change the first DNS rule from remote to local
If you use a domain name to connect to your vps, it will cause the DNS to not resolve successfully, maybe you should change the first DNS rule from remote to local
no.. not work but this config from Nekoray.. and it work!!!
"dns": {
"fakeip": {
"enabled": true,
"inet4_range": "198.18.0.0/15",
"inet6_range": "fc00::/18"
},
"servers": [
{
"tag": "dns-remote",
"address": "8.8.8.8",
"detour": "nekoray-socks"
},
{
"tag": "dns-direct",
"address": "underlying://0.0.0.0",
"detour": "direct"
},
{
"address": "fakeip",
"tag": "dns-fake"
},
{
"address": "rcode://success",
"tag": "dns-block"
}
],
"rules": [
{
"query_type": [
32,
33
],
"server": "dns-block"
},
{
"domain_suffix": [
".lan"
],
"server": "dns-block"
},
{
"process_name": [
"nekoray_core",
"nekoray_core.exe",
"nekobox_core",
"nekobox_core.exe"
],
"server": "dns-direct"
},
{
"inbound": "empty",
"server": "dns-fake"
}
]
},
Sorry, Nekoray work with Xray core... win sign-box core tun-mode don't work too.. (((
try! and upload log
{
"servers": [
{
"tag": "default",
"address": "tls://8.8.8.8"
},
{
"tag": "local",
"address": "local",
"detour": "direct"
}
],
"rules": [
{
"outbound": "any",
"server": "local"
}
],
"reverse_mapping": true
}
try! and upload log
+0300 2024-05-10 14:35:12 INFO router: updated default interface Беспроводная сеть, index 27
+0300 2024-05-10 14:35:12 INFO clash-api: restful api listening at 127.0.0.1:10813
+0300 2024-05-10 14:35:12 INFO inbound/socks[socks]: tcp server started at [::]:10808
+0300 2024-05-10 14:35:12 INFO inbound/http[http]: tcp server started at [::]:10809
+0300 2024-05-10 14:35:13 INFO [2900609335 0ms] inbound/http[http]: inbound connection from 127.0.0.1:54216
+0300 2024-05-10 14:35:13 DEBUG [2900609335 0ms] inbound/http[http]: connection closed: process connection from 127.0.0.1:54216: read http request: EOF
+0300 2024-05-10 14:35:13 INFO [543408499 0ms] inbound/http[http]: inbound connection from 127.0.0.1:54217
+0300 2024-05-10 14:35:13 INFO [543408499 7ms] inbound/http[http]: inbound connection to www.google.com:443
+0300 2024-05-10 14:35:14 DEBUG [543408499 60ms] router: sniffed protocol: tls, domain: www.google.com
+0300 2024-05-10 14:35:14 DEBUG [543408499 60ms] dns: lookup domain www.google.com
+0300 2024-05-10 14:35:14 INFO outbound/vless[proxy]: outbound multiplex connection to 8.8.8.8:853
+0300 2024-05-10 14:35:14 DEBUG dns: lookup domain de.z****b.uk
+0300 2024-05-10 14:35:14 DEBUG dns: match[0] outbound=any => local
+0300 2024-05-10 14:35:15 INFO inbound/tun[tun-in]: started at singbox_tun
+0300 2024-05-10 14:35:15 INFO sing-box started (2.111s)
+0300 2024-05-10 14:35:15 INFO [44665424 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:53161
+0300 2024-05-10 14:35:15 INFO [44665424 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 14:35:15 DEBUG [44665424 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 14:35:15 INFO [44665424 0ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:15 DEBUG [44665424 0ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 14:35:15 DEBUG dns: exchange de.z*****b.uk. IN A
+0300 2024-05-10 14:35:15 INFO [2167082916 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:64724
+0300 2024-05-10 14:35:15 INFO [2167082916 0ms] inbound/tun[tun-in]: inbound packet connection to 104.16.185.241:443
+0300 2024-05-10 14:35:15 INFO [3705145882 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:60425
+0300 2024-05-10 14:35:15 INFO [3705145882 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 14:35:15 DEBUG [3705145882 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 14:35:15 INFO [2167082916 0ms] router: found process path: C:\Program Files\Arduino IDE\Arduino IDE.exe
+0300 2024-05-10 14:35:15 INFO [2167082916 0ms] outbound/vless[proxy]: outbound multiplex packet connection to 104.16.185.241:443
+0300 2024-05-10 14:35:15 INFO [3705145882 0ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:15 DEBUG [3705145882 0ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 14:35:15 DEBUG dns: exchange www.msftconnecttest.com. IN A
+0300 2024-05-10 14:35:15 INFO [991170985 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:54440
+0300 2024-05-10 14:35:15 INFO [991170985 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 14:35:15 DEBUG [991170985 0ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 14:35:15 INFO [991170985 1ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:15 INFO [991170985 1ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 14:35:15 INFO [364184302 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:57298
+0300 2024-05-10 14:35:15 INFO [364184302 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 14:35:15 DEBUG [364184302 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 14:35:15 INFO [364184302 0ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:15 DEBUG [364184302 0ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 14:35:15 DEBUG dns: exchange detectportal.firefox.com. IN A
+0300 2024-05-10 14:35:15 INFO [2620871041 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:56093
+0300 2024-05-10 14:35:15 INFO [2620871041 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 14:35:15 DEBUG [2620871041 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 14:35:15 INFO [3425095145 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:65073
+0300 2024-05-10 14:35:15 INFO [3425095145 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 14:35:15 DEBUG [3425095145 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 14:35:15 INFO [2620871041 0ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:15 DEBUG [2620871041 0ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 14:35:15 DEBUG dns: exchange example.org. IN A
+0300 2024-05-10 14:35:15 INFO [3425095145 0ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:15 DEBUG [3425095145 0ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 14:35:15 DEBUG dns: exchange ipv4only.arpa. IN A
+0300 2024-05-10 14:35:15 INFO [924459526 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:54446
+0300 2024-05-10 14:35:15 INFO [924459526 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 14:35:15 DEBUG dns: exchange de.zeroclub.uk. IN A
+0300 2024-05-10 14:35:15 INFO [235353958 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:54445
+0300 2024-05-10 14:35:15 INFO [235353958 1ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 14:35:15 DEBUG [235353958 1ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 14:35:15 INFO [235353958 1ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:15 INFO [235353958 1ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 14:35:15 INFO [1372685168 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:54447
+0300 2024-05-10 14:35:15 INFO [1372685168 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 14:35:15 DEBUG [1372685168 0ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 14:35:15 INFO [1372685168 1ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:15 INFO [1372685168 1ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 14:35:15 DEBUG [924459526 20ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 14:35:15 INFO [924459526 21ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:15 INFO [924459526 21ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 14:35:15 DEBUG dns: exchange www.msftconnecttest.com. IN A
+0300 2024-05-10 14:35:16 DEBUG dns: exchange ipv4only.arpa. IN A
+0300 2024-05-10 14:35:16 DEBUG dns: exchange example.org. IN A
+0300 2024-05-10 14:35:16 DEBUG dns: exchange detectportal.firefox.com. IN A
+0300 2024-05-10 14:35:16 DEBUG dns: exchange de.z*****b.uk. IN A
+0300 2024-05-10 14:35:16 INFO [4073542817 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:57352
+0300 2024-05-10 14:35:16 INFO [4073542817 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 14:35:16 DEBUG [4073542817 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 14:35:16 INFO [4073542817 0ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:16 DEBUG [4073542817 0ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 14:35:16 DEBUG dns: exchange geo.prod.do.dsp.mp.microsoft.com. IN A
+0300 2024-05-10 14:35:16 INFO [2150143118 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:54449
+0300 2024-05-10 14:35:16 INFO [2150143118 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 14:35:16 DEBUG [2150143118 0ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 14:35:16 INFO [2150143118 1ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:16 INFO [2150143118 1ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 14:35:16 INFO [991865649 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:49713
+0300 2024-05-10 14:35:16 INFO [991865649 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 14:35:16 DEBUG [991865649 1ms] router: sniffed packet protocol: dns
+0300 2024-05-10 14:35:16 INFO [1608051506 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:54450
+0300 2024-05-10 14:35:16 INFO [1608051506 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 14:35:16 INFO [991865649 1ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:16 DEBUG [991865649 1ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 14:35:16 DEBUG dns: exchange mozilla.cloudflare-dns.com. IN A
+0300 2024-05-10 14:35:16 DEBUG [1608051506 1ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 14:35:16 INFO [1608051506 2ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:16 INFO [1608051506 2ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 14:35:16 DEBUG dns: exchange www.msftconnecttest.com. IN A
+0300 2024-05-10 14:35:17 DEBUG dns: exchange example.org. IN A
+0300 2024-05-10 14:35:17 DEBUG dns: exchange ipv4only.arpa. IN A
+0300 2024-05-10 14:35:17 DEBUG dns: exchange detectportal.firefox.com. IN A
+0300 2024-05-10 14:35:17 DEBUG dns: exchange geo.prod.do.dsp.mp.microsoft.com. IN A
+0300 2024-05-10 14:35:17 DEBUG dns: exchange mozilla.cloudflare-dns.com. IN A
+0300 2024-05-10 14:35:18 DEBUG dns: exchange de.z*****b.uk. IN A
+0300 2024-05-10 14:35:18 DEBUG dns: exchange geo.prod.do.dsp.mp.microsoft.com. IN A
+0300 2024-05-10 14:35:18 DEBUG dns: exchange mozilla.cloudflare-dns.com. IN A
+0300 2024-05-10 14:35:18 DEBUG dns: exchange www.msftconnecttest.com. IN A
+0300 2024-05-10 14:35:19 DEBUG dns: lookup failed for de.z******b.uk: lookup de.z****b.uk: i/o timeout
+0300 2024-05-10 14:35:19 DEBUG dns: lookup domain de.z*****b.uk
+0300 2024-05-10 14:35:19 DEBUG dns: match[0] outbound=any => local
+0300 2024-05-10 14:35:19 INFO [3172071579 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:52519
+0300 2024-05-10 14:35:19 INFO [3172071579 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 14:35:19 DEBUG [3172071579 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 14:35:19 INFO [1274401515 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:54451
+0300 2024-05-10 14:35:19 INFO [1274401515 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 14:35:19 INFO [3172071579 0ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:19 DEBUG [3172071579 0ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 14:35:19 DEBUG dns: exchange de.z****b.uk. IN A
+0300 2024-05-10 14:35:19 DEBUG [1274401515 1ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 14:35:19 INFO [1274401515 2ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:19 INFO [1274401515 2ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 14:35:19 DEBUG dns: exchange ipv4only.arpa. IN A
+0300 2024-05-10 14:35:19 DEBUG dns: exchange example.org. IN A
+0300 2024-05-10 14:35:19 DEBUG dns: exchange detectportal.firefox.com. IN A
+0300 2024-05-10 14:35:19 INFO [1638364722 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:55417
+0300 2024-05-10 14:35:19 INFO [1638364722 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 14:35:19 DEBUG [1638364722 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 14:35:19 INFO [1010751971 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:54452
+0300 2024-05-10 14:35:19 INFO [1010751971 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 14:35:19 INFO [1638364722 0ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:19 DEBUG [1638364722 0ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 14:35:19 DEBUG dns: exchange api.ipify.org. IN A
+0300 2024-05-10 14:35:19 DEBUG [1010751971 1ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 14:35:19 INFO [1010751971 2ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:19 INFO [1010751971 2ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 14:35:19 INFO [3906937308 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:51723
+0300 2024-05-10 14:35:19 INFO [3906937308 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 14:35:19 DEBUG [3906937308 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 14:35:19 INFO [3906937308 1ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:19 DEBUG [3906937308 1ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 14:35:19 INFO [22070105 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:54453
+0300 2024-05-10 14:35:19 INFO [22070105 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 14:35:19 DEBUG dns: exchange s.myangular.life. IN A
+0300 2024-05-10 14:35:19 DEBUG [22070105 2ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 14:35:19 INFO [22070105 2ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:19 INFO [22070105 2ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 14:35:20 DEBUG dns: exchange de.z****b.uk. IN A
+0300 2024-05-10 14:35:20 DEBUG dns: exchange api.ipify.org. IN A
+0300 2024-05-10 14:35:20 DEBUG dns: exchange geo.prod.do.dsp.mp.microsoft.com. IN A
+0300 2024-05-10 14:35:20 DEBUG dns: exchange mozilla.cloudflare-dns.com. IN A
+0300 2024-05-10 14:35:20 DEBUG dns: exchange s.myangular.life. IN A
+0300 2024-05-10 14:35:21 DEBUG dns: exchange de.z*****b.uk. IN A
+0300 2024-05-10 14:35:21 DEBUG dns: exchange api.ipify.org. IN A
+0300 2024-05-10 14:35:21 DEBUG dns: exchange s.myangular.life. IN A
+0300 2024-05-10 14:35:22 DEBUG dns: exchange de.z*****b.uk. IN A
+0300 2024-05-10 14:35:22 INFO [1373373992 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:51372
+0300 2024-05-10 14:35:22 INFO [1373373992 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 14:35:22 DEBUG [1373373992 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 14:35:22 INFO [2263787898 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:54454
+0300 2024-05-10 14:35:22 INFO [2263787898 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 14:35:22 INFO [1373373992 0ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:22 DEBUG [1373373992 0ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 14:35:22 DEBUG dns: exchange sw.z*****b.fun. IN A
+0300 2024-05-10 14:35:22 DEBUG [2263787898 1ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 14:35:22 INFO [2263787898 1ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:22 INFO [2263787898 1ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 14:35:22 DEBUG dns: exchange www.msftconnecttest.com. IN A
+0300 2024-05-10 14:35:23 DEBUG dns: exchange de.z******b.uk. IN A
+0300 2024-05-10 14:35:23 DEBUG dns: exchange ipv4only.arpa. IN A
+0300 2024-05-10 14:35:23 DEBUG dns: exchange example.org. IN A
+0300 2024-05-10 14:35:23 DEBUG dns: exchange detectportal.firefox.com. IN A
+0300 2024-05-10 14:35:23 DEBUG dns: exchange sw.z******b.fun. IN A
+0300 2024-05-10 14:35:23 DEBUG dns: exchange api.ipify.org. IN A
+0300 2024-05-10 14:35:23 DEBUG dns: exchange s.myangular.life. IN A
+0300 2024-05-10 14:35:24 DEBUG dns: lookup failed for de.zeroclub.uk: lookup de.z*****b.uk: i/o timeout
+0300 2024-05-10 14:35:24 DEBUG [2167082916 8.87s] dns: lookup domain de.z******b.uk
+0300 2024-05-10 14:35:24 DEBUG [2167082916 8.87s] dns: match[0] outbound=any => local
+0300 2024-05-10 14:35:24 INFO outbound/vless[proxy]: outbound multiplex connection to 8.8.8.8:853
+0300 2024-05-10 14:35:24 DEBUG dns: exchange sw.z*****b.fun. IN A
+0300 2024-05-10 14:35:24 INFO [2264777023 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:52722
+0300 2024-05-10 14:35:24 INFO [4087248027 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:53251
+0300 2024-05-10 14:35:24 INFO [4087248027 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 14:35:24 INFO [2264777023 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 14:35:24 DEBUG [4087248027 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 14:35:24 DEBUG [2264777023 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 14:35:24 INFO [1187693445 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:54456
+0300 2024-05-10 14:35:24 INFO [1187693445 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 14:35:24 INFO [4180792247 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:54455
+0300 2024-05-10 14:35:24 INFO [4180792247 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 14:35:24 INFO [4087248027 1ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:24 INFO [2264777023 1ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:24 DEBUG [4087248027 1ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 14:35:24 DEBUG [2264777023 1ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 14:35:24 DEBUG dns: exchange nl.z*****b.uk. IN A
+0300 2024-05-10 14:35:24 DEBUG dns: exchange ssl.gstatic.com. IN A
+0300 2024-05-10 14:35:24 DEBUG [1187693445 1ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 14:35:24 DEBUG [4180792247 1ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 14:35:24 INFO [4180792247 2ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:24 INFO [1187693445 2ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:24 INFO [1187693445 2ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 14:35:24 INFO [4180792247 2ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 14:35:24 DEBUG dns: exchange geo.prod.do.dsp.mp.microsoft.com. IN A
+0300 2024-05-10 14:35:24 DEBUG dns: exchange mozilla.cloudflare-dns.com. IN A
+0300 2024-05-10 14:35:25 INFO [3216805581 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:55561
+0300 2024-05-10 14:35:25 INFO [3216805581 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 14:35:25 DEBUG [3216805581 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 14:35:25 INFO [2880820778 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:54457
upload the full configuration information generated by v2rayn, removing your node information when turn on tun and try turn off mux
upload the full configuration information generated by v2rayn, removing your node information when turn on tun and try turn off mux
I figured out the TUN-mode. and I didn't like him. The problem really is that I tried to raise it for VLESS+TLS... but TUN does not work with TLS. ((( Therefore, you need to use VMESS or TROJAN, but they do not suit me. In addition, it turns out that the Sing-box core does not support domain:.ru, domain:.by in general, I had to go back to the regular "system proxy"..
Thank you very much for your help and your time. Sorry.
domain:.ru? Maybe you should use domain_suffix
"domain_suffix": ".ru"
domain:.ru? Maybe you should use domain_suffix
"domain_suffix": ".ru"
with the XRay core it works simply: Settings -> Routing Settings - Direct Domain or IP -> domain:.ru
No, sorry. geosite not work too
FATAL[0000] start service: initialize rule-set[4]: initial rule-set: geosite-ru: unexpected status: 404 Not Found Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-ru.srs": context canceled
сб, 11 мая 2024 г. в 06:27, Wuch @.***>:
The domain field is utilized for specifying a single address name, such as "domain: github.com". To route traffic for all domains ending in ".ru", you have the option of employing a regular expression like "domain: .* .ru". You can also use "geosite: ru" to achieve that. By the way, sing-box turns to rule-set, click here https://sing-box.sagernet.org/configuration/rule-set/ for more detail.
— Reply to this email directly, view it on GitHub https://github.com/2dust/v2rayN/issues/5079#issuecomment-2105510779, or unsubscribe https://github.com/notifications/unsubscribe-auth/AGHHPIVKGDEZXR7Y7JAROZDZBWF3RAVCNFSM6AAAAABHOGVONGVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDCMBVGUYTANZXHE . You are receiving this because you authored the thread.Message ID: @.***>
"domain: .* .ru" - don't work with Sing-box core too. work "domain:.ru" with XRay core only.
сб, 11 мая 2024 г. в 06:27, Wuch @.***>:
The domain field is utilized for specifying a single address name, such as "domain: github.com". To route traffic for all domains ending in ".ru", you have the option of employing a regular expression like "domain: .* .ru". You can also use "geosite: ru" to achieve that. By the way, sing-box turns to rule-set, click here https://sing-box.sagernet.org/configuration/rule-set/ for more detail.
— Reply to this email directly, view it on GitHub https://github.com/2dust/v2rayN/issues/5079#issuecomment-2105510779, or unsubscribe https://github.com/notifications/unsubscribe-auth/AGHHPIVKGDEZXR7Y7JAROZDZBWF3RAVCNFSM6AAAAABHOGVONGVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDCMBVGUYTANZXHE . You are receiving this because you authored the thread.Message ID: @.***>
XRay core is BETTER... Will be TUN-mode on XRay core?
Same Problem
6.44
甚至我发现都无法生成 sing-box 的虚拟网卡
配置成功 [Shadowsocks] 新加坡-05(db9eae23***com:57045) Microsoft Windows NT 10.0.22631.0 - 64 启动服务(2024/05/11 18:17:52)... FATAL[0000] start service: initialize rule-set[3]: initial rule-set: geoip-cn: Get "https://raw.githubusercontent.com/SagerNet/sing-geoip/rule-set/geoip-cn.srs": http2: client connection force closed via ClientConn.Close | initialize rule-set[3]: initial rule-set: geosite-cn: Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-cn.srs": http2: client connection force closed via ClientConn.Close | initialize rule-set[3]: initial rule-set: geosite-geolocation-!cn: Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-geolocation-!cn.srs": http2: client connection force closed via ClientConn.Close | initialize rule-set[3]: initial rule-set: geosite-category-ads-all: Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-category-ads-all.srs": http2: client connection force closed via ClientConn.Close FATAL[0000] start service: initialize rule-set[3]: initial rule-set: geoip-cn: Get "https://raw.githubusercontent.com/SagerNet/sing-geoip/rule-set/geoip-cn.srs": http2: client connection force closed via ClientConn.Close | initialize rule-set[3]: initial rule-set: geosite-cn: Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-cn.srs": http2: client connection force closed via ClientConn.Close | initialize rule-set[3]: initial rule-set: geosite-geolocation-!cn: Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-geolocation-!cn.srs": http2: client connection force closed via ClientConn.Close | initialize rule-set[3]: initial rule-set: geosite-category-ads-all: Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-category-ads-all.srs": http2: client connection force closed via ClientConn.Close 2024/05/11 18:17:52 系统代理设置改变ForcedChange
@dascwf
begin with this dns-config
{
"servers": [
{
"tag": "remote",
"address": "1.1.1.1",
"strategy": "ipv4_only",
"detour": "proxy"
},
{
"tag": "local",
"address": "223.5.5.5",
"strategy": "ipv4_only",
"detour": "direct"
},
{
"tag": "block",
"address": "rcode://success"
}
],
"rules": [
{
"rule_set": [
"geosite-category-ads-all"
],
"server": "block"
}
]
}
also, clear all routing settings. when it will work, then add all rules. and make sure that the settings on the server are correct for TUN mode. Not any settings are suitable for this.
Same Problem
6.44
甚至我发现都无法生成 sing-box 的虚拟网卡
配置成功 [Shadowsocks] 新加坡-05(db9eae23***com:57045) Microsoft Windows NT 10.0.22631.0 - 64 启动服务(2024/05/11 18:17:52)... FATAL[0000] start service: initialize rule-set[3]: initial rule-set: geoip-cn: Get "https://raw.githubusercontent.com/SagerNet/sing-geoip/rule-set/geoip-cn.srs": http2: client connection force closed via ClientConn.Close | initialize rule-set[3]: initial rule-set: geosite-cn: Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-cn.srs": http2: client connection force closed via ClientConn.Close | initialize rule-set[3]: initial rule-set: geosite-geolocation-!cn: Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-geolocation-!cn.srs": http2: client connection force closed via ClientConn.Close | initialize rule-set[3]: initial rule-set: geosite-category-ads-all: Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-category-ads-all.srs": http2: client connection force closed via ClientConn.Close FATAL[0000] start service: initialize rule-set[3]: initial rule-set: geoip-cn: Get "https://raw.githubusercontent.com/SagerNet/sing-geoip/rule-set/geoip-cn.srs": http2: client connection force closed via ClientConn.Close | initialize rule-set[3]: initial rule-set: geosite-cn: Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-cn.srs": http2: client connection force closed via ClientConn.Close | initialize rule-set[3]: initial rule-set: geosite-geolocation-!cn: Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-geolocation-!cn.srs": http2: client connection force closed via ClientConn.Close | initialize rule-set[3]: initial rule-set: geosite-category-ads-all: Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-category-ads-all.srs": http2: client connection force closed via ClientConn.Close 2024/05/11 18:17:52 系统代理设置改变ForcedChange
您是不是开了多路复用?是话先尝试关闭
Solved.
The same error as above. Then , turn off : MUX multiplexing in the settings and it solved it.
之前跟上面一样报错. 随后 , 在设置里关闭 : MUX 多路复用 就解决了.
Solved.
The same error as above. Then , turn off : MUX multiplexing in the settings and it solved it.
之前跟上面一样报错. 随后 , 在设置里关闭 : MUX 多路复用 就解决了.
MUX 有很多兼容问题,没有必要请不要使用
the same issue:
FATAL[0000] start service: initialize rule-set[1]: initial rule-set: geosite-geolocation-!cn: Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-geolocation-!cn.srs": reality verification failed | initialize rule-set[1]: initial rule-set: geosite-category-ads-all: Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-category-ads-all.srs": context canceled FATAL[0000] start service: initialize rule-set[1]: initial rule-set: geosite-geolocation-!cn: Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-geolocation-!cn.srs": reality verification failed | initialize rule-set[1]: initial rule-set: geosite-category-ads-all: Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-category-ads-all.srs": context canceled
MUX关闭了也不行,用的是sing-box内核
i have the same issue FATAL[0000] start service: initialize rule-set[1]: initial rule-set: geosite-geolocation-!cn: Get ...
and mux is already off. to use those DNS configs mentioned above where should i put them ?