OpenClash icon indicating copy to clipboard operation
OpenClash copied to clipboard

[Bug]版本更新界面 所有版本都显示:正在收集数据...

Open pcj1997 opened this issue 11 months ago • 11 comments

Verify Steps

  • [x] Tracker 我已经在 Issue Tracker 中找过我要提出的问题
  • [x] Branch 我知道 OpenClash 的 Dev 分支切换开关位于插件设置-版本更新中,或者我会手动下载并安装 Dev 分支的 OpenClash
  • [x] Latest 我已经使用最新 Dev 版本测试过,问题依旧存在
  • [x] Relevant 我知道 OpenClash 与 内核(Core)、控制面板(Dashboard)、在线订阅转换(Subconverter)等项目之间无直接关系,仅相互调用
  • [x] Definite 这确实是 OpenClash 出现的问题
  • [x] Contributors 我有能力协助 OpenClash 开发并解决此问题
  • [ ] Meaningless 我提交的是无意义的催促更新或修复请求

OpenClash Version

v0.46.080

Bug on Environment

Immortalwrt

OpenWrt Version

ImmortalWrt 24.10.0 r32824-6a73dae98c9c / LuCI openwrt-24.10 branch 25.017.24510~d42ec55

Bug on Platform

Linux-armv7, Linux-arm64

Describe the Bug

版本更新界面所有版本都显示:正在收集数据... 如下图所示

Image

查看web报文发现http://192.168.2.1/cgi-bin/luci/admin/services/openclash/update?1743174267326接口一直无响应。

To Reproduce

每次打开版本更新都会显示正在收集数据...

OpenClash Log

OpenClash 调试日志

生成时间: 2025-03-28 23:06:53
插件版本: 0.46.080
隐私提示: 上传此日志前请注意检查、屏蔽公网IP、节点、密码等相关敏感信息



#===================== 系统信息 =====================#

主机型号: FriendlyElec NanoPi R5S
固件版本: ImmortalWrt 24.10.0 r32824-6a73dae98c9c
LuCI版本: 25.051.33724~da6871e
内核版本: 6.6.73
处理器架构: aarch64_generic

#此项有值时,如不使用IPv6,建议到网络-接口-lan的设置中禁用IPV6的DHCP
IPV6-DHCP: 

DNS劫持: Dnsmasq 转发
#DNS劫持为Dnsmasq时,此项结果应仅有配置文件的DNS监听地址
Dnsmasq转发设置: 127.0.*.*#7874

#===================== 依赖检查 =====================#

dnsmasq-full: 已安装
dnsmasq-full(ipset): 未安装
dnsmasq-full(nftset): 已安装
bash: 已安装
curl: 已安装
ca-bundle: 已安装
ipset: 未安装
ip-full: 已安装
ruby: 已安装
ruby-yaml: 已安装
ruby-psych: 已安装
ruby-pstore: 已安装
kmod-tun(TUN模式): 已安装
luci-compat(Luci >= 19.07): 已安装
kmod-inet-diag(PROCESS-NAME): 已安装
unzip: 已安装
kmod-nft-tproxy: 已安装

#===================== 内核检查 =====================#

运行状态: 运行中
运行内核:Meta
进程pid: 5578
运行用户: root
已选择的架构: linux-arm64

#下方无法显示内核版本号时请确认您的内核版本是否正确或者有无权限

Meta内核版本: alpha-g7b38261
Meta内核文件: 存在
Meta内核运行权限: 正常

#===================== 插件设置 =====================#

当前配置文件: /etc/openclash/config/YUN.yaml
启动配置文件: /etc/openclash/YUN.yaml
运行模式: fake-ip
默认代理模式: rule
UDP流量转发(tproxy): 启用
自定义DNS: 启用
IPV6代理: 停用
IPV6-DNS解析: 停用
禁用Dnsmasq缓存: 启用
自定义规则: 启用
仅允许内网: 启用
仅代理命中规则流量: 停用
仅允许常用端口流量: 停用
绕过中国大陆IP: 启用
路由本机代理: 启用

#启动异常时建议关闭此项后重试
混合节点: 停用
保留配置: 停用

#启动异常时建议关闭此项后重试
第三方规则: 停用

#===================== 自定义规则 一 =====================#
rules:
##- PROCESS-NAME,curl,DIRECT #匹配路由自身进程(curl直连)
##- DOMAIN-SUFFIX,google.com,Proxy #匹配域名后缀(交由Proxy代理服务器组)
##- DOMAIN-KEYWORD,google,Proxy #匹配域名关键字(交由Proxy代理服务器组)
##- DOMAIN,google.com,Proxy #匹配域名(交由Proxy代理服务器组)
##- DOMAIN-SUFFIX,ad.com,REJECT #匹配域名后缀(拒绝)
##- IP-CIDR,127.0.*.*/8,DIRECT #匹配数据目标IP(直连)
##- SRC-IP-CIDR,192.168.*.*/32,DIRECT #匹配数据发起IP(直连)
##- DST-PORT,80,DIRECT #匹配数据目标端口(直连)
##- SRC-PORT,7777,DIRECT #匹配数据源端口(直连)
##- GEOSITE,category-public-tracker,DIRECT #匹配GEOSITE数据库规则(直连)
##- DOMAIN-REGEX,^abc.*com,PROXY #正则匹配域名
##- RULE-SET,providername,PROXY #匹配规则集
##- IP-CIDR6,2620:*:*:*::7/32,PROXY
##- IP-SUFFIX,8.8.*.*/24,PROXY
##- IP-ASN,13335,DIRECT

##- SRC-GEOIP,cn,DIRECT
##- SRC-IP-ASN,9808,DIRECT
##- SRC-IP-SUFFIX,192.168.*.*/8,DIRECT

##- IN-PORT,7890,PROXY
##- IN-TYPE,SOCKS/HTTP,PROXY
##- IN-USER,mihomo,PROXY
##- IN-NAME,ss,PROXY

##- PROCESS-NAME-REGEX,curl$,PROXY
##- PROCESS-NAME-REGEX,(?i)Telegram,PROXY
##- PROCESS-NAME-REGEX,.*telegram.*,PROXY

##- NETWORK,udp,DIRECT
##- DSCP,4,DIRECT

##- AND,((DOMAIN,baidu.com),(NETWORK,UDP)),DIRECT
##- OR,((NETWORK,UDP),(DOMAIN,baidu.com)),REJECT
##- NOT,((DOMAIN,baidu.com)),PROXY
##- SUB-RULE,(NETWORK,tcp),sub-rule

##排序在上的规则优先生效,如添加(去除规则前的#号):
##IP段:192.168.*.*-192.168.*.* 直连
##- SRC-IP-CIDR,192.168.*.*/31,DIRECT
##- SRC-IP-CIDR,192.168.*.*/30,DIRECT
##- SRC-IP-CIDR,192.168.*.*/29,DIRECT
##- SRC-IP-CIDR,192.168.*.*/28,DIRECT
##- SRC-IP-CIDR,192.168.*.*/27,DIRECT
##- SRC-IP-CIDR,192.168.*.*/26,DIRECT
##- SRC-IP-CIDR,192.168.*.*/26,DIRECT
##- SRC-IP-CIDR,192.168.*.*/29,DIRECT
##- SRC-IP-CIDR,192.168.*.*/32,DIRECT

##IP段:192.168.*.*-192.168.*.* 直连
##- SRC-IP-CIDR,192.168.*.*/31,DIRECT
##- SRC-IP-CIDR,192.168.*.*/30,DIRECT
##- SRC-IP-CIDR,192.168.*.*/28,DIRECT
##- SRC-IP-CIDR,192.168.*.*/27,DIRECT

##此时IP为192.168.*.*和192.168.*.*的客户端流量走代理(策略),其余客户端不走代理
##因为Fake-IP模式下,IP地址为192.168.*.*的路由器自身流量可走代理(策略),所以需要排除

##仅设置路由器自身直连:
##- SRC-IP-CIDR,192.168.*.*/32,DIRECT
##- SRC-IP-CIDR,198.18.*.*/32,DIRECT

##DDNS
##- DOMAIN-KEYWORD,synology,DIRECT
##- DOMAIN-KEYWORD,quickconnect,DIRECT
##- DOMAIN-SUFFIX,checkip.dyndns.org,DIRECT
##- DOMAIN-SUFFIX,checkipv6.dyndns.org,DIRECT
##- DOMAIN-SUFFIX,checkip.synology.com,DIRECT
##- DOMAIN-SUFFIX,ifconfig.co,DIRECT
##- DOMAIN-SUFFIX,api.myip.com,DIRECT
##- DOMAIN-SUFFIX,ip-api.com,DIRECT
##- DOMAIN-SUFFIX,ipapi.co,DIRECT
##- DOMAIN-SUFFIX,ip6.seeip.org,DIRECT
##- DOMAIN-SUFFIX,members.3322.org,DIRECT

##在线IP段转CIDR地址:http://ip2cidr.com
#===================== 自定义规则 二 =====================#
rules:
##- DOMAIN-SUFFIX,google.com,Proxy #匹配域名后缀(交由Proxy代理服务器组)
##- DOMAIN-KEYWORD,google,Proxy #匹配域名关键字(交由Proxy代理服务器组)
##- DOMAIN,google.com,Proxy #匹配域名(交由Proxy代理服务器组)
##- DOMAIN-SUFFIX,ad.com,REJECT #匹配域名后缀(拒绝)
##- IP-CIDR,127.0.*.*/8,DIRECT #匹配数据目标IP(直连)
##- SRC-IP-CIDR,192.168.*.*/32,DIRECT #匹配数据发起IP(直连)
##- DST-PORT,80,DIRECT #匹配数据目标端口(直连)
##- SRC-PORT,7777,DIRECT #匹配数据源端口(直连)

#===================== 配置文件 =====================#

mixed-port: 7893
allow-lan: true
mode: rule
log-level: info
external-controller: 0.0.*.*:9090
proxy-groups:
- name: "\U0001F680 手动选择"
  type: select
  proxies:
  - "♻️ 自动选择"
  - "\U0001F1ED\U0001F1F0 香港节点"
  - "\U0001F1FA\U0001F1F8 美国节点"
  - "\U0001F1EF\U0001F1F5 日本节点"
  - "\U0001F1F8\U0001F1EC 新加坡节点"
  - "\U0001F1FC\U0001F1F8 台湾节点"
  - "\U0001F1F0\U0001F1F7 韩国节点"
  - "\U0001F1E8\U0001F1E6 加拿大节点"
  - "\U0001F1EC\U0001F1E7 英国节点"
  - "\U0001F1EB\U0001F1F7 法国节点"
  - "\U0001F1E9\U0001F1EA 德国节点"
  - "\U0001F1F3\U0001F1F1 荷兰节点"
  - "\U0001F1F9\U0001F1F7 土耳其节点"
  - "\U0001F1FB\U0001F1F3 越南节点"
  -
    #      Value['mixed-port']=7893;
    #   }.join;

    #   rescue Exception => e
    #      puts '${LOGTIME} Error: Set General Failed,【' + e.message + '】';
    #   ensure
    #      File.open('$CONFIG_FILE','w') {|f| YAML.dump(Value, f)};
    #   end" 2>/dev/null >> $LOG_FILE

exit 0
#===================== 自定义防火墙设置 =====================#

#!/bin/sh
. /usr/share/openclash/log.sh
. /lib/functions.sh

# This script is called by /etc/init.d/openclash
# Add your custom firewall rules here, they will be added after the end of the OpenClash iptables rules

LOG_OUT "Tip: Start Add Custom Firewall Rules..."

exit 0
#===================== IPTABLES 防火墙设置 =====================#

#IPv4 NAT chain


#IPv4 Mangle chain


#IPv4 Filter chain


#IPv6 NAT chain


#IPv6 Mangle chain


#IPv6 Filter chain


#===================== NFTABLES 防火墙设置 =====================#

table inet fw4 {
	chain input {
		type filter hook input priority filter; policy accept;
		udp dport 443 ip daddr != @china_ip_route counter packets 129 bytes 165912 reject with icmp port-unreachable comment "OpenClash QUIC REJECT"
		iifname "pppoe-wan" ip saddr != @localnetwork counter packets 22431 bytes 10220195 jump openclash_wan_input
		iif "lo" accept comment "!fw4: Accept traffic from loopback"
		ct state vmap { established : accept, related : accept } comment "!fw4: Handle inbound flows"
		tcp flags & (fin | syn | rst | ack) == syn jump syn_flood comment "!fw4: Rate limit TCP syn packets"
		iifname "br-lan" jump input_lan comment "!fw4: Handle lan IPv4/IPv6 input traffic"
		iifname "pppoe-wan" jump input_wan comment "!fw4: Handle wan IPv4/IPv6 input traffic"
	}
}
table inet fw4 {
	chain forward {
		type filter hook forward priority filter; policy accept;
		meta l4proto { tcp, udp } flow add @ft
		ct state vmap { established : accept, related : accept } comment "!fw4: Handle forwarded flows"
		iifname "br-lan" jump forward_lan comment "!fw4: Handle lan IPv4/IPv6 forward traffic"
		iifname "pppoe-wan" jump forward_wan comment "!fw4: Handle wan IPv4/IPv6 forward traffic"
	}
}
table inet fw4 {
	chain dstnat {
		type nat hook prerouting priority dstnat; policy accept;
		meta l4proto { tcp, udp } th dport 53 counter packets 2773 bytes 212019 redirect to :53 comment "OpenClash DNS Hijack"
		iifname "br-lan" jump dstnat_lan comment "!fw4: Handle lan IPv4/IPv6 dstnat traffic"
		iifname "pppoe-wan" jump dstnat_wan comment "!fw4: Handle wan IPv4/IPv6 dstnat traffic"
		ip protocol tcp counter packets 1596 bytes 93488 jump openclash
	}
}
table inet fw4 {
	chain srcnat {
		type nat hook postrouting priority srcnat; policy accept;
		oifname "br-lan" jump srcnat_lan comment "!fw4: Handle lan IPv4/IPv6 srcnat traffic"
		oifname "pppoe-wan" jump srcnat_wan comment "!fw4: Handle wan IPv4/IPv6 srcnat traffic"
	}
}
table inet fw4 {
	chain nat_output {
		type nat hook output priority filter - 1; policy accept;
		meta skgid != 65534 meta l4proto { tcp, udp } th dport 53 ip daddr 127.0.*.* counter packets 14 bytes 1198 redirect to :53 comment "OpenClash DNS Hijack"
		ip protocol tcp counter packets 2230 bytes 133800 jump openclash_output
	}
}
table inet fw4 {
	chain mangle_prerouting {
		type filter hook prerouting priority mangle; policy accept;
		ip protocol udp counter packets 24799 bytes 4305341 jump openclash_mangle
	}
}
table inet fw4 {
	chain mangle_output {
		type route hook output priority mangle; policy accept;
		ip protocol udp counter packets 28214 bytes 2796865 jump openclash_mangle_output
	}
}
table inet fw4 {
	chain openclash {
		ip daddr @localnetwork counter packets 641 bytes 34992 return
		ct direction reply counter packets 0 bytes 0 return
		ip protocol tcp ip daddr 198.18.*.*/16 counter packets 323 bytes 19476 redirect to :7892
		ip daddr @china_ip_route ip daddr != @china_ip_route_pass counter packets 445 bytes 27792 return
		ip protocol tcp counter packets 187 bytes 11228 redirect to :7892
	}
}
table inet fw4 {
	chain openclash_mangle {
		meta nfproto ipv4 udp sport 500 counter packets 0 bytes 0 return
		meta nfproto ipv4 udp sport 68 counter packets 1 bytes 336 return
		ip saddr 192.168.*.* udp sport 16666 counter packets 0 bytes 0 return
		ip daddr @localnetwork counter packets 22399 bytes 3490300 return
		ct direction reply counter packets 1151 bytes 351878 return
		meta l4proto udp ip daddr 198.18.*.*/16 meta mark set 0x00000162 tproxy ip to 127.0.*.*:7895 counter packets 126 bytes 158472 accept
		ip daddr @china_ip_route ip daddr != @china_ip_route_pass counter packets 389 bytes 58040 return
		ip protocol udp counter packets 733 bytes 246315 jump openclash_upnp
		meta l4proto udp meta mark set 0x00000162 tproxy ip to 127.0.*.*:7895 counter packets 728 bytes 245871 accept
	}
}
table inet fw4 {
	chain openclash_mangle_output {
		meta nfproto ipv4 udp sport 500 counter packets 0 bytes 0 return
		meta nfproto ipv4 udp sport 68 counter packets 0 bytes 0 return
		ip saddr 192.168.*.* udp sport 16666 counter packets 0 bytes 0 return
		meta skgid 65534 counter packets 10546 bytes 1294809 return
		ip daddr @localnetwork counter packets 17668 bytes 1502056 return
		ct direction reply counter packets 0 bytes 0 return
		meta l4proto udp ip daddr 198.18.*.*/16 meta mark set 0x00000162 counter packets 0 bytes 0 accept
		ip daddr @china_ip_route ip daddr != @china_ip_route_pass counter packets 0 bytes 0 return
		meta mark set 0x00000162 counter packets 0 bytes 0 accept
	}
}
table inet fw4 {
	chain openclash_output {
		ip saddr 192.168.*.* tcp sport 16666 counter packets 0 bytes 0 return
		meta skgid 65534 counter packets 1853 bytes 111180 return
		ip daddr @localnetwork counter packets 373 bytes 22380 return
		ct direction reply counter packets 0 bytes 0 return
		ip protocol tcp ip daddr 198.18.*.*/16 counter packets 4 bytes 240 redirect to :7892
		ip daddr @china_ip_route ip daddr != @china_ip_route_pass counter packets 0 bytes 0 return
		ip protocol tcp counter packets 0 bytes 0 redirect to :7892
	}
}
table inet fw4 {
	chain openclash_wan_input {
		th dport { 7874, 7890, 7891, 7892, 7893, 7895, 9090 } counter packets 0 bytes 0 reject
	}
}

#===================== IPSET状态 =====================#


#===================== 路由表状态 =====================#

#IPv4

#route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
0.0.*.*         39.78.*.*      0.0.*.*         UG    0      0        0 pppoe-wan
39.78.*.*      0.0.*.*         255.255.*.* UH    0      0        0 pppoe-wan
192.168.*.*     0.0.*.*         255.255.*.*   U     0      0        0 br-lan

#ip route list
default via 39.78.*.* dev pppoe-wan proto static 
39.78.*.* dev pppoe-wan proto kernel scope link src 39.78.*.* 
192.168.*.*/24 dev br-lan proto kernel scope link src 192.168.*.* 

#ip rule show
0:	from all lookup local
32765:	from all fwmark 0x162 lookup 354
32766:	from all lookup main
32767:	from all lookup default

#IPv6

#route -A inet6
Kernel IPv6 routing table
Destination                                 Next Hop                                Flags Metric Ref    Use Iface
::/0                                        fe80::*:*:*:5a3f               UG    512    5        0 pppoe-wan
::/0                                        fe80::*:*:*:5a3f               UG    512    6        0 pppoe-wan
2408:*:*:*::/64                     ::                                      !n    2147483647 2        0 lo      
2408:*:*:*::/64                     ::                                      U     1024   4        0 br-lan  
2408:*:*:*::/60                     ::                                      !n    2147483647 2        0 lo      
fde4:7203:faa8::/64                         ::                                      U     1024   3        0 br-lan  
fde4:7203:faa8::/48                         ::                                      !n    2147483647 2        0 lo      
fe80::*:*:*:ecd7/128               ::                                      U     256    1        0 pppoe-wan
fe80::*:*:*:5a3f/128               ::                                      U     256    1        0 pppoe-wan
fe80::/64                                   ::                                      U     256    5        0 br-lan  
fe80::/64                                   ::                                      U     256    1        0 eth0    
::/0                                        ::                                      !n    -1     2        0 lo      
::1/128                                     ::                                      Un    0      7        0 lo      
2408:*:*:*::/128                    ::                                      Un    0      3        0 pppoe-wan
2408:*:*:*:2119:b922:3fea:ecd7/128  ::                                      Un    0      4        0 pppoe-wan
2408:*:*:*::/128                    ::                                      Un    0      3        0 br-lan  
2408:*:*:*:9cb2:2dff:fe88:827d/128  ::                                      Un    0      7        0 br-lan  
fde4:7203:faa8::/128                        ::                                      Un    0      3        0 br-lan  
fde4:*:*:*:9cb2:2dff:fe88:827d/128    ::                                      Un    0      5        0 br-lan  
fe80::/128                                  ::                                      Un    0      4        0 br-lan  
fe80::/128                                  ::                                      Un    0      3        0 eth0    
fe80::*:*:*:ecd7/128               ::                                      Un    0      3        0 pppoe-wan
fe80::*:*:*:827c/128               ::                                      Un    0      2        0 eth0    
fe80::*:*:*:827d/128               ::                                      Un    0      6        0 br-lan  
ff00::/8                                    ::                                      U     256    7        0 br-lan  
ff00::/8                                    ::                                      U     256    2        0 eth0    
ff00::/8                                    ::                                      U     256    5        0 pppoe-wan
::/0                                        ::                                      !n    -1     2        0 lo      

#ip -6 route list
default from 2408:*:*:*::/64 via fe80::cab6:d3ff:fe04:5a3f dev pppoe-wan proto static metric 512 pref medium
default from 2408:*:*:*::/60 via fe80::cab6:d3ff:fe04:5a3f dev pppoe-wan proto static metric 512 pref medium
unreachable 2408:*:*:*::/64 dev lo proto static metric 2147483647 pref medium
2408:*:*:*::/64 dev br-lan proto static metric 1024 pref medium
unreachable 2408:*:*:*::/60 dev lo proto static metric 2147483647 pref medium
fde4:7203:faa8::/64 dev br-lan proto static metric 1024 pref medium
unreachable fde4:7203:faa8::/48 dev lo proto static metric 2147483647 pref medium
fe80::*:*:*:ecd7 dev pppoe-wan proto kernel metric 256 pref medium
fe80::*:*:*:5a3f dev pppoe-wan proto kernel metric 256 pref medium
fe80::/64 dev br-lan proto kernel metric 256 pref medium
fe80::/64 dev eth0 proto kernel metric 256 pref medium

#ip -6 rule show
0:	from all lookup local
32766:	from all lookup main
4200000000:	from 2408:*:*:*:9cb2:2dff:fe88:827d/64 iif br-lan unreachable

#===================== 端口占用状态 =====================#

tcp        0      0 :::9090                 :::*                    LISTEN      5578/clash
tcp        0      0 :::7891                 :::*                    LISTEN      5578/clash
tcp        0      0 :::7890                 :::*                    LISTEN      5578/clash
tcp        0      0 :::7895                 :::*                    LISTEN      5578/clash
tcp        0      0 :::7893                 :::*                    LISTEN      5578/clash
tcp        0      0 :::7892                 :::*                    LISTEN      5578/clash
tcp        0      0 :::7874                 :::*                    LISTEN      5578/clash
udp        0      0 :::49682                :::*                                5578/clash
udp        0      0 :::7874                 :::*                                5578/clash
udp        0      0 :::7891                 :::*                                5578/clash
udp        0      0 :::7892                 :::*                                5578/clash
udp        0      0 :::7893                 :::*                                5578/clash
udp        0      0 :::7895                 :::*                                5578/clash

#===================== 测试本机DNS查询(www.baidu.com) =====================#

Server:		127.0.*.*
Address:	127.0.*.*:53

www.baidu.com	canonical name = www.a.shifen.com
Name:	www.a.shifen.com
Address: 110.242.*.*
Name:	www.a.shifen.com
Address: 110.242.*.*



#===================== 测试内核DNS查询(www.instagram.com) =====================#

Status: 0
TC: false
RD: true
RA: true
AD: false
CD: false

Question: 
  Name: www.instagram.com.
  Qtype: 1
  Qclass: 1

Answer: 
  TTL: 30
  data: 157.240.*.*
  name: www.instagram.com.
  type: 1

Status: 0
TC: false
RD: true
RA: true
AD: false
CD: false

Question: 
  Name: www.instagram.com.
  Qtype: 28
  Qclass: 1

Answer: 
  TTL: 219
  data: 2a03:*:*:*:face:b00c:0:25de
  name: www.instagram.com.
  type: 28


Dnsmasq 当前默认 resolv 文件:/tmp/resolv.conf.d/resolv.conf.auto

#===================== /tmp/resolv.conf.auto =====================#

# Interface wan
nameserver 202.102.*.*
nameserver 202.102.*.*
# Interface wan_6

#===================== /tmp/resolv.conf.d/resolv.conf.auto =====================#

# Interface wan
nameserver 202.102.*.*
nameserver 202.102.*.*
# Interface wan_6

#===================== 测试本机网络连接(www.baidu.com) =====================#

HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: private, no-cache, no-store, proxy-revalidate, no-transform
Connection: keep-alive
Content-Length: 277
Content-Type: text/html
Date: Fri, 28 Mar 2025 15:06:56 GMT
Etag: "575e1f59-115"
Last-Modified: Mon, 13 Jun 2016 02:50:01 GMT
Pragma: no-cache
Server: bfe/1.0.*.*


#===================== 测试本机网络下载(raw.githubusercontent.com) =====================#

HTTP/2 200 
cache-control: max-age=300
content-security-policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
content-type: text/plain; charset=utf-8
etag: "f6037a93c68519d7041a3b4df325b61c424ec255b45dfeb063371319e39b0d96"
strict-transport-security: max-age=31536000
x-content-type-options: nosniff
x-frame-options: deny
x-xss-protection: 1; mode=block
x-github-request-id: 579A:261005:1C101DA:1FDB8BF:67E6B8AA
accept-ranges: bytes
date: Fri, 28 Mar 2025 15:06:57 GMT
via: 1.1 varnish
x-served-by: cache-sin-wsss1830028-SIN
x-cache: HIT
x-cache-hits: 0
x-timer: S1743174417.365213,VS0,VE321
vary: Authorization,Accept-Encoding,Origin
access-control-allow-origin: *
cross-origin-resource-policy: cross-origin
x-fastly-request-id: 1de90fd29d9043832bf367db84ea3e1a2ef262bb
expires: Fri, 28 Mar 2025 15:11:57 GMT
source-age: 0
content-length: 1071


#===================== 最近运行日志(自动切换为Debug模式) =====================#

time="2025-03-28T15:03:10.092537503Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:50803 --> :8123 error: dial tcp 104.21.*.*:8123: i/o timeout\ndial tcp 172.67.*.*:8123: i/o timeout"
time="2025-03-28T15:03:10.713637996Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:10992 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:03:18.076143982Z" level=info msg="[TCP] 192.168.*.*:10998 --> activity.windows.com:443 match GeoSite(microsoft) using Ⓜ️ 微软服务[DIRECT]"
time="2025-03-28T15:03:24.069473509Z" level=info msg="[TCP] 192.168.*.*:60626 --> o1098464.ingest.sentry.io:443 match RuleSet(Copilot) using 🤖 Copilot[🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07]"
time="2025-03-28T15:03:50.370655728Z" level=info msg="[TCP] 192.168.*.*:44596 --> o1098464.ingest.sentry.io:443 match RuleSet(Copilot) using 🤖 Copilot[🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07]"
time="2025-03-28T15:03:53.844990624Z" level=info msg="[TCP] 192.168.*.*:11018 --> api.github.com:443 match GeoSite(github) using 🚀 GitHub[🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07]"
time="2025-03-28T15:04:00.507042354Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11028 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:00.541133358Z" level=info msg="[TCP] 192.168.*.*:11027 --> d.skk.moe:443 match Match using 🐟 漏网之鱼[DIRECT]"
time="2025-03-28T15:04:00.550045330Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11028 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:00.608497259Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11028 --> api.ipify.org:443 error: dial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:00.680815593Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11028 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused"
time="2025-03-28T15:04:00.697623100Z" level=info msg="[TCP] 192.168.*.*:11025 --> api.ttt.sh:443 match Match using 🐟 漏网之鱼[DIRECT]"
time="2025-03-28T15:04:00.749357510Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11028 --> api.ipify.org:443 error: dial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:00.783978169Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11034 --> api.ipify.org:443 error: dial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:00.834770225Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11034 --> api.ipify.org:443 error: dial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:00.835389419Z" level=info msg="[TCP] 192.168.*.*:11035 --> github.com:443 match GeoSite(github) using 🚀 GitHub[🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07]"
time="2025-03-28T15:04:00.898564495Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11034 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused"
time="2025-03-28T15:04:00.932616709Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11028 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused"
time="2025-03-28T15:04:00.948597651Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11034 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:01.001977024Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11034 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:01.084588925Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11028 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused"
time="2025-03-28T15:04:01.150592814Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11034 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:01.469018472Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11028 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused"
time="2025-03-28T15:04:01.502373909Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11034 --> api.ipify.org:443 error: dial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:01.682825294Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11034 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused"
time="2025-03-28T15:04:02.064482901Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11034 --> api.ipify.org:443 error: dial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:02.173207439Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11028 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused"
time="2025-03-28T15:04:03.105848657Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11034 --> api.ipify.org:443 error: dial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:03.216797979Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11028 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:04.043151773Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11040 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:04.094450443Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11040 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:04.149176412Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11040 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused"
time="2025-03-28T15:04:04.154087971Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11042 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused"
time="2025-03-28T15:04:04.202786489Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11042 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:04.212114951Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11040 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:04.257656246Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11042 --> api.ipify.org:443 error: dial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:04.304132605Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11040 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:04.333874954Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11042 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused"
time="2025-03-28T15:04:04.413223176Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11042 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:04.427317951Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11040 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:04.464798922Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11042 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:04.631546649Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11040 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused"
time="2025-03-28T15:04:04.792982950Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11042 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused"
time="2025-03-28T15:04:04.907674857Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11040 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused"
time="2025-03-28T15:04:05.459820442Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11042 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:05.821677525Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11040 --> api.ipify.org:443 error: dial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:06.278226785Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11042 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused"
time="2025-03-28T15:04:06.860462671Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11040 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused"
time="2025-03-28T15:04:07.318851141Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11042 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:07.912695689Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11045 --> api.ipify.org:443 error: dial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:07.961833447Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11045 --> api.ipify.org:443 error: dial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:08.020746491Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11045 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:08.091274615Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11045 --> api.ipify.org:443 error: dial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:08.148733149Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11045 --> api.ipify.org:443 error: dial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:08.289804854Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11045 --> api.ipify.org:443 error: dial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:08.367277701Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11046 --> api.ipify.org:443 error: dial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:08.418388832Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11046 --> api.ipify.org:443 error: dial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:08.472882348Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11046 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:08.481738321Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11045 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:08.531472233Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11046 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:08.584708110Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11046 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused"
time="2025-03-28T15:04:08.705668088Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11046 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused"
time="2025-03-28T15:04:08.845081121Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11046 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:08.912510062Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11045 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:09.261058977Z" level=info msg="[TCP] 192.168.*.*:53672 --> tvsilo.vip:443 match Match using 🐟 漏网之鱼[DIRECT]"
time="2025-03-28T15:04:09.512380312Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11046 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:09.931288187Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11046 --> api.ipify.org:443 error: dial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:09.950259814Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11045 --> api.ipify.org:443 error: dial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:10.408047756Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11045 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:10.429640242Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11046 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:17.798635379Z" level=info msg="[TCP] 192.168.*.*:11058 --> github.com:443 match GeoSite(github) using 🚀 GitHub[🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07]"
time="2025-03-28T15:04:25.230280021Z" level=info msg="[TCP] 192.168.*.*:56258 --> o1098464.ingest.sentry.io:443 match RuleSet(Copilot) using 🤖 Copilot[🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07]"
time="2025-03-28T15:04:50.376902262Z" level=info msg="[TCP] 192.168.*.*:60070 --> o1098464.ingest.sentry.io:443 match RuleSet(Copilot) using 🤖 Copilot[🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07]"
time="2025-03-28T15:05:02.233389547Z" level=info msg="[TCP] 192.168.*.*:50452 --> devicelibrary.cn2.luto.cc:35848 match GeoIP(cn) using 🎯 全球直连[DIRECT]"
time="2025-03-28T15:05:03.502287366Z" level=info msg="[TCP] 192.168.*.*:49711 --> lcdn-locator.apple.com:443 match GeoSite(apple) using 🍎 苹果服务[DIRECT]"
time="2025-03-28T15:05:03.553021964Z" level=info msg="[TCP] 192.168.*.*:49712 --> gateway.fe2.apple-dns.net:443 match GeoSite(apple) using 🍎 苹果服务[DIRECT]"
time="2025-03-28T15:05:03.793027755Z" level=info msg="[TCP] 192.168.*.*:49713 --> gateway.fe2.apple-dns.net:443 match GeoSite(apple) using 🍎 苹果服务[DIRECT]"
time="2025-03-28T15:05:04.023837205Z" level=info msg="[TCP] 192.168.*.*:49715 --> ocsp.digicert.com:80 match Match using 🐟 漏网之鱼[DIRECT]"
time="2025-03-28T15:05:04.051506724Z" level=info msg="[TCP] 192.168.*.*:49717 --> gateway.fe2.apple-dns.net:443 match GeoSite(apple) using 🍎 苹果服务[DIRECT]"
time="2025-03-28T15:05:09.604094982Z" level=info msg="[TCP] 192.168.*.*:49721 --> weatherkit.apple.com.akadns.net:443 match GeoIP(cn) using 🎯 全球直连[DIRECT]"
time="2025-03-28T15:05:26.339414269Z" level=info msg="[TCP] 192.168.*.*:38222 --> o1098464.ingest.sentry.io:443 match RuleSet(Copilot) using 🤖 Copilot[🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07]"
time="2025-03-28T15:05:29.757272070Z" level=info msg="[TCP] 192.168.*.*:11138 --> activity.windows.com:443 match GeoSite(microsoft) using Ⓜ️ 微软服务[DIRECT]"
time="2025-03-28T15:05:33.081997783Z" level=info msg="[TCP] 192.168.*.*:11143 --> api.github.com:443 match GeoSite(github) using 🚀 GitHub[🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07]"
time="2025-03-28T15:05:37.594107516Z" level=info msg="[TCP] 192.168.*.*:11149 --> github.com:443 match GeoSite(github) using 🚀 GitHub[🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07]"
time="2025-03-28T15:05:50.377476316Z" level=info msg="[TCP] 192.168.*.*:45654 --> o1098464.ingest.sentry.io:443 match RuleSet(Copilot) using 🤖 Copilot[🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07]"
time="2025-03-28T15:06:02.878873494Z" level=info msg="[TCP] 192.168.*.*:11179 --> github-production-user-asset-6210df.s3.amazonaws.com:443 match RuleSet(GlobalMedia) using 🌎 国外媒体[🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07]"
time="2025-03-28T15:06:27.516334181Z" level=info msg="[TCP] 192.168.*.*:42950 --> o1098464.ingest.sentry.io:443 match RuleSet(Copilot) using 🤖 Copilot[🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07]"
time="2025-03-28T15:06:39.974432643Z" level=info msg="[TCP] 192.168.*.*:50804 --> m.hotmail.com:443 match GeoSite(microsoft) using Ⓜ️ 微软服务[DIRECT]"
time="2025-03-28T15:06:48.543787190Z" level=info msg="[TCP] 192.168.*.*:57784 --> graph.microsoft.com:443 match GeoSite(microsoft) using Ⓜ️ 微软服务[DIRECT]"
time="2025-03-28T15:06:50.360958515Z" level=info msg="[TCP] 192.168.*.*:34162 --> o1098464.ingest.sentry.io:443 match RuleSet(Copilot) using 🤖 Copilot[🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07]"
time="2025-03-28T15:06:56.768956352Z" level=info msg="[TCP] 39.78.*.*:52606 --> raw.githubusercontent.com:443 match GeoSite(github) using 🚀 GitHub[🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07]"
time="2025-03-28T15:07:01.306430616Z" level=debug msg="[DNS] cache hit baidu.com --> [39.156.*.* 110.242.*.*] A, expire at 2025-03-28 15:13:55"
time="2025-03-28T15:07:01.470908642Z" level=debug msg="[DNS] cache hit api.miwifi.com --> [123.125.*.* 210.12.*.* 123.125.*.* 114.247.*.*] A, expire at 2025-03-28 15:06:57"
time="2025-03-28T15:07:01.471398340Z" level=debug msg="[DNS] resolve api.miwifi.com A from udp://202.102.*.*:53"
time="2025-03-28T15:07:01.471751540Z" level=debug msg="[DNS] cache hit api.miwifi.com --> [123.125.*.* 210.12.*.* 123.125.*.* 114.247.*.*] A, expire at 2025-03-28 15:06:57"
time="2025-03-28T15:07:01.472029784Z" level=debug msg="[DNS] resolve api.miwifi.com A from "
time="2025-03-28T15:07:01.472054867Z" level=debug msg="[DNS] resolve api.miwifi.com A from udp://202.102.*.*:53"
time="2025-03-28T15:07:01.472107657Z" level=debug msg="[DNS] resolve api.miwifi.com A from udp://39.78.*.*:53"
time="2025-03-28T15:07:01.475505791Z" level=debug msg="[DNS] api.miwifi.com --> [210.12.*.* 123.125.*.* 114.247.*.* 123.125.*.*] A from udp://202.102.*.*:53"
time="2025-03-28T15:07:04.605097359Z" level=debug msg="[DNS] cache hit www.qq.com --> [221.198.*.*] A, expire at 2025-03-28 15:07:10"

#===================== 最近运行日志获取完成(自动切换为silent模式) =====================#


#===================== 活动连接信息 =====================#

1. SourceIP:【192.168.*.*】 - Host:【avatars2.githubusercontent.com】 - DestinationIP:【185.199.*.*】 - Network:【tcp】 - RulePayload:【github】 - Lastchain:【🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07】
2. SourceIP:【192.168.*.*】 - Host:【img-s.msn.cn】 - DestinationIP:【2.16.*.*】 - Network:【tcp】 - RulePayload:【microsoft】 - Lastchain:【DIRECT】
3. SourceIP:【192.168.*.*】 - Host:【avatars.githubusercontent.com】 - DestinationIP:【185.199.*.*】 - Network:【tcp】 - RulePayload:【github】 - Lastchain:【🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07】
4. SourceIP:【192.168.*.*】 - Host:【private-user-images.githubusercontent.com】 - DestinationIP:【185.199.*.*】 - Network:【tcp】 - RulePayload:【github】 - Lastchain:【🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07】
5. SourceIP:【192.168.*.*】 - Host:【go.microsoft.com】 - DestinationIP:【2.19.*.*】 - Network:【tcp】 - RulePayload:【microsoft】 - Lastchain:【DIRECT】
6. SourceIP:【192.168.*.*】 - Host:【optimizationguide-pa.googleapis.com】 - DestinationIP:【142.251.*.*】 - Network:【tcp】 - RulePayload:【google】 - Lastchain:【🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07】
7. SourceIP:【192.168.*.*】 - Host:【www.google.com】 - DestinationIP:【31.13.*.*】 - Network:【tcp】 - RulePayload:【facebook】 - Lastchain:【🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07】
8. SourceIP:【192.168.*.*】 - Host:【avatars3.githubusercontent.com】 - DestinationIP:【185.199.*.*】 - Network:【tcp】 - RulePayload:【github】 - Lastchain:【🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07】
9. SourceIP:【192.168.*.*】 - Host:【cdn.jsdelivr.net】 - DestinationIP:【8.7.*.*】 - Network:【tcp】 - RulePayload:【Custom_Direct】 - Lastchain:【DIRECT】
10. SourceIP:【192.168.*.*】 - Host:【img-s.msn.cn】 - DestinationIP:【2.16.*.*】 - Network:【tcp】 - RulePayload:【microsoft】 - Lastchain:【DIRECT】
11. SourceIP:【192.168.*.*】 - Host:【alive.github.com】 - DestinationIP:【140.82.*.*】 - Network:【tcp】 - RulePayload:【github】 - Lastchain:【🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07】
12. SourceIP:【192.168.*.*】 - Host:【avatars.githubusercontent.com】 - DestinationIP:【185.199.*.*】 - Network:【tcp】 - RulePayload:【github】 - Lastchain:【🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07】
13. SourceIP:【192.168.*.*】 - Host:【cdn.jsdelivr.net】 - DestinationIP:【8.7.*.*】 - Network:【tcp】 - RulePayload:【Custom_Direct】 - Lastchain:【DIRECT】
14. SourceIP:【192.168.*.*】 - Host:【substrate.office.com】 - DestinationIP:【52.98.*.*】 - Network:【tcp】 - RulePayload:【microsoft】 - Lastchain:【DIRECT】
15. SourceIP:【192.168.*.*】 - Host:【api-ipv4.ip.sb】 - DestinationIP:【104.26.*.*】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【DIRECT】
16. SourceIP:【192.168.*.*】 - Host:【graph.microsoft.com】 - DestinationIP:【20.190.*.*】 - Network:【tcp】 - RulePayload:【microsoft】 - Lastchain:【DIRECT】
17. SourceIP:【192.168.*.*】 - Host:【www.youtube.com】 - DestinationIP:【31.13.*.*】 - Network:【tcp】 - RulePayload:【facebook】 - Lastchain:【🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07】
18. SourceIP:【192.168.*.*】 - Host:【edge.microsoft.com】 - DestinationIP:【150.171.*.*】 - Network:【tcp】 - RulePayload:【microsoft】 - Lastchain:【DIRECT】
19. SourceIP:【192.168.*.*】 - Host:【activity.windows.com】 - DestinationIP:【20.44.*.*】 - Network:【tcp】 - RulePayload:【microsoft】 - Lastchain:【DIRECT】
20. SourceIP:【192.168.*.*】 - Host:【collector.github.com】 - DestinationIP:【140.82.*.*】 - Network:【tcp】 - RulePayload:【github】 - Lastchain:【🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07】
21. SourceIP:【192.168.*.*】 - Host:【tvsilo.vip】 - DestinationIP:【172.67.*.*】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【DIRECT】
22. SourceIP:【192.168.*.*】 - Host:【Empty】 - DestinationIP:【91.108.*.*】 - Network:【tcp】 - RulePayload:【telegram】 - Lastchain:【🇭🇰 Hong Kong Chai Wan MEGA-i 10GE0/0/23 DELLR6515 F39】
23. SourceIP:【192.168.*.*】 - Host:【accounts.google.com】 - DestinationIP:【46.82.*.*】 - Network:【tcp】 - RulePayload:【google】 - Lastchain:【🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07】
24. SourceIP:【192.168.*.*】 - Host:【avatars1.githubusercontent.com】 - DestinationIP:【185.199.*.*】 - Network:【tcp】 - RulePayload:【github】 - Lastchain:【🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07】
25. SourceIP:【192.168.*.*】 - Host:【client.wns.windows.com】 - DestinationIP:【20.197.*.*】 - Network:【tcp】 - RulePayload:【microsoft】 - Lastchain:【DIRECT】
26. SourceIP:【192.168.*.*】 - Host:【Empty】 - DestinationIP:【5.35.*.*】 - Network:【udp】 - RulePayload:【】 - Lastchain:【DIRECT】
27. SourceIP:【192.168.*.*】 - Host:【sb.scorecardresearch.com】 - DestinationIP:【3.168.*.*】 - Network:【tcp】 - RulePayload:【AmazonIP】 - Lastchain:【🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07】
28. SourceIP:【192.168.*.*】 - Host:【img-s.msn.cn】 - DestinationIP:【2.16.*.*】 - Network:【tcp】 - RulePayload:【microsoft】 - Lastchain:【DIRECT】
29. SourceIP:【192.168.*.*】 - Host:【Empty】 - DestinationIP:【91.108.*.*】 - Network:【tcp】 - RulePayload:【telegram】 - Lastchain:【🇭🇰 Hong Kong Chai Wan MEGA-i 10GE0/0/23 DELLR6515 F39】
30. SourceIP:【192.168.*.*】 - Host:【raw.githubusercontent.com】 - DestinationIP:【185.199.*.*】 - Network:【tcp】 - RulePayload:【github】 - Lastchain:【🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07】
31. SourceIP:【192.168.*.*】 - Host:【m.hotmail.com】 - DestinationIP:【40.99.*.*】 - Network:【tcp】 - RulePayload:【microsoft】 - Lastchain:【DIRECT】
32. SourceIP:【192.168.*.*】 - Host:【cdn.jsdelivr.net】 - DestinationIP:【8.7.*.*】 - Network:【tcp】 - RulePayload:【Custom_Direct】 - Lastchain:【DIRECT】
33. SourceIP:【192.168.*.*】 - Host:【avatars0.githubusercontent.com】 - DestinationIP:【185.199.*.*】 - Network:【tcp】 - RulePayload:【github】 - Lastchain:【🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07】

OpenClash Config


Expected Behavior

希望能展示出版本号

Additional Context

No response

pcj1997 avatar Mar 28 '25 15:03 pcj1997

下载版本文件超时了,你看下本机跟github的连接情况

vernesong avatar Mar 29 '25 08:03 vernesong

网络是通的 Image

pcj1997 avatar Mar 31 '25 01:03 pcj1997

同有这个问题

weitao1209 avatar Mar 31 '25 09:03 weitao1209

重启openwrt试试。

joy518688 avatar Apr 24 '25 01:04 joy518688

重启后能好一会,然后过段时间再去查看还不行。 但是这个不影响我去更新版本

pcj1997 avatar Apr 24 '25 12:04 pcj1997

+1也是有这个问题,单独拿接口出来可以获取到版本数据 { "opcv": "v0.46.079", "coremodel": "aarch64_generic", "coremetacv": "alpha-g8bc6f77\n", "oplv": "v0.46.079\n,0", "corelv": "alpha-g8bc6f77\n", "upchecktime": "2025-05-09 17:00:37" }

kakathy avatar May 09 '25 09:05 kakathy

找到问题了,是luci 的xhr 的timeout问题默认的是3000-5=2995毫秒,但是插件里面取update数据平均5-10s,脸好能刷出来,超时了 把请求时间都加大点

vim /usr/lib/lua/luci/view/openclash/update.htm
 XHR.poll(10, '<%=luci.dispatcher.build_url("admin", "services", "openclash", "update")%>', null....

kakathy avatar May 09 '25 10:05 kakathy

#4468 修改获取openclash最新版本信息接口超时时间:从3s改为10s

pcj1997 avatar May 16 '25 15:05 pcj1997

给作者大大一个👍

kakathy avatar May 16 '25 15:05 kakathy

是我提的合并请求,作者大大还没同意呢😂

pcj1997 avatar May 16 '25 15:05 pcj1997

催催,哈哈哈给你也赞

kakathy avatar May 16 '25 15:05 kakathy

This issue is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 5 days

github-actions[bot] avatar Jul 16 '25 08:07 github-actions[bot]