OpenClash
OpenClash copied to clipboard
[Bug] 开启fake-ip和quic导致手机淘宝访问异常
Verify Steps
- [x] Tracker 我已经在 Issue Tracker 中找过我要提出的问题
- [x] Branch 我知道 OpenClash 的 Dev 分支切换开关位于插件设置-版本更新中,或者我会手动下载并安装 Dev 分支的 OpenClash
- [x] Latest 我已经使用最新 Dev 版本测试过,问题依旧存在
- [x] Relevant 我知道 OpenClash 与 内核(Core)、控制面板(Dashboard)、在线订阅转换(Subconverter)等项目之间无直接关系,仅相互调用
- [x] Definite 这确实是 OpenClash 出现的问题
- [x] Contributors 我有能力协助 OpenClash 开发并解决此问题
- [x] Meaningless 我提交的是无意义的催促更新或修复请求
OpenClash Version
v0.47.016
Bug on Environment
Lean
OpenWrt Version
OpenWrt 24.10.3, r7623-bee33b4ab
Bug on Platform
Linux-arm64
Describe the Bug
当开启fake-ip+quic后,淘宝加载会受到影响,但不是完全加载不出,而是要等待一段时间才会加载,且速度也快 但是,fake-ip+关闭quic后,淘宝访问完全正常,好奇的是关闭quic不是只对国外ip有效吗?为什么会影响国内的淘宝呢,看了一下防火墙规则,开启quic,实际影响的是非国内的ip,不知道为什么会影响到淘宝,redir+开关quic都正常,麻烦大佬看看什么个情况
To Reproduce
fake-ip+开启quic+关闭绕过大陆ip(手机淘宝加载异常) fake-ip+关闭quic+关闭绕过大陆ip(手机淘宝加载正常) redir-host+开关quic+关闭绕过大陆ip(手机淘宝加载都正常)
OpenClash Log
#===================== 自定义防火墙设置 =====================#
#!/bin/sh
. /usr/share/openclash/log.sh
. /lib/functions.sh
# This script is called by /etc/init.d/openclash
# Add your custom firewall rules here, they will be added after the end of the OpenClash iptables rules
LOG_OUT "Tip: Start Add Custom Firewall Rules..."
exit 0
#===================== IPTABLES 防火墙设置 =====================#
#IPv4 NAT chain
# Generated by iptables-save v1.8.7 on Sat Oct 11 11:01:06 2025
*nat
:PREROUTING ACCEPT [377:321761]
:INPUT ACCEPT [1315:171925]
:OUTPUT ACCEPT [2813:345465]
:POSTROUTING ACCEPT [1568:105664]
:MINIUPNPD - [0:0]
:MINIUPNPD-POSTROUTING - [0:0]
:openclash - [0:0]
:openclash_output - [0:0]
:postrouting_lan_rule - [0:0]
:postrouting_rule - [0:0]
:postrouting_wan_rule - [0:0]
:prerouting_lan_rule - [0:0]
:prerouting_rule - [0:0]
:prerouting_wan_rule - [0:0]
:zone_lan_postrouting - [0:0]
:zone_lan_prerouting - [0:0]
:zone_wan_postrouting - [0:0]
:zone_wan_prerouting - [0:0]
-A PREROUTING -p tcp -m tcp --dport 53 -m comment --comment "OpenClash DNS Hijack" -j REDIRECT --to-ports 53
-A PREROUTING -p udp -m udp --dport 53 -m comment --comment "OpenClash DNS Hijack" -j REDIRECT --to-ports 53
-A PREROUTING -m comment --comment "!fw3: Custom prerouting rule chain" -j prerouting_rule
-A PREROUTING -i br-lan -m comment --comment "!fw3" -j zone_lan_prerouting
-A PREROUTING -i pppoe-wan -m comment --comment "!fw3" -j zone_wan_prerouting
-A PREROUTING -p tcp -j openclash
-A OUTPUT -d 127.0.*.*/32 -p udp -m owner ! --gid-owner 65534 -m comment --comment "OpenClash DNS Hijack" -m udp --dport 53 -j REDIRECT --to-ports 53
-A OUTPUT -d 127.0.*.*/32 -p tcp -m owner ! --gid-owner 65534 -m comment --comment "OpenClash DNS Hijack" -m tcp --dport 53 -j REDIRECT --to-ports 53
-A OUTPUT -j openclash_output
-A POSTROUTING -m comment --comment "!fw3: Custom postrouting rule chain" -j postrouting_rule
-A POSTROUTING -o br-lan -m comment --comment "!fw3" -j zone_lan_postrouting
-A POSTROUTING -o pppoe-wan -m comment --comment "!fw3" -j zone_wan_postrouting
-A openclash -m set --match-set localnetwork dst -j RETURN
-A openclash -m conntrack --ctdir REPLY -j RETURN
-A openclash -d 198.18.*.*/15 -p tcp -j REDIRECT --to-ports 7892
-A openclash -p tcp -j REDIRECT --to-ports 7892
-A openclash_output -m owner --gid-owner 65534 -j RETURN
-A openclash_output -d 198.18.*.*/15 -p tcp -j REDIRECT --to-ports 7892
-A openclash_output -m set --match-set localnetwork dst -j RETURN
-A openclash_output -m conntrack --ctdir REPLY -j RETURN
-A openclash_output -p tcp -j REDIRECT --to-ports 7892
-A zone_lan_postrouting -m comment --comment "!fw3: Custom lan postrouting rule chain" -j postrouting_lan_rule
-A zone_lan_prerouting -m comment --comment "!fw3: Custom lan prerouting rule chain" -j prerouting_lan_rule
-A zone_wan_postrouting -j MINIUPNPD-POSTROUTING
-A zone_wan_postrouting -m comment --comment "!fw3: Custom wan postrouting rule chain" -j postrouting_wan_rule
-A zone_wan_postrouting -m comment --comment "!fw3" -j MASQUERADE --mode fullcone
-A zone_wan_prerouting -j MINIUPNPD
-A zone_wan_prerouting -m comment --comment "!fw3: Custom wan prerouting rule chain" -j prerouting_wan_rule
COMMIT
# Completed on Sat Oct 11 11:01:06 2025
#IPv4 Mangle chain
# Generated by iptables-save v1.8.7 on Sat Oct 11 11:01:06 2025
*mangle
:PREROUTING ACCEPT [66524:39098756]
:INPUT ACCEPT [71499:40304171]
:FORWARD ACCEPT [1179:109134]
:OUTPUT ACCEPT [80626:141782016]
:POSTROUTING ACCEPT [81823:141899679]
:openclash - [0:0]
:openclash_output - [0:0]
:openclash_upnp - [0:0]
-A PREROUTING -p udp -j openclash
-A FORWARD -o pppoe-wan -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -i pppoe-wan -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A OUTPUT -p udp -j openclash_output
-A openclash -p udp -m udp --sport 500 -j RETURN
-A openclash -p udp -m udp --sport 68 -j RETURN
-A openclash -m set --match-set localnetwork dst -j RETURN
-A openclash -m conntrack --ctdir REPLY -j RETURN
-A openclash -d 198.18.*.*/15 -p udp -j TPROXY --on-port 7895 --on-ip 0.0.*.* --tproxy-mark 0x162/0xffffffff
-A openclash -p udp -j openclash_upnp
-A openclash -p udp -j TPROXY --on-port 7895 --on-ip 0.0.*.* --tproxy-mark 0x162/0xffffffff
-A openclash_output -p udp -m udp --sport 500 -j RETURN
-A openclash_output -p udp -m udp --sport 68 -j RETURN
-A openclash_output -m owner --gid-owner 65534 -j RETURN
-A openclash_output -m set --match-set localnetwork dst -j RETURN
-A openclash_output -m conntrack --ctdir REPLY -j RETURN
-A openclash_output -d 198.18.*.*/15 -p udp -j MARK --set-xmark 0x162/0xffffffff
-A openclash_output -p udp -j MARK --set-xmark 0x162/0xffffffff
COMMIT
# Completed on Sat Oct 11 11:01:06 2025
#IPv4 Filter chain
# Generated by iptables-save v1.8.7 on Sat Oct 11 11:01:06 2025
*filter
:INPUT ACCEPT [16:512]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [0:0]
:MINIUPNPD - [0:0]
:forwarding_lan_rule - [0:0]
:forwarding_rule - [0:0]
:forwarding_wan_rule - [0:0]
:input_lan_rule - [0:0]
:input_rule - [0:0]
:input_wan_rule - [0:0]
:openclash_wan_input - [0:0]
:output_lan_rule - [0:0]
:output_rule - [0:0]
:output_wan_rule - [0:0]
:reject - [0:0]
:zone_lan_dest_ACCEPT - [0:0]
:zone_lan_forward - [0:0]
:zone_lan_input - [0:0]
:zone_lan_output - [0:0]
:zone_lan_src_ACCEPT - [0:0]
:zone_wan_dest_ACCEPT - [0:0]
:zone_wan_dest_REJECT - [0:0]
:zone_wan_forward - [0:0]
:zone_wan_input - [0:0]
:zone_wan_output - [0:0]
:zone_wan_src_REJECT - [0:0]
-A INPUT -d 198.18.*.*/15 -p icmp -m icmp --icmp-type 8 -m comment --comment "OpenClash ICMP INPUT REJECT" -j REJECT --reject-with icmp-admin-prohibited
-A INPUT -p udp -m udp --dport 443 -m comment --comment "OpenClash QUIC REJECT" -m set ! --match-set china_ip_route dst -j REJECT --reject-with icmp-port-unreachable
-A INPUT -i pppoe-wan -m set ! --match-set localnetwork src -j openclash_wan_input
-A INPUT -i lo -m comment --comment "!fw3" -j ACCEPT
-A INPUT -m comment --comment "!fw3: Custom input rule chain" -j input_rule
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A INPUT -i br-lan -m comment --comment "!fw3" -j zone_lan_input
-A INPUT -i pppoe-wan -m comment --comment "!fw3" -j zone_wan_input
-A FORWARD -d 198.18.*.*/15 -p icmp -m icmp --icmp-type 8 -m comment --comment "OpenClash ICMP FORWARD REJECT" -j REJECT --reject-with icmp-admin-prohibited
-A FORWARD -m comment --comment "!fw3: Custom forwarding rule chain" -j forwarding_rule
-A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A FORWARD -i br-lan -m comment --comment "!fw3" -j zone_lan_forward
-A FORWARD -i pppoe-wan -m comment --comment "!fw3" -j zone_wan_forward
-A FORWARD -m comment --comment "!fw3" -j reject
-A OUTPUT -d 198.18.*.*/15 -p icmp -m icmp --icmp-type 8 -m owner ! --gid-owner 65534 -m comment --comment "OpenClash ICMP OUTPUT REJECT" -j REJECT --reject-with icmp-admin-prohibited
-A OUTPUT -o lo -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -m comment --comment "!fw3: Custom output rule chain" -j output_rule
-A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -o br-lan -m comment --comment "!fw3" -j zone_lan_output
-A OUTPUT -o pppoe-wan -m comment --comment "!fw3" -j zone_wan_output
-A openclash_wan_input -p udp -m multiport --dports 7892,7895,9090,7890,7891,7893,7874 -j REJECT --reject-with icmp-port-unreachable
-A openclash_wan_input -p tcp -m multiport --dports 7892,7895,9090,7890,7891,7893,7874 -j REJECT --reject-with icmp-port-unreachable
-A reject -p tcp -m comment --comment "!fw3" -j REJECT --reject-with tcp-reset
-A reject -m comment --comment "!fw3" -j REJECT --reject-with icmp-port-unreachable
-A zone_lan_dest_ACCEPT -o br-lan -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_forward -m comment --comment "!fw3: Custom lan forwarding rule chain" -j forwarding_lan_rule
-A zone_lan_forward -m comment --comment "!fw3: Zone lan to wan forwarding policy" -j zone_wan_dest_ACCEPT
-A zone_lan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_lan_forward -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_input -m comment --comment "!fw3: Custom lan input rule chain" -j input_lan_rule
-A zone_lan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_lan_input -m comment --comment "!fw3" -j zone_lan_src_ACCEPT
-A zone_lan_output -m comment --comment "!fw3: Custom lan output rule chain" -j output_lan_rule
-A zone_lan_output -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_src_ACCEPT -i br-lan -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_ACCEPT -o pppoe-wan -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
-A zone_wan_dest_ACCEPT -o pppoe-wan -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_REJECT -o pppoe-wan -m comment --comment "!fw3" -j reject
-A zone_wan_forward -j MINIUPNPD
-A zone_wan_forward -m comment --comment "!fw3: Custom wan forwarding rule chain" -j forwarding_wan_rule
-A zone_wan_forward -p esp -m comment --comment "!fw3: Allow-IPSec-ESP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -p udp -m udp --dport 500 -m comment --comment "!fw3: Allow-ISAKMP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_wan_forward -m comment --comment "!fw3" -j zone_wan_dest_REJECT
-A zone_wan_input -m comment --comment "!fw3: Custom wan input rule chain" -j input_wan_rule
-A zone_wan_input -p udp -m udp --dport 68 -m comment --comment "!fw3: Allow-DHCP-Renew" -j ACCEPT
-A zone_wan_input -p icmp -m icmp --icmp-type 8 -m comment --comment "!fw3: Allow-Ping" -j ACCEPT
-A zone_wan_input -p igmp -m comment --comment "!fw3: Allow-IGMP" -j ACCEPT
-A zone_wan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_wan_input -m comment --comment "!fw3" -j zone_wan_src_REJECT
-A zone_wan_output -m comment --comment "!fw3: Custom wan output rule chain" -j output_wan_rule
-A zone_wan_output -m comment --comment "!fw3" -j zone_wan_dest_ACCEPT
-A zone_wan_src_REJECT -i pppoe-wan -m comment --comment "!fw3" -j reject
COMMIT
# Completed on Sat Oct 11 11:01:06 2025
#IPv6 NAT chain
# Generated by ip6tables-save v1.8.7 on Sat Oct 11 11:01:06 2025
*nat
:PREROUTING ACCEPT [0:0]
:INPUT ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:POSTROUTING ACCEPT [2:176]
-A PREROUTING -p tcp -m tcp --dport 53 -m comment --comment "OpenClash DNS Hijack" -j REDIRECT --to-ports 53
-A PREROUTING -p udp -m udp --dport 53 -m comment --comment "OpenClash DNS Hijack" -j REDIRECT --to-ports 53
-A OUTPUT -p udp -m udp --dport 53 -m owner ! --gid-owner 65534 -m comment --comment "OpenClash DNS Hijack" -j REDIRECT --to-ports 53
-A OUTPUT -p tcp -m tcp --dport 53 -m owner ! --gid-owner 65534 -m comment --comment "OpenClash DNS Hijack" -j REDIRECT --to-ports 53
COMMIT
# Completed on Sat Oct 11 11:01:06 2025
#IPv6 Mangle chain
# Generated by ip6tables-save v1.8.7 on Sat Oct 11 11:01:06 2025
*mangle
:PREROUTING ACCEPT [9:840]
:INPUT ACCEPT [9:840]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [8:736]
:POSTROUTING ACCEPT [8:736]
:openclash - [0:0]
:openclash_output - [0:0]
-A PREROUTING -j openclash
-A FORWARD -o pppoe-wan -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -i pppoe-wan -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A OUTPUT -j openclash_output
-A openclash -p udp -m udp --sport 500 -j RETURN
-A openclash -s fc00::/6 -p udp -m udp --sport 546 -j RETURN
-A openclash -m set --match-set localnetwork6 dst -j RETURN
-A openclash -m conntrack --ctdir REPLY -j RETURN
-A openclash -p tcp -m comment --comment "OpenClash TCP Tproxy" -j TPROXY --on-port 7895 --on-ip :: --tproxy-mark 0x162/0xffffffff
-A openclash -p udp -m comment --comment "OpenClash UDP Tproxy" -j TPROXY --on-port 7895 --on-ip :: --tproxy-mark 0x162/0xffffffff
-A openclash_output -p udp -m udp --sport 500 -j RETURN
-A openclash_output -p udp -m udp --sport 546 -j RETURN
-A openclash_output -m owner --gid-owner 65534 -j RETURN
-A openclash_output -m set --match-set localnetwork6 dst -j RETURN
-A openclash_output -m conntrack --ctdir REPLY -j RETURN
-A openclash_output -j MARK --set-xmark 0x162/0xffffffff
COMMIT
# Completed on Sat Oct 11 11:01:06 2025
#IPv6 Filter chain
# Generated by ip6tables-save v1.8.7 on Sat Oct 11 11:01:06 2025
*filter
:INPUT ACCEPT [0:0]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [0:0]
:MINIUPNPD - [0:0]
:forwarding_lan_rule - [0:0]
:forwarding_rule - [0:0]
:forwarding_wan_rule - [0:0]
:input_lan_rule - [0:0]
:input_rule - [0:0]
:input_wan_rule - [0:0]
:openclash_wan_input - [0:0]
:output_lan_rule - [0:0]
:output_rule - [0:0]
:output_wan_rule - [0:0]
:reject - [0:0]
:zone_lan_dest_ACCEPT - [0:0]
:zone_lan_forward - [0:0]
:zone_lan_input - [0:0]
:zone_lan_output - [0:0]
:zone_lan_src_ACCEPT - [0:0]
:zone_wan_dest_ACCEPT - [0:0]
:zone_wan_dest_REJECT - [0:0]
:zone_wan_forward - [0:0]
:zone_wan_input - [0:0]
:zone_wan_output - [0:0]
:zone_wan_src_REJECT - [0:0]
-A INPUT -i pppoe-wan -m set ! --match-set localnetwork6 src -j openclash_wan_input
-A INPUT -p udp -m udp --dport 443 -m comment --comment "OpenClash QUIC REJECT" -m set ! --match-set china_ip6_route dst -j REJECT --reject-with icmp6-port-unreachable
-A INPUT -i lo -m comment --comment "!fw3" -j ACCEPT
-A INPUT -m comment --comment "!fw3: Custom input rule chain" -j input_rule
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A INPUT -i br-lan -m comment --comment "!fw3" -j zone_lan_input
-A INPUT -i pppoe-wan -m comment --comment "!fw3" -j zone_wan_input
-A FORWARD -m comment --comment "!fw3: Custom forwarding rule chain" -j forwarding_rule
-A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A FORWARD -i br-lan -m comment --comment "!fw3" -j zone_lan_forward
-A FORWARD -i pppoe-wan -m comment --comment "!fw3" -j zone_wan_forward
-A FORWARD -m comment --comment "!fw3" -j reject
-A OUTPUT -o lo -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -m comment --comment "!fw3: Custom output rule chain" -j output_rule
-A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -o br-lan -m comment --comment "!fw3" -j zone_lan_output
-A OUTPUT -o pppoe-wan -m comment --comment "!fw3" -j zone_wan_output
-A openclash_wan_input -p udp -m multiport --dports 7892,7895,9090,7890,7891,7893,7874 -j REJECT --reject-with icmp6-port-unreachable
-A openclash_wan_input -p tcp -m multiport --dports 7892,7895,9090,7890,7891,7893,7874 -j REJECT --reject-with icmp6-port-unreachable
-A reject -p tcp -m comment --comment "!fw3" -j REJECT --reject-with tcp-reset
-A reject -m comment --comment "!fw3" -j REJECT --reject-with icmp6-port-unreachable
-A zone_lan_dest_ACCEPT -o br-lan -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_forward -m comment --comment "!fw3: Custom lan forwarding rule chain" -j forwarding_lan_rule
-A zone_lan_forward -m comment --comment "!fw3: Zone lan to wan forwarding policy" -j zone_wan_dest_ACCEPT
-A zone_lan_forward -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_input -m comment --comment "!fw3: Custom lan input rule chain" -j input_lan_rule
-A zone_lan_input -m comment --comment "!fw3" -j zone_lan_src_ACCEPT
-A zone_lan_output -m comment --comment "!fw3: Custom lan output rule chain" -j output_lan_rule
-A zone_lan_output -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_src_ACCEPT -i br-lan -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_ACCEPT -o pppoe-wan -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
-A zone_wan_dest_ACCEPT -o pppoe-wan -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_REJECT -o pppoe-wan -m comment --comment "!fw3" -j reject
-A zone_wan_forward -j MINIUPNPD
-A zone_wan_forward -m comment --comment "!fw3: Custom wan forwarding rule chain" -j forwarding_wan_rule
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 128 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 129 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 2 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 3 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 4/0 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 4/1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p esp -m comment --comment "!fw3: Allow-IPSec-ESP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -p udp -m udp --dport 500 -m comment --comment "!fw3: Allow-ISAKMP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -m comment --comment "!fw3" -j zone_wan_dest_REJECT
-A zone_wan_input -m comment --comment "!fw3: Custom wan input rule chain" -j input_wan_rule
-A zone_wan_input -s fc00::/6 -d fc00::/6 -p udp -m udp --dport 546 -m comment --comment "!fw3: Allow-DHCPv6" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 130/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 131/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 132/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 143/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 128 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 129 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 2 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 3 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 4/0 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 4/1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 133 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 135 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 134 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 136 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -m comment --comment "!fw3" -j zone_wan_src_REJECT
-A zone_wan_output -m comment --comment "!fw3: Custom wan output rule chain" -j output_wan_rule
-A zone_wan_output -m comment --comment "!fw3" -j zone_wan_dest_ACCEPT
-A zone_wan_src_REJECT -i pppoe-wan -m comment --comment "!fw3" -j reject
COMMIT
# Completed on Sat Oct 11 11:01:06 2025
#===================== IPSET状态 =====================#
Name: china_ip_route
Type: hash:net
Revision: 7
Header: family inet hashsize 2048 maxelem 1000000 bucketsize 12 initval 0x8ba04633
Size in memory: 194256
References: 1
Number of entries: 7041
Name: china_ip_route_pass
Type: hash:net
Revision: 7
Header: family inet hashsize 1024 maxelem 1000000 bucketsize 12 initval 0x84b053d4
Size in memory: 456
References: 0
Number of entries: 0
Name: localnetwork
Type: hash:net
Revision: 7
Header: family inet hashsize 1024 maxelem 65536 bucketsize 12 initval 0x21a54348
Size in memory: 2760
References: 5
Number of entries: 52
Name: china_ip6_route
Type: hash:net
Revision: 7
Header: family inet6 hashsize 1024 maxelem 1000000 bucketsize 12 initval 0xc29d383a
Size in memory: 74032
References: 1
Number of entries: 1536
Name: china_ip6_route_pass
Type: hash:net
Revision: 7
Header: family inet6 hashsize 1024 maxelem 1000000 bucketsize 12 initval 0xa7359cf9
Size in memory: 1240
References: 0
Number of entries: 0
Name: localnetwork6
Type: hash:net
Revision: 7
Header: family inet6 hashsize 1024 maxelem 65536 bucketsize 12 initval 0x6ddde14a
Size in memory: 2320
References: 3
Number of entries: 15
#===================== 路由表状态 =====================#
#IPv4
#route -n
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
0.0.*.* 10.84.*.* 0.0.*.* UG 0 0 0 pppoe-wan
10.84.*.* 0.0.*.* 255.255.*.* UH 0 0 0 pppoe-wan
192.168.*.* 0.0.*.* 255.255.*.* U 0 0 0 br-lan
#ip route list
default via 10.84.*.* dev pppoe-wan proto static
10.84.*.* dev pppoe-wan proto kernel scope link src 10.84.*.*
192.168.*.*/24 dev br-lan proto kernel scope link src 192.168.*.*
#ip rule show
0: from all lookup local
32765: from all fwmark 0x162 lookup 354
32766: from all lookup main
32767: from all lookup default
#IPv6
#route -A inet6
Kernel IPv6 routing table
Destination Next Hop Flags Metric Ref Use Iface
::/0 :: U 1024 1 0 lo
fe80::*:*:*:c3c2/128 :: U 256 1 0 pppoe-wan
fe80::*:*:*:f23b/128 :: U 256 2 0 pppoe-wan
fe80::/64 :: U 256 1 0 br-lan
::/0 :: !n -1 1 0 lo
::1/128 :: Un 0 6 0 lo
fe80::/128 :: Un 0 3 0 br-lan
fe80::*:*:*:872/128 :: Un 0 4 0 br-lan
fe80::*:*:*:f23b/128 :: Un 0 2 0 pppoe-wan
ff00::/8 :: U 256 4 0 br-lan
ff00::/8 :: U 256 2 0 pppoe-wan
::/0 :: !n -1 1 0 lo
#ip -6 route list
fe80::*:*:*:c3c2 dev pppoe-wan proto kernel metric 256 pref medium
fe80::*:*:*:f23b dev pppoe-wan proto kernel metric 256 pref medium
fe80::/64 dev br-lan proto kernel metric 256 pref medium
#ip -6 rule show
0: from all lookup local
32765: from all fwmark 0x162 lookup 354
32766: from all lookup main
4200000001: from all iif lo failed_policy
4200000005: from all iif br-lan failed_policy
4200000012: from all iif pppoe-wan failed_policy
#===================== 端口占用状态 =====================#
tcp 0 0 :::9090 :::* LISTEN 18153/clash
tcp 0 0 :::7895 :::* LISTEN 18153/clash
tcp 0 0 :::7892 :::* LISTEN 18153/clash
tcp 0 0 :::7893 :::* LISTEN 18153/clash
tcp 0 0 :::7890 :::* LISTEN 18153/clash
tcp 0 0 :::7891 :::* LISTEN 18153/clash
tcp 0 0 :::7874 :::* LISTEN 18153/clash
udp 0 0 :::52495 :::* 18153/clash
udp 0 0 :::57673 :::* 18153/clash
udp 0 0 :::50519 :::* 18153/clash
udp 0 0 :::38318 :::* 18153/clash
udp 0 0 :::57796 :::* 18153/clash
udp 0 0 :::53719 :::* 18153/clash
udp 0 0 :::42466 :::* 18153/clash
udp 0 0 :::41495 :::* 18153/clash
udp 0 0 :::45675 :::* 18153/clash
udp 0 0 :::50851 :::* 18153/clash
udp 0 0 :::7874 :::* 18153/clash
udp 0 0 :::7891 :::* 18153/clash
udp 0 0 :::7892 :::* 18153/clash
udp 0 0 :::7893 :::* 18153/clash
udp 0 0 :::7895 :::* 18153/clash
udp 0 0 :::52108 :::* 18153/clash
udp 0 0 :::52139 :::* 18153/clash
udp 0 0 :::39935 :::* 18153/clash
udp 0 0 :::43014 :::* 18153/clash
udp 0 0 :::45063 :::* 18153/clash
udp 0 0 :::38923 :::* 18153/clash
udp 0 0 :::39983 :::* 18153/clash
udp 0 0 :::43072 :::* 18153/clash
udp 0 0 :::49302 :::* 18153/clash
udp 0 0 :::34976 :::* 18153/clash
udp 0 0 :::41125 :::* 18153/clash
udp 0 0 :::56515 :::* 18153/clash
udp 0 0 :::44262 :::* 18153/clash
udp 0 0 :::48376 :::* 18153/clash
udp 0 0 :::41222 :::* 18153/clash
#===================== 测试本机DNS查询(www.baidu.com) =====================#
Server: 127.0.*.*
Address: 127.0.*.*:53
Name: www.baidu.com
Address: 198.18.*.*
#===================== 测试内核DNS查询(www.instagram.com) =====================#
Status: 0
TC: false
RD: true
RA: true
AD: false
CD: false
Question:
Name: www.instagram.com.
Qtype: 1
Qclass: 1
Answer:
TTL: 600
data: z-p42-instagram.c10r.instagram.com.
name: www.instagram.com.
type: 5
TTL: 600
data: 157.240.*.*
name: z-p42-instagram.c10r.instagram.com.
type: 1
Status: 0
TC: false
RD: true
RA: true
AD: false
CD: false
Question:
Name: www.instagram.com.
Qtype: 28
Qclass: 1
Authority:
TTL: 30
data: a.gtld-servers.net. nstld.verisign-grs.com. 1800 1800 900 604800 86400
name: www.instagram.com.
type: 6
Dnsmasq 当前默认 resolv 文件:/tmp/resolv.conf.d/resolv.conf.auto
#===================== /tmp/resolv.conf.d/resolv.conf.auto =====================#
# Interface lan
nameserver 119.29.*.*
nameserver 8.8.*.*
#===================== 测试本机网络连接(www.baidu.com) =====================#
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: private, no-cache, no-store, proxy-revalidate, no-transform
Connection: keep-alive
Content-Length: 277
Content-Type: text/html
Date: Sat, 11 Oct 2025 03:01:07 GMT
Etag: "575e1f60-115"
Last-Modified: Mon, 13 Jun 2016 02:50:08 GMT
Pragma: no-cache
Server: bfe/1.0.*.*
Tr_id: bfe_7879776404539634863
#===================== 测试本机网络下载(raw.githubusercontent.com) =====================#
HTTP/2 200
cache-control: max-age=300
content-security-policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
content-type: text/plain; charset=utf-8
etag: "f6037a93c68519d7041a3b4df325b61c424ec255b45dfeb063371319e39b0d96"
strict-transport-security: max-age=31536000
x-content-type-options: nosniff
x-frame-options: deny
x-xss-protection: 1; mode=block
x-github-request-id: EA47:21080A:6174A:11AF6D:68E9C873
accept-ranges: bytes
date: Sat, 11 Oct 2025 03:01:08 GMT
via: 1.1 varnish
x-served-by: cache-nrt-rjtt7900049-NRT
x-cache: MISS
x-cache-hits: 0
x-timer: S1760151668.874674,VS0,VE192
vary: Authorization,Accept-Encoding
access-control-allow-origin: *
cross-origin-resource-policy: cross-origin
x-fastly-request-id: ade7ecc9caa1982cd7d1ca9a6c8d2e0ff7b86ef3
expires: Sat, 11 Oct 2025 03:06:08 GMT
source-age: 0
content-length: 1071
#===================== 最近运行日志(自动切换为Debug模式) =====================#
time="2025-10-11T02:51:57.892552569Z" level=error msg="[Sniffer] [223.109.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:51:57.892856204Z" level=error msg="[Sniffer] [111.3.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:51:57.893865696Z" level=error msg="[Sniffer] [111.3.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:51:57.894882480Z" level=error msg="[Sniffer] [111.3.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:51:57.892617613Z" level=error msg="[Sniffer] [111.3.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:51:57.900310577Z" level=error msg="[Sniffer] [111.3.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:51:57.901839836Z" level=error msg="[Sniffer] [111.3.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:51:57.904173830Z" level=error msg="[Sniffer] [111.3.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:52:11.393097424Z" level=error msg="[Sniffer] [17.253.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:52:11.395335165Z" level=error msg="[Sniffer] [17.253.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:52:11.395837724Z" level=error msg="[Sniffer] [17.253.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:52:11.401922384Z" level=error msg="[Sniffer] [17.253.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:53:58.648488688Z" level=error msg="[Sniffer] [111.13.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:53:58.649092750Z" level=error msg="[Sniffer] [111.13.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:53:58.650220954Z" level=error msg="[Sniffer] [111.13.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:53:58.650438253Z" level=error msg="[Sniffer] [111.13.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:54:35.762862160Z" level=error msg="[Sniffer] [36.155.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:54:35.764248498Z" level=error msg="[Sniffer] [120.233.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:54:35.765052941Z" level=error msg="[Sniffer] [120.233.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:54:35.765206946Z" level=error msg="[Sniffer] [112.60.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:54:35.765360952Z" level=error msg="[Sniffer] [120.233.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:54:35.765918637Z" level=error msg="[Sniffer] [112.60.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:54:35.765953055Z" level=error msg="[Sniffer] [111.32.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:54:35.766994631Z" level=error msg="[Sniffer] [120.233.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:54:35.768138586Z" level=error msg="[Sniffer] [36.155.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:54:35.767781866Z" level=error msg="[Sniffer] [112.60.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:54:35.769739307Z" level=error msg="[Sniffer] [120.233.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:54:35.769966814Z" level=error msg="[Sniffer] [36.155.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:54:35.770415121Z" level=error msg="[Sniffer] [112.60.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:54:35.770883845Z" level=error msg="[Sniffer] [36.155.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:56:03.570515629Z" level=error msg="[Sniffer] [111.13.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:56:03.571788797Z" level=error msg="[Sniffer] [117.128.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:56:03.571934051Z" level=error msg="[Sniffer] [117.128.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:56:03.572205311Z" level=error msg="[Sniffer] [111.13.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:57:16.470726550Z" level=error msg="[Sniffer] [59.82.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:57:16.471408780Z" level=error msg="[Sniffer] [59.82.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:57:16.479164744Z" level=error msg="[Sniffer] [59.82.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:57:21.650122238Z" level=error msg="[Sniffer] [39.175.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:57:21.650287618Z" level=error msg="[Sniffer] [111.1.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:57:21.653634603Z" level=error msg="[Sniffer] [39.175.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:57:21.653831193Z" level=error msg="[Sniffer] [112.13.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:57:21.653918404Z" level=error msg="[Sniffer] [112.13.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:57:21.654021366Z" level=error msg="[Sniffer] [112.13.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:57:21.654121119Z" level=error msg="[Sniffer] [39.175.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:57:21.654420088Z" level=error msg="[Sniffer] [112.13.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:57:21.654480173Z" level=error msg="[Sniffer] [112.13.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:57:21.654469381Z" level=error msg="[Sniffer] [39.175.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:57:21.654756974Z" level=error msg="[Sniffer] [39.175.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:58:33.291831530Z" level=error msg="[Sniffer] [36.156.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:58:33.293557378Z" level=error msg="[Sniffer] [120.221.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:58:33.294700749Z" level=error msg="[Sniffer] [120.222.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:58:33.294968508Z" level=error msg="[Sniffer] [120.221.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:58:33.294727584Z" level=error msg="[Sniffer] [120.221.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:58:33.295212641Z" level=error msg="[Sniffer] [120.221.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:58:33.295241809Z" level=error msg="[Sniffer] [120.221.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:58:33.302069367Z" level=error msg="[Sniffer] [183.250.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:58:33.303328533Z" level=error msg="[Sniffer] [183.250.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:58:33.304045473Z" level=error msg="[Sniffer] [183.250.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:58:33.304062682Z" level=error msg="[Sniffer] [183.250.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:58:33.304092142Z" level=error msg="[Sniffer] [183.250.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:58:47.858742727Z" level=error msg="[Sniffer] [223.4.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:58:47.859332788Z" level=error msg="[Sniffer] [116.62.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:58:47.868265957Z" level=error msg="[Sniffer] [118.31.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:59:06.890778859Z" level=error msg="[Sniffer] [106.55.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:59:34.877198575Z" level=error msg="[Sniffer] [39.173.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:59:34.877848721Z" level=error msg="[Sniffer] [183.247.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:59:50.130387267Z" level=error msg="[Sniffer] [20.189.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:59:50.131052288Z" level=error msg="[Sniffer] [20.42.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T02:59:50.138892251Z" level=error msg="[Sniffer] [52.178.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T03:00:10.521815762Z" level=error msg="[Sniffer] [52.167.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T03:00:10.522322403Z" level=error msg="[Sniffer] [20.106.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T03:00:10.529820521Z" level=error msg="[Sniffer] [52.167.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T03:00:34.606348428Z" level=error msg="[Sniffer] [59.82.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T03:00:35.976070369Z" level=error msg="[Sniffer] [110.75.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T03:01:00.947503066Z" level=error msg="[Sniffer] [150.171.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T03:01:00.949485881Z" level=error msg="[Sniffer] [150.171.*.*] [tls] may not have any sent data, Consider adding skip"
time="2025-10-11T03:01:11.810955257Z" level=debug msg="Hopped to 203.10.*.*:23975"
time="2025-10-11T03:01:11.817080456Z" level=debug msg="Hopped to 203.10.*.*:30853"
time="2025-10-11T03:01:11.822228540Z" level=debug msg="Hopped to 138.2.*.*:42545"
time="2025-10-11T03:01:11.840377505Z" level=debug msg="Hopped to 168.138.*.*:40412"
time="2025-10-11T03:01:11.842529783Z" level=debug msg="Hopped to 158.179.*.*:36409"
time="2025-10-11T03:01:11.851684622Z" level=debug msg="Hopped to 193.122.*.*:53979"
time="2025-10-11T03:01:11.865829748Z" level=debug msg="Hopped to 203.10.*.*:26884"
time="2025-10-11T03:01:12.043817530Z" level=debug msg="Hopped to 152.70.*.*:29250"
time="2025-10-11T03:01:12.066960281Z" level=debug msg="Hopped to 192.9.*.*:35264"
time="2025-10-11T03:01:12.094116497Z" level=debug msg="Hopped to 132.226.*.*:24552"
time="2025-10-11T03:01:12.113268827Z" level=debug msg="Hopped to 192.151.*.*:25939"
time="2025-10-11T03:01:12.140421834Z" level=debug msg="Hopped to 85.159.*.*:38252"
time="2025-10-11T03:01:12.155567993Z" level=debug msg="Hopped to 107.150.*.*:28403"
time="2025-10-11T03:01:12.163719174Z" level=debug msg="Hopped to 63.141.*.*:20174"
time="2025-10-11T03:01:12.174862953Z" level=debug msg="Hopped to 199.168.*.*:26830"
time="2025-10-11T03:01:12.174930330Z" level=debug msg="Hopped to 63.141.*.*:39538"
time="2025-10-11T03:01:12.183109221Z" level=debug msg="Hopped to 63.141.*.*:43175"
time="2025-10-11T03:01:12.281516376Z" level=debug msg="Hopped to 204.10.*.*:48161"
time="2025-10-11T03:01:12.431279824Z" level=debug msg="Hopped to 129.148.*.*:26063"
time="2025-10-11T03:01:12.839350495Z" level=debug msg="Hopped to 173.208.*.*:43821"
time="2025-10-11T03:01:12.945254602Z" level=debug msg="Hopped to 142.54.*.*:45492"
time="2025-10-11T03:01:16.810947003Z" level=debug msg="Exiting hop loop ..."
time="2025-10-11T03:01:16.818487706Z" level=debug msg="Exiting hop loop ..."
time="2025-10-11T03:01:16.838308850Z" level=debug msg="Exiting hop loop ..."
OpenClash Config
OpenClash 调试日志
生成时间: 2025-10-11 11:01:04
插件版本: 0.47.016
隐私提示: 上传此日志前请注意检查、屏蔽公网IP、节点、密码等相关敏感信息
#===================== 系统信息 =====================#
主机型号: Radxa E25 Carrier Board
固件版本: LEDE R25.10.10
LuCI版本: git-25.243.68636-4597fa4
内核版本: 6.6.110
处理器架构: aarch64_generic
#此项有值时,如不使用IPv6,建议到网络-接口-lan的设置中禁用IPV6的DHCP
IPV6-DHCP:
DNS劫持: Dnsmasq 转发
#DNS劫持为Dnsmasq时,此项结果应仅有配置文件的DNS监听地址
Dnsmasq转发设置: 127.0.*.*#7874
#===================== 依赖检查 =====================#
dnsmasq-full: 已安装
dnsmasq-full(ipset): 已安装
dnsmasq-full(nftset): 已安装
bash: 已安装
curl: 已安装
ca-bundle: 已安装
ipset: 已安装
ip-full: 已安装
ruby: 已安装
ruby-yaml: 已安装
ruby-psych: 已安装
ruby-pstore: 已安装
kmod-tun(TUN模式): 已安装
luci-compat(Luci >= 19.07): 已安装
kmod-inet-diag(PROCESS-NAME): 未安装
unzip: 已安装
iptables-mod-tproxy: 已安装
kmod-ipt-tproxy: 已安装
iptables-mod-extra: 已安装
kmod-ipt-extra: 已安装
kmod-ipt-nat: 已安装
#===================== 内核检查 =====================#
运行状态: 运行中
运行内核:Meta
进程pid: 18153
运行用户: root
已选择的架构: linux-arm64
#下方无法显示内核版本号时请确认您的内核版本是否正确或者有无权限
Meta内核版本: v1.19.14
Meta内核文件: 存在
Meta内核运行权限: 正常
#===================== 插件设置 =====================#
当前配置文件: /etc/openclash/config/gw.yaml
启动配置文件: /etc/openclash/gw.yaml
运行模式: fake-ip
默认代理模式: rule
UDP流量转发(tproxy): 启用
自定义DNS: 启用
IPV6代理: 启用
IPV6-DNS解析: 启用
禁用Dnsmasq缓存: 启用
自定义规则: 启用
仅允许内网: 启用
仅代理命中规则流量: 停用
仅允许常用端口流量: 停用
绕过中国大陆IP: 停用
路由本机代理: 启用
#启动异常时建议关闭此项后重试
混合节点: 停用
保留配置: 停用
#启动异常时建议关闭此项后重试
第三方规则: 停用
Expected Behavior
fake-ip+开启quic后,淘宝加载依然正常
Additional Context
/
This issue is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 5 days