Comments (3)
@1989car 有log发log,没log发生辰8字
from mihomo.
yacd 节点测速时候 网页控制台报错
openclash 的调试日志
`
OpenClash 调试日志
生成时间: 2022-05-03 12:51:39
插件版本:
隐私提示: 上传此日志前请注意检查、屏蔽公网IP、节点、密码等相关敏感信息
#===================== 系统信息 =====================#
主机型号: FriendlyElec NanoPi R4S
固件版本: OpenWrt SNAPSHOT r4492+32-30dc6d34b
LuCI版本: git-22.115.51709-a2bd654-1
内核版本: 5.15.36
处理器架构: aarch64_generic
#此项有值时,如不使用IPv6,建议到网络-接口-lan的设置中禁用IPV6的DHCP
IPV6-DHCP:
#此项结果应仅有配置文件的DNS监听地址
Dnsmasq转发设置:
#===================== 依赖检查 =====================#
dnsmasq-full: 已安装
coreutils: 已安装
coreutils-nohup: 已安装
bash: 已安装
curl: 已安装
ca-certificates: 已安装
ipset: 已安装
ip-full: 已安装
iptables-mod-tproxy: 已安装
kmod-ipt-tproxy: 已安装
iptables-mod-extra: 已安装
kmod-ipt-extra: 已安装
libcap: 已安装
libcap-bin: 已安装
ruby: 已安装
ruby-yaml: 已安装
ruby-psych: 已安装
ruby-pstore: 已安装
ruby-dbm: 未安装
kmod-tun(TUN模式): 已安装
luci-compat(Luci-19.07): 已安装
kmod-inet-diag(PROCESS-NAME): 已安装
#===================== 内核检查 =====================#
运行状态: 运行中
进程pid: 10490
运行权限: 10490: cap_dac_override,cap_net_bind_service,cap_net_admin,cap_net_raw,cap_sys_ptrace,cap_sys_resource=eip
运行用户: nobody
已选择的架构: linux-armv8
#下方无法显示内核版本号时请确认您的内核版本是否正确或者有无权限
Tun内核版本: 2022.04.17
Tun内核文件: 存在
Tun内核运行权限: 正常
Dev内核版本: v1.10.0-10-gaef4dd3
Dev内核文件: 存在
Dev内核运行权限: 正常
Meta内核版本: alpha-g4d5c0d2
Meta内核文件: 存在
Meta内核运行权限: 正常
#===================== 插件设置 =====================#
当前配置文件: /etc/openclash/config/Shuttle.yaml
启动配置文件: /etc/openclash/Shuttle.yaml
运行模式: redir-host-mix
默认代理模式: rule
UDP流量转发(tproxy): 停用
DNS劫持: 停用
自定义DNS: 启用
IPV6代理: 启用
IPV6-DNS解析: 启用
禁用Dnsmasq缓存: 启用
自定义规则: 启用
仅允许内网: 启用
仅代理命中规则流量: 启用
仅允许常用端口流量: 启用
绕过**大陆IP: 启用
DNS远程解析: 启用
路由本机代理: 启用
#启动异常时建议关闭此项后重试
混合节点: 停用
保留配置: 停用
#启动异常时建议关闭此项后重试
第三方规则: 停用
#===================== 自定义规则 一 =====================#
script:
## shortcuts:
## Notice: The core timezone is UTC
## CST 20:00-24:00 = time.now().hour > 12 and time.now().hour < 16
## 内核时区为UTC,故以下time.now()函数的取值需要根据本地时区进行转换
## 北京时间(CST) 20:00-24:00 = time.now().hour > 12 and time.now().hour < 16
## quic: network == 'udp' and dst_port == 443 and (geoip(resolve_ip(host)) != 'CN' or geoip(dst_ip) != 'CN')
## time-limit: in_cidr(src_ip,'192.168.1.2/32') and time.now().hour < 20 or time.now().hour > 21
## time-limit: src_ip == '192.168.1.2' and time.now().hour < 20 or time.now().hour > 21
## code: |
## def main(ctx, metadata):
## directkeywordlist = ["baidu"]
## for directkeyword in directkeywordlist:
## if directkeyword in metadata["host"]:
## ctx.log('[Script] matched keyword %s use direct' % directkeyword)
## return "DIRECT"
rules:
##- SCRIPT,quic,REJECT #shortcuts rule
##- SCRIPT,time-limit,REJECT #shortcuts rule
##DDNS
- DOMAIN-SUFFIX,checkip.dyndns.org,DIRECT
- DOMAIN-SUFFIX,checkipv6.dyndns.org,DIRECT
- DOMAIN-SUFFIX,checkip.synology.com,DIRECT
- DOMAIN-SUFFIX,synology.com,DIRECT
- DOMAIN-SUFFIX,dyndns.org,DIRECT
- DOMAIN-SUFFIX,synocommunity.com,DIRECT
- DOMAIN-SUFFIX,quickconnect.to,DIRECT
## PT
- DOMAIN-SUFFIX,tracker.m-team.cc,DIRECT
- DOMAIN-SUFFIX,chdbits.co,DIRECT
- DOMAIN-SUFFIX,pttime.org,DIRECT
- DOMAIN-SUFFIX,on.springsunday.net,DIRECT
##- PROCESS-NAME,curl,DIRECT #匹配路由自身进程(curl直连)
##- DOMAIN-SUFFIX,google.com,Proxy #匹配域名后缀(交由Proxy代理服务器组)
##- DOMAIN-KEYWORD,google,Proxy #匹配域名关键字(交由Proxy代理服务器组)
##- DOMAIN,google.com,Proxy #匹配域名(交由Proxy代理服务器组)
##- DOMAIN-SUFFIX,ad.com,REJECT #匹配域名后缀(拒绝)
##- IP-CIDR,127.0.0.0/8,DIRECT #匹配数据目标IP(直连)
##- SRC-IP-CIDR,192.168.1.201/32,DIRECT #匹配数据发起IP(直连)
##- DST-PORT,80,DIRECT #匹配数据目标端口(直连)
##- SRC-PORT,7777,DIRECT #匹配数据源端口(直连)
##排序在上的规则优先生效,如添加(去除规则前的#号):
##IP段:192.168.1.2-192.168.1.200 直连
##- SRC-IP-CIDR,192.168.1.2/31,DIRECT
##- SRC-IP-CIDR,192.168.1.4/30,DIRECT
##- SRC-IP-CIDR,192.168.1.8/29,DIRECT
##- SRC-IP-CIDR,192.168.1.16/28,DIRECT
##- SRC-IP-CIDR,192.168.1.32/27,DIRECT
##- SRC-IP-CIDR,192.168.1.64/26,DIRECT
##- SRC-IP-CIDR,192.168.1.128/26,DIRECT
##- SRC-IP-CIDR,192.168.1.192/29,DIRECT
##- SRC-IP-CIDR,192.168.1.200/32,DIRECT
##IP段:192.168.1.202-192.168.1.255 直连
##- SRC-IP-CIDR,192.168.1.202/31,DIRECT
##- SRC-IP-CIDR,192.168.1.204/30,DIRECT
##- SRC-IP-CIDR,192.168.1.208/28,DIRECT
##- SRC-IP-CIDR,192.168.1.224/27,DIRECT
##此时IP为192.168.1.1和192.168.1.201的客户端流量走代理(策略),其余客户端不走代理
##因为Fake-IP模式下,IP地址为192.168.1.1的路由器自身流量可走代理(策略),所以需要排除
##仅设置路由器自身直连:
##- SRC-IP-CIDR,192.168.1.1/32,DIRECT
##- SRC-IP-CIDR,198.18.0.1/32,DIRECT
##DDNS
##- DOMAIN-SUFFIX,checkip.dyndns.org,DIRECT
##- DOMAIN-SUFFIX,checkipv6.dyndns.org,DIRECT
##- DOMAIN-SUFFIX,checkip.synology.com,DIRECT
##- DOMAIN-SUFFIX,ifconfig.co,DIRECT
##- DOMAIN-SUFFIX,api.myip.com,DIRECT
##- DOMAIN-SUFFIX,ip-api.com,DIRECT
##- DOMAIN-SUFFIX,ipapi.co,DIRECT
##- DOMAIN-SUFFIX,ip6.seeip.org,DIRECT
##- DOMAIN-SUFFIX,members.3322.org,DIRECT
##在线IP段转CIDR地址:http://ip2cidr.com
#===================== 自定义规则 二 =====================#
script:
## shortcuts:
## common_port: dst_port not in [21, 22, 23, 53, 80, 123, 143, 194, 443, 465, 587, 853, 993, 995, 998, 2052, 2053, 2082, 2083, 2086, 2095, 2096, 5222, 5228, 5229, 5230, 8080, 8443, 8880, 8888, 8889]
## code: |
## def main(ctx, metadata):
## directkeywordlist = ["baidu"]
## for directkeyword in directkeywordlist:
## if directkeyword in metadata["host"]:
## ctx.log('[Script] matched keyword %s use direct' % directkeyword)
## return "DIRECT"
rules:
##- SCRIPT,common_port,DIRECT #shortcuts rule
##- DOMAIN-SUFFIX,google.com,Proxy #匹配域名后缀(交由Proxy代理服务器组)
##- DOMAIN-KEYWORD,google,Proxy #匹配域名关键字(交由Proxy代理服务器组)
##- DOMAIN,google.com,Proxy #匹配域名(交由Proxy代理服务器组)
##- DOMAIN-SUFFIX,ad.com,REJECT #匹配域名后缀(拒绝)
##- IP-CIDR,127.0.0.0/8,DIRECT #匹配数据目标IP(直连)
##- SRC-IP-CIDR,192.168.1.201/32,DIRECT #匹配数据发起IP(直连)
##- DST-PORT,80,DIRECT #匹配数据目标端口(直连)
##- SRC-PORT,7777,DIRECT #匹配数据源端口(直连)
#===================== 配置文件 =====================#
port: 7890
socks-port: 7891
allow-lan: true
mode: rule
log-level: silent
external-controller: 0.0.0.0:9090
proxy-groups:
- name: "\U0001F680 节点选择"
type: select
proxies:
- "♻️ 自动选择"
- "\U0001F1ED\U0001F1F0 香港节点"
- "\U0001F1E8\U0001F1F3 **节点"
- "\U0001F1F8\U0001F1EC 狮城节点"
- "\U0001F1EF\U0001F1F5 日本节点"
- "\U0001F1FA\U0001F1F2 美国节点"
- "\U0001F1F0\U0001F1F7 韩国节点"
- "\U0001F680 手动切换"
- DIRECT
- name: "\U0001F680 手动切换"
type: select
proxies:
- "[VMess] \U0001F1ED\U0001F1F0 HK丨VM丨香港一丨NF"
- "[VMess] \U0001F1ED\U0001F1F0 HK丨VM丨香港二丨NF"
- "[VMess] \U0001F1ED\U0001F1F0 HK丨VM丨香港三丨NF"
- "[VMess] \U0001F1E8\U0001F1F3 TW丨VM丨**一丨NF"
- "[VMess] \U0001F1E8\U0001F1F3 TW丨VM丨**二丨NF"
- "[VMess] \U0001F1EF\U0001F1F5 JP丨VM丨日本丨NF"
- "[VMess] \U0001F1F0\U0001F1F7 KR丨VM丨韩国丨NF"
- "[VMess] \U0001F1F8\U0001F1EC SG丨VM丨新加坡丨NF"
- "[VMess] \U0001F1EE\U0001F1F3 IN丨VM丨印度丨NF"
- "[VMess] \U0001F1F5\U0001F1ED PH丨VM丨菲律宾丨NF"
- "[VMess] \U0001F1F5\U0001F1F0 PK丨VM丨巴基斯坦X3丨NF"
- "[VMess] \U0001F1EE\U0001F1F1 IL丨VM丨以色列X2丨NF"
- "[VMess] \U0001F1E6\U0001F1EA AE丨VM丨阿联酋X3丨NF"
- "[VMess] \U0001F1FA\U0001F1F8 US丨VM丨加利福利亚丨NF"
- "[VMess] \U0001F1FA\U0001F1F8 US丨VM丨纽约丨YT"
- "[VMess] \U0001F1FA\U0001F1F8 US丨VM丨得克萨斯丨YT"
- "[VMess] \U0001F1FA\U0001F1F8 US丨VM丨佛罗里达丨NF"
- "[VMess] \U0001F1FA\U0001F1F8 US丨VM丨华盛顿丨YT"
- "[VMess] \U0001F1FA\U0001F1F8 US丨VM丨俄勒冈丨NF"
- "[VMess] \U0001F1E8\U0001F1E6 CA丨VM丨加拿大丨YT"
- "[VMess] \U0001F1E6\U0001F1F7 AR丨VM丨阿根廷丨NF"
- "[VMess] \U0001F1E7\U0001F1F7 BR丨VM丨巴西丨NF"
- "[VMess] \U0001F1EC\U0001F1E7 UK丨VM丨英国丨NF"
- "[VMess] \U0001F1EB\U0001F1F7 FR丨VM丨法国丨YT"
- "[VMess] \U0001F1E9\U0001F1EA DE丨VM丨德国丨NF"
- "[VMess] \U0001F1EE\U0001F1F9 IT丨VM丨意大利丨NF"
- "[VMess] \U0001F1F3\U0001F1F1 NL丨VM丨荷兰丨NF"
- "[VMess] \U0001F1F8\U0001F1EA SE丨VM丨瑞典丨NF"
- "[VMess] \U0001F1F7\U0001F1FA RU丨VM丨俄罗斯丨NF"
- "[VMess] \U0001F1F9\U0001F1F7 TR丨VM丨土耳其丨NF"
- "[VMess] \U0001F1F5\U0001F1F1 PL丨VM丨波兰丨NF"
- "[VMess] \U0001F1E9\U0001F1F0 DK丨VM丨丹麦丨NF"
- "[VMess] \U0001F1F1\U0001F1F9 LT丨VM丨立陶宛丨NF"
- "[VMess] \U0001F1F1\U0001F1FB LV丨VM丨拉脱维亚丨NF"
- "[VMess] \U0001F1E8\U0001F1ED CH丨VM丨瑞士丨NF"
- "[VMess] \U0001F1F7\U0001F1F4 RO丨VM丨罗马尼亚丨NF"
- "[VMess] \U0001F1E6\U0001F1FA AU丨VM丨澳大利亚丨YT"
- "[VMess] \U0001F1F8\U0001F1EC NZ丨VM丨新西兰X3丨NF"
- "[VMess] \U0001F1EA\U0001F1EC EG丨VM丨埃及丨NF"
- "[VMess] \U0001F1FF\U0001F1E6 ZA丨VM丨南非丨NF"
- name: "♻️ 自动选择"
type: url-test
url: http://www.gstatic.com/generate_204
interval: 300
tolerance: 50
proxies:
- "[VMess] \U0001F1ED\U0001F1F0 HK丨VM丨香港一丨NF"
- "[VMess] \U0001F1ED\U0001F1F0 HK丨VM丨香港二丨NF"
- "[VMess] \U0001F1ED\U0001F1F0 HK丨VM丨香港三丨NF"
- "[VMess] \U0001F1E8\U0001F1F3 TW丨VM丨**一丨NF"
- "[VMess] \U0001F1E8\U0001F1F3 TW丨VM丨**二丨NF"
- "[VMess] \U0001F1EF\U0001F1F5 JP丨VM丨日本丨NF"
- "[VMess] \U0001F1F0\U0001F1F7 KR丨VM丨韩国丨NF"
- "[VMess] \U0001F1F8\U0001F1EC SG丨VM丨新加坡丨NF"
- "[VMess] \U0001F1EE\U0001F1F3 IN丨VM丨印度丨NF"
- "[VMess] \U0001F1F5\U0001F1ED PH丨VM丨菲律宾丨NF"
- "[VMess] \U0001F1F5\U0001F1F0 PK丨VM丨巴基斯坦X3丨NF"
- "[VMess] \U0001F1EE\U0001F1F1 IL丨VM丨以色列X2丨NF"
- "[VMess] \U0001F1E6\U0001F1EA AE丨VM丨阿联酋X3丨NF"
- "[VMess] \U0001F1FA\U0001F1F8 US丨VM丨加利福利亚丨NF"
- "[VMess] \U0001F1FA\U0001F1F8 US丨VM丨纽约丨YT"
- "[VMess] \U0001F1FA\U0001F1F8 US丨VM丨得克萨斯丨YT"
- "[VMess] \U0001F1FA\U0001F1F8 US丨VM丨佛罗里达丨NF"
- "[VMess] \U0001F1FA\U0001F1F8 US丨VM丨华盛顿丨YT"
- "[VMess] \U0001F1FA\U0001F1F8 US丨VM丨俄勒冈丨NF"
- "[VMess] \U0001F1E8\U0001F1E6 CA丨VM丨加拿大丨YT"
- "[VMess] \U0001F1E6\U0001F1F7 AR丨VM丨阿根廷丨NF"
- "[VMess] \U0001F1E7\U0001F1F7 BR丨VM丨巴西丨NF"
- "[VMess] \U0001F1EC\U0001F1E7 UK丨VM丨英国丨NF"
- "[VMess] \U0001F1EB\U0001F1F7 FR丨VM丨法国丨YT"
- "[VMess] \U0001F1E9\U0001F1EA DE丨VM丨德国丨NF"
- "[VMess] \U0001F1EE\U0001F1F9 IT丨VM丨意大利丨NF"
- "[VMess] \U0001F1F3\U0001F1F1 NL丨VM丨荷兰丨NF"
- "[VMess] \U0001F1F8\U0001F1EA SE丨VM丨瑞典丨NF"
- "[VMess] \U0001F1F7\U0001F1FA RU丨VM丨俄罗斯丨NF"
- "[VMess] \U0001F1F9\U0001F1F7 TR丨VM丨土耳其丨NF"
- "[VMess] \U0001F1F5\U0001F1F1 PL丨VM丨波兰丨NF"
- "[VMess] \U0001F1E9\U0001F1F0 DK丨VM丨丹麦丨NF"
- "[VMess] \U0001F1F1\U0001F1F9 LT丨VM丨立陶宛丨NF"
- "[VMess] \U0001F1F1\U0001F1FB LV丨VM丨拉脱维亚丨NF"
- "[VMess] \U0001F1E8\U0001F1ED CH丨VM丨瑞士丨NF"
- "[VMess] \U0001F1F7\U0001F1F4 RO丨VM丨罗马尼亚丨NF"
- "[VMess] \U0001F1E6\U0001F1FA AU丨VM丨澳大利亚丨YT"
- "[VMess] \U0001F1F8\U0001F1EC NZ丨VM丨新西兰X3丨NF"
- "[VMess] \U0001F1EA\U0001F1EC EG丨VM丨埃及丨NF"
- "[VMess] \U0001F1FF\U0001F1E6 ZA丨VM丨南非丨NF"
- name: "\U0001F4F2 电报消息"
type: select
proxies:
- "\U0001F680 节点选择"
- "♻️ 自动选择"
- "\U0001F1F8\U0001F1EC 狮城节点"
- "\U0001F1ED\U0001F1F0 香港节点"
- "\U0001F1E8\U0001F1F3 **节点"
- "\U0001F1EF\U0001F1F5 日本节点"
- "\U0001F1FA\U0001F1F2 美国节点"
- "\U0001F1F0\U0001F1F7 韩国节点"
- "\U0001F680 手动切换"
- DIRECT
- name: "\U0001F4F9 油管视频"
type: select
proxies:
- "\U0001F680 节点选择"
- "♻️ 自动选择"
- "\U0001F1F8\U0001F1EC 狮城节点"
- "\U0001F1ED\U0001F1F0 香港节点"
- "\U0001F1E8\U0001F1F3 **节点"
- "\U0001F1EF\U0001F1F5 日本节点"
- "\U0001F1FA\U0001F1F2 美国节点"
- "\U0001F1F0\U0001F1F7 韩国节点"
- "\U0001F680 手动切换"
- DIRECT
- name: "\U0001F3A5 奈飞视频"
type: select
proxies:
- "\U0001F3A5 奈飞节点"
- "\U0001F680 节点选择"
- "♻️ 自动选择"
- "\U0001F1F8\U0001F1EC 狮城节点"
- "\U0001F1ED\U0001F1F0 香港节点"
- "\U0001F1E8\U0001F1F3 **节点"
- "\U0001F1EF\U0001F1F5 日本节点"
- "\U0001F1FA\U0001F1F2 美国节点"
- "\U0001F1F0\U0001F1F7 韩国节点"
- "\U0001F680 手动切换"
- DIRECT
- name: "\U0001F4FA 巴哈姆特"
type: select
proxies:
- "\U0001F1E8\U0001F1F3 **节点"
- "\U0001F680 节点选择"
- "\U0001F680 手动切换"
- DIRECT
- name: "\U0001F4FA 哔哩哔哩"
type: select
proxies:
- "\U0001F3AF 全球直连"
- "\U0001F1E8\U0001F1F3 **节点"
- "\U0001F1ED\U0001F1F0 香港节点"
- name: "\U0001F30D 国外媒体"
type: select
proxies:
- "\U0001F680 节点选择"
- "♻️ 自动选择"
- "\U0001F1ED\U0001F1F0 香港节点"
- "\U0001F1E8\U0001F1F3 **节点"
- "\U0001F1F8\U0001F1EC 狮城节点"
- "\U0001F1EF\U0001F1F5 日本节点"
- "\U0001F1FA\U0001F1F2 美国节点"
- "\U0001F1F0\U0001F1F7 韩国节点"
- "\U0001F680 手动切换"
- DIRECT
- name: "\U0001F30F 国内媒体"
type: select
proxies:
- DIRECT
- "\U0001F1ED\U0001F1F0 香港节点"
- "\U0001F1E8\U0001F1F3 **节点"
- "\U0001F1F8\U0001F1EC 狮城节点"
- "\U0001F1EF\U0001F1F5 日本节点"
- "\U0001F680 手动切换"
- name: "\U0001F4E2 谷歌FCM"
type: select
proxies:
- DIRECT
- "\U0001F680 节点选择"
- "\U0001F1FA\U0001F1F2 美国节点"
- "\U0001F1ED\U0001F1F0 香港节点"
- "\U0001F1E8\U0001F1F3 **节点"
- "\U0001F1F8\U0001F1EC 狮城节点"
- "\U0001F1EF\U0001F1F5 日本节点"
- "\U0001F1F0\U0001F1F7 韩国节点"
- "\U0001F680 手动切换"
- name: Ⓜ️ 微软云盘
type: select
proxies:
- DIRECT
- "\U0001F680 节点选择"
- "\U0001F1FA\U0001F1F2 美国节点"
- "\U0001F1ED\U0001F1F0 香港节点"
- "\U0001F1E8\U0001F1F3 **节点"
- "\U0001F1F8\U0001F1EC 狮城节点"
- "\U0001F1EF\U0001F1F5 日本节点"
- "\U0001F1F0\U0001F1F7 韩国节点"
- "\U0001F680 手动切换"
- name: Ⓜ️ 微软服务
type: select
proxies:
- DIRECT
- "\U0001F680 节点选择"
- "\U0001F1FA\U0001F1F2 美国节点"
- "\U0001F1ED\U0001F1F0 香港节点"
- "\U0001F1E8\U0001F1F3 **节点"
- "\U0001F1F8\U0001F1EC 狮城节点"
- "\U0001F1EF\U0001F1F5 日本节点"
- "\U0001F1F0\U0001F1F7 韩国节点"
- "\U0001F680 手动切换"
- name: "\U0001F34E 苹果服务"
type: select
proxies:
- DIRECT
- "\U0001F680 节点选择"
- "\U0001F1FA\U0001F1F2 美国节点"
- "\U0001F1ED\U0001F1F0 香港节点"
- "\U0001F1E8\U0001F1F3 **节点"
- "\U0001F1F8\U0001F1EC 狮城节点"
- "\U0001F1EF\U0001F1F5 日本节点"
- "\U0001F1F0\U0001F1F7 韩国节点"
- "\U0001F680 手动切换"
- name: "\U0001F3AE 游戏平台"
type: select
proxies:
- DIRECT
- "\U0001F680 节点选择"
- "\U0001F1FA\U0001F1F2 美国节点"
- "\U0001F1ED\U0001F1F0 香港节点"
- "\U0001F1E8\U0001F1F3 **节点"
- "\U0001F1F8\U0001F1EC 狮城节点"
- "\U0001F1EF\U0001F1F5 日本节点"
- "\U0001F1F0\U0001F1F7 韩国节点"
- "\U0001F680 手动切换"
- name: "\U0001F3B6 网易音乐"
type: select
proxies:
- DIRECT
- "\U0001F680 节点选择"
- "♻️ 自动选择"
- name: "\U0001F3AF 全球直连"
type: select
proxies:
- DIRECT
- "\U0001F680 节点选择"
- "♻️ 自动选择"
- name: "\U0001F6D1 广告拦截"
type: select
proxies:
- REJECT
- DIRECT
- name: "\U0001F343 应用净化"
type: select
proxies:
- REJECT
- DIRECT
- name: "\U0001F41F 漏网之鱼"
type: select
proxies:
- "\U0001F680 节点选择"
- "♻️ 自动选择"
- DIRECT
- "\U0001F1ED\U0001F1F0 香港节点"
- "\U0001F1E8\U0001F1F3 **节点"
- "\U0001F1F8\U0001F1EC 狮城节点"
- "\U0001F1EF\U0001F1F5 日本节点"
- "\U0001F1FA\U0001F1F2 美国节点"
- "\U0001F1F0\U0001F1F7 韩国节点"
- "\U0001F680 手动切换"
- name: "\U0001F1ED\U0001F1F0 香港节点"
type: url-test
url: http://www.gstatic.com/generate_204
interval: 300
tolerance: 50
proxies:
- "[VMess] \U0001F1ED\U0001F1F0 HK丨VM丨香港一丨NF"
- "[VMess] \U0001F1ED\U0001F1F0 HK丨VM丨香港二丨NF"
- "[VMess] \U0001F1ED\U0001F1F0 HK丨VM丨香港三丨NF"
- name: "\U0001F1EF\U0001F1F5 日本节点"
type: url-test
url: http://www.gstatic.com/generate_204
interval: 300
tolerance: 50
proxies:
- "[VMess] \U0001F1EF\U0001F1F5 JP丨VM丨日本丨NF"
- name: "\U0001F1FA\U0001F1F2 美国节点"
type: url-test
url: http://www.gstatic.com/generate_204
interval: 300
tolerance: 150
proxies:
- "[VMess] \U0001F1FA\U0001F1F8 US丨VM丨加利福利亚丨NF"
- "[VMess] \U0001F1FA\U0001F1F8 US丨VM丨纽约丨YT"
- "[VMess] \U0001F1FA\U0001F1F8 US丨VM丨得克萨斯丨YT"
- "[VMess] \U0001F1FA\U0001F1F8 US丨VM丨佛罗里达丨NF"
- "[VMess] \U0001F1FA\U0001F1F8 US丨VM丨华盛顿丨YT"
- "[VMess] \U0001F1FA\U0001F1F8 US丨VM丨俄勒冈丨NF"
- name: "\U0001F1E8\U0001F1F3 **节点"
type: url-test
url: http://www.gstatic.com/generate_204
interval: 300
tolerance: 50
proxies:
- "[VMess] \U0001F1E8\U0001F1F3 TW丨VM丨**一丨NF"
- "[VMess] \U0001F1E8\U0001F1F3 TW丨VM丨**二丨NF"
- name: "\U0001F1F8\U0001F1EC 狮城节点"
type: url-test
url: http://www.gstatic.com/generate_204
interval: 300
tolerance: 50
proxies:
- "[VMess] \U0001F1F8\U0001F1EC SG丨VM丨新加坡丨NF"
- name: "\U0001F1F0\U0001F1F7 韩国节点"
type: url-test
url: http://www.gstatic.com/generate_204
interval: 300
tolerance: 50
proxies:
- "[VMess] \U0001F1F0\U0001F1F7 KR丨VM丨韩国丨NF"
- name: "\U0001F3A5 奈飞节点"
type: select
proxies:
- "[VMess] \U0001F1ED\U0001F1F0 HK丨VM丨香港一丨NF"
- "[VMess] \U0001F1ED\U0001F1F0 HK丨VM丨香港二丨NF"
- "[VMess] \U0001F1ED\U0001F1F0 HK丨VM丨香港三丨NF"
- "[VMess] \U0001F1E8\U0001F1F3 TW丨VM丨**一丨NF"
- "[VMess] \U0001F1E8\U0001F1F3 TW丨VM丨**二丨NF"
- "[VMess] \U0001F1EF\U0001F1F5 JP丨VM丨日本丨NF"
- "[VMess] \U0001F1F0\U0001F1F7 KR丨VM丨韩国丨NF"
- "[VMess] \U0001F1F8\U0001F1EC SG丨VM丨新加坡丨NF"
- "[VMess] \U0001F1EE\U0001F1F3 IN丨VM丨印度丨NF"
- "[VMess] \U0001F1F5\U0001F1ED PH丨VM丨菲律宾丨NF"
- "[VMess] \U0001F1F5\U0001F1F0 PK丨VM丨巴基斯坦X3丨NF"
- "[VMess] \U0001F1EE\U0001F1F1 IL丨VM丨以色列X2丨NF"
- "[VMess] \U0001F1E6\U0001F1EA AE丨VM丨阿联酋X3丨NF"
- "[VMess] \U0001F1FA\U0001F1F8 US丨VM丨加利福利亚丨NF"
- "[VMess] \U0001F1FA\U0001F1F8 US丨VM丨佛罗里达丨NF"
- "[VMess] \U0001F1FA\U0001F1F8 US丨VM丨俄勒冈丨NF"
- "[VMess] \U0001F1E6\U0001F1F7 AR丨VM丨阿根廷丨NF"
- "[VMess] \U0001F1E7\U0001F1F7 BR丨VM丨巴西丨NF"
- "[VMess] \U0001F1EC\U0001F1E7 UK丨VM丨英国丨NF"
- "[VMess] \U0001F1E9\U0001F1EA DE丨VM丨德国丨NF"
- "[VMess] \U0001F1EE\U0001F1F9 IT丨VM丨意大利丨NF"
- "[VMess] \U0001F1F3\U0001F1F1 NL丨VM丨荷兰丨NF"
- "[VMess] \U0001F1F8\U0001F1EA SE丨VM丨瑞典丨NF"
- "[VMess] \U0001F1F7\U0001F1FA RU丨VM丨俄罗斯丨NF"
- "[VMess] \U0001F1F9\U0001F1F7 TR丨VM丨土耳其丨NF"
- "[VMess] \U0001F1F5\U0001F1F1 PL丨VM丨波兰丨NF"
- "[VMess] \U0001F1E9\U0001F1F0 DK丨VM丨丹麦丨NF"
- "[VMess] \U0001F1F1\U0001F1F9 LT丨VM丨立陶宛丨NF"
- "[VMess] \U0001F1F1\U0001F1FB LV丨VM丨拉脱维亚丨NF"
- "[VMess] \U0001F1E8\U0001F1ED CH丨VM丨瑞士丨NF"
- "[VMess] \U0001F1F7\U0001F1F4 RO丨VM丨罗马尼亚丨NF"
- "[VMess] \U0001F1F8\U0001F1EC NZ丨VM丨新西兰X3丨NF"
- "[VMess] \U0001F1EA\U0001F1EC EG丨VM丨埃及丨NF"
- "[VMess] \U0001F1FF\U0001F1E6 ZA丨VM丨南非丨NF"
rules:
- DST-PORT,7895,REJECT
- DST-PORT,7892,REJECT
- IP-CIDR,198.18.0.1/16,REJECT,no-resolve
- DOMAIN-SUFFIX,awesome-hd.me,DIRECT
- DOMAIN-SUFFIX,broadcasthe.net,DIRECT
- DOMAIN-SUFFIX,chdbits.co,DIRECT
- DOMAIN-SUFFIX,classix-unlimited.co.uk,DIRECT
- DOMAIN-SUFFIX,empornium.me,DIRECT
- DOMAIN-SUFFIX,gazellegames.net,DIRECT
- DOMAIN-SUFFIX,hdchina.org,DIRECT
- DOMAIN-SUFFIX,hdsky.me,DIRECT
- DOMAIN-SUFFIX,icetorrent.org,DIRECT
- DOMAIN-SUFFIX,jpopsuki.eu,DIRECT
- DOMAIN-SUFFIX,keepfrds.com,DIRECT
- DOMAIN-SUFFIX,madsrevolution.net,DIRECT
- DOMAIN-SUFFIX,m-team.cc,DIRECT
- DOMAIN-SUFFIX,nanyangpt.com,DIRECT
- DOMAIN-SUFFIX,ncore.cc,DIRECT
- DOMAIN-SUFFIX,open.cd,DIRECT
- DOMAIN-SUFFIX,ourbits.club,DIRECT
- DOMAIN-SUFFIX,passthepopcorn.me,DIRECT
- DOMAIN-SUFFIX,privatehd.to,DIRECT
- DOMAIN-SUFFIX,redacted.ch,DIRECT
- DOMAIN-SUFFIX,springsunday.net,DIRECT
- DOMAIN-SUFFIX,tjupt.org,DIRECT
- DOMAIN-SUFFIX,totheglory.im,DIRECT
- DOMAIN-KEYWORD,announce,DIRECT
- DOMAIN-KEYWORD,torrent,DIRECT
- DOMAIN-KEYWORD,tracker,DIRECT
- PROCESS-NAME,aria2c,DIRECT
- PROCESS-NAME,BitComet,DIRECT
- PROCESS-NAME,fdm,DIRECT
- PROCESS-NAME,NetTransport,DIRECT
- PROCESS-NAME,qbittorrent,DIRECT
- PROCESS-NAME,Thunder,DIRECT
- PROCESS-NAME,transmission-daemon,DIRECT
- PROCESS-NAME,transmission-qt,DIRECT
- PROCESS-NAME,uTorrent,DIRECT
- PROCESS-NAME,WebTorrent,DIRECT
- PROCESS-NAME,aria2c,DIRECT
- PROCESS-NAME,fdm,DIRECT
- PROCESS-NAME,Folx,DIRECT
- PROCESS-NAME,NetTransport,DIRECT
- PROCESS-NAME,qbittorrent,DIRECT
- PROCESS-NAME,Thunder,DIRECT
- PROCESS-NAME,Transmission,DIRECT
- PROCESS-NAME,transmission,DIRECT
- PROCESS-NAME,uTorrent,DIRECT
- PROCESS-NAME,WebTorrent,DIRECT
- PROCESS-NAME,WebTorrent Helper,DIRECT
- PROCESS-NAME,v2ray,DIRECT
- PROCESS-NAME,ss-local,DIRECT
- PROCESS-NAME,ssr-local,DIRECT
- PROCESS-NAME,ss-redir,DIRECT
- PROCESS-NAME,ssr-redir,DIRECT
- PROCESS-NAME,ss-server,DIRECT
- PROCESS-NAME,trojan-go,DIRECT
- PROCESS-NAME,xray,DIRECT
- PROCESS-NAME,hysteria,DIRECT
- PROCESS-NAME,UUBooster,DIRECT
- PROCESS-NAME,uugamebooster,DIRECT
- DOMAIN-SUFFIX,smtp,DIRECT
- DOMAIN-SUFFIX,checkip.dyndns.org,DIRECT
- DOMAIN-SUFFIX,checkipv6.dyndns.org,DIRECT
- DOMAIN-SUFFIX,checkip.synology.com,DIRECT
- DOMAIN-SUFFIX,synology.com,DIRECT
- DOMAIN-SUFFIX,dyndns.org,DIRECT
- DOMAIN-SUFFIX,synocommunity.com,DIRECT
- DOMAIN-SUFFIX,quickconnect.to,DIRECT
- DOMAIN-SUFFIX,tracker.m-team.cc,DIRECT
- DOMAIN-SUFFIX,chdbits.co,DIRECT
- DOMAIN-SUFFIX,pttime.org,DIRECT
- DOMAIN-SUFFIX,on.springsunday.net,DIRECT
- "RULE-SET,LocalAreaNetwork,\U0001F3AF 全球直连"
- "RULE-SET,UnBan,\U0001F3AF 全球直连"
- "RULE-SET,BanAD,\U0001F6D1 广告拦截"
- "RULE-SET,BanProgramAD,\U0001F343 应用净化"
- "RULE-SET,GoogleFCM,\U0001F4E2 谷歌FCM"
- "RULE-SET,GoogleCN,\U0001F3AF 全球直连"
- "RULE-SET,SteamCN,\U0001F3AF 全球直连"
- RULE-SET,OneDrive,Ⓜ️ 微软云盘
- RULE-SET,Microsoft,Ⓜ️ 微软服务
- "RULE-SET,Apple,\U0001F34E 苹果服务"
- "RULE-SET,Telegram,\U0001F4F2 电报消息"
- "RULE-SET,NetEaseMusic,\U0001F3B6 网易音乐"
- "RULE-SET,Epic,\U0001F3AE 游戏平台"
- "RULE-SET,Sony,\U0001F3AE 游戏平台"
- "RULE-SET,Steam,\U0001F3AE 游戏平台"
- "RULE-SET,YouTube,\U0001F4F9 油管视频"
- "RULE-SET,Netflix,\U0001F3A5 奈飞视频"
- "RULE-SET,Bahamut,\U0001F4FA 巴哈姆特"
- "RULE-SET,BilibiliHMT,\U0001F4FA 哔哩哔哩"
- "RULE-SET,Bilibili,\U0001F4FA 哔哩哔哩"
- "RULE-SET,ChinaMedia,\U0001F30F 国内媒体"
- "RULE-SET,ProxyMedia,\U0001F30D 国外媒体"
- "RULE-SET,ProxyGFWlist,\U0001F680 节点选择"
- "RULE-SET,ChinaDomain,\U0001F3AF 全球直连"
- "RULE-SET,ChinaCompanyIp,\U0001F3AF 全球直连"
- "RULE-SET,Download,\U0001F3AF 全球直连"
- "GEOIP,CN,\U0001F3AF 全球直连"
- "DST-PORT,80,\U0001F41F 漏网之鱼"
- "DST-PORT,443,\U0001F41F 漏网之鱼"
- "DST-PORT,22,\U0001F41F 漏网之鱼"
- MATCH,DIRECT
rule-providers:
LocalAreaNetwork:
type: http
behavior: classical
url: https://api.dler.io/getruleset?type=6&url=aHR0cHM6Ly9yYXcuZ2l0aHVidXNlcmNvbnRlbnQuY29tL0FDTDRTU1IvQUNMNFNTUi9tYXN0ZXIvQ2xhc2gvTG9jYWxBcmVhTmV0d29yay5saXN0
path: "./rule_provider/rule-provider_LocalAreaNetwork.yaml"
interval: 86400
UnBan:
type: http
behavior: classical
url: https://api.dler.io/getruleset?type=6&url=aHR0cHM6Ly9yYXcuZ2l0aHVidXNlcmNvbnRlbnQuY29tL0FDTDRTU1IvQUNMNFNTUi9tYXN0ZXIvQ2xhc2gvVW5CYW4ubGlzdA
path: "./rule_provider/rule-provider_UnBan.yaml"
interval: 86400
BanAD:
type: http
behavior: classical
url: https://api.dler.io/getruleset?type=6&url=aHR0cHM6Ly9yYXcuZ2l0aHVidXNlcmNvbnRlbnQuY29tL0FDTDRTU1IvQUNMNFNTUi9tYXN0ZXIvQ2xhc2gvQmFuQUQubGlzdA
path: "./rule_provider/rule-provider_BanAD.yaml"
interval: 86400
BanProgramAD:
type: http
behavior: classical
url: https://api.dler.io/getruleset?type=6&url=aHR0cHM6Ly9yYXcuZ2l0aHVidXNlcmNvbnRlbnQuY29tL0FDTDRTU1IvQUNMNFNTUi9tYXN0ZXIvQ2xhc2gvQmFuUHJvZ3JhbUFELmxpc3Q
path: "./rule_provider/rule-provider_BanProgramAD.yaml"
interval: 86400
GoogleFCM:
type: http
behavior: classical
url: https://api.dler.io/getruleset?type=6&url=aHR0cHM6Ly9yYXcuZ2l0aHVidXNlcmNvbnRlbnQuY29tL0FDTDRTU1IvQUNMNFNTUi9tYXN0ZXIvQ2xhc2gvUnVsZXNldC9Hb29nbGVGQ00ubGlzdA
path: "./rule_provider/rule-provider_GoogleFCM.yaml"
interval: 86400
GoogleCN:
type: http
behavior: classical
url: https://api.dler.io/getruleset?type=6&url=aHR0cHM6Ly9yYXcuZ2l0aHVidXNlcmNvbnRlbnQuY29tL0FDTDRTU1IvQUNMNFNTUi9tYXN0ZXIvQ2xhc2gvR29vZ2xlQ04ubGlzdA
path: "./rule_provider/rule-provider_GoogleCN.yaml"
interval: 86400
SteamCN:
type: http
behavior: classical
url: https://api.dler.io/getruleset?type=6&url=aHR0cHM6Ly9yYXcuZ2l0aHVidXNlcmNvbnRlbnQuY29tL0FDTDRTU1IvQUNMNFNTUi9tYXN0ZXIvQ2xhc2gvUnVsZXNldC9TdGVhbUNOLmxpc3Q
path: "./rule_provider/rule-provider_SteamCN.yaml"
interval: 86400
OneDrive:
type: http
behavior: classical
url: https://api.dler.io/getruleset?type=6&url=aHR0cHM6Ly9yYXcuZ2l0aHVidXNlcmNvbnRlbnQuY29tL0FDTDRTU1IvQUNMNFNTUi9tYXN0ZXIvQ2xhc2gvT25lRHJpdmUubGlzdA
path: "./rule_provider/rule-provider_OneDrive.yaml"
interval: 86400
Microsoft:
type: http
behavior: classical
url: https://api.dler.io/getruleset?type=6&url=aHR0cHM6Ly9yYXcuZ2l0aHVidXNlcmNvbnRlbnQuY29tL0FDTDRTU1IvQUNMNFNTUi9tYXN0ZXIvQ2xhc2gvTWljcm9zb2Z0Lmxpc3Q
path: "./rule_provider/rule-provider_Microsoft.yaml"
interval: 86400
Apple:
type: http
behavior: classical
url: https://api.dler.io/getruleset?type=6&url=aHR0cHM6Ly9yYXcuZ2l0aHVidXNlcmNvbnRlbnQuY29tL0FDTDRTU1IvQUNMNFNTUi9tYXN0ZXIvQ2xhc2gvQXBwbGUubGlzdA
path: "./rule_provider/rule-provider_Apple.yaml"
interval: 86400
Telegram:
type: http
behavior: classical
url: https://api.dler.io/getruleset?type=6&url=aHR0cHM6Ly9yYXcuZ2l0aHVidXNlcmNvbnRlbnQuY29tL0FDTDRTU1IvQUNMNFNTUi9tYXN0ZXIvQ2xhc2gvVGVsZWdyYW0ubGlzdA
path: "./rule_provider/rule-provider_Telegram.yaml"
interval: 86400
NetEaseMusic:
type: http
behavior: classical
url: https://api.dler.io/getruleset?type=6&url=aHR0cHM6Ly9yYXcuZ2l0aHVidXNlcmNvbnRlbnQuY29tL0FDTDRTU1IvQUNMNFNTUi9tYXN0ZXIvQ2xhc2gvUnVsZXNldC9OZXRFYXNlTXVzaWMubGlzdA
path: "./rule_provider/rule-provider_NetEaseMusic.yaml"
interval: 86400
Epic:
type: http
behavior: classical
url: https://api.dler.io/getruleset?type=6&url=aHR0cHM6Ly9yYXcuZ2l0aHVidXNlcmNvbnRlbnQuY29tL0FDTDRTU1IvQUNMNFNTUi9tYXN0ZXIvQ2xhc2gvUnVsZXNldC9FcGljLmxpc3Q
path: "./rule_provider/rule-provider_Epic.yaml"
interval: 86400
Sony:
type: http
behavior: classical
url: https://api.dler.io/getruleset?type=6&url=aHR0cHM6Ly9yYXcuZ2l0aHVidXNlcmNvbnRlbnQuY29tL0FDTDRTU1IvQUNMNFNTUi9tYXN0ZXIvQ2xhc2gvUnVsZXNldC9Tb255Lmxpc3Q
path: "./rule_provider/rule-provider_Sony.yaml"
interval: 86400
Steam:
type: http
behavior: classical
url: https://api.dler.io/getruleset?type=6&url=aHR0cHM6Ly9yYXcuZ2l0aHVidXNlcmNvbnRlbnQuY29tL0FDTDRTU1IvQUNMNFNTUi9tYXN0ZXIvQ2xhc2gvUnVsZXNldC9TdGVhbS5saXN0
path: "./rule_provider/rule-provider_Steam.yaml"
interval: 86400
YouTube:
type: http
behavior: classical
url: https://api.dler.io/getruleset?type=6&url=aHR0cHM6Ly9yYXcuZ2l0aHVidXNlcmNvbnRlbnQuY29tL0FDTDRTU1IvQUNMNFNTUi9tYXN0ZXIvQ2xhc2gvUnVsZXNldC9Zb3VUdWJlLmxpc3Q
path: "./rule_provider/rule-provider_YouTube.yaml"
interval: 86400
Netflix:
type: http
behavior: classical
url: https://api.dler.io/getruleset?type=6&url=aHR0cHM6Ly9yYXcuZ2l0aHVidXNlcmNvbnRlbnQuY29tL0FDTDRTU1IvQUNMNFNTUi9tYXN0ZXIvQ2xhc2gvUnVsZXNldC9OZXRmbGl4Lmxpc3Q
path: "./rule_provider/rule-provider_Netflix.yaml"
interval: 86400
Bahamut:
type: http
behavior: classical
url: https://api.dler.io/getruleset?type=6&url=aHR0cHM6Ly9yYXcuZ2l0aHVidXNlcmNvbnRlbnQuY29tL0FDTDRTU1IvQUNMNFNTUi9tYXN0ZXIvQ2xhc2gvUnVsZXNldC9CYWhhbXV0Lmxpc3Q
path: "./rule_provider/rule-provider_Bahamut.yaml"
interval: 86400
BilibiliHMT:
type: http
behavior: classical
url: https://api.dler.io/getruleset?type=6&url=aHR0cHM6Ly9yYXcuZ2l0aHVidXNlcmNvbnRlbnQuY29tL0FDTDRTU1IvQUNMNFNTUi9tYXN0ZXIvQ2xhc2gvUnVsZXNldC9CaWxpYmlsaUhNVC5saXN0
path: "./rule_provider/rule-provider_BilibiliHMT.yaml"
interval: 86400
Bilibili:
type: http
behavior: classical
url: https://api.dler.io/getruleset?type=6&url=aHR0cHM6Ly9yYXcuZ2l0aHVidXNlcmNvbnRlbnQuY29tL0FDTDRTU1IvQUNMNFNTUi9tYXN0ZXIvQ2xhc2gvUnVsZXNldC9CaWxpYmlsaS5saXN0
path: "./rule_provider/rule-provider_Bilibili.yaml"
interval: 86400
ChinaMedia:
type: http
behavior: classical
url: https://api.dler.io/getruleset?type=6&url=aHR0cHM6Ly9yYXcuZ2l0aHVidXNlcmNvbnRlbnQuY29tL0FDTDRTU1IvQUNMNFNTUi9tYXN0ZXIvQ2xhc2gvQ2hpbmFNZWRpYS5saXN0
path: "./rule_provider/rule-provider_ChinaMedia.yaml"
interval: 86400
ProxyMedia:
type: http
behavior: classical
url: https://api.dler.io/getruleset?type=6&url=aHR0cHM6Ly9yYXcuZ2l0aHVidXNlcmNvbnRlbnQuY29tL0FDTDRTU1IvQUNMNFNTUi9tYXN0ZXIvQ2xhc2gvUHJveHlNZWRpYS5saXN0
path: "./rule_provider/rule-provider_ProxyMedia.yaml"
interval: 86400
ProxyGFWlist:
type: http
behavior: classical
url: https://api.dler.io/getruleset?type=6&url=aHR0cHM6Ly9yYXcuZ2l0aHVidXNlcmNvbnRlbnQuY29tL0FDTDRTU1IvQUNMNFNTUi9tYXN0ZXIvQ2xhc2gvUHJveHlHRldsaXN0Lmxpc3Q
path: "./rule_provider/rule-provider_ProxyGFWlist.yaml"
interval: 86400
ChinaDomain:
type: http
behavior: classical
url: https://api.dler.io/getruleset?type=6&url=aHR0cHM6Ly9yYXcuZ2l0aHVidXNlcmNvbnRlbnQuY29tL0FDTDRTU1IvQUNMNFNTUi9tYXN0ZXIvQ2xhc2gvQ2hpbmFEb21haW4ubGlzdA
path: "./rule_provider/rule-provider_ChinaDomain.yaml"
interval: 86400
ChinaCompanyIp:
type: http
behavior: classical
url: https://api.dler.io/getruleset?type=6&url=aHR0cHM6Ly9yYXcuZ2l0aHVidXNlcmNvbnRlbnQuY29tL0FDTDRTU1IvQUNMNFNTUi9tYXN0ZXIvQ2xhc2gvQ2hpbmFDb21wYW55SXAubGlzdA
path: "./rule_provider/rule-provider_ChinaCompanyIp.yaml"
interval: 86400
Download:
type: http
behavior: classical
url: https://api.dler.io/getruleset?type=6&url=aHR0cHM6Ly9yYXcuZ2l0aHVidXNlcmNvbnRlbnQuY29tL0FDTDRTU1IvQUNMNFNTUi9tYXN0ZXIvQ2xhc2gvRG93bmxvYWQubGlzdA
path: "./rule_provider/rule-provider_Download.yaml"
interval: 86400
redir-port: 7892
tproxy-port: 7895
mixed-port: 7893
bind-address: "*"
external-ui: "/usr/share/openclash/dashboard"
ipv6: true
geodata-mode: true
geodata-loader: standard
tcp-concurrent: true
dns:
enable: true
ipv6: true
enhanced-mode: fake-ip
fake-ip-range: 198.18.0.1/16
listen: 0.0.0.0:7874
nameserver:
- dhcp://"pppoe-wan"
- 114.242.41.1
- "[fe80::2d0:f6ff:fe9a:9d80]:53"
- 202.106.46.151
- 202.106.195.68
- "[2408:8000:1010:1::8]:53"
- "[2408:8000:1010:2::8]:53"
- 119.29.29.29
- 119.28.28.28
- 223.5.5.5
- https://doh.pub/dns-query
- https://dns.alidns.com/dns-query
fallback:
- https://dns.cloudflare.com/dns-query
- tls://dns.google:853
- https://1.1.1.1/dns-query
- tls://1.1.1.1:853
- tls://8.8.8.8:853
use-hosts: true
fake-ip-filter:
- "+.*"
default-nameserver:
- 114.242.41.1
- "[fe80::2d0:f6ff:fe9a:9d80]:53"
- 202.106.46.151
- 202.106.195.68
- "[2408:8000:1010:1::8]:53"
- "[2408:8000:1010:2::8]:53"
- 119.29.29.29
- 119.28.28.28
- 223.5.5.5
sniffer:
enable: true
sniffing:
- tls
tun:
enable: true
stack: system
device: utun
auto-route: false
auto-detect-interface: false
dns-hijack:
- tcp://any:53
profile:
store-selected: true
store-fake-ip: true
hosts:
#===================== 防火墙设置 =====================#
#IPv4 NAT chain
# Generated by iptables-save v1.8.7 on Tue May 3 12:51:42 2022
*nat
:PREROUTING ACCEPT [420:50637]
:INPUT ACCEPT [306:33617]
:OUTPUT ACCEPT [927:66280]
:POSTROUTING ACCEPT [159:12872]
:CLOUD_MUSIC - [0:0]
:MINIUPNPD - [0:0]
:MINIUPNPD-POSTROUTING - [0:0]
:openclash - [0:0]
:openclash_output - [0:0]
:postrouting_lan_rule - [0:0]
:postrouting_rule - [0:0]
:postrouting_wan_rule - [0:0]
:postrouting_zerotier_rule - [0:0]
:prerouting_lan_rule - [0:0]
:prerouting_rule - [0:0]
:prerouting_wan_rule - [0:0]
:prerouting_zerotier_rule - [0:0]
:zone_lan_postrouting - [0:0]
:zone_lan_prerouting - [0:0]
:zone_wan_postrouting - [0:0]
:zone_wan_prerouting - [0:0]
:zone_zerotier_postrouting - [0:0]
:zone_zerotier_prerouting - [0:0]
-A PREROUTING -p tcp -m comment --comment "OpenClash TCP DNS Hijack" -m tcp --dport 53 -j ACCEPT
-A PREROUTING -p tcp -m set --match-set music dst -j CLOUD_MUSIC
-A PREROUTING -m comment --comment "!fw3: Custom prerouting rule chain" -j prerouting_rule
-A PREROUTING -i br-lan -m comment --comment "!fw3" -j zone_lan_prerouting
-A PREROUTING -i wireguard -m comment --comment "!fw3" -j zone_lan_prerouting
-A PREROUTING -i pppoe-wan -m comment --comment "!fw3" -j zone_wan_prerouting
-A PREROUTING -i eth0 -m comment --comment "!fw3" -j zone_wan_prerouting
-A PREROUTING -i ztugarseqb -m comment --comment "!fw3" -j zone_zerotier_prerouting
-A PREROUTING -d 10.0.0.1/32 -p udp -m udp --dport 53 -j REDIRECT --to-ports 5353
-A PREROUTING -d 10.0.0.1/32 -p udp -m udp --dport 53 -j REDIRECT --to-ports 5353
-A PREROUTING -d 192.168.1.10/32 -p udp -m udp --dport 53 -j REDIRECT --to-ports 5353
-A PREROUTING -d 172.30.0.1/32 -p udp -m udp --dport 53 -j REDIRECT --to-ports 5353
-A PREROUTING -p tcp -j openclash
-A OUTPUT -j openclash_output
-A POSTROUTING -s 172.30.0.0/16 -j MASQUERADE
-A POSTROUTING -o ztugarseqb -j MASQUERADE
-A POSTROUTING -s 172.30.0.0/16 -j MASQUERADE
-A POSTROUTING -o ztugarseqb -j MASQUERADE
-A POSTROUTING -s 172.30.0.0/16 -j MASQUERADE
-A POSTROUTING -s 172.30.0.0/16 -j MASQUERADE
-A POSTROUTING -o ztugarseqb -j MASQUERADE
-A POSTROUTING -s 172.30.0.0/16 -j MASQUERADE
-A POSTROUTING -o ztugarseqb -j MASQUERADE
-A POSTROUTING -o zt+ -j MASQUERADE
-A POSTROUTING -m comment --comment "!fw3: Custom postrouting rule chain" -j postrouting_rule
-A POSTROUTING -o br-lan -m comment --comment "!fw3" -j zone_lan_postrouting
-A POSTROUTING -o wireguard -m comment --comment "!fw3" -j zone_lan_postrouting
-A POSTROUTING -o pppoe-wan -m comment --comment "!fw3" -j zone_wan_postrouting
-A POSTROUTING -o eth0 -m comment --comment "!fw3" -j zone_wan_postrouting
-A POSTROUTING -o ztugarseqb -m comment --comment "!fw3" -j zone_zerotier_postrouting
-A CLOUD_MUSIC -d 0.0.0.0/8 -j RETURN
-A CLOUD_MUSIC -d 10.0.0.0/8 -j RETURN
-A CLOUD_MUSIC -d 127.0.0.0/8 -j RETURN
-A CLOUD_MUSIC -d 169.254.0.0/16 -j RETURN
-A CLOUD_MUSIC -d 172.16.0.0/12 -j RETURN
-A CLOUD_MUSIC -d 192.168.0.0/16 -j RETURN
-A CLOUD_MUSIC -d 224.0.0.0/4 -j RETURN
-A CLOUD_MUSIC -d 240.0.0.0/4 -j RETURN
-A CLOUD_MUSIC -p tcp -m set ! --match-set music_http src -m tcp --dport 80 -j REDIRECT --to-ports 5200
-A CLOUD_MUSIC -p tcp -m set ! --match-set music_https src -m tcp --dport 443 -j REDIRECT --to-ports 5201
-A MINIUPNPD -p udp -m udp --dport 64595 -j DNAT --to-destination 10.0.1.105:64595
-A MINIUPNPD -p udp -m udp --dport 16881 -j DNAT --to-destination 10.0.1.10:16881
-A MINIUPNPD -p tcp -m tcp --dport 1888 -j DNAT --to-destination 10.0.0.100:1888
-A MINIUPNPD -p tcp -m tcp --dport 2888 -j DNAT --to-destination 10.0.0.100:2888
-A MINIUPNPD -p tcp -m tcp --dport 6690 -j DNAT --to-destination 10.0.0.100:6690
-A MINIUPNPD -p tcp -m tcp --dport 3888 -j DNAT --to-destination 10.0.0.100:3888
-A MINIUPNPD -p udp -m udp --dport 6881 -j DNAT --to-destination 10.0.0.100:6881
-A MINIUPNPD -p tcp -m tcp --dport 20034 -j DNAT --to-destination 10.0.0.34:20034
-A MINIUPNPD -p udp -m udp --dport 20034 -j DNAT --to-destination 10.0.0.34:20034
-A MINIUPNPD -p tcp -m tcp --dport 16881 -j DNAT --to-destination 10.0.1.10:16881
-A openclash -p tcp -m tcp --sport 1688 -j RETURN
-A openclash -p tcp -m tcp --sport 3560 -j RETURN
-A openclash -m set --match-set localnetwork dst -j RETURN
-A openclash -m set ! --match-set common_ports dst -j RETURN
-A openclash -m set --match-set china_ip_route dst -j RETURN
-A openclash -p tcp -j REDIRECT --to-ports 7892
-A openclash_output -p tcp -m tcp --sport 1688 -j RETURN
-A openclash_output -p tcp -m tcp --sport 3560 -j RETURN
-A openclash_output -s 10.0.0.100/32 -p tcp -m tcp --dport 16882 -j RETURN
-A openclash_output -s 10.0.0.100/32 -p tcp -m tcp --sport 16881 -j RETURN
-A openclash_output -s 10.0.0.100/32 -p tcp -m tcp --dport 6690 -j RETURN
-A openclash_output -s 10.0.0.100/32 -p tcp -m tcp --sport 6690 -j RETURN
-A openclash_output -s 10.0.0.100/32 -p tcp -m tcp --dport 16881 -j RETURN
-A openclash_output -s 10.0.0.100/32 -p tcp -m tcp --sport 16881 -j RETURN
-A openclash_output -s 10.0.0.100/32 -p tcp -m tcp --dport 2888 -j RETURN
-A openclash_output -s 10.0.0.100/32 -p tcp -m tcp --sport 2888 -j RETURN
-A openclash_output -m set --match-set localnetwork dst -j RETURN
-A openclash_output -m owner ! --uid-owner 65534 -m set ! --match-set common_ports dst -j RETURN
-A openclash_output -m owner ! --uid-owner 65534 -m set --match-set china_ip_route dst -j RETURN
-A openclash_output -p tcp -m owner ! --uid-owner 65534 -j REDIRECT --to-ports 7892
-A zone_lan_postrouting -m comment --comment "!fw3: Custom lan postrouting rule chain" -j postrouting_lan_rule
-A zone_lan_postrouting -s 10.0.0.0/20 -d 10.0.0.100/32 -p tcp -m tcp --dport 2888 -m comment --comment "!fw3: NAS (reflection)" -j SNAT --to-source 10.0.0.1
-A zone_lan_postrouting -s 10.0.0.0/20 -d 10.0.0.100/32 -p udp -m udp --dport 2888 -m comment --comment "!fw3: NAS (reflection)" -j SNAT --to-source 10.0.0.1
-A zone_lan_postrouting -s 192.168.100.0/24 -d 10.0.0.100/32 -p tcp -m tcp --dport 2888 -m comment --comment "!fw3: NAS (reflection)" -j SNAT --to-source 192.168.100.1
-A zone_lan_postrouting -s 192.168.100.0/24 -d 10.0.0.100/32 -p udp -m udp --dport 2888 -m comment --comment "!fw3: NAS (reflection)" -j SNAT --to-source 192.168.100.1
-A zone_lan_postrouting -s 10.0.0.0/20 -d 10.0.0.100/32 -p tcp -m tcp --dport 6690 -m comment --comment "!fw3: NAS-Drive (reflection)" -j SNAT --to-source 10.0.0.1
-A zone_lan_postrouting -s 10.0.0.0/20 -d 10.0.0.100/32 -p udp -m udp --dport 6690 -m comment --comment "!fw3: NAS-Drive (reflection)" -j SNAT --to-source 10.0.0.1
-A zone_lan_postrouting -s 192.168.100.0/24 -d 10.0.0.100/32 -p tcp -m tcp --dport 6690 -m comment --comment "!fw3: NAS-Drive (reflection)" -j SNAT --to-source 192.168.100.1
-A zone_lan_postrouting -s 192.168.100.0/24 -d 10.0.0.100/32 -p udp -m udp --dport 6690 -m comment --comment "!fw3: NAS-Drive (reflection)" -j SNAT --to-source 192.168.100.1
-A zone_lan_postrouting -s 10.0.0.0/20 -d 10.0.0.100/32 -p tcp -m tcp --dport 16881 -m comment --comment "!fw3: BT (reflection)" -j SNAT --to-source 10.0.0.1
-A zone_lan_postrouting -s 10.0.0.0/20 -d 10.0.0.100/32 -p udp -m udp --dport 16881 -m comment --comment "!fw3: BT (reflection)" -j SNAT --to-source 10.0.0.1
-A zone_lan_postrouting -s 192.168.100.0/24 -d 10.0.0.100/32 -p tcp -m tcp --dport 16881 -m comment --comment "!fw3: BT (reflection)" -j SNAT --to-source 192.168.100.1
-A zone_lan_postrouting -s 192.168.100.0/24 -d 10.0.0.100/32 -p udp -m udp --dport 16881 -m comment --comment "!fw3: BT (reflection)" -j SNAT --to-source 192.168.100.1
-A zone_lan_prerouting -m comment --comment "!fw3: Custom lan prerouting rule chain" -j prerouting_lan_rule
-A zone_lan_prerouting -s 10.0.0.0/20 -d *WAN IP*/32 -p tcp -m tcp --dport 2888 -m comment --comment "!fw3: NAS (reflection)" -j DNAT --to-destination 10.0.0.100:2888
-A zone_lan_prerouting -s 10.0.0.0/20 -d *WAN IP*/32 -p udp -m udp --dport 2888 -m comment --comment "!fw3: NAS (reflection)" -j DNAT --to-destination 10.0.0.100:2888
-A zone_lan_prerouting -s 192.168.100.0/24 -d *WAN IP*/32 -p tcp -m tcp --dport 2888 -m comment --comment "!fw3: NAS (reflection)" -j DNAT --to-destination 10.0.0.100:2888
-A zone_lan_prerouting -s 192.168.100.0/24 -d *WAN IP*/32 -p udp -m udp --dport 2888 -m comment --comment "!fw3: NAS (reflection)" -j DNAT --to-destination 10.0.0.100:2888
-A zone_lan_prerouting -s 10.0.0.0/20 -d 192.168.1.10/32 -p tcp -m tcp --dport 2888 -m comment --comment "!fw3: NAS (reflection)" -j DNAT --to-destination 10.0.0.100:2888
-A zone_lan_prerouting -s 10.0.0.0/20 -d 192.168.1.10/32 -p udp -m udp --dport 2888 -m comment --comment "!fw3: NAS (reflection)" -j DNAT --to-destination 10.0.0.100:2888
-A zone_lan_prerouting -s 192.168.100.0/24 -d 192.168.1.10/32 -p tcp -m tcp --dport 2888 -m comment --comment "!fw3: NAS (reflection)" -j DNAT --to-destination 10.0.0.100:2888
-A zone_lan_prerouting -s 192.168.100.0/24 -d 192.168.1.10/32 -p udp -m udp --dport 2888 -m comment --comment "!fw3: NAS (reflection)" -j DNAT --to-destination 10.0.0.100:2888
-A zone_lan_prerouting -s 10.0.0.0/20 -d *WAN IP*/32 -p tcp -m tcp --dport 16881 -m comment --comment "!fw3: BT (reflection)" -j DNAT --to-destination 10.0.0.100:16881
-A zone_lan_prerouting -s 10.0.0.0/20 -d *WAN IP*/32 -p udp -m udp --dport 16881 -m comment --comment "!fw3: BT (reflection)" -j DNAT --to-destination 10.0.0.100:16881
-A zone_lan_prerouting -s 192.168.100.0/24 -d *WAN IP*/32 -p tcp -m tcp --dport 16881 -m comment --comment "!fw3: BT (reflection)" -j DNAT --to-destination 10.0.0.100:16881
-A zone_lan_prerouting -s 192.168.100.0/24 -d *WAN IP*/32 -p udp -m udp --dport 16881 -m comment --comment "!fw3: BT (reflection)" -j DNAT --to-destination 10.0.0.100:16881
-A zone_lan_prerouting -s 10.0.0.0/20 -d 192.168.1.10/32 -p tcp -m tcp --dport 16881 -m comment --comment "!fw3: BT (reflection)" -j DNAT --to-destination 10.0.0.100:16881
-A zone_lan_prerouting -s 10.0.0.0/20 -d 192.168.1.10/32 -p udp -m udp --dport 16881 -m comment --comment "!fw3: BT (reflection)" -j DNAT --to-destination 10.0.0.100:16881
-A zone_lan_prerouting -s 192.168.100.0/24 -d 192.168.1.10/32 -p tcp -m tcp --dport 16881 -m comment --comment "!fw3: BT (reflection)" -j DNAT --to-destination 10.0.0.100:16881
-A zone_lan_prerouting -s 192.168.100.0/24 -d 192.168.1.10/32 -p udp -m udp --dport 16881 -m comment --comment "!fw3: BT (reflection)" -j DNAT --to-destination 10.0.0.100:16881
-A zone_lan_prerouting -s 10.0.0.0/20 -d *WAN IP*/32 -p tcp -m tcp --dport 6690 -m comment --comment "!fw3: NAS-Drive (reflection)" -j DNAT --to-destination 10.0.0.100:6690
-A zone_lan_prerouting -s 10.0.0.0/20 -d *WAN IP*/32 -p udp -m udp --dport 6690 -m comment --comment "!fw3: NAS-Drive (reflection)" -j DNAT --to-destination 10.0.0.100:6690
-A zone_lan_prerouting -s 192.168.100.0/24 -d *WAN IP*/32 -p tcp -m tcp --dport 6690 -m comment --comment "!fw3: NAS-Drive (reflection)" -j DNAT --to-destination 10.0.0.100:6690
-A zone_lan_prerouting -s 192.168.100.0/24 -d *WAN IP*/32 -p udp -m udp --dport 6690 -m comment --comment "!fw3: NAS-Drive (reflection)" -j DNAT --to-destination 10.0.0.100:6690
-A zone_lan_prerouting -s 10.0.0.0/20 -d 192.168.1.10/32 -p tcp -m tcp --dport 6690 -m comment --comment "!fw3: NAS-Drive (reflection)" -j DNAT --to-destination 10.0.0.100:6690
-A zone_lan_prerouting -s 10.0.0.0/20 -d 192.168.1.10/32 -p udp -m udp --dport 6690 -m comment --comment "!fw3: NAS-Drive (reflection)" -j DNAT --to-destination 10.0.0.100:6690
-A zone_lan_prerouting -s 192.168.100.0/24 -d 192.168.1.10/32 -p tcp -m tcp --dport 6690 -m comment --comment "!fw3: NAS-Drive (reflection)" -j DNAT --to-destination 10.0.0.100:6690
-A zone_lan_prerouting -s 192.168.100.0/24 -d 192.168.1.10/32 -p udp -m udp --dport 6690 -m comment --comment "!fw3: NAS-Drive (reflection)" -j DNAT --to-destination 10.0.0.100:6690
-A zone_lan_prerouting -s 10.0.0.0/20 -d *WAN IP*/32 -p tcp -m tcp --dport 16882 -m comment --comment "!fw3: BT (reflection)" -j DNAT --to-destination 10.0.0.100:16881
-A zone_lan_prerouting -s 10.0.0.0/20 -d *WAN IP*/32 -p udp -m udp --dport 16882 -m comment --comment "!fw3: BT (reflection)" -j DNAT --to-destination 10.0.0.100:16881
-A zone_lan_prerouting -s 192.168.100.0/24 -d *WAN IP*/32 -p tcp -m tcp --dport 16882 -m comment --comment "!fw3: BT (reflection)" -j DNAT --to-destination 10.0.0.100:16881
-A zone_lan_prerouting -s 192.168.100.0/24 -d *WAN IP*/32 -p udp -m udp --dport 16882 -m comment --comment "!fw3: BT (reflection)" -j DNAT --to-destination 10.0.0.100:16881
-A zone_lan_prerouting -s 10.0.0.0/20 -d 192.168.1.10/32 -p tcp -m tcp --dport 16882 -m comment --comment "!fw3: BT (reflection)" -j DNAT --to-destination 10.0.0.100:16881
-A zone_lan_prerouting -s 10.0.0.0/20 -d 192.168.1.10/32 -p udp -m udp --dport 16882 -m comment --comment "!fw3: BT (reflection)" -j DNAT --to-destination 10.0.0.100:16881
-A zone_lan_prerouting -s 192.168.100.0/24 -d 192.168.1.10/32 -p tcp -m tcp --dport 16882 -m comment --comment "!fw3: BT (reflection)" -j DNAT --to-destination 10.0.0.100:16881
-A zone_lan_prerouting -s 192.168.100.0/24 -d 192.168.1.10/32 -p udp -m udp --dport 16882 -m comment --comment "!fw3: BT (reflection)" -j DNAT --to-destination 10.0.0.100:16881
-A zone_wan_postrouting -j MINIUPNPD-POSTROUTING
-A zone_wan_postrouting -j MINIUPNPD-POSTROUTING
-A zone_wan_postrouting -m comment --comment "!fw3: Custom wan postrouting rule chain" -j postrouting_wan_rule
-A zone_wan_postrouting -m comment --comment "!fw3" -j FULLCONENAT
-A zone_wan_prerouting -j MINIUPNPD
-A zone_wan_prerouting -j MINIUPNPD
-A zone_wan_prerouting -m comment --comment "!fw3: Custom wan prerouting rule chain" -j prerouting_wan_rule
-A zone_wan_prerouting -p tcp -m tcp --dport 2888 -m comment --comment "!fw3: NAS" -j DNAT --to-destination 10.0.0.100:2888
-A zone_wan_prerouting -p udp -m udp --dport 2888 -m comment --comment "!fw3: NAS" -j DNAT --to-destination 10.0.0.100:2888
-A zone_wan_prerouting -p tcp -m tcp --dport 16881 -m comment --comment "!fw3: BT" -j DNAT --to-destination 10.0.0.100:16881
-A zone_wan_prerouting -p udp -m udp --dport 16881 -m comment --comment "!fw3: BT" -j DNAT --to-destination 10.0.0.100:16881
-A zone_wan_prerouting -p tcp -m tcp --dport 6690 -m comment --comment "!fw3: NAS-Drive" -j DNAT --to-destination 10.0.0.100:6690
-A zone_wan_prerouting -p udp -m udp --dport 6690 -m comment --comment "!fw3: NAS-Drive" -j DNAT --to-destination 10.0.0.100:6690
-A zone_wan_prerouting -p tcp -m tcp --dport 16882 -m comment --comment "!fw3: BT" -j DNAT --to-destination 10.0.0.100:16881
-A zone_wan_prerouting -p udp -m udp --dport 16882 -m comment --comment "!fw3: BT" -j DNAT --to-destination 10.0.0.100:16881
-A zone_wan_prerouting -m comment --comment "!fw3" -j FULLCONENAT
-A zone_zerotier_postrouting -m comment --comment "!fw3: Custom zerotier postrouting rule chain" -j postrouting_zerotier_rule
-A zone_zerotier_prerouting -m comment --comment "!fw3: Custom zerotier prerouting rule chain" -j prerouting_zerotier_rule
COMMIT
# Completed on Tue May 3 12:51:42 2022
#IPv4 Mangle chain
# Generated by iptables-save v1.8.7 on Tue May 3 12:51:42 2022
*mangle
:PREROUTING ACCEPT [9156:2296429]
:INPUT ACCEPT [8299:2232289]
:FORWARD ACCEPT [769:50998]
:OUTPUT ACCEPT [8343:2203516]
:POSTROUTING ACCEPT [9112:2254466]
:mwan3_connected - [0:0]
:mwan3_hook - [0:0]
:mwan3_iface_in_wan - [0:0]
:mwan3_ifaces_in - [0:0]
:mwan3_policy_balanced - [0:0]
:mwan3_rule_https - [0:0]
:mwan3_rules - [0:0]
:openclash - [0:0]
:openclash_dns_hijack - [0:0]
-A PREROUTING -p udp -j openclash
-A PREROUTING -p tcp -m tcp --dport 53 -j openclash_dns_hijack
-A PREROUTING -j mwan3_hook
-A FORWARD -o pppoe-wan -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -i pppoe-wan -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -o eth0 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -i eth0 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A OUTPUT -j mwan3_hook
-A mwan3_connected -m set --match-set mwan3_connected dst -j MARK --set-xmark 0x3f00/0x3f00
-A mwan3_hook -j CONNMARK --restore-mark --nfmask 0x3f00 --ctmask 0x3f00
-A mwan3_hook -m mark --mark 0x0/0x3f00 -j mwan3_ifaces_in
-A mwan3_hook -m mark --mark 0x0/0x3f00 -j mwan3_connected
-A mwan3_hook -m mark --mark 0x0/0x3f00 -j mwan3_rules
-A mwan3_hook -j CONNMARK --save-mark --nfmask 0x3f00 --ctmask 0x3f00
-A mwan3_hook -m mark ! --mark 0x3f00/0x3f00 -j mwan3_connected
-A mwan3_iface_in_wan -i pppoe-wan -m set --match-set mwan3_connected src -m mark --mark 0x0/0x3f00 -m comment --comment default -j MARK --set-xmark 0x3f00/0x3f00
-A mwan3_iface_in_wan -i pppoe-wan -m mark --mark 0x0/0x3f00 -m comment --comment wan -j MARK --set-xmark 0x100/0x3f00
-A mwan3_ifaces_in -m mark --mark 0x0/0x3f00 -j mwan3_iface_in_wan
-A mwan3_policy_balanced -m mark --mark 0x0/0x3f00 -m statistic --mode random --probability 0.25000000000 -m comment --comment "wan 1 4" -j MARK --set-xmark 0x100/0x3f00
-A mwan3_policy_balanced -m mark --mark 0x0/0x3f00 -m comment --comment "wan 3 3" -j MARK --set-xmark 0x100/0x3f00
-A mwan3_rule_https -m mark --mark 0x0/0x3f00 -j MARK --set-xmark 0x100/0x3f00
-A mwan3_rule_https -m mark --mark 0x100/0x3f00 -m set ! --match-set mwan3_sticky_https src,src -j MARK --set-xmark 0x0/0x3f00
-A mwan3_rule_https -m mark --mark 0x0/0x3f00 -j MARK --set-xmark 0x100/0x3f00
-A mwan3_rule_https -m mark --mark 0x100/0x3f00 -m set ! --match-set mwan3_sticky_https src,src -j MARK --set-xmark 0x0/0x3f00
-A mwan3_rule_https -m mark --mark 0x0/0x3f00 -j mwan3_policy_balanced
-A mwan3_rule_https -m mark ! --mark 0xfc00/0xfc00 -j SET --del-set mwan3_sticky_https src,src
-A mwan3_rule_https -m mark ! --mark 0xfc00/0xfc00 -j SET --add-set mwan3_sticky_https src,src
-A mwan3_rules -p tcp -m multiport --dports 443 -m mark --mark 0x0/0x3f00 -j mwan3_rule_https
-A mwan3_rules -m mark --mark 0x0/0x3f00 -j mwan3_policy_balanced
-A openclash -p udp -m udp --sport 3560 -j RETURN
-A openclash -p udp -m udp --sport 500 -j RETURN
-A openclash -p udp -m udp --sport 68 -j RETURN
-A openclash -s 10.0.0.100/32 -p udp -m udp --sport 16881 -j RETURN
-A openclash -s 10.0.0.100/32 -p udp -m udp --dport 16882 -j RETURN
-A openclash -s 10.0.0.100/32 -p udp -m udp --sport 6690 -j RETURN
-A openclash -s 10.0.0.100/32 -p udp -m udp --dport 6690 -j RETURN
-A openclash -s 10.0.0.100/32 -p udp -m udp --sport 16881 -j RETURN
-A openclash -s 10.0.0.100/32 -p udp -m udp --dport 16881 -j RETURN
-A openclash -s 10.0.0.100/32 -p udp -m udp --sport 2888 -j RETURN
-A openclash -s 10.0.0.100/32 -p udp -m udp --dport 2888 -j RETURN
-A openclash -i utun -j RETURN
-A openclash -m set --match-set localnetwork dst -j RETURN
-A openclash -m set ! --match-set common_ports dst -j RETURN
-A openclash -m set --match-set china_ip_route dst -j RETURN
-A openclash -j MARK --set-xmark 0x162/0xffffffff
-A openclash_dns_hijack -p tcp -m comment --comment "OpenClash TCP DNS Hijack" -m tcp --dport 53 -j MARK --set-xmark 0x162/0xffffffff
COMMIT
# Completed on Tue May 3 12:51:42 2022
#IPv4 Filter chain
# Generated by iptables-save v1.8.7 on Tue May 3 12:51:42 2022
*filter
:INPUT ACCEPT [0:0]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [0:0]
:MINIUPNPD - [0:0]
:forwarding_lan_rule - [0:0]
:forwarding_rule - [0:0]
:forwarding_wan_rule - [0:0]
:forwarding_zerotier_rule - [0:0]
:input_lan_rule - [0:0]
:input_rule - [0:0]
:input_wan_rule - [0:0]
:input_zerotier_rule - [0:0]
:openclash_wan_input - [0:0]
:output_lan_rule - [0:0]
:output_rule - [0:0]
:output_wan_rule - [0:0]
:output_zerotier_rule - [0:0]
:reject - [0:0]
:syn_flood - [0:0]
:zone_lan_dest_ACCEPT - [0:0]
:zone_lan_forward - [0:0]
:zone_lan_input - [0:0]
:zone_lan_output - [0:0]
:zone_lan_src_ACCEPT - [0:0]
:zone_wan_dest_ACCEPT - [0:0]
:zone_wan_dest_REJECT - [0:0]
:zone_wan_forward - [0:0]
:zone_wan_input - [0:0]
:zone_wan_output - [0:0]
:zone_wan_src_REJECT - [0:0]
:zone_zerotier_dest_ACCEPT - [0:0]
:zone_zerotier_forward - [0:0]
:zone_zerotier_input - [0:0]
:zone_zerotier_output - [0:0]
:zone_zerotier_src_ACCEPT - [0:0]
-A INPUT -i eth0 -j openclash_wan_input
-A INPUT -i pppoe-wan -j openclash_wan_input
-A INPUT -i lo -m comment --comment "!fw3" -j ACCEPT
-A INPUT -m comment --comment "!fw3: Custom input rule chain" -j input_rule
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m comment --comment "!fw3" -j syn_flood
-A INPUT -p tcp -m tcp --dport 3560 -m comment --comment "!fw3: Allow-WireGuard" -j ACCEPT
-A INPUT -p udp -m udp --dport 3560 -m comment --comment "!fw3: Allow-WireGuard" -j ACCEPT
-A INPUT -i br-lan -m comment --comment "!fw3" -j zone_lan_input
-A INPUT -i wireguard -m comment --comment "!fw3" -j zone_lan_input
-A INPUT -i pppoe-wan -m comment --comment "!fw3" -j zone_wan_input
-A INPUT -i eth0 -m comment --comment "!fw3" -j zone_wan_input
-A INPUT -i ztugarseqb -m comment --comment "!fw3" -j zone_zerotier_input
-A FORWARD -o utun -p udp -m udp --dport 443 -m comment --comment "OpenClash QUIC REJECT" -m set ! --match-set china_ip_route dst -j REJECT --reject-with icmp-port-unreachable
-A FORWARD -o utun -m comment --comment "OpenClash TUN Forward" -j ACCEPT
-A FORWARD -o ztugarseqb -j ACCEPT
-A FORWARD -i ztugarseqb -j ACCEPT
-A FORWARD -o ztugarseqb -j ACCEPT
-A FORWARD -i ztugarseqb -j ACCEPT
-A FORWARD -o ztugarseqb -j ACCEPT
-A FORWARD -i ztugarseqb -j ACCEPT
-A FORWARD -o ztugarseqb -j ACCEPT
-A FORWARD -i ztugarseqb -j ACCEPT
-A FORWARD -o zt+ -j ACCEPT
-A FORWARD -i zt+ -j ACCEPT
-A FORWARD -m comment --comment "!fw3: Custom forwarding rule chain" -j forwarding_rule
-A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A FORWARD -i br-lan -m comment --comment "!fw3" -j zone_lan_forward
-A FORWARD -i wireguard -m comment --comment "!fw3" -j zone_lan_forward
-A FORWARD -i pppoe-wan -m comment --comment "!fw3" -j zone_wan_forward
-A FORWARD -i eth0 -m comment --comment "!fw3" -j zone_wan_forward
-A FORWARD -i ztugarseqb -m comment --comment "!fw3" -j zone_zerotier_forward
-A FORWARD -m comment --comment "!fw3" -j reject
-A OUTPUT -d 223.252.199.10/32 -j DROP
-A OUTPUT -o lo -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -m comment --comment "!fw3: Custom output rule chain" -j output_rule
-A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -o br-lan -m comment --comment "!fw3" -j zone_lan_output
-A OUTPUT -o wireguard -m comment --comment "!fw3" -j zone_lan_output
-A OUTPUT -o pppoe-wan -m comment --comment "!fw3" -j zone_wan_output
-A OUTPUT -o eth0 -m comment --comment "!fw3" -j zone_wan_output
-A OUTPUT -o ztugarseqb -m comment --comment "!fw3" -j zone_zerotier_output
-A MINIUPNPD -d 10.0.1.105/32 -p udp -m udp --dport 64595 -j ACCEPT
-A MINIUPNPD -d 10.0.1.10/32 -p udp -m udp --dport 16881 -j ACCEPT
-A MINIUPNPD -d 10.0.0.100/32 -p tcp -m tcp --dport 1888 -j ACCEPT
-A MINIUPNPD -d 10.0.0.100/32 -p tcp -m tcp --dport 2888 -j ACCEPT
-A MINIUPNPD -d 10.0.0.100/32 -p tcp -m tcp --dport 6690 -j ACCEPT
-A MINIUPNPD -d 10.0.0.100/32 -p tcp -m tcp --dport 3888 -j ACCEPT
-A MINIUPNPD -d 10.0.0.100/32 -p udp -m udp --dport 6881 -j ACCEPT
-A MINIUPNPD -d 10.0.0.34/32 -p tcp -m tcp --dport 20034 -j ACCEPT
-A MINIUPNPD -d 10.0.0.34/32 -p udp -m udp --dport 20034 -j ACCEPT
-A MINIUPNPD -d 10.0.1.10/32 -p tcp -m tcp --dport 16881 -j ACCEPT
-A openclash_wan_input -p udp -m multiport --dports 7892,7895,9090,7890,7891,7893,7874 -j REJECT --reject-with icmp-port-unreachable
-A openclash_wan_input -p tcp -m multiport --dports 7892,7895,9090,7890,7891,7893,7874 -j REJECT --reject-with icmp-port-unreachable
-A reject -p tcp -m comment --comment "!fw3" -j REJECT --reject-with tcp-reset
-A reject -m comment --comment "!fw3" -j REJECT --reject-with icmp-port-unreachable
-A syn_flood -m limit --limit 25/sec --limit-burst 50 -m comment --comment "!fw3" -j RETURN
-A syn_flood -m comment --comment "!fw3" -j DROP
-A zone_lan_dest_ACCEPT -o br-lan -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_dest_ACCEPT -o wireguard -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_forward -m comment --comment "!fw3: Custom lan forwarding rule chain" -j forwarding_lan_rule
-A zone_lan_forward -m comment --comment "!fw3: Zone lan to wan forwarding policy" -j zone_wan_dest_ACCEPT
-A zone_lan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_lan_forward -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_input -m comment --comment "!fw3: Custom lan input rule chain" -j input_lan_rule
-A zone_lan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_lan_input -m comment --comment "!fw3" -j zone_lan_src_ACCEPT
-A zone_lan_output -m comment --comment "!fw3: Custom lan output rule chain" -j output_lan_rule
-A zone_lan_output -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_src_ACCEPT -i br-lan -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_src_ACCEPT -i wireguard -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_ACCEPT -o pppoe-wan -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
-A zone_wan_dest_ACCEPT -o pppoe-wan -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_ACCEPT -o eth0 -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
-A zone_wan_dest_ACCEPT -o eth0 -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_REJECT -o pppoe-wan -m comment --comment "!fw3" -j reject
-A zone_wan_dest_REJECT -o eth0 -m comment --comment "!fw3" -j reject
-A zone_wan_forward -j MINIUPNPD
-A zone_wan_forward -j MINIUPNPD
-A zone_wan_forward -m comment --comment "!fw3: Custom wan forwarding rule chain" -j forwarding_wan_rule
-A zone_wan_forward -d 224.0.0.0/4 -p udp -m comment --comment "!fw3: ubus:omcproxy[instance1] rule 2" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -p esp -m comment --comment "!fw3: Allow-IPSec-ESP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -p udp -m udp --dport 500 -m comment --comment "!fw3: Allow-ISAKMP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_wan_forward -m comment --comment "!fw3" -j zone_wan_dest_REJECT
-A zone_wan_input -m comment --comment "!fw3: Custom wan input rule chain" -j input_wan_rule
-A zone_wan_input -p igmp -m comment --comment "!fw3: ubus:omcproxy[instance1] rule 0" -j ACCEPT
-A zone_wan_input -p udp -m udp --dport 68 -m comment --comment "!fw3: Allow-DHCP-Renew" -j ACCEPT
-A zone_wan_input -p icmp -m icmp --icmp-type 8 -m comment --comment "!fw3: Allow-Ping" -j ACCEPT
-A zone_wan_input -p igmp -m comment --comment "!fw3: Allow-IGMP" -j ACCEPT
-A zone_wan_input -d 224.0.0.0/4 -p udp -m comment --comment "!fw3: Allow-udpxy" -j ACCEPT
-A zone_wan_input -p tcp -m tcp --dport 1688 -m comment --comment "!fw3: kms" -j ACCEPT
-A zone_wan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_wan_input -m comment --comment "!fw3" -j zone_wan_src_REJECT
-A zone_wan_output -m comment --comment "!fw3: Custom wan output rule chain" -j output_wan_rule
-A zone_wan_output -m comment --comment "!fw3" -j zone_wan_dest_ACCEPT
-A zone_wan_src_REJECT -i pppoe-wan -m comment --comment "!fw3" -j reject
-A zone_wan_src_REJECT -i eth0 -m comment --comment "!fw3" -j reject
-A zone_zerotier_dest_ACCEPT -o ztugarseqb -m comment --comment "!fw3" -j ACCEPT
-A zone_zerotier_forward -m comment --comment "!fw3: Custom zerotier forwarding rule chain" -j forwarding_zerotier_rule
-A zone_zerotier_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_zerotier_forward -m comment --comment "!fw3" -j zone_zerotier_dest_ACCEPT
-A zone_zerotier_input -m comment --comment "!fw3: Custom zerotier input rule chain" -j input_zerotier_rule
-A zone_zerotier_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_zerotier_input -m comment --comment "!fw3" -j zone_zerotier_src_ACCEPT
-A zone_zerotier_output -m comment --comment "!fw3: Custom zerotier output rule chain" -j output_zerotier_rule
-A zone_zerotier_output -m comment --comment "!fw3" -j zone_zerotier_dest_ACCEPT
-A zone_zerotier_src_ACCEPT -i ztugarseqb -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
COMMIT
# Completed on Tue May 3 12:51:42 2022
#IPv6 NAT chain
# Generated by ip6tables-save v1.8.7 on Tue May 3 12:51:42 2022
*nat
:PREROUTING ACCEPT [63:11665]
:INPUT ACCEPT [106:8498]
:OUTPUT ACCEPT [228:22536]
:POSTROUTING ACCEPT [236:23128]
-A PREROUTING -d 2001:4860:4860::8844/128 -p tcp -m comment --comment "OpenClash Google DNS Hijack" -m tcp --dport 53 -j ACCEPT
-A PREROUTING -d 2001:4860:4860::8888/128 -p tcp -m comment --comment "OpenClash Google DNS Hijack" -m tcp --dport 53 -j ACCEPT
-A PREROUTING -d 2408:8207:3022:6490::/64 -p udp -m udp --dport 53 -j REDIRECT --to-ports 5353
-A PREROUTING -d 2408:8206:302d:31a1::/64 -p udp -m udp --dport 53 -j REDIRECT --to-ports 5353
COMMIT
# Completed on Tue May 3 12:51:42 2022
#IPv6 Mangle chain
# Generated by ip6tables-save v1.8.7 on Tue May 3 12:51:42 2022
*mangle
:PREROUTING ACCEPT [1003:745639]
:INPUT ACCEPT [1224:773344]
:FORWARD ACCEPT [73:5726]
:OUTPUT ACCEPT [1137:722020]
:POSTROUTING ACCEPT [1209:727686]
:mwan3_connected - [0:0]
:mwan3_hook - [0:0]
:mwan3_ifaces_in - [0:0]
:mwan3_policy_balanced - [0:0]
:mwan3_rule_https - [0:0]
:mwan3_rules - [0:0]
:openclash - [0:0]
:openclash_output - [0:0]
-A PREROUTING -j mwan3_hook
-A PREROUTING -j openclash
-A FORWARD -o pppoe-wan -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -i pppoe-wan -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -o eth0 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -i eth0 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A OUTPUT -j mwan3_hook
-A OUTPUT -j openclash_output
-A mwan3_connected -m set --match-set mwan3_connected dst -j MARK --set-xmark 0x3f00/0x3f00
-A mwan3_hook -p ipv6-icmp -m icmp6 --icmpv6-type 133 -j RETURN
-A mwan3_hook -p ipv6-icmp -m icmp6 --icmpv6-type 134 -j RETURN
-A mwan3_hook -p ipv6-icmp -m icmp6 --icmpv6-type 135 -j RETURN
-A mwan3_hook -p ipv6-icmp -m icmp6 --icmpv6-type 136 -j RETURN
-A mwan3_hook -p ipv6-icmp -m icmp6 --icmpv6-type 137 -j RETURN
-A mwan3_hook -p ipv6-icmp -m set --match-set mwan3_source_v6 src -m icmp6 --icmpv6-type 128 -j RETURN
-A mwan3_hook -j CONNMARK --restore-mark --nfmask 0x3f00 --ctmask 0x3f00
-A mwan3_hook -m mark --mark 0x0/0x3f00 -j mwan3_ifaces_in
-A mwan3_hook -m mark --mark 0x0/0x3f00 -j mwan3_connected
-A mwan3_hook -m mark --mark 0x0/0x3f00 -j mwan3_rules
-A mwan3_hook -j CONNMARK --save-mark --nfmask 0x3f00 --ctmask 0x3f00
-A mwan3_hook -m mark ! --mark 0x3f00/0x3f00 -j mwan3_connected
-A mwan3_policy_balanced -m mark --mark 0x0/0x3f00 -m comment --comment default -j MARK --set-xmark 0x3f00/0x3f00
-A mwan3_rule_https -m mark --mark 0x0/0x3f00 -j mwan3_policy_balanced
-A mwan3_rule_https -m mark ! --mark 0xfc00/0xfc00 -j SET --del-set mwan3_sticky_https src,src
-A mwan3_rule_https -m mark ! --mark 0xfc00/0xfc00 -j SET --add-set mwan3_sticky_https src,src
-A mwan3_rules -p tcp -m multiport --dports 443 -m mark --mark 0x0/0x3f00 -j mwan3_rule_https
-A mwan3_rules -m mark --mark 0x0/0x3f00 -j mwan3_policy_balanced
-A openclash -p tcp -m tcp --sport 1688 -j RETURN
-A openclash -s ::8e0e:60ff:fe67:790e/::ffff:ffff:ffff:ffff -p udp -m udp --sport 16882 -j RETURN
-A openclash -s ::8e0e:60ff:fe67:790e/::ffff:ffff:ffff:ffff -p tcp -m tcp --sport 16882 -j RETURN
-A openclash -s ::8e0e:60ff:fe67:790e/::ffff:ffff:ffff:ffff -p udp -m udp --sport 16881 -j RETURN
-A openclash -s ::8e0e:60ff:fe67:790e/::ffff:ffff:ffff:ffff -p tcp -m tcp --sport 16881 -j RETURN
-A openclash -p udp -m udp --sport 3560 -j RETURN
-A openclash -p tcp -m tcp --sport 3560 -j RETURN
-A openclash -p udp -m udp --sport 500 -j RETURN
-A openclash -s fc00::/6 -p udp -m udp --sport 546 -j RETURN
-A openclash -m set --match-set localnetwork6 dst -j RETURN
-A openclash -m set ! --match-set common_ports dst -j RETURN
-A openclash -m set --match-set china_ip6_route dst -j RETURN
-A openclash -p tcp -m comment --comment "OpenClash TCP Mark" -j TPROXY --on-port 7895 --on-ip :: --tproxy-mark 0x162/0xffffffff
-A openclash -p udp -m comment --comment OpenClash -j TPROXY --on-port 7895 --on-ip :: --tproxy-mark 0x162/0xffffffff
-A openclash_output -p tcp -m tcp --sport 1688 -j RETURN
-A openclash_output -p udp -m udp --sport 16882 -j RETURN
-A openclash_output -p tcp -m tcp --sport 16882 -j RETURN
-A openclash_output -p udp -m udp --sport 16881 -j RETURN
-A openclash_output -p tcp -m tcp --sport 16881 -j RETURN
-A openclash_output -p udp -m udp --sport 3560 -j RETURN
-A openclash_output -p tcp -m tcp --sport 3560 -j RETURN
-A openclash_output -p udp -m udp --sport 500 -j RETURN
-A openclash_output -p udp -m udp --sport 546 -j RETURN
-A openclash_output -m set --match-set localnetwork6 dst -j RETURN
-A openclash_output -m owner ! --uid-owner 65534 -m set ! --match-set common_ports dst -j RETURN
-A openclash_output -m owner ! --uid-owner 65534 -m set --match-set china_ip6_route dst -j RETURN
-A openclash_output -p tcp -m owner ! --uid-owner 65534 -j MARK --set-xmark 0x162/0xffffffff
-A openclash_output -p udp -m owner ! --uid-owner 65534 -j MARK --set-xmark 0x162/0xffffffff
COMMIT
# Completed on Tue May 3 12:51:42 2022
#IPv6 Filter chain
# Generated by ip6tables-save v1.8.7 on Tue May 3 12:51:42 2022
*filter
:INPUT ACCEPT [1:60]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [0:0]
:MINIUPNPD - [0:0]
:forwarding_lan_rule - [0:0]
:forwarding_rule - [0:0]
:forwarding_wan_rule - [0:0]
:forwarding_zerotier_rule - [0:0]
:input_lan_rule - [0:0]
:input_rule - [0:0]
:input_wan_rule - [0:0]
:input_zerotier_rule - [0:0]
:openclash_wan_input - [0:0]
:output_lan_rule - [0:0]
:output_rule - [0:0]
:output_wan_rule - [0:0]
:output_zerotier_rule - [0:0]
:reject - [0:0]
:syn_flood - [0:0]
:zone_lan_dest_ACCEPT - [0:0]
:zone_lan_forward - [0:0]
:zone_lan_input - [0:0]
:zone_lan_output - [0:0]
:zone_lan_src_ACCEPT - [0:0]
:zone_wan_dest_ACCEPT - [0:0]
:zone_wan_dest_REJECT - [0:0]
:zone_wan_forward - [0:0]
:zone_wan_input - [0:0]
:zone_wan_output - [0:0]
:zone_wan_src_REJECT - [0:0]
:zone_zerotier_dest_ACCEPT - [0:0]
:zone_zerotier_forward - [0:0]
:zone_zerotier_input - [0:0]
:zone_zerotier_output - [0:0]
:zone_zerotier_src_ACCEPT - [0:0]
-A INPUT -i eth0 -j openclash_wan_input
-A INPUT -i eth0 -j openclash_wan_input
-A INPUT -p udp -m udp --dport 443 -m comment --comment "OpenClash QUIC REJECT" -m set ! --match-set china_ip6_route dst -j REJECT --reject-with icmp6-port-unreachable
-A INPUT -i lo -m comment --comment "!fw3" -j ACCEPT
-A INPUT -m comment --comment "!fw3: Custom input rule chain" -j input_rule
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m comment --comment "!fw3" -j syn_flood
-A INPUT -p tcp -m tcp --dport 3560 -m comment --comment "!fw3: Allow-WireGuard" -j ACCEPT
-A INPUT -p udp -m udp --dport 3560 -m comment --comment "!fw3: Allow-WireGuard" -j ACCEPT
-A INPUT -i br-lan -m comment --comment "!fw3" -j zone_lan_input
-A INPUT -i wireguard -m comment --comment "!fw3" -j zone_lan_input
-A INPUT -i pppoe-wan -m comment --comment "!fw3" -j zone_wan_input
-A INPUT -i eth0 -m comment --comment "!fw3" -j zone_wan_input
-A INPUT -i ztugarseqb -m comment --comment "!fw3" -j zone_zerotier_input
-A FORWARD -m comment --comment "!fw3: Custom forwarding rule chain" -j forwarding_rule
-A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A FORWARD -i br-lan -m comment --comment "!fw3" -j zone_lan_forward
-A FORWARD -i wireguard -m comment --comment "!fw3" -j zone_lan_forward
-A FORWARD -i pppoe-wan -m comment --comment "!fw3" -j zone_wan_forward
-A FORWARD -i eth0 -m comment --comment "!fw3" -j zone_wan_forward
-A FORWARD -i ztugarseqb -m comment --comment "!fw3" -j zone_zerotier_forward
-A FORWARD -m comment --comment "!fw3" -j reject
-A OUTPUT -o lo -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -m comment --comment "!fw3: Custom output rule chain" -j output_rule
-A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -o br-lan -m comment --comment "!fw3" -j zone_lan_output
-A OUTPUT -o wireguard -m comment --comment "!fw3" -j zone_lan_output
-A OUTPUT -o pppoe-wan -m comment --comment "!fw3" -j zone_wan_output
-A OUTPUT -o eth0 -m comment --comment "!fw3" -j zone_wan_output
-A OUTPUT -o ztugarseqb -m comment --comment "!fw3" -j zone_zerotier_output
-A openclash_wan_input -p udp -m multiport --dports 7892,7895,9090,7890,7891,7893,7874 -j REJECT --reject-with icmp6-port-unreachable
-A openclash_wan_input -p tcp -m multiport --dports 7892,7895,9090,7890,7891,7893,7874 -j REJECT --reject-with icmp6-port-unreachable
-A reject -p tcp -m comment --comment "!fw3" -j REJECT --reject-with tcp-reset
-A reject -m comment --comment "!fw3" -j REJECT --reject-with icmp6-port-unreachable
-A syn_flood -m limit --limit 25/sec --limit-burst 50 -m comment --comment "!fw3" -j RETURN
-A syn_flood -m comment --comment "!fw3" -j DROP
-A zone_lan_dest_ACCEPT -o br-lan -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_dest_ACCEPT -o wireguard -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_forward -m comment --comment "!fw3: Custom lan forwarding rule chain" -j forwarding_lan_rule
-A zone_lan_forward -m comment --comment "!fw3: Zone lan to wan forwarding policy" -j zone_wan_dest_ACCEPT
-A zone_lan_forward -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_input -m comment --comment "!fw3: Custom lan input rule chain" -j input_lan_rule
-A zone_lan_input -m comment --comment "!fw3" -j zone_lan_src_ACCEPT
-A zone_lan_output -m comment --comment "!fw3: Custom lan output rule chain" -j output_lan_rule
-A zone_lan_output -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_src_ACCEPT -i br-lan -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_src_ACCEPT -i wireguard -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_ACCEPT -o pppoe-wan -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
-A zone_wan_dest_ACCEPT -o pppoe-wan -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_ACCEPT -o eth0 -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
-A zone_wan_dest_ACCEPT -o eth0 -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_REJECT -o pppoe-wan -m comment --comment "!fw3" -j reject
-A zone_wan_dest_REJECT -o eth0 -m comment --comment "!fw3" -j reject
-A zone_wan_forward -j MINIUPNPD
-A zone_wan_forward -j MINIUPNPD
-A zone_wan_forward -m comment --comment "!fw3: Custom wan forwarding rule chain" -j forwarding_wan_rule
-A zone_wan_forward -d ff00::/8 -p udp -m comment --comment "!fw3: ubus:omcproxy[instance1] rule 3" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 128 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 129 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 2 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 3 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 4/0 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p ipv6-icmp -m icmp6 --icmpv6-type 4/1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Forward" -j ACCEPT
-A zone_wan_forward -p esp -m comment --comment "!fw3: Allow-IPSec-ESP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -p udp -m udp --dport 500 -m comment --comment "!fw3: Allow-ISAKMP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -d ::8e0e:60ff:fe67:790e/::ffff:ffff:ffff:ffff -p tcp -m tcp --dport 16881 -m comment --comment "!fw3: Allow-IPV6-BT" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -d ::8e0e:60ff:fe67:790e/::ffff:ffff:ffff:ffff -p tcp -m tcp --dport 16882 -m comment --comment "!fw3: Allow-IPV6-BT" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -d ::8e0e:60ff:fe67:790e/::ffff:ffff:ffff:ffff -p udp -m udp --dport 16881 -m comment --comment "!fw3: Allow-IPV6-BT" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -d ::8e0e:60ff:fe67:790e/::ffff:ffff:ffff:ffff -p udp -m udp --dport 16882 -m comment --comment "!fw3: Allow-IPV6-BT" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -m comment --comment "!fw3" -j zone_wan_dest_REJECT
-A zone_wan_input -m comment --comment "!fw3: Custom wan input rule chain" -j input_wan_rule
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 130/0 -m comment --comment "!fw3: ubus:omcproxy[instance1] rule 1" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 131/0 -m comment --comment "!fw3: ubus:omcproxy[instance1] rule 1" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 132/0 -m comment --comment "!fw3: ubus:omcproxy[instance1] rule 1" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 143/0 -m comment --comment "!fw3: ubus:omcproxy[instance1] rule 1" -j ACCEPT
-A zone_wan_input -s fc00::/6 -d fc00::/6 -p udp -m udp --dport 546 -m comment --comment "!fw3: Allow-DHCPv6" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 130/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 131/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 132/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT
-A zone_wan_input -s fe80::/10 -p ipv6-icmp -m icmp6 --icmpv6-type 143/0 -m comment --comment "!fw3: Allow-MLD" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 128 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 129 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 2 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 3 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 4/0 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 4/1 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 133 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 135 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 134 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p ipv6-icmp -m icmp6 --icmpv6-type 136 -m limit --limit 1000/sec -m comment --comment "!fw3: Allow-ICMPv6-Input" -j ACCEPT
-A zone_wan_input -p tcp -m tcp --dport 1688 -m comment --comment "!fw3: kms" -j ACCEPT
-A zone_wan_input -m comment --comment "!fw3" -j zone_wan_src_REJECT
-A zone_wan_output -m comment --comment "!fw3: Custom wan output rule chain" -j output_wan_rule
-A zone_wan_output -m comment --comment "!fw3" -j zone_wan_dest_ACCEPT
-A zone_wan_src_REJECT -i pppoe-wan -m comment --comment "!fw3" -j reject
-A zone_wan_src_REJECT -i eth0 -m comment --comment "!fw3" -j reject
-A zone_zerotier_dest_ACCEPT -o ztugarseqb -m comment --comment "!fw3" -j ACCEPT
-A zone_zerotier_forward -m comment --comment "!fw3: Custom zerotier forwarding rule chain" -j forwarding_zerotier_rule
-A zone_zerotier_forward -m comment --comment "!fw3" -j zone_zerotier_dest_ACCEPT
-A zone_zerotier_input -m comment --comment "!fw3: Custom zerotier input rule chain" -j input_zerotier_rule
-A zone_zerotier_input -m comment --comment "!fw3" -j zone_zerotier_src_ACCEPT
-A zone_zerotier_output -m comment --comment "!fw3: Custom zerotier output rule chain" -j output_zerotier_rule
-A zone_zerotier_output -m comment --comment "!fw3" -j zone_zerotier_dest_ACCEPT
-A zone_zerotier_src_ACCEPT -i ztugarseqb -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
COMMIT
# Completed on Tue May 3 12:51:42 2022
#===================== IPSET状态 =====================#
Name: cn
Name: ct
Name: cnc
Name: cmcc
Name: crtc
Name: cernet
Name: gwbn
Name: othernet
Name: music
Name: music_http
Name: music_https
Name: mwan3_connected_v4
Name: mwan3_connected_v6
Name: mwan3_source_v6
Name: mwan3_dynamic_v4
Name: mwan3_dynamic_v6
Name: mwan3_custom_v4
Name: mwan3_custom_v6
Name: mwan3_sticky_v4_https
Name: mwan3_sticky_v6_https
Name: china_ip_route
Name: localnetwork
Name: common_ports
Name: china_ip6_route
Name: localnetwork6
Name: mwan3_connected
Name: mwan3_sticky_https
#===================== 路由表状态 =====================#
#route -n
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
0.0.0.0 114.242.41.1 0.0.0.0 UG 0 0 0 pppoe-wan
10.0.0.0 0.0.0.0 255.255.240.0 U 0 0 0 br-lan
114.242.41.1 0.0.0.0 255.255.255.255 UH 0 0 0 pppoe-wan
172.30.0.0 0.0.0.0 255.255.0.0 U 0 0 0 ztugarseqb
192.168.1.0 0.0.0.0 255.255.255.0 U 20 0 0 eth0
192.168.100.0 0.0.0.0 255.255.255.0 U 0 0 0 wireguard
192.168.100.10 0.0.0.0 255.255.255.255 UH 0 0 0 wireguard
192.168.100.20 0.0.0.0 255.255.255.255 UH 0 0 0 wireguard
198.18.0.0 0.0.0.0 255.255.0.0 U 0 0 0 utun
#ip route list
default via 114.242.41.1 dev pppoe-wan proto static
10.0.0.0/20 dev br-lan proto kernel scope link src 10.0.0.1
114.242.41.1 dev pppoe-wan proto kernel scope link src *WAN IP*
172.30.0.0/16 dev ztugarseqb proto kernel scope link src 172.30.0.1
192.168.1.0/24 dev eth0 proto static scope link metric 20
192.168.100.0/24 dev wireguard proto kernel scope link src 192.168.100.1
192.168.100.10 dev wireguard proto static scope link
192.168.100.20 dev wireguard proto static scope link
198.18.0.0/16 dev utun scope link
#ip rule show
0: from all lookup local
1000: from all fwmark 0x162 lookup 354
1001: from all iif pppoe-wan lookup 1
2001: from all fwmark 0x100/0x3f00 lookup 1
2061: from all fwmark 0x3d00/0x3f00 blackhole
2062: from all fwmark 0x3e00/0x3f00 unreachable
32766: from all lookup main
32767: from all lookup default
#===================== Tun设备状态 =====================#
ztugarseqb: tap
utun: tun
#===================== 端口占用状态 =====================#
tcp 0 0 0.0.0.0:41933 0.0.0.0:* LISTEN 10490/clash
tcp 0 0 :::9090 :::* LISTEN 10490/clash
tcp 0 0 :::7893 :::* LISTEN 10490/clash
tcp 0 0 :::7892 :::* LISTEN 10490/clash
tcp 0 0 :::7895 :::* LISTEN 10490/clash
tcp 0 0 :::7891 :::* LISTEN 10490/clash
tcp 0 0 :::7890 :::* LISTEN 10490/clash
udp 0 0 :::7874 :::* 10490/clash
udp 0 0 :::7891 :::* 10490/clash
udp 0 0 :::7892 :::* 10490/clash
udp 0 0 :::7893 :::* 10490/clash
udp 0 0 :::7895 :::* 10490/clash
#===================== 测试本机DNS查询 =====================#
Server: 127.0.0.1
Address: 127.0.0.1:53
Non-authoritative answer:
www.baidu.com canonical name = www.a.shifen.com
Name: www.a.shifen.com
Address: 110.242.68.4
Name: www.a.shifen.com
Address: 110.242.68.3
Non-authoritative answer:
www.baidu.com canonical name = www.a.shifen.com
#===================== resolv.conf.d =====================#
# Interface lan
nameserver 114.114.114.114
nameserver 119.29.29.29
# Interface wan
nameserver 202.106.46.151
nameserver 202.106.195.68
# Interface wan_6
nameserver 2408:8000:1010:1::8
nameserver 2408:8000:1010:2::8
#===================== 测试本机网络连接 =====================#
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: private, no-cache, no-store, proxy-revalidate, no-transform
Connection: keep-alive
Content-Length: 277
Content-Type: text/html
Date: Tue, 03 May 2022 04:51:44 GMT
Etag: "575e1f59-115"
Last-Modified: Mon, 13 Jun 2016 02:50:01 GMT
Pragma: no-cache
Server: bfe/1.0.8.18
#===================== 测试本机网络下载 =====================#
#===================== 最近运行日志 =====================#
time="2022-05-02T11:43:11Z" level=info msg="Start initial rule provider ChinaMedia"
time="2022-05-02T11:43:11Z" level=info msg="Start initial rule provider ChinaCompanyIp"
time="2022-05-02T11:43:11Z" level=info msg="DNS server listening at: [::]:7874"
2022-05-02 19:43:14 Step 6: Wait For The File Downloading...
2022-05-02 19:43:14 Step 7: Set Control Panel...
2022-05-02 19:43:14 Step 8: Set Firewall Rules...
2022-05-02 19:43:19 Step 9: Restart Dnsmasq...
2022-05-02 19:43:22 Step 10: Add Cron Rules, Start Daemons...
2022-05-02 19:43:22 OpenClash Start Successful!
2022-05-02 19:47:55 Rule File【Unbreak.yaml】Download Error!
2022-05-02 19:47:59 Rule File【UnBan.yaml】Download Error!
2022-05-03 00:00:00 Start Downloading Geoip Database...
2022-05-03 00:00:00 Start Downloading The Chnroute Cidr List...
2022-05-03 00:00:00 Chnroute Cidr List Update Error, Please Try Again Later...
2022-05-03 00:00:00 Geoip Database Update Error, Please Try Again Later...
2022-05-03 00:00:03 Start Downloading The Chnroute6 Cidr List...
2022-05-03 00:00:05 Chnroute6 Cidr List Download Success, Check Updated...
2022-05-03 00:00:05 Updated Chnroute6 Cidr List No Change, Do Nothing...
2022-05-03 05:45:44 Start Updating Config File【Shuttle】...
2022-05-03 05:45:45 Error: Config File【Shuttle】Subscribed Failed, Trying to Download Without Agent...
2022-05-03 05:45:49 Error:【Shuttle】Update Error, Please Try Again Later...
2022-05-03 12:49:32 OpenClash Stoping...
2022-05-03 12:49:32 Step 1: Backup The Current Groups State...
2022-05-03 12:49:32 Step 2: Delete OpenClash Firewall Rules...
2022-05-03 12:49:33 Step 3: Close The OpenClash Daemons...
2022-05-03 12:49:33 Step 4: Close The Clash Core Process...
2022-05-03 12:49:33 Step 5: Restart Dnsmasq...
2022-05-03 12:49:36 Step 6: Delete OpenClash Residue File...
2022-05-03 12:49:36 OpenClash Start Running...
2022-05-03 12:49:36 Step 1: Get The Configuration...
2022-05-03 12:49:37 Step 2: Check The Components...
2022-05-03 12:49:37 Tip: Because of the file【 /etc/config/openclash 】modificated, Pause quick start...
2022-05-03 12:49:37 Step 3: Modify The Config File...
2022-05-03 12:49:38 Step 4: Start Running The Clash Core...
2022-05-03 12:49:38 Tip: Detected The Exclusive Function of The Meta Core, Use Meta Core to Start...
2022-05-03 12:49:39 Step 5: Check The Core Status...
time="2022-05-03T04:49:40Z" level=info msg="Start initial configuration in progress"
time="2022-05-03T04:49:40Z" level=info msg="Geodata Loader mode: standard"
time="2022-05-03T04:49:40Z" level=info msg="Start initial GeoIP rule CN => 🎯 全球直连, records: 10301"
time="2022-05-03T04:49:40Z" level=warning msg="Sniffer param force and reverses deprecated, will be removed in the release version, see https://github.com/MetaCubeX/Clash.Meta/commit/48a01adb7a4f38974b9d9639f931d0d245aebf28"
time="2022-05-03T04:49:40Z" level=info msg="Initial configuration complete, total time: 584ms"
time="2022-05-03T04:49:40Z" level=info msg="Sniffer is loaded and working"
time="2022-05-03T04:49:40Z" level=info msg="DNS enable IPv6 resolve"
time="2022-05-03T04:49:40Z" level=info msg="DNS server listening at: [::]:7874"
2022-05-03 12:49:42 Step 6: Wait For The File Downloading...
2022-05-03 12:49:43 Step 7: Set Control Panel...
2022-05-03 12:49:43 Step 8: Set Firewall Rules...
2022-05-03 12:49:50 Step 9: Restart Dnsmasq...
2022-05-03 12:49:53 Step 10: Add Cron Rules, Start Daemons...
2022-05-03 12:49:53 OpenClash Start Successful!
#===================== 活动连接信息 =====================#
1. SourceIP:【10.0.1.105】 - Host:【nleditor.osi.office.net】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【Microsoft】 - Lastchain:【DIRECT】
2. SourceIP:【10.0.1.105】 - Host:【array513.prod.do.dsp.mp.microsoft.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【Microsoft】 - Lastchain:【DIRECT】
3. SourceIP:【2408:8207:3022:6490:68d5:a5c7:6e8:80a5】 - Host:【devtools.azureedge.net】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【Microsoft】 - Lastchain:【DIRECT】
4. SourceIP:【10.0.1.105】 - Host:【self.events.data.microsoft.com】 - DestinationIP:【】 - Network:【tcp】 - RulePayload:【Microsoft】 - Lastchain:【DIRECT】
`
from mihomo.
这个是测速网站打不开吧?
from mihomo.
Related Issues (20)
- CMFA请求支持“从最近任务中隐藏”来防止误删后台。类似于surfboard和Flclash那样。
- [Bug] hosts写法不完善
- [Feature] proxy-providers 增加是否使用代理更新的选项 HOT 2
- [Bug] provider 中设定的 HTTP header 不生效 HOT 3
- [Bug] 负载均衡s5崩溃的问题
- [Bug] mihomo对代理节点的解析没有遵循“proxy-server-nameserver”的设置
- [Feature] ssh private-key 为路径时解析~为$HOME
- [Bug] 在alpine Linux下无法运行 HOT 3
- [Bug] 关闭IPV6的情况下,有部分网站依然被分配IPV6地址并可绕过clash直接访问网络 HOT 3
- [Bug] 死循环请求单个节点 (当开启 mobile hotspot热点) HOT 2
- [Feature] HTTPUpgrade 支持 0-rtt 配置 HOT 3
- [Feature] clash dns返回不了ipv6解析吗
- [Feature] 实现节点动态实时选择功能 HOT 11
- Manually Specifying DoH Server IP Address for 'default-nameserver' in 'mihomo' Configuration HOT 3
- [技术咨询] Mihomo 监听 shadowsocks 端口同时在另一台主机使用 Mihomo 作为客户端访问时不通 HOT 3
- [Bug] Memory usage HOT 1
- [Feature] rule-set可以不用通配符吗 HOT 1
- [Feature] 初始化过程中下载GeoX数据库时,也设置routing-mark
- [Bug] DNS fallback 没有直接走代理,也没有命中规则 HOT 2
- [Feature] 请求添加 classical behavior 的 mrs format 支持 HOT 9
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from mihomo.