Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Bug]: Don't start TUN-mode #5079

Closed
2 tasks done
EarlVadim opened this issue May 9, 2024 · 26 comments
Closed
2 tasks done

[Bug]: Don't start TUN-mode #5079

EarlVadim opened this issue May 9, 2024 · 26 comments
Labels
bug Something isn't working

Comments

@EarlVadim
Copy link

EarlVadim commented May 9, 2024

预期情况

Service start

实际情况

Service not started

复现方法

I tried everything, but the mode does not turn on.

日志信息

C:\Program Files\v2rayN\guiLogs

额外信息

Everything works for me in system proxy mode, but switching to TUN mode does not happen. The IKSray kernel does not start. I don’t understand where exactly something needs to be corrected.

Configuration successful
[VLESS] Earl.NB-DE(de***uk:443)
Microsoft Windows NT 10.0.22621.0 - 64
Start service (2024.05.09 08:53:22)...
2024.05.09 08:53:23 System proxy setting is changedForcedChange
+0300 2024-05-09 08:53:32 ERROR [2896928371 9.91s] dns: lookup failed for ssl.gstatic.com: EOF
2024.05.09 08:53:33 The ping of current service: -1 ms
+0300 2024-05-09 08:53:36 ERROR dns: exchange failed for detectportal.firefox.com. IN A: EOF
+0300 2024-05-09 08:53:36 ERROR dns: exchange failed for go.microsoft.com. IN A: EOF
+0300 2024-05-09 08:53:37 ERROR dns: exchange failed for geo.prod.do.dsp.mp.microsoft.com. IN A: EOF

and more log

FATAL[0000] start service: initialize rule-set[1]: initial rule-set: geosite-category-ads-all: Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-category-ads-all.srs": EOF | initialize rule-set[1]: initial rule-set: geosite-geolocation-!cn: Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-geolocation-!cn.srs": context canceled
FATAL[0000] start service: initialize rule-set[1]: initial rule-set: geosite-category-ads-all: Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-category-ads-all.srs": EOF | initialize rule-set[1]: initial rule-set: geosite-geolocation-!cn: Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-geolocation-!cn.srs": context canceled
Tun mode restart the core once

我确认已更新至最新版本

我确认已查询历史issues

@EarlVadim EarlVadim added the bug Something isn't working label May 9, 2024
@irrikrlla
Copy link

I have the same problem. The tun mode does not work

@lyd123qw2008
Copy link

FATAL[0000] start service: initialize rule-set[3]: initial rule-set: geosite-geolocation-!cn:
我也遇到类似的问题

@Lsyx-Good
Copy link

config and log file sing-box

@EarlVadim
Copy link
Author

EarlVadim commented May 10, 2024

config and log file sing-box

The problem is that over the last 24 hours I have tried 15 or 20 different configurations, both from the sing-box branch and from this branch, and added something of my own, but NOT ONE option works. I’ll say more, I couldn’t launch the sing-box core even without the TUNE mode. and this suggests that the problem is not in the config at all, but in the code.

It should be admitted that V2RayN cannot work with either the sing-box core or the TUNE mode.

Last config WITHOUT TUN-mode

{
"servers": [
{
"tag": "local",
"address": "223.5.5.5",
"strategy": "prefer_ipv4",
"detour": "direct"
},
{
"tag": "remote",
"address": "1.1.1.1",
"strategy": "prefer_ipv4",
"detour": "proxy"
},
{
"tag": "block",
"address": "rcode://success"
}
],
"rules": [
{
"outbound": "any",
"server": "remote"
}
],
"final": "remote",
"strategy": "prefer_ipv4"
}

Log is EMPTY, but proxy not work!!!!
And I'm tried "address": "tcp://1.1.1.1", not work also.

this config not work also (and log empty too)..

{
"servers": [
{
"tag": "local",
"address": "223.5.5.5",
"address_resolver": "dns-resolver",
"strategy": "prefer_ipv4",
"detour": "direct"
},
{
"tag": "remote",
"address": "1.1.1.1",
"strategy": "prefer_ipv4",
"address_resolver": "dns-resolver",
"detour": "proxy"
},
{
"tag": "block",
"address": "rcode://success"
},
{
"tag": "dns-resolver",
"address": "tcp://1.1.1.1",
"detour": "proxy"
}
],
"rules": [
{
"outbound": "any",
"server": "remote"
}
],
"final": "remote",
"strategy": "prefer_ipv4"
}

@Lsyx-Good
Copy link

Lsyx-Good commented May 10, 2024

please turn on save log to file on v2rayn settings

@EarlVadim
Copy link
Author

please turn on save log to file on v2raynn settings

all enabled...
with warning level only this record
+0300 2024-05-10 09:44:21 WARN router: initialize rule-set take too much time to finish!

@Lsyx-Good
Copy link

Upload your configuration information to remove your node information when tun mode is turned on

@Lsyx-Good
Copy link

Lsyx-Good commented May 10, 2024

please turn on save log to file on v2raynn settings

all enabled... with warning level only this record +0300 2024-05-10 09:44:21 WARN router: initialize rule-set take too much time to finish!

log file level should be to debug

@EarlVadim
Copy link
Author

EarlVadim commented May 10, 2024

please turn on save log to file on v2raynn settings

all enabled... with warning level only this record +0300 2024-05-10 09:44:21 WARN router: initialize rule-set take too much time to finish!

log file level should be to debug

+0300 2024-05-10 13:12:45 INFO router: updated default interface Беспроводная сеть, index 27
+0300 2024-05-10 13:12:45 INFO clash-api: restful api listening at 127.0.0.1:10813
+0300 2024-05-10 13:12:45 INFO inbound/socks[socks]: tcp server started at [::]:10808
+0300 2024-05-10 13:12:45 INFO inbound/http[http]: tcp server started at [::]:10809
+0300 2024-05-10 13:12:45 INFO [2634312280 0ms] inbound/http[http]: inbound connection from 127.0.0.1:63680
+0300 2024-05-10 13:12:45 INFO [2634312280 0ms] inbound/http[http]: inbound connection to signaler-pa.clients6.google.com:443
+0300 2024-05-10 13:12:45 DEBUG [2634312280 1ms] router: sniffed protocol: tls, domain: signaler-pa.clients6.google.com
+0300 2024-05-10 13:12:45 DEBUG [2634312280 1ms] dns: lookup domain signaler-pa.clients6.google.com
+0300 2024-05-10 13:12:45 INFO outbound/vless[proxy]: outbound multiplex packet connection to 1.1.1.1:53
+0300 2024-05-10 13:12:45 DEBUG dns: lookup domain de.z*****b.uk
+0300 2024-05-10 13:12:45 DEBUG dns: match[0] outbound=any => remote
+0300 2024-05-10 13:12:45 INFO [555007031 0ms] inbound/http[http]: inbound connection from 127.0.0.1:63672
+0300 2024-05-10 13:12:45 INFO [555007031 0ms] inbound/http[http]: inbound connection to web-chat-e2ee.facebook.com:443
+0300 2024-05-10 13:12:45 DEBUG [555007031 1ms] router: sniffed protocol: tls, domain: web-chat-e2ee.facebook.com
+0300 2024-05-10 13:12:45 DEBUG [555007031 1ms] dns: lookup domain web-chat-e2ee.facebook.com
+0300 2024-05-10 13:12:45 INFO [3662596169 0ms] inbound/http[http]: inbound connection from 127.0.0.1:63673
+0300 2024-05-10 13:12:45 INFO [3662596169 0ms] inbound/http[http]: inbound connection to ipv4.icanhazip.com:443
+0300 2024-05-10 13:12:45 DEBUG [3662596169 0ms] router: sniffed protocol: tls, domain: ipv4.icanhazip.com
+0300 2024-05-10 13:12:45 DEBUG [3662596169 0ms] dns: lookup domain ipv4.icanhazip.com
+0300 2024-05-10 13:12:45 INFO [1960488965 0ms] inbound/http[http]: inbound connection from 127.0.0.1:63676
+0300 2024-05-10 13:12:45 INFO [3625670406 0ms] inbound/http[http]: inbound connection from 127.0.0.1:63677
+0300 2024-05-10 13:12:45 INFO [1362963062 0ms] inbound/http[http]: inbound connection from 127.0.0.1:63674
+0300 2024-05-10 13:12:45 INFO [1786317290 0ms] inbound/http[http]: inbound connection from 127.0.0.1:63675
+0300 2024-05-10 13:12:45 INFO [1786317290 0ms] inbound/http[http]: inbound connection to ipv4.icanhazip.com:443
+0300 2024-05-10 13:12:45 DEBUG [1786317290 0ms] router: sniffed protocol: tls, domain: ipv4.icanhazip.com
+0300 2024-05-10 13:12:45 DEBUG [1786317290 0ms] dns: lookup domain ipv4.icanhazip.com
+0300 2024-05-10 13:12:46 INFO [3232857642 0ms] inbound/http[http]: inbound connection from 127.0.0.1:63684
+0300 2024-05-10 13:12:46 DEBUG [3232857642 0ms] inbound/http[http]: connection closed: process connection from 127.0.0.1:63684: read http request: EOF
+0300 2024-05-10 13:12:46 INFO [1045591748 0ms] inbound/http[http]: inbound connection from 127.0.0.1:63685
+0300 2024-05-10 13:12:46 INFO [1045591748 0ms] inbound/http[http]: inbound connection to www.google.com:443
+0300 2024-05-10 13:12:46 DEBUG [1045591748 2ms] router: sniffed protocol: tls, domain: www.google.com
+0300 2024-05-10 13:12:46 DEBUG [1045591748 2ms] dns: lookup domain www.google.com
+0300 2024-05-10 13:12:47 INFO inbound/tun[tun-in]: started at singbox_tun
+0300 2024-05-10 13:12:47 INFO sing-box started (1.999s)
+0300 2024-05-10 13:12:47 INFO [3290383369 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:59047
+0300 2024-05-10 13:12:47 INFO [3290383369 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 13:12:47 DEBUG [3290383369 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 13:12:47 INFO [3290383369 1ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 13:12:47 DEBUG [3290383369 1ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 13:12:47 INFO [2084712713 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:55768
+0300 2024-05-10 13:12:47 INFO [2084712713 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 13:12:47 DEBUG dns: exchange www.msftconnecttest.com. IN A
+0300 2024-05-10 13:12:47 DEBUG [2084712713 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 13:12:47 INFO [2084712713 10ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 13:12:47 DEBUG [2084712713 10ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 13:12:47 DEBUG dns: exchange api.ipify.org. IN A
+0300 2024-05-10 13:12:47 INFO [4111878783 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:63792
+0300 2024-05-10 13:12:47 INFO [4111878783 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 13:12:47 DEBUG [4111878783 0ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 13:12:47 INFO [4111878783 0ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 13:12:47 INFO [4111878783 0ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 13:12:47 INFO [1619130076 2ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:65219
+0300 2024-05-10 13:12:47 INFO [1619130076 3ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 13:12:47 DEBUG [1619130076 3ms] router: sniffed packet protocol: dns
+0300 2024-05-10 13:12:47 INFO [743334590 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:49698
+0300 2024-05-10 13:12:47 INFO [743334590 1ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 13:12:47 DEBUG [743334590 1ms] router: sniffed packet protocol: dns
+0300 2024-05-10 13:12:47 INFO [1619130076 4ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 13:12:47 DEBUG [1619130076 4ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 13:12:47 DEBUG dns: exchange example.org. IN A
+0300 2024-05-10 13:12:47 INFO [743334590 1ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 13:12:47 DEBUG [743334590 1ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 13:12:47 DEBUG dns: exchange ipv4only.arpa. IN A
+0300 2024-05-10 13:12:47 INFO [1166345808 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:63795
+0300 2024-05-10 13:12:47 INFO [1166345808 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 13:12:47 INFO [3685172797 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:63794
+0300 2024-05-10 13:12:47 INFO [3685172797 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 13:12:47 DEBUG [3685172797 111ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 13:12:47 INFO [3685172797 111ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 13:12:47 INFO [3685172797 111ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 13:12:47 DEBUG [1166345808 116ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 13:12:47 INFO [1166345808 117ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 13:12:47 INFO [1166345808 117ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 13:12:47 INFO [726650415 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:63919
+0300 2024-05-10 13:12:47 INFO [726650415 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 13:12:47 DEBUG [726650415 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 13:12:47 INFO [726650415 0ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 13:12:47 DEBUG [726650415 0ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 13:12:47 DEBUG dns: exchange detectportal.firefox.com. IN A
+0300 2024-05-10 13:12:47 INFO [3769376391 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:63796
+0300 2024-05-10 13:12:47 INFO [3769376391 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 13:12:47 DEBUG [3769376391 13ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 13:12:47 INFO [3769376391 15ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 13:12:47 INFO [3769376391 15ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 13:12:47 DEBUG dns: exchange www.msftconnecttest.com. IN A
+0300 2024-05-10 13:12:48 DEBUG dns: exchange api.ipify.org. IN A
+0300 2024-05-10 13:12:48 DEBUG dns: exchange example.org. IN A
+0300 2024-05-10 13:12:48 DEBUG dns: exchange ipv4only.arpa. IN A
+0300 2024-05-10 13:12:48 INFO [4213639100 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:55251
+0300 2024-05-10 13:12:48 INFO [4213639100 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 13:12:48 DEBUG [4213639100 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 13:12:48 INFO [4213639100 0ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 13:12:48 DEBUG [4213639100 0ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 13:12:48 DEBUG dns: exchange mozilla.cloudflare-dns.com. IN A
+0300 2024-05-10 13:12:48 INFO [2746249138 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:63797
+0300 2024-05-10 13:12:48 INFO [2746249138 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 13:12:48 DEBUG [2746249138 0ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 13:12:48 INFO [2746249138 0ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 13:12:48 INFO [2746249138 0ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 13:12:48 DEBUG dns: exchange detectportal.firefox.com. IN A
+0300 2024-05-10 13:12:48 INFO [707036943 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:63991
+0300 2024-05-10 13:12:48 INFO [707036943 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 13:12:48 DEBUG [707036943 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 13:12:48 INFO [3394812257 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:63798
+0300 2024-05-10 13:12:48 INFO [3394812257 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 13:12:48 INFO [707036943 0ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 13:12:48 DEBUG [707036943 0ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 13:12:48 DEBUG dns: exchange geo.prod.do.dsp.mp.microsoft.com. IN A
+0300 2024-05-10 13:12:48 DEBUG [3394812257 1ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 13:12:48 INFO [3394812257 2ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 13:12:48 INFO [3394812257 2ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 13:12:48 DEBUG dns: exchange www.msftconnecttest.com. IN A
+0300 2024-05-10 13:12:49 DEBUG dns: exchange api.ipify.org. IN A
+0300 2024-05-10 13:12:49 DEBUG dns: exchange mozilla.cloudflare-dns.com. IN A
+0300 2024-05-10 13:12:49 DEBUG dns: exchange example.org. IN A
+0300 2024-05-10 13:12:49 DEBUG dns: exchange ipv4only.arpa. IN A
+0300 2024-05-10 13:12:49 DEBUG dns: exchange detectportal.firefox.com. IN A
+0300 2024-05-10 13:12:49 DEBUG dns: exchange geo.prod.do.dsp.mp.microsoft.com. IN A
+0300 2024-05-10 13:12:50 DEBUG dns: exchange mozilla.cloudflare-dns.com. IN A
+0300 2024-05-10 13:12:50 DEBUG [3625670406 5.1s] inbound/http[http]: connection closed: process connection from 127.0.0.1:63677: read http request: EOF
+0300 2024-05-10 13:12:50 DEBUG [1362963062 5.0s] inbound/http[http]: connection closed: process connection from 127.0.0.1:63674: read http request: EOF
+0300 2024-05-10 13:12:50 DEBUG [1960488965 5.5s] inbound/http[http]: connection closed: process connection from 127.0.0.1:63676: read http request: EOF
+0300 2024-05-10 13:12:50 DEBUG dns: exchange geo.prod.do.dsp.mp.microsoft.com. IN A
+0300 2024-05-10 13:12:50 DEBUG dns: exchange www.msftconnecttest.com. IN A
+0300 2024-05-10 13:12:51 DEBUG dns: exchange api.ipify.org. IN A
+0300 2024-05-10 13:12:51 DEBUG dns: exchange example.org. IN A
+0300 2024-05-10 13:12:51 DEBUG dns: exchange ipv4only.arpa. IN A
+0300 2024-05-10 13:12:51 DEBUG dns: exchange detectportal.firefox.com. IN A
+0300 2024-05-10 13:12:51 INFO [292424751 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:57504
+0300 2024-05-10 13:12:51 INFO [292424751 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 13:12:51 DEBUG [292424751 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 13:12:51 INFO [292424751 0ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 13:12:51 DEBUG [292424751 0ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 13:12:51 DEBUG dns: exchange alive.github.com. IN A
+0300 2024-05-10 13:12:51 INFO [1976341863 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:63800
+0300 2024-05-10 13:12:51 INFO [1976341863 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 13:12:51 DEBUG [1976341863 1ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 13:12:51 INFO [1976341863 1ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 13:12:51 INFO [1976341863 1ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 13:12:52 DEBUG dns: exchange mozilla.cloudflare-dns.com. IN A
+0300 2024-05-10 13:12:52 DEBUG dns: exchange alive.github.com. IN A
+0300 2024-05-10 13:12:52 DEBUG dns: exchange geo.prod.do.dsp.mp.microsoft.com. IN A
+0300 2024-05-10 13:12:53 DEBUG dns: exchange alive.github.com. IN A
+0300 2024-05-10 13:12:54 DEBUG dns: exchange www.msftconnecttest.com. IN A
+0300 2024-05-10 13:12:55 DEBUG dns: exchange api.ipify.org. IN A
+0300 2024-05-10 13:12:55 DEBUG dns: exchange ipv4only.arpa. IN A
+0300 2024-05-10 13:12:55 DEBUG dns: exchange example.org. IN A
+0300 2024-05-10 13:12:55 DEBUG dns: exchange detectportal.firefox.com. IN A
+0300 2024-05-10 13:12:55 DEBUG dns: exchange alive.github.com. IN A
+0300 2024-05-10 13:12:56 INFO [2089552918 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:64481
+0300 2024-05-10 13:12:56 INFO [2089552918 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 13:12:56 DEBUG [2089552918 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 13:12:56 INFO [3712155911 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:63801
+0300 2024-05-10 13:12:56 INFO [3712155911 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 13:12:56 INFO [2089552918 0ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 13:12:56 DEBUG [2089552918 0ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 13:12:56 DEBUG dns: exchange cdn.z*****b.uk. IN A
+0300 2024-05-10 13:12:56 DEBUG [3712155911 1ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 13:12:56 INFO [3712155911 1ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 13:12:56 INFO [3712155911 1ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 13:12:56 DEBUG dns: exchange mozilla.cloudflare-dns.com. IN A
+0300 2024-05-10 13:12:56 DEBUG dns: exchange geo.prod.do.dsp.mp.microsoft.com. IN A

DNS config

{
"servers": [
{
"tag": "local",
"address": "223.5.5.5",
"address_resolver": "dns-resolver",
"strategy": "prefer_ipv4",
"detour": "direct"
},
{
"tag": "remote",
"address": "1.1.1.1",
"strategy": "prefer_ipv4",
"address_resolver": "dns-resolver",
"detour": "proxy"
},
{
"tag": "block",
"address": "rcode://success"
},
{
"tag": "dns-resolver",
"address": "tcp://1.1.1.1",
"detour": "proxy"
}
],
"rules": [
{
"outbound": "any",
"server": "remote"
}
],
"final": "remote",
"strategy": "prefer_ipv4"
}

@Lsyx-Good
Copy link

If you use a domain name to connect to your vps, it will cause the DNS to not resolve successfully, maybe you should change the first DNS rule from remote to local
image

@EarlVadim
Copy link
Author

If you use a domain name to connect to your vps, it will cause the DNS to not resolve successfully, maybe you should change the first DNS rule from remote to local image

no.. not work
but this config from Nekoray.. and it work!!!


"dns": {
        "fakeip": {
            "enabled": true,
            "inet4_range": "198.18.0.0/15",
            "inet6_range": "fc00::/18"
        },
        "servers": [
            {
                "tag": "dns-remote",
                "address": "8.8.8.8",
                "detour": "nekoray-socks"
            },
            {
                "tag": "dns-direct",
                "address": "underlying://0.0.0.0",
                "detour": "direct"
            },
            {
                "address": "fakeip",
                "tag": "dns-fake"
            },
            {
                "address": "rcode://success",
                "tag": "dns-block"
            }
        ],
        "rules": [
            {
                "query_type": [
                    32,
                    33
                ],
                "server": "dns-block"
            },
            {
                "domain_suffix": [
                    ".lan"
                ],
                "server": "dns-block"
            },
            {
                "process_name": [
                    "nekoray_core",
                    "nekoray_core.exe",
                    "nekobox_core",
                    "nekobox_core.exe"
                ],
                "server": "dns-direct"
            },
            {
                "inbound": "empty",
                "server": "dns-fake"
            }
        ]
    },

@EarlVadim
Copy link
Author

Sorry, Nekoray work with Xray core...
win sign-box core tun-mode don't work too.. (((

@Lsyx-Good
Copy link

try! and upload log

{
  "servers": [
    {
      "tag": "default",
      "address": "tls://8.8.8.8"
    },
    {
      "tag": "local",
      "address": "local",
      "detour": "direct"
    }
  ],
  "rules": [
    {
      "outbound": "any",
      "server": "local"
    }
  ],
  "reverse_mapping": true
}

@EarlVadim
Copy link
Author

try! and upload log

+0300 2024-05-10 14:35:12 INFO router: updated default interface Беспроводная сеть, index 27
+0300 2024-05-10 14:35:12 INFO clash-api: restful api listening at 127.0.0.1:10813
+0300 2024-05-10 14:35:12 INFO inbound/socks[socks]: tcp server started at [::]:10808
+0300 2024-05-10 14:35:12 INFO inbound/http[http]: tcp server started at [::]:10809
+0300 2024-05-10 14:35:13 INFO [2900609335 0ms] inbound/http[http]: inbound connection from 127.0.0.1:54216
+0300 2024-05-10 14:35:13 DEBUG [2900609335 0ms] inbound/http[http]: connection closed: process connection from 127.0.0.1:54216: read http request: EOF
+0300 2024-05-10 14:35:13 INFO [543408499 0ms] inbound/http[http]: inbound connection from 127.0.0.1:54217
+0300 2024-05-10 14:35:13 INFO [543408499 7ms] inbound/http[http]: inbound connection to www.google.com:443
+0300 2024-05-10 14:35:14 DEBUG [543408499 60ms] router: sniffed protocol: tls, domain: www.google.com
+0300 2024-05-10 14:35:14 DEBUG [543408499 60ms] dns: lookup domain www.google.com
+0300 2024-05-10 14:35:14 INFO outbound/vless[proxy]: outbound multiplex connection to 8.8.8.8:853
+0300 2024-05-10 14:35:14 DEBUG dns: lookup domain de.z****b.uk
+0300 2024-05-10 14:35:14 DEBUG dns: match[0] outbound=any => local
+0300 2024-05-10 14:35:15 INFO inbound/tun[tun-in]: started at singbox_tun
+0300 2024-05-10 14:35:15 INFO sing-box started (2.111s)
+0300 2024-05-10 14:35:15 INFO [44665424 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:53161
+0300 2024-05-10 14:35:15 INFO [44665424 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 14:35:15 DEBUG [44665424 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 14:35:15 INFO [44665424 0ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:15 DEBUG [44665424 0ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 14:35:15 DEBUG dns: exchange de.z*****b.uk. IN A
+0300 2024-05-10 14:35:15 INFO [2167082916 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:64724
+0300 2024-05-10 14:35:15 INFO [2167082916 0ms] inbound/tun[tun-in]: inbound packet connection to 104.16.185.241:443
+0300 2024-05-10 14:35:15 INFO [3705145882 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:60425
+0300 2024-05-10 14:35:15 INFO [3705145882 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 14:35:15 DEBUG [3705145882 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 14:35:15 INFO [2167082916 0ms] router: found process path: C:\Program Files\Arduino IDE\Arduino IDE.exe
+0300 2024-05-10 14:35:15 INFO [2167082916 0ms] outbound/vless[proxy]: outbound multiplex packet connection to 104.16.185.241:443
+0300 2024-05-10 14:35:15 INFO [3705145882 0ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:15 DEBUG [3705145882 0ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 14:35:15 DEBUG dns: exchange www.msftconnecttest.com. IN A
+0300 2024-05-10 14:35:15 INFO [991170985 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:54440
+0300 2024-05-10 14:35:15 INFO [991170985 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 14:35:15 DEBUG [991170985 0ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 14:35:15 INFO [991170985 1ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:15 INFO [991170985 1ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 14:35:15 INFO [364184302 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:57298
+0300 2024-05-10 14:35:15 INFO [364184302 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 14:35:15 DEBUG [364184302 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 14:35:15 INFO [364184302 0ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:15 DEBUG [364184302 0ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 14:35:15 DEBUG dns: exchange detectportal.firefox.com. IN A
+0300 2024-05-10 14:35:15 INFO [2620871041 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:56093
+0300 2024-05-10 14:35:15 INFO [2620871041 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 14:35:15 DEBUG [2620871041 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 14:35:15 INFO [3425095145 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:65073
+0300 2024-05-10 14:35:15 INFO [3425095145 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 14:35:15 DEBUG [3425095145 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 14:35:15 INFO [2620871041 0ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:15 DEBUG [2620871041 0ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 14:35:15 DEBUG dns: exchange example.org. IN A
+0300 2024-05-10 14:35:15 INFO [3425095145 0ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:15 DEBUG [3425095145 0ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 14:35:15 DEBUG dns: exchange ipv4only.arpa. IN A
+0300 2024-05-10 14:35:15 INFO [924459526 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:54446
+0300 2024-05-10 14:35:15 INFO [924459526 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 14:35:15 DEBUG dns: exchange de.zeroclub.uk. IN A
+0300 2024-05-10 14:35:15 INFO [235353958 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:54445
+0300 2024-05-10 14:35:15 INFO [235353958 1ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 14:35:15 DEBUG [235353958 1ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 14:35:15 INFO [235353958 1ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:15 INFO [235353958 1ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 14:35:15 INFO [1372685168 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:54447
+0300 2024-05-10 14:35:15 INFO [1372685168 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 14:35:15 DEBUG [1372685168 0ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 14:35:15 INFO [1372685168 1ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:15 INFO [1372685168 1ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 14:35:15 DEBUG [924459526 20ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 14:35:15 INFO [924459526 21ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:15 INFO [924459526 21ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 14:35:15 DEBUG dns: exchange www.msftconnecttest.com. IN A
+0300 2024-05-10 14:35:16 DEBUG dns: exchange ipv4only.arpa. IN A
+0300 2024-05-10 14:35:16 DEBUG dns: exchange example.org. IN A
+0300 2024-05-10 14:35:16 DEBUG dns: exchange detectportal.firefox.com. IN A
+0300 2024-05-10 14:35:16 DEBUG dns: exchange de.z*****b.uk. IN A
+0300 2024-05-10 14:35:16 INFO [4073542817 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:57352
+0300 2024-05-10 14:35:16 INFO [4073542817 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 14:35:16 DEBUG [4073542817 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 14:35:16 INFO [4073542817 0ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:16 DEBUG [4073542817 0ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 14:35:16 DEBUG dns: exchange geo.prod.do.dsp.mp.microsoft.com. IN A
+0300 2024-05-10 14:35:16 INFO [2150143118 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:54449
+0300 2024-05-10 14:35:16 INFO [2150143118 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 14:35:16 DEBUG [2150143118 0ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 14:35:16 INFO [2150143118 1ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:16 INFO [2150143118 1ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 14:35:16 INFO [991865649 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:49713
+0300 2024-05-10 14:35:16 INFO [991865649 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 14:35:16 DEBUG [991865649 1ms] router: sniffed packet protocol: dns
+0300 2024-05-10 14:35:16 INFO [1608051506 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:54450
+0300 2024-05-10 14:35:16 INFO [1608051506 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 14:35:16 INFO [991865649 1ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:16 DEBUG [991865649 1ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 14:35:16 DEBUG dns: exchange mozilla.cloudflare-dns.com. IN A
+0300 2024-05-10 14:35:16 DEBUG [1608051506 1ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 14:35:16 INFO [1608051506 2ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:16 INFO [1608051506 2ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 14:35:16 DEBUG dns: exchange www.msftconnecttest.com. IN A
+0300 2024-05-10 14:35:17 DEBUG dns: exchange example.org. IN A
+0300 2024-05-10 14:35:17 DEBUG dns: exchange ipv4only.arpa. IN A
+0300 2024-05-10 14:35:17 DEBUG dns: exchange detectportal.firefox.com. IN A
+0300 2024-05-10 14:35:17 DEBUG dns: exchange geo.prod.do.dsp.mp.microsoft.com. IN A
+0300 2024-05-10 14:35:17 DEBUG dns: exchange mozilla.cloudflare-dns.com. IN A
+0300 2024-05-10 14:35:18 DEBUG dns: exchange de.z*****b.uk. IN A
+0300 2024-05-10 14:35:18 DEBUG dns: exchange geo.prod.do.dsp.mp.microsoft.com. IN A
+0300 2024-05-10 14:35:18 DEBUG dns: exchange mozilla.cloudflare-dns.com. IN A
+0300 2024-05-10 14:35:18 DEBUG dns: exchange www.msftconnecttest.com. IN A
+0300 2024-05-10 14:35:19 DEBUG dns: lookup failed for de.z******b.uk: lookup de.z****b.uk: i/o timeout
+0300 2024-05-10 14:35:19 DEBUG dns: lookup domain de.z*****b.uk
+0300 2024-05-10 14:35:19 DEBUG dns: match[0] outbound=any => local
+0300 2024-05-10 14:35:19 INFO [3172071579 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:52519
+0300 2024-05-10 14:35:19 INFO [3172071579 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 14:35:19 DEBUG [3172071579 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 14:35:19 INFO [1274401515 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:54451
+0300 2024-05-10 14:35:19 INFO [1274401515 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 14:35:19 INFO [3172071579 0ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:19 DEBUG [3172071579 0ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 14:35:19 DEBUG dns: exchange de.z****b.uk. IN A
+0300 2024-05-10 14:35:19 DEBUG [1274401515 1ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 14:35:19 INFO [1274401515 2ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:19 INFO [1274401515 2ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 14:35:19 DEBUG dns: exchange ipv4only.arpa. IN A
+0300 2024-05-10 14:35:19 DEBUG dns: exchange example.org. IN A
+0300 2024-05-10 14:35:19 DEBUG dns: exchange detectportal.firefox.com. IN A
+0300 2024-05-10 14:35:19 INFO [1638364722 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:55417
+0300 2024-05-10 14:35:19 INFO [1638364722 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 14:35:19 DEBUG [1638364722 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 14:35:19 INFO [1010751971 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:54452
+0300 2024-05-10 14:35:19 INFO [1010751971 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 14:35:19 INFO [1638364722 0ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:19 DEBUG [1638364722 0ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 14:35:19 DEBUG dns: exchange api.ipify.org. IN A
+0300 2024-05-10 14:35:19 DEBUG [1010751971 1ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 14:35:19 INFO [1010751971 2ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:19 INFO [1010751971 2ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 14:35:19 INFO [3906937308 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:51723
+0300 2024-05-10 14:35:19 INFO [3906937308 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 14:35:19 DEBUG [3906937308 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 14:35:19 INFO [3906937308 1ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:19 DEBUG [3906937308 1ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 14:35:19 INFO [22070105 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:54453
+0300 2024-05-10 14:35:19 INFO [22070105 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 14:35:19 DEBUG dns: exchange s.myangular.life. IN A
+0300 2024-05-10 14:35:19 DEBUG [22070105 2ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 14:35:19 INFO [22070105 2ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:19 INFO [22070105 2ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 14:35:20 DEBUG dns: exchange de.z****b.uk. IN A
+0300 2024-05-10 14:35:20 DEBUG dns: exchange api.ipify.org. IN A
+0300 2024-05-10 14:35:20 DEBUG dns: exchange geo.prod.do.dsp.mp.microsoft.com. IN A
+0300 2024-05-10 14:35:20 DEBUG dns: exchange mozilla.cloudflare-dns.com. IN A
+0300 2024-05-10 14:35:20 DEBUG dns: exchange s.myangular.life. IN A
+0300 2024-05-10 14:35:21 DEBUG dns: exchange de.z*****b.uk. IN A
+0300 2024-05-10 14:35:21 DEBUG dns: exchange api.ipify.org. IN A
+0300 2024-05-10 14:35:21 DEBUG dns: exchange s.myangular.life. IN A
+0300 2024-05-10 14:35:22 DEBUG dns: exchange de.z*****b.uk. IN A
+0300 2024-05-10 14:35:22 INFO [1373373992 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:51372
+0300 2024-05-10 14:35:22 INFO [1373373992 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 14:35:22 DEBUG [1373373992 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 14:35:22 INFO [2263787898 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:54454
+0300 2024-05-10 14:35:22 INFO [2263787898 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 14:35:22 INFO [1373373992 0ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:22 DEBUG [1373373992 0ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 14:35:22 DEBUG dns: exchange sw.z*****b.fun. IN A
+0300 2024-05-10 14:35:22 DEBUG [2263787898 1ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 14:35:22 INFO [2263787898 1ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:22 INFO [2263787898 1ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 14:35:22 DEBUG dns: exchange www.msftconnecttest.com. IN A
+0300 2024-05-10 14:35:23 DEBUG dns: exchange de.z******b.uk. IN A
+0300 2024-05-10 14:35:23 DEBUG dns: exchange ipv4only.arpa. IN A
+0300 2024-05-10 14:35:23 DEBUG dns: exchange example.org. IN A
+0300 2024-05-10 14:35:23 DEBUG dns: exchange detectportal.firefox.com. IN A
+0300 2024-05-10 14:35:23 DEBUG dns: exchange sw.z******b.fun. IN A
+0300 2024-05-10 14:35:23 DEBUG dns: exchange api.ipify.org. IN A
+0300 2024-05-10 14:35:23 DEBUG dns: exchange s.myangular.life. IN A
+0300 2024-05-10 14:35:24 DEBUG dns: lookup failed for de.zeroclub.uk: lookup de.z*****b.uk: i/o timeout
+0300 2024-05-10 14:35:24 DEBUG [2167082916 8.87s] dns: lookup domain de.z******b.uk
+0300 2024-05-10 14:35:24 DEBUG [2167082916 8.87s] dns: match[0] outbound=any => local
+0300 2024-05-10 14:35:24 INFO outbound/vless[proxy]: outbound multiplex connection to 8.8.8.8:853
+0300 2024-05-10 14:35:24 DEBUG dns: exchange sw.z*****b.fun. IN A
+0300 2024-05-10 14:35:24 INFO [2264777023 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:52722
+0300 2024-05-10 14:35:24 INFO [4087248027 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:53251
+0300 2024-05-10 14:35:24 INFO [4087248027 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 14:35:24 INFO [2264777023 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 14:35:24 DEBUG [4087248027 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 14:35:24 DEBUG [2264777023 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 14:35:24 INFO [1187693445 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:54456
+0300 2024-05-10 14:35:24 INFO [1187693445 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 14:35:24 INFO [4180792247 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:54455
+0300 2024-05-10 14:35:24 INFO [4180792247 0ms] inbound/tun[tun-in]: inbound connection to 1.0.0.1:443
+0300 2024-05-10 14:35:24 INFO [4087248027 1ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:24 INFO [2264777023 1ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:24 DEBUG [4087248027 1ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 14:35:24 DEBUG [2264777023 1ms] router: match[0] protocol=dns => dns_out
+0300 2024-05-10 14:35:24 DEBUG dns: exchange nl.z*****b.uk. IN A
+0300 2024-05-10 14:35:24 DEBUG dns: exchange ssl.gstatic.com. IN A
+0300 2024-05-10 14:35:24 DEBUG [1187693445 1ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 14:35:24 DEBUG [4180792247 1ms] router: sniffed protocol: tls, domain: cloudflare-dns.com
+0300 2024-05-10 14:35:24 INFO [4180792247 2ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:24 INFO [1187693445 2ms] router: found process path: C:\Windows\System32\svchost.exe
+0300 2024-05-10 14:35:24 INFO [1187693445 2ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 14:35:24 INFO [4180792247 2ms] outbound/vless[proxy]: outbound multiplex connection to cloudflare-dns.com:443
+0300 2024-05-10 14:35:24 DEBUG dns: exchange geo.prod.do.dsp.mp.microsoft.com. IN A
+0300 2024-05-10 14:35:24 DEBUG dns: exchange mozilla.cloudflare-dns.com. IN A
+0300 2024-05-10 14:35:25 INFO [3216805581 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:55561
+0300 2024-05-10 14:35:25 INFO [3216805581 0ms] inbound/tun[tun-in]: inbound packet connection to 172.19.0.2:53
+0300 2024-05-10 14:35:25 DEBUG [3216805581 0ms] router: sniffed packet protocol: dns
+0300 2024-05-10 14:35:25 INFO [2880820778 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:54457

@Lsyx-Good
Copy link

upload the full configuration information generated by v2rayn, removing your node information when turn on tun and try turn off mux

@EarlVadim
Copy link
Author

upload the full configuration information generated by v2rayn, removing your node information when turn on tun and try turn off mux

I figured out the TUN-mode. and I didn't like him.
The problem really is that I tried to raise it for VLESS+TLS... but TUN does not work with TLS. (((
Therefore, you need to use VMESS or TROJAN, but they do not suit me.
In addition, it turns out that the Sing-box core does not support domain:.ru, domain:.by
in general, I had to go back to the regular "system proxy"..

Thank you very much for your help and your time.
Sorry.

@Lsyx-Good
Copy link

Lsyx-Good commented May 11, 2024

domain:.ru? Maybe you should use domain_suffix

 "domain_suffix":  ".ru"

@EarlVadim
Copy link
Author

domain:.ru? Maybe you should use domain_suffix

 "domain_suffix":  ".ru"

with the XRay core it works simply:
Settings -> Routing Settings - Direct Domain or IP -> domain:.ru

@EarlVadim
Copy link
Author

EarlVadim commented May 11, 2024 via email

@EarlVadim
Copy link
Author

EarlVadim commented May 11, 2024 via email

@EarlVadim
Copy link
Author

XRay core is BETTER...
Will be TUN-mode on XRay core?

@dascwf
Copy link

dascwf commented May 11, 2024

Same Problem

6.44

甚至我发现都无法生成 sing-box 的虚拟网卡

配置成功
[Shadowsocks] 新加坡-05(db9eae23***com:57045)
Microsoft Windows NT 10.0.22631.0 - 64
启动服务(2024/05/11 18:17:52)...
FATAL[0000] start service: initialize rule-set[3]: initial rule-set: geoip-cn: Get "https://raw.githubusercontent.com/SagerNet/sing-geoip/rule-set/geoip-cn.srs": http2: client connection force closed via ClientConn.Close | initialize rule-set[3]: initial rule-set: geosite-cn: Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-cn.srs": http2: client connection force closed via ClientConn.Close | initialize rule-set[3]: initial rule-set: geosite-geolocation-!cn: Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-geolocation-!cn.srs": http2: client connection force closed via ClientConn.Close | initialize rule-set[3]: initial rule-set: geosite-category-ads-all: Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-category-ads-all.srs": http2: client connection force closed via ClientConn.Close
FATAL[0000] start service: initialize rule-set[3]: initial rule-set: geoip-cn: Get "https://raw.githubusercontent.com/SagerNet/sing-geoip/rule-set/geoip-cn.srs": http2: client connection force closed via ClientConn.Close | initialize rule-set[3]: initial rule-set: geosite-cn: Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-cn.srs": http2: client connection force closed via ClientConn.Close | initialize rule-set[3]: initial rule-set: geosite-geolocation-!cn: Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-geolocation-!cn.srs": http2: client connection force closed via ClientConn.Close | initialize rule-set[3]: initial rule-set: geosite-category-ads-all: Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-category-ads-all.srs": http2: client connection force closed via ClientConn.Close
2024/05/11 18:17:52 系统代理设置改变ForcedChange

@EarlVadim
Copy link
Author

@dascwf

begin with this dns-config

{
  "servers": [
    {
      "tag": "remote",
      "address": "1.1.1.1",
      "strategy": "ipv4_only",
      "detour": "proxy"
    },
    {
      "tag": "local",
      "address": "223.5.5.5",
      "strategy": "ipv4_only",
      "detour": "direct"
    },
    {
      "tag": "block",
      "address": "rcode://success"
    }
  ],
  "rules": [
    {
      "rule_set": [
        "geosite-category-ads-all"
      ],
      "server": "block"
    }
  ]
}

also, clear all routing settings.
when it will work, then add all rules.
and make sure that the settings on the server are correct for TUN mode. Not any settings are suitable for this.

@Lsyx-Good
Copy link

Same Problem

6.44

甚至我发现都无法生成 sing-box 的虚拟网卡

配置成功 [Shadowsocks] 新加坡-05(db9eae23***com:57045) Microsoft Windows NT 10.0.22631.0 - 64 启动服务(2024/05/11 18:17:52)... FATAL[0000] start service: initialize rule-set[3]: initial rule-set: geoip-cn: Get "https://raw.githubusercontent.com/SagerNet/sing-geoip/rule-set/geoip-cn.srs": http2: client connection force closed via ClientConn.Close | initialize rule-set[3]: initial rule-set: geosite-cn: Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-cn.srs": http2: client connection force closed via ClientConn.Close | initialize rule-set[3]: initial rule-set: geosite-geolocation-!cn: Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-geolocation-!cn.srs": http2: client connection force closed via ClientConn.Close | initialize rule-set[3]: initial rule-set: geosite-category-ads-all: Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-category-ads-all.srs": http2: client connection force closed via ClientConn.Close FATAL[0000] start service: initialize rule-set[3]: initial rule-set: geoip-cn: Get "https://raw.githubusercontent.com/SagerNet/sing-geoip/rule-set/geoip-cn.srs": http2: client connection force closed via ClientConn.Close | initialize rule-set[3]: initial rule-set: geosite-cn: Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-cn.srs": http2: client connection force closed via ClientConn.Close | initialize rule-set[3]: initial rule-set: geosite-geolocation-!cn: Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-geolocation-!cn.srs": http2: client connection force closed via ClientConn.Close | initialize rule-set[3]: initial rule-set: geosite-category-ads-all: Get "https://raw.githubusercontent.com/SagerNet/sing-geosite/rule-set/geosite-category-ads-all.srs": http2: client connection force closed via ClientConn.Close 2024/05/11 18:17:52 系统代理设置改变ForcedChange

您是不是开了多路复用?是话先尝试关闭

@dascwf
Copy link

dascwf commented May 11, 2024

Solved.

The same error as above. Then , turn off : MUX multiplexing in the settings and it solved it.

之前跟上面一样报错. 随后 , 在设置里关闭 : MUX 多路复用 就解决了.

@2dust
Copy link
Owner

2dust commented May 12, 2024

Solved.

The same error as above. Then , turn off : MUX multiplexing in the settings and it solved it.

之前跟上面一样报错. 随后 , 在设置里关闭 : MUX 多路复用 就解决了.

MUX 有很多兼容问题,没有必要请不要使用

@2dust 2dust closed this as completed May 15, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working
Projects
None yet
Development

No branches or pull requests

6 participants