We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
预期行为:像最新版NB4A一样,更新订阅的这股流量不应该被Fakedns影响。
实际行为:开启Fakedns时除了已经连接的节点,其他全部返回了fakeip,关闭Fakedns才能正常强制解析。
环境:纯TUN模式
DEBUG[0019] [1573801192 10.0s] inbound/tun[tun-in]: connection closed: io: read/write on closed pipe | upstream: context canceled DEBUG[0019] [1225548580 10.0s] inbound/tun[tun-in]: connection closed: io: read/write on closed pipe | upstream: context canceled DEBUG[0019] [2980062728 10.0s] inbound/tun[tun-in]: connection closed: io: read/write on closed pipe | upstream: context canceled DEBUG[0019] [2015713177 10.0s] inbound/tun[tun-in]: connection closed: io: read/write on closed pipe | upstream: context canceled DEBUG[0019] [175249701 10.0s] inbound/tun[tun-in]: connection closed: io: read/write on closed pipe | upstream: context canceled DEBUG[0019] [1287638918 16.63s] inbound/tun[tun-in]: connection closed: io: read/write on closed pipe | upstream: context canceled DEBUG[0019] [3966256181 10.0s] inbound/tun[tun-in]: connection closed: io: read/write on closed pipe | upstream: context canceled DEBUG[0019] [188613054 16.63s] inbound/tun[tun-in]: connection closed: io: read/write on closed pipe | upstream: context canceled DEBUG[0019] [3353144458 10.0s] inbound/tun[tun-in]: connection closed: io: read/write on closed pipe | upstream: context canceled DEBUG[0019] [3346784487 10.0s] inbound/tun[tun-in]: connection closed: io: read/write on closed pipe | upstream: context canceled DEBUG[0019] [142993365 10.0s] inbound/tun[tun-in]: connection closed: io: read/write on closed pipe | upstream: context canceled DEBUG[0019] [2037130844 10.0s] inbound/tun[tun-in]: connection closed: io: read/write on closed pipe | upstream: context canceled DEBUG[0019] [279815463 10.0s] inbound/tun[tun-in]: connection closed: io: read/write on closed pipe | upstream: context canceled DEBUG[0019] [3136663671 10.1s] inbound/tun[tun-in]: connection closed: io: read/write on closed pipe | upstream: context canceled DEBUG[0019] [969378388 10.1s] inbound/tun[tun-in]: connection closed: io: read/write on closed pipe | upstream: context canceled DEBUG[0019] [2331712534 10.1s] inbound/tun[tun-in]: connection closed: io: read/write on closed pipe | upstream: context canceled DEBUG[0019] [75690831 10.15s] inbound/tun[tun-in]: connection closed: io: read/write on closed pipe | upstream: context canceled DEBUG[0019] [3493761354 10.16s] inbound/tun[tun-in]: connection closed: io: read/write on closed pipe | upstream: context canceled DEBUG[0019] [1946069726 10.0s] inbound/tun[tun-in]: connection closed: io: read/write on closed pipe | upstream: context canceled INFO[0034] [2542639576 0ms] inbound/tun[tun-in]: inbound packet connection from [fdfe:dcba:9876::1]:53054 INFO[0034] [686227335 0ms] inbound/tun[tun-in]: inbound packet connection from [fdfe:dcba:9876::1]:59242 INFO[0034] [2542639576 1ms] inbound/tun[tun-in]: inbound packet connection to [fdfe:dcba:9876::2]:53 INFO[0034] [686227335 1ms] inbound/tun[tun-in]: inbound packet connection to [fdfe:dcba:9876::2]:53 DEBUG[0034] [2542639576 1ms] router: sniffed packet protocol: dns DEBUG[0034] [2542639576 1ms] router: match[0] protocol=dns => dns-out DEBUG[0034] [686227335 1ms] router: sniffed packet protocol: dns DEBUG[0034] [686227335 1ms] router: match[0] protocol=dns => dns-out DEBUG[0034] [686227335 1ms] dns: exchange wss.dida365.com. IN AAAA DEBUG[0034] [2542639576 1ms] dns: exchange wss.dida365.com. IN A DEBUG[0034] [686227335 1ms] dns: match[4] inbound=tun-in => dns-fake DEBUG[0034] [2542639576 1ms] dns: match[4] inbound=tun-in => dns-fake INFO[0034] [2937637212 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:12596 INFO[0034] [2937637212 0ms] inbound/tun[tun-in]: inbound connection to 198.18.0.57:443 DEBUG[0034] [2937637212 0ms] router: found fakeip domain: wss.dida365.com DEBUG[0034] [2937637212 0ms] router: sniffed protocol: tls, domain: wss.dida365.com DEBUG[0034] [2937637212 0ms] router: match[3] domain_suffix=[autodl.com seetacloud.com codewithgpu.com...] geosite=cn => bypass INFO[0034] [2937637212 0ms] outbound/direct[bypass]: outbound connection to wss.dida365.com:443 DEBUG[0034] [2937637212 0ms] dns: lookup domain wss.dida365.com DEBUG[0034] [2937637212 0ms] dns: match[0] outbound=any => dns-direct DEBUG[0034] dns: exchanged wss.dida365.com NOERROR 1 DEBUG[0034] dns: exchanged wss.dida365.com NOERROR 1 INFO[0034] dns: exchanged wss.dida365.com CNAME wss.dida365.com. 1 IN CNAME daycount-1450237091.cn-north-1.elb.amazonaws.com.cn. INFO[0034] dns: exchanged wss.dida365.com CNAME wss.dida365.com. 1 IN CNAME daycount-1450237091.cn-north-1.elb.amazonaws.com.cn. INFO[0034] dns: exchanged wss.dida365.com A daycount-1450237091.cn-north-1.elb.amazonaws.com.cn. 1 IN A 71.132.7.53 INFO[0034] dns: exchanged wss.dida365.com A daycount-1450237091.cn-north-1.elb.amazonaws.com.cn. 1 IN A 54.223.252.92 DEBUG[0034] [2937637212 7ms] dns: lookup succeed for wss.dida365.com: 71.132.7.53 54.223.252.92 INFO[0034] [3823748695 0ms] inbound/tun[tun-in]: inbound packet connection from [fdfe:dcba:9876::1]:57060 INFO[0034] [3823748695 0ms] inbound/tun[tun-in]: inbound packet connection to [fdfe:dcba:9876::2]:53 INFO[0034] [2822180807 0ms] inbound/tun[tun-in]: inbound packet connection from [fdfe:dcba:9876::1]:64061 DEBUG[0034] [3823748695 0ms] router: sniffed packet protocol: dns INFO[0034] [2822180807 0ms] inbound/tun[tun-in]: inbound packet connection to [fdfe:dcba:9876::2]:53 DEBUG[0034] [2822180807 0ms] router: sniffed packet protocol: dns DEBUG[0034] [2822180807 0ms] router: match[0] protocol=dns => dns-out DEBUG[0034] [3823748695 0ms] router: match[0] protocol=dns => dns-out DEBUG[0034] [3823748695 0ms] dns: exchange api.dida365.com. IN A DEBUG[0034] [2822180807 0ms] dns: exchange api.dida365.com. IN AAAA DEBUG[0034] [3823748695 0ms] dns: match[4] inbound=tun-in => dns-fake DEBUG[0034] [2822180807 0ms] dns: match[4] inbound=tun-in => dns-fake INFO[0034] [1315049334 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:12598 INFO[0034] [1315049334 0ms] inbound/tun[tun-in]: inbound connection to 198.18.0.58:443 DEBUG[0034] [1315049334 0ms] router: found fakeip domain: api.dida365.com DEBUG[0034] [1315049334 0ms] router: sniffed protocol: tls, domain: api.dida365.com DEBUG[0034] [1315049334 0ms] router: match[3] domain_suffix=[autodl.com seetacloud.com codewithgpu.com...] geosite=cn => bypass INFO[0034] [1315049334 0ms] outbound/direct[bypass]: outbound connection to api.dida365.com:443 DEBUG[0034] [1315049334 0ms] dns: lookup domain api.dida365.com DEBUG[0034] [1315049334 0ms] dns: match[0] outbound=any => dns-direct DEBUG[0034] dns: exchanged api.dida365.com NOERROR 28 INFO[0034] dns: exchanged api.dida365.com CNAME api.dida365.com. 28 IN CNAME www-dida-313720269.cn-north-1.elb.amazonaws.com.cn. DEBUG[0034] dns: exchanged api.dida365.com NOERROR 3 INFO[0034] dns: exchanged api.dida365.com CNAME api.dida365.com. 3 IN CNAME www-dida-313720269.cn-north-1.elb.amazonaws.com.cn. INFO[0034] dns: exchanged api.dida365.com A www-dida-313720269.cn-north-1.elb.amazonaws.com.cn. 3 IN A 54.222.195.90 INFO[0034] dns: exchanged api.dida365.com A www-dida-313720269.cn-north-1.elb.amazonaws.com.cn. 3 IN A 52.80.53.181 INFO[0034] dns: exchanged api.dida365.com A www-dida-313720269.cn-north-1.elb.amazonaws.com.cn. 3 IN A 54.223.186.2 DEBUG[0034] [1315049334 211ms] dns: lookup succeed for api.dida365.com: 54.222.195.90 52.80.53.181 54.223.186.2 INFO[0036] [1029080329 0ms] inbound/tun[tun-in]: inbound packet connection from [fdfe:dcba:9876::1]:52596 INFO[0036] [1029080329 0ms] inbound/tun[tun-in]: inbound packet connection to [fdfe:dcba:9876::2]:53 DEBUG[0036] [1029080329 0ms] router: sniffed packet protocol: dns DEBUG[0036] [1029080329 0ms] router: match[0] protocol=dns => dns-out DEBUG[0036] [1029080329 0ms] dns: exchange dns.msftncsi.com. IN A DEBUG[0036] [1029080329 0ms] dns: match[4] inbound=tun-in => dns-fake INFO[0042] [1856238897 0ms] inbound/tun[tun-in]: inbound packet connection from [fdfe:dcba:9876::1]:57946 INFO[0042] [1856238897 7ms] inbound/tun[tun-in]: inbound packet connection to [fdfe:dcba:9876::2]:53 DEBUG[0042] [1856238897 7ms] router: sniffed packet protocol: dns DEBUG[0042] [1856238897 7ms] router: match[0] protocol=dns => dns-out DEBUG[0042] [1856238897 7ms] dns: exchange ipv6.msftconnecttest.com. IN A INFO[0042] [2567263547 0ms] inbound/tun[tun-in]: inbound packet connection from [fdfe:dcba:9876::1]:55424 DEBUG[0042] [1856238897 7ms] dns: match[4] inbound=tun-in => dns-fake INFO[0042] [2567263547 0ms] inbound/tun[tun-in]: inbound packet connection to [fdfe:dcba:9876::2]:53 DEBUG[0042] [2567263547 0ms] router: sniffed packet protocol: dns DEBUG[0042] [2567263547 0ms] router: match[0] protocol=dns => dns-out DEBUG[0042] [2567263547 0ms] dns: exchange ipv6.msftconnecttest.com. IN AAAA DEBUG[0042] [2567263547 0ms] dns: match[4] inbound=tun-in => dns-fake INFO[0042] [4250478009 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:12600 INFO[0042] [4250478009 0ms] inbound/tun[tun-in]: inbound connection to 198.18.0.60:80 DEBUG[0042] [4250478009 0ms] router: found fakeip domain: ipv6.msftconnecttest.com DEBUG[0042] [4250478009 0ms] router: sniffed protocol: http, domain: ipv6.msftconnecttest.com INFO[0042] [4250478009 0ms] outbound/hysteria2[proxy]: outbound connection to ipv6.msftconnecttest.com:80 INFO[0042] [1514413197 0ms] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:64816 INFO[0042] [1514413197 0ms] inbound/tun[tun-in]: inbound packet connection to 223.6.6.6:53 DEBUG[0042] [1514413197 0ms] router: sniffed packet protocol: dns DEBUG[0042] [1514413197 0ms] router: match[0] protocol=dns => dns-out DEBUG[0042] [1514413197 0ms] dns: exchange drive.wps.cn. IN A DEBUG[0042] [1514413197 0ms] dns: match[4] inbound=tun-in => dns-fake INFO[0042] [2916355520 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:12601 INFO[0042] [2916355520 0ms] inbound/tun[tun-in]: inbound connection to 198.18.0.37:443 DEBUG[0042] [2916355520 0ms] router: found fakeip domain: vl-jp-1.twcc.eu.org DEBUG[0042] [2916355520 1ms] router: sniffed protocol: tls, domain: drive.wps.cn DEBUG[0042] [2916355520 1ms] router: match[3] domain_suffix=[autodl.com seetacloud.com codewithgpu.com...] geosite=cn => bypass INFO[0042] [2916355520 1ms] outbound/direct[bypass]: outbound connection to vl-jp-1.twcc.eu.org:443 DEBUG[0042] [2916355520 1ms] dns: lookup domain vl-jp-1.twcc.eu.org DEBUG[0042] [2916355520 1ms] dns: match[0] outbound=any => dns-direct DEBUG[0042] dns: exchanged vl-jp-1.twcc.eu.org NOERROR 1 DEBUG[0042] dns: exchanged vl-jp-1.twcc.eu.org NOERROR 1 INFO[0042] dns: exchanged vl-jp-1.twcc.eu.org SOA twcc.eu.org. 1 IN SOA troy.ns.cloudflare.com. dns.cloudflare.com. 2363195927 10000 2400 604800 1800 INFO[0042] dns: exchanged vl-jp-1.twcc.eu.org A vl-jp-1.twcc.eu.org. 1 IN A 13.115.160.72 DEBUG[0042] [2916355520 11ms] dns: lookup succeed for vl-jp-1.twcc.eu.org: 13.115.160.72 DEBUG[0044] [686227335 10.0s] inbound/tun[tun-in]: connection closed: io: read/write on closed pipe | upstream: context canceled DEBUG[0044] [2542639576 10.0s] inbound/tun[tun-in]: connection closed: io: read/write on closed pipe | upstream: context canceled DEBUG[0044] [3823748695 10.0s] inbound/tun[tun-in]: connection closed: io: read/write on closed pipe | upstream: context canceled DEBUG[0044] [2822180807 10.0s] inbound/tun[tun-in]: connection closed: io: read/write on closed pipe | upstream: context canceled DEBUG[0046] [1029080329 10.0s] inbound/tun[tun-in]: connection closed: io: read/write on closed pipe | upstream: context canceled DEBUG[0047] [2916355520 5.1s] inbound/tun[tun-in]: connection closed: dial tcp 13.115.160.72:443: i/o timeout INFO[0047] [1583197702 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:12603 INFO[0047] [1583197702 0ms] inbound/tun[tun-in]: inbound connection to 198.18.0.37:443 DEBUG[0047] [1583197702 0ms] router: found fakeip domain: vl-jp-1.twcc.eu.org DEBUG[0047] [1583197702 1ms] router: sniffed protocol: tls, domain: drive.wps.cn DEBUG[0047] [1583197702 1ms] router: match[3] domain_suffix=[autodl.com seetacloud.com codewithgpu.com...] geosite=cn => bypass INFO[0047] [1583197702 2ms] outbound/direct[bypass]: outbound connection to vl-jp-1.twcc.eu.org:443 DEBUG[0047] [1583197702 2ms] dns: lookup domain vl-jp-1.twcc.eu.org DEBUG[0047] [1583197702 2ms] dns: match[0] outbound=any => dns-direct DEBUG[0047] dns: exchanged vl-jp-1.twcc.eu.org NOERROR 56 INFO[0047] dns: exchanged vl-jp-1.twcc.eu.org A vl-jp-1.twcc.eu.org. 56 IN A 13.115.160.72 DEBUG[0047] dns: exchanged vl-jp-1.twcc.eu.org NOERROR 1796 INFO[0047] dns: exchanged vl-jp-1.twcc.eu.org SOA twcc.eu.org. 1796 IN SOA troy.ns.cloudflare.com. dns.cloudflare.com. 2363195927 10000 2400 604800 1800 DEBUG[0047] [1583197702 39ms] dns: lookup succeed for vl-jp-1.twcc.eu.org: 13.115.160.72 DEBUG[0052] [2567263547 10.0s] inbound/tun[tun-in]: connection closed: io: read/write on closed pipe | upstream: context canceled DEBUG[0052] [1856238897 10.0s] inbound/tun[tun-in]: connection closed: io: read/write on closed pipe | upstream: context canceled DEBUG[0052] [1514413197 10.0s] inbound/tun[tun-in]: connection closed: io: read/write on closed pipe | upstream: context canceled DEBUG[0052] [1583197702 5.4s] inbound/tun[tun-in]: connection closed: dial tcp 13.115.160.72:443: i/o timeout INFO[0052] [2178556430 0ms] inbound/tun[tun-in]: inbound packet connection from [fdfe:dcba:9876::1]:52246 INFO[0052] [2178556430 0ms] inbound/tun[tun-in]: inbound packet connection to [fdfe:dcba:9876::2]:53 INFO[0052] [4003618678 0ms] inbound/tun[tun-in]: inbound packet connection from [fdfe:dcba:9876::1]:52688 DEBUG[0052] [2178556430 0ms] router: sniffed packet protocol: dns INFO[0052] [4003618678 0ms] inbound/tun[tun-in]: inbound packet connection to [fdfe:dcba:9876::2]:53 DEBUG[0052] [2178556430 0ms] router: match[0] protocol=dns => dns-out DEBUG[0052] [4003618678 0ms] router: sniffed packet protocol: dns DEBUG[0052] [4003618678 0ms] router: match[0] protocol=dns => dns-out DEBUG[0052] [4003618678 0ms] dns: exchange shuc-pc-hunt.ksord.com. IN AAAA DEBUG[0052] [2178556430 0ms] dns: exchange shuc-pc-hunt.ksord.com. IN A DEBUG[0052] [4003618678 0ms] dns: match[4] inbound=tun-in => dns-fake DEBUG[0052] [2178556430 0ms] dns: match[4] inbound=tun-in => dns-fake INFO[0052] [3645692144 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:12605 INFO[0052] [3645692144 0ms] inbound/tun[tun-in]: inbound connection to 198.18.0.62:80 DEBUG[0052] [3645692144 0ms] router: found fakeip domain: shuc-pc-hunt.ksord.com DEBUG[0052] [3645692144 0ms] router: sniffed protocol: http, domain: shuc-pc-hunt.ksord.com DEBUG[0052] [3645692144 0ms] router: match[3] domain_suffix=[autodl.com seetacloud.com codewithgpu.com...] geosite=cn => bypass INFO[0052] [3645692144 0ms] outbound/direct[bypass]: outbound connection to shuc-pc-hunt.ksord.com:80 DEBUG[0052] [3645692144 0ms] dns: lookup domain shuc-pc-hunt.ksord.com DEBUG[0052] [3645692144 0ms] dns: match[0] outbound=any => dns-direct INFO[0052] [2768072027 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:12606 INFO[0052] [2768072027 0ms] inbound/tun[tun-in]: inbound connection to 198.18.0.62:80 DEBUG[0052] [2768072027 0ms] router: found fakeip domain: shuc-pc-hunt.ksord.com DEBUG[0052] [2768072027 0ms] router: sniffed protocol: http, domain: shuc-pc-hunt.ksord.com DEBUG[0052] [2768072027 0ms] router: match[3] domain_suffix=[autodl.com seetacloud.com codewithgpu.com...] geosite=cn => bypass INFO[0052] [2768072027 0ms] outbound/direct[bypass]: outbound connection to shuc-pc-hunt.ksord.com:80 DEBUG[0052] [2768072027 0ms] dns: lookup domain shuc-pc-hunt.ksord.com DEBUG[0052] [2768072027 0ms] dns: match[0] outbound=any => dns-direct DEBUG[0052] dns: exchanged shuc-pc-hunt.ksord.com NOERROR 105 DEBUG[0052] dns: exchanged shuc-pc-hunt.ksord.com NOERROR 403 INFO[0052] dns: exchanged shuc-pc-hunt.ksord.com SOA ksord.com. 105 IN SOA ns1.kingclouddns.com. dnsadmin.kingclouddns.com. 1457939306 3600 360 1801209600 180 INFO[0052] dns: exchanged shuc-pc-hunt.ksord.com A shuc-pc-hunt.ksord.com. 403 IN A 110.249.194.78 INFO[0052] dns: exchanged shuc-pc-hunt.ksord.com A shuc-pc-hunt.ksord.com. 403 IN A 124.236.26.167 INFO[0052] dns: exchanged shuc-pc-hunt.ksord.com A shuc-pc-hunt.ksord.com. 403 IN A 110.249.194.67 INFO[0052] dns: exchanged shuc-pc-hunt.ksord.com A shuc-pc-hunt.ksord.com. 403 IN A 124.236.26.161 INFO[0052] dns: exchanged shuc-pc-hunt.ksord.com A shuc-pc-hunt.ksord.com. 403 IN A 124.236.26.168 INFO[0052] dns: exchanged shuc-pc-hunt.ksord.com A shuc-pc-hunt.ksord.com. 403 IN A 110.249.194.71 INFO[0052] dns: exchanged shuc-pc-hunt.ksord.com A shuc-pc-hunt.ksord.com. 403 IN A 124.236.26.172 INFO[0052] dns: exchanged shuc-pc-hunt.ksord.com A shuc-pc-hunt.ksord.com. 403 IN A 110.249.194.68 DEBUG[0052] [3645692144 7ms] dns: lookup succeed for shuc-pc-hunt.ksord.com: 110.249.194.78 124.236.26.167 110.249.194.67 124.236.26.161 124.236.26.168 110.249.194.71 124.236.26.172 110.249.194.68 DEBUG[0052] dns: exchanged shuc-pc-hunt.ksord.com NOERROR 403 DEBUG[0052] dns: exchanged shuc-pc-hunt.ksord.com NOERROR 105 INFO[0052] dns: exchanged shuc-pc-hunt.ksord.com A shuc-pc-hunt.ksord.com. 403 IN A 124.236.26.161 INFO[0052] dns: exchanged shuc-pc-hunt.ksord.com SOA ksord.com. 105 IN SOA ns1.kingclouddns.com. dnsadmin.kingclouddns.com. 1457939306 3600 360 1801209600 180 INFO[0052] dns: exchanged shuc-pc-hunt.ksord.com A shuc-pc-hunt.ksord.com. 403 IN A 124.236.26.168 INFO[0052] dns: exchanged shuc-pc-hunt.ksord.com A shuc-pc-hunt.ksord.com. 403 IN A 110.249.194.71 INFO[0052] dns: exchanged shuc-pc-hunt.ksord.com A shuc-pc-hunt.ksord.com. 403 IN A 124.236.26.172 INFO[0052] dns: exchanged shuc-pc-hunt.ksord.com A shuc-pc-hunt.ksord.com. 403 IN A 110.249.194.68 INFO[0052] dns: exchanged shuc-pc-hunt.ksord.com A shuc-pc-hunt.ksord.com. 403 IN A 110.249.194.78 INFO[0052] dns: exchanged shuc-pc-hunt.ksord.com A shuc-pc-hunt.ksord.com. 403 IN A 124.236.26.167 INFO[0052] dns: exchanged shuc-pc-hunt.ksord.com A shuc-pc-hunt.ksord.com. 403 IN A 110.249.194.67 DEBUG[0052] [2768072027 7ms] dns: lookup succeed for shuc-pc-hunt.ksord.com: 124.236.26.161 124.236.26.168 110.249.194.71 124.236.26.172 110.249.194.68 110.249.194.78 124.236.26.167 110.249.194.67 INFO[0052] [4125061696 0ms] inbound/tun[tun-in]: inbound connection from 172.19.0.1:12609 INFO[0052] [4125061696 0ms] inbound/tun[tun-in]: inbound connection to 198.18.0.62:80 DEBUG[0052] [4125061696 0ms] router: found fakeip domain: shuc-pc-hunt.ksord.com DEBUG[0052] [4125061696 0ms] router: sniffed protocol: http, domain: shuc-pc-hunt.ksord.com DEBUG[0052] [4125061696 0ms] router: match[3] domain_suffix=[autodl.com seetacloud.com codewithgpu.com...] geosite=cn => bypass INFO[0052] [4125061696 0ms] outbound/direct[bypass]: outbound connection to shuc-pc-hunt.ksord.com:80 DEBUG[0052] [4125061696 0ms] dns: lookup domain shuc-pc-hunt.ksord.com DEBUG[0052] [4125061696 0ms] dns: match[0] outbound=any => dns-direct DEBUG[0052] [4125061696 0ms] dns: lookup succeed for shuc-pc-hunt.ksord.com: 124.236.26.161 124.236.26.168 110.249.194.71 124.236.26.172 110.249.194.68 110.249.194.78 124.236.26.167 110.249.194.67
The text was updated successfully, but these errors were encountered:
No branches or pull requests
描述问题
预期行为:像最新版NB4A一样,更新订阅的这股流量不应该被Fakedns影响。
实际行为:开启Fakedns时除了已经连接的节点,其他全部返回了fakeip,关闭Fakedns才能正常强制解析。
如何复现
环境:纯TUN模式
日志
The text was updated successfully, but these errors were encountered: