V2RAY内存泄露,不停地和自己进行tcp连接 #1394
Unanswered
lilyok1234
asked this question in
Q&A
Replies: 2 comments 3 replies
-
这个应该是你的 iptables 规则的问题,而非 V2Ray 的问题。 |
Beta Was this translation helpful? Give feedback.
0 replies
-
你好,请问有规则吗?我改个试下,谢谢了 |
Beta Was this translation helpful? Give feedback.
3 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
你正在使用哪个版本的 V2Ray?
4.43.0
本地程序故障,不涉及服务器
你的使用场景是什么?
使用tproxy透明代理,本地直连网段进行iperf3网络测试,理论上局域网直连不应该涉及到代理才对。
具体操作如下:
1、透明代理网关上执行iperf3服务程序,nohup iperf3 -s &,我的服务器ip是192.168.6.44
2、手机连上局域网,在同一网段进行iperf3客户端测试,执行测速的ip是192.168.6.43
3、此问题概率出现,概率还挺大,多测几次就出来了,发现测速速度比较快的时候更容易出现一些。
4、出现问题时,htop查看内存急剧增大,同时netstat -ano发现大量192.168.6.44与192.168.6.44:12345的
连接。
你看到的异常现象是什么?
内存占用突然占满,日志不断地建立大量本地ip的tcp连接
你期待看到的正常表现是怎样的?
iperf3局域网测速,与v2ray代理应该没关系,不知道为什么v2ray突然自己会建立大量tcp连接,
一直建立,跟死循环一样,直到内存耗尽
请附上你的配置
服务端配置:
本地应用故障,服务器不涉及,因此未贴
客户端配置:
root@arm-64:/usr/local/V2ray.Fun# cat /etc/v2ray/config.json
{
"log": {
"access": "/var/log/v2ray/access.log",
"error": "/var/log/v2ray/error.log",
"loglevel": "warning"
},
"inbounds": [
{
"port": 12345,
"protocol": "dokodemo-door",
"settings": {
"network": "tcp,udp",
"followRedirect": true
},
"sniffing": {
"enabled": true,
"destOverride": [
"http",
"tls"
]
},
"streamSettings": {
"sockopt": {
"tproxy": "tproxy"
}
},
"tag": "transparent"
},
{
"port": 1080,
"protocol": "socks",
"settings": {
"auth": "noauth"
},
"sniffing": {
"enabled": true,
"destOverride": [
"http",
"tls"
]
}
}
],
"outbounds": [
{
"mux": {
"enabled": true
},
"protocol": "vmess",
"settings": {
"vnext": [
{
"address": "xxx.xxxxxx.xxxx.xx",
"port": 443,
"users": [
{
"id": "xxx.xxxxxx.xxxx.xx",
"alterId": 1,
"security": "auto",
"level": 0
}
]
}
]
},
"streamSettings": {
"network": "ws",
"security": "tls",
"wsSettings": {
"path": "/cctv5/cctv5hd.m3u8",
"headers": {
"Host": "xxx.xxxxxx.xxxx.xx"
}
},
"tlsSettings": {
"serverName": "xxx.xxxxxx.xxxx.xx",
"allowInsecure": false
},
"sockopt": {
"mark": 255
}
},
"tag": "proxy"
},
{
"protocol": "freedom",
"settings": {
"domainStrategy": "UseIP"
},
"streamSettings": {
"sockopt": {
"mark": 255
}
},
"tag": "direct"
},
{
"protocol": "blackhole",
"settings": {
"response": {
"type": "http"
}
},
"tag": "block"
},
{
"protocol": "dns",
"streamSettings": {
"sockopt": {
"mark": 255
}
},
"tag": "dns-out"
}
],
"dns": {
"servers": [
"8.8.8.8",
{
"address": "192.168.6.1",
"port": 53,
"domains": [
"ntp.org",
"geosite:speedtest",
"geosite:cn"
]
}
]
},
"routing": {
"domainStrategy": "IPOnDemand",
"rules": [
{
"type": "field",
"inboundTag": [
"transparent"
],
"port": 53,
"network": "udp",
"outboundTag": "dns-out"
},
{
"type": "field",
"inboundTag": [
"transparent"
],
"port": 123,
"network": "udp",
"outboundTag": "direct"
},
{
"type": "field",
"protocol": [
"bittorrent"
],
"outboundTag": "direct"
},
{
"type": "field",
"ip": [
"geoip:private"
],
"outboundTag": "direct"
},
{
"type": "field",
"ip": [
"192.168.6.1"
],
"outboundTag": "direct"
},
{
"type": "field",
"ip": [
"8.8.8.8"
],
"outboundTag": "proxy"
},
{
"type": "field",
"domain": [
"xxx.xxxxxx.xxxx.xx",
"xxx.xxxxxx.xxxx.xx",
"xxx.xxxxxx.xxxx.xx",
"xxx.xxxxxx.xxxx.xx",
"xxx.xxxxxx.xxxx.xx"
],
"outboundTag": "direct"
},
{
"type": "field",
"ip": [
"xxx.xxxxxx.xxxx.xx",
"xxx.xxxxxx.xxxx.xx",
"xxx.xxxxxx.xxxx.xx"
],
"outboundTag": "direct"
},
{
"type": "field",
"ip": [
"geoip:cn"
],
"outboundTag": "direct"
},
{
"type": "field",
"domain": [
"geosite:cn"
],
"outboundTag": "direct"
}
]
}
}
请附上出错时软件输出的错误日志
服务器端错误日志:
// 在这里附上服务器端日志
客户端错误日志:
2021/11/13 21:45:46 [Debug] transport/internet/udp: UDP original destination: udp:192.168.6.44:53
2021/11/13 21:45:46 [Debug] [2428159971] proxy/dokodemo: processing connection from: 192.168.6.43:48988
2021/11/13 21:45:46 [Info] [2428159971] proxy/dokodemo: received request for 192.168.6.43:48988
2021/11/13 21:45:46 [Info] [2428159971] app/dispatcher: taking detour [dns-out] for [udp:192.168.6.44:53]
2021/11/13 21:45:46 [Info] [2428159971] proxy/dns: handling DNS traffic to udp:192.168.6.44:53
2021/11/13 21:45:52 [Debug] [665439119] proxy/dokodemo: processing connection from: 192.168.6.43:33994
2021/11/13 21:45:52 [Info] [665439119] proxy/dokodemo: received request for 192.168.6.43:33994
2021/11/13 21:45:52 [Info] [665439119] app/dispatcher: taking detour [direct] for [tcp:192.168.6.44:12345]
2021/11/13 21:45:52 [Info] [665439119] proxy/freedom: opening connection to tcp:192.168.6.44:12345
2021/11/13 21:45:52 [Info] [665439119] transport/internet/tcp: dialing TCP to tcp:192.168.6.44:12345
2021/11/13 21:45:52 [Debug] [3123507772] proxy/dokodemo: processing connection from: 192.168.6.44:54066
2021/11/13 21:45:52 [Info] [3123507772] proxy/dokodemo: received request for 192.168.6.44:54066
2021/11/13 21:45:52 [Info] [3123507772] app/dispatcher: taking detour [direct] for [tcp:192.168.6.44:12345]
2021/11/13 21:45:52 [Info] [3123507772] proxy/freedom: opening connection to tcp:192.168.6.44:12345
2021/11/13 21:45:52 [Info] [3123507772] transport/internet/tcp: dialing TCP to tcp:192.168.6.44:12345
2021/11/13 21:45:52 [Debug] [2649186110] proxy/dokodemo: processing connection from: 192.168.6.44:54068
2021/11/13 21:45:52 [Info] [2649186110] proxy/dokodemo: received request for 192.168.6.44:54068
2021/11/13 21:45:52 [Info] [2649186110] app/dispatcher: taking detour [direct] for [tcp:192.168.6.44:12345]
2021/11/13 21:45:52 [Info] [2649186110] proxy/freedom: opening connection to tcp:192.168.6.44:12345
2021/11/13 21:45:52 [Info] [2649186110] transport/internet/tcp: dialing TCP to tcp:192.168.6.44:12345
2021/11/13 21:45:52 [Debug] [195987298] proxy/dokodemo: processing connection from: 192.168.6.44:54070
2021/11/13 21:45:52 [Info] [195987298] proxy/dokodemo: received request for 192.168.6.44:54070
2021/11/13 21:45:53 [Info] [195987298] app/dispatcher: taking detour [direct] for [tcp:192.168.6.44:12345]
2021/11/13 21:45:53 [Info] [195987298] proxy/freedom: opening connection to tcp:192.168.6.44:12345
2021/11/13 21:45:53 [Info] [195987298] transport/internet/tcp: dialing TCP to tcp:192.168.6.44:12345
2021/11/13 21:45:53 [Debug] [1875110860] proxy/dokodemo: processing connection from: 192.168.6.44:54072
2021/11/13 21:45:53 [Info] [1875110860] proxy/dokodemo: received request for 192.168.6.44:54072
2021/11/13 21:45:53 [Info] [1875110860] app/dispatcher: taking detour [direct] for [tcp:192.168.6.44:12345]
2021/11/13 21:45:53 [Info] [1875110860] proxy/freedom: opening connection to tcp:192.168.6.44:12345
2021/11/13 21:45:53 [Info] [1875110860] transport/internet/tcp: dialing TCP to tcp:192.168.6.44:12345
2021/11/13 21:45:53 [Debug] [2316172777] proxy/dokodemo: processing connection from: 192.168.6.44:54074
2021/11/13 21:45:53 [Info] [2316172777] proxy/dokodemo: received request for 192.168.6.44:54074
2021/11/13 21:45:53 [Info] [665439119] app/proxyman/inbound: connection ends > proxy/dokodemo: connection ends > context canceled
2021/11/13 21:45:53 [Info] [665439119] app/proxyman/outbound: failed to process outbound traffic > proxy/freedom: connection ends > context canceled
2021/11/13 21:45:53 [Info] [2316172777] app/dispatcher: taking detour [direct] for [tcp:192.168.6.44:12345]
2021/11/13 21:45:53 [Info] [2316172777] proxy/freedom: opening connection to tcp:192.168.6.44:12345
2021/11/13 21:45:53 [Info] [2316172777] transport/internet/tcp: dialing TCP to tcp:192.168.6.44:12345
2021/11/13 21:45:53 [Debug] [1305803253] proxy/dokodemo: processing connection from: 192.168.6.44:54076
2021/11/13 21:45:53 [Info] [1305803253] proxy/dokodemo: received request for 192.168.6.44:54076
2021/11/13 21:45:53 [Debug] [575872178] proxy/dokodemo: processing connection from: 192.168.6.43:34602
2021/11/13 21:45:53 [Info] [575872178] proxy/dokodemo: received request for 192.168.6.43:34602
2021/11/13 21:45:53 [Info] [575872178] app/dispatcher: sniffed domain: 192.168.6.44
2021/11/13 21:45:53 [Info] [575872178] app/dispatcher: taking detour [direct] for [tcp:192.168.6.44:12345]
2021/11/13 21:45:53 [Info] [575872178] proxy/freedom: opening connection to tcp:192.168.6.44:12345
2021/11/13 21:45:53 [Info] [575872178] transport/internet/tcp: dialing TCP to tcp:192.168.6.44:12345
2021/11/13 21:45:53 [Debug] [3559856917] proxy/dokodemo: processing connection from: 192.168.6.44:54078
2021/11/13 21:45:53 [Info] [3559856917] proxy/dokodemo: received request for 192.168.6.44:54078
2021/11/13 21:45:53 [Info] [3559856917] app/dispatcher: sniffed domain: 192.168.6.44
2021/11/13 21:45:53 [Info] [3559856917] app/dispatcher: taking detour [direct] for [tcp:192.168.6.44:12345]
2021/11/13 21:45:53 [Info] [3559856917] proxy/freedom: opening connection to tcp:192.168.6.44:12345
2021/11/13 21:45:53 [Info] [3559856917] transport/internet/tcp: dialing TCP to tcp:192.168.6.44:12345
2021/11/13 21:45:53 [Debug] [3179530449] proxy/dokodemo: processing connection from: 192.168.6.44:54080
2021/11/13 21:45:53 [Info] [3179530449] proxy/dokodemo: received request for 192.168.6.44:54080
2021/11/13 21:45:53 [Info] [3179530449] app/dispatcher: sniffed domain: 192.168.6.44
2021/11/13 21:45:53 [Info] [3179530449] app/dispatcher: taking detour [direct] for [tcp:192.168.6.44:12345]
2021/11/13 21:45:53 [Info] [3179530449] proxy/freedom: opening connection to tcp:192.168.6.44:12345
2021/11/13 21:45:53 [Info] [3179530449] transport/internet/tcp: dialing TCP to tcp:192.168.6.44:12345
2021/11/13 21:45:53 [Debug] [782884098] proxy/dokodemo: processing connection from: 192.168.6.44:54082
2021/11/13 21:45:53 [Info] [782884098] proxy/dokodemo: received request for 192.168.6.44:54082
2021/11/13 21:45:53 [Info] [782884098] app/dispatcher: sniffed domain: 192.168.6.44
2021/11/13 21:45:53 [Info] [782884098] app/dispatcher: taking detour [direct] for [tcp:192.168.6.44:12345]
2021/11/13 21:45:53 [Info] [782884098] proxy/freedom: opening connection to tcp:192.168.6.44:12345
2021/11/13 21:45:53 [Info] [782884098] transport/internet/tcp: dialing TCP to tcp:192.168.6.44:12345
2021/11/13 21:45:53 [Debug] [3968737263] proxy/dokodemo: processing connection from: 192.168.6.44:54084
2021/11/13 21:45:53 [Info] [3968737263] proxy/dokodemo: received request for 192.168.6.44:54084
2021/11/13 21:45:53 [Info] [3968737263] app/dispatcher: sniffed domain: 192.168.6.44
2021/11/13 21:45:53 [Info] [3968737263] app/dispatcher: taking detour [direct] for [tcp:192.168.6.44:12345]
2021/11/13 21:45:53 [Info] [3968737263] proxy/freedom: opening connection to tcp:192.168.6.44:12345
2021/11/13 21:45:53 [Info] [3968737263] transport/internet/tcp: dialing TCP to tcp:192.168.6.44:12345
2021/11/13 21:45:53 [Debug] [3609532938] proxy/dokodemo: processing connection from: 192.168.6.44:54086
2021/11/13 21:45:53 [Info] [3609532938] proxy/dokodemo: received request for 192.168.6.44:54086
2021/11/13 21:45:53 [Info] [3609532938] app/dispatcher: sniffed domain: 192.168.6.44
2021/11/13 21:45:53 [Info] [3609532938] app/dispatcher: taking detour [direct] for [tcp:192.168.6.44:12345]
2021/11/13 21:45:53 [Info] [3609532938] proxy/freedom: opening connection to tcp:192.168.6.44:12345
2021/11/13 21:45:53 [Info] [3609532938] transport/internet/tcp: dialing TCP to tcp:192.168.6.44:12345
2021/11/13 21:45:53 [Debug] [4132007648] proxy/dokodemo: processing connection from: 192.168.6.44:54088
2021/11/13 21:45:53 [Info] [4132007648] proxy/dokodemo: received request for 192.168.6.44:54088
2021/11/13 21:45:53 [Info] [4132007648] app/dispatcher: sniffed domain: 192.168.6.44
2021/11/13 21:45:53 [Info] [4132007648] app/dispatcher: taking detour [direct] for [tcp:192.168.6.44:12345]
2021/11/13 21:45:53 [Info] [4132007648] proxy/freedom: opening connection to tcp:192.168.6.44:12345
2021/11/13 21:45:53 [Info] [4132007648] transport/internet/tcp: dialing TCP to tcp:192.168.6.44:12345
2021/11/13 21:45:53 [Debug] [948293693] proxy/dokodemo: processing connection from: 192.168.6.44:54090
2021/11/13 21:45:53 [Info] [948293693] proxy/dokodemo: received request for 192.168.6.44:54090
2021/11/13 21:45:53 [Info] [948293693] app/dispatcher: sniffed domain: 192.168.6.44
2021/11/13 21:45:53 [Info] [948293693] app/dispatcher: taking detour [direct] for [tcp:192.168.6.44:12345]
2021/11/13 21:45:53 [Info] [948293693] proxy/freedom: opening connection to tcp:192.168.6.44:12345
2021/11/13 21:45:53 [Info] [948293693] transport/internet/tcp: dialing TCP to tcp:192.168.6.44:12345
2021/11/13 21:45:53 [Debug] [2040328540] proxy/dokodemo: processing connection from: 192.168.6.44:54092
2021/11/13 21:45:53 [Info] [2040328540] proxy/dokodemo: received request for 192.168.6.44:54092
2021/11/13 21:45:53 [Info] [2040328540] app/dispatcher: sniffed domain: 192.168.6.44
2021/11/13 21:45:53 [Info] [2040328540] app/dispatcher: taking detour [direct] for [tcp:192.168.6.44:12345]
2021/11/13 21:45:53 [Info] [2040328540] proxy/freedom: opening connection to tcp:192.168.6.44:12345
2021/11/13 21:45:53 [Info] [2040328540] transport/internet/tcp: dialing TCP to tcp:192.168.6.44:12345
2021/11/13 21:45:53 [Debug] [1418087001] proxy/dokodemo: processing connection from: 192.168.6.44:54094
2021/11/13 21:45:53 [Info] [1418087001] proxy/dokodemo: received request for 192.168.6.44:54094
2021/11/13 21:45:53 [Info] [1418087001] app/dispatcher: sniffed domain: 192.168.6.44
2021/11/13 21:45:53 [Info] [1418087001] app/dispatcher: taking detour [direct] for [tcp:192.168.6.44:12345]
2021/11/13 21:45:53 [Info] [1418087001] proxy/freedom: opening connection to tcp:192.168.6.44:12345
2021/11/13 21:45:53 [Info] [1418087001] transport/internet/tcp: dialing TCP to tcp:192.168.6.44:12345
2021/11/13 21:45:53 [Debug] [2204252950] proxy/dokodemo: processing connection from: 192.168.6.44:54096
2021/11/13 21:45:53 [Info] [2204252950] proxy/dokodemo: received request for 192.168.6.44:54096
2021/11/13 21:45:53 [Info] [2204252950] app/dispatcher: sniffed domain: 192.168.6.44
2021/11/13 21:45:53 [Info] [2204252950] app/dispatcher: taking detour [direct] for [tcp:192.168.6.44:12345]
2021/11/13 21:45:53 [Info] [2204252950] proxy/freedom: opening connection to tcp:192.168.6.44:12345
2021/11/13 21:45:53 [Info] [2204252950] transport/internet/tcp: dialing TCP to tcp:192.168.6.44:12345
2021/11/13 21:45:53 [Debug] [1685884326] proxy/dokodemo: processing connection from: 192.168.6.44:54098
2021/11/13 21:45:53 [Info] [1685884326] proxy/dokodemo: received request for 192.168.6.44:54098
2021/11/13 21:45:53 [Info] [1685884326] app/dispatcher: sniffed domain: 192.168.6.44
2021/11/13 21:45:53 [Info] [1685884326] app/dispatcher: taking detour [direct] for [tcp:192.168.6.44:12345]
2021/11/13 21:45:53 [Info] [1685884326] proxy/freedom: opening connection to tcp:192.168.6.44:12345
2021/11/13 21:45:53 [Info] [1685884326] transport/internet/tcp: dialing TCP to tcp:192.168.6.44:12345
2021/11/13 21:45:53 [Debug] [1752831710] proxy/dokodemo: processing connection from: 192.168.6.44:54100
2021/11/13 21:45:53 [Info] [1752831710] proxy/dokodemo: received request for 192.168.6.44:54100
2021/11/13 21:45:53 [Info] [1752831710] app/dispatcher: sniffed domain: 192.168.6.44
2021/11/13 21:45:53 [Info] [1752831710] app/dispatcher: taking detour [direct] for [tcp:192.168.6.44:12345]
请附上访问日志
此时并没有做代理访问
其它相关的配置文件(如 Nginx)和相关日志
iptables的配置,也没有发现什么问题
root@arm-64:/usr/local/V2ray.Fun# iptables -t mangle -L -n -v
Chain PREROUTING (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
11M 1246M DIVERT tcp -- * * 0.0.0.0/0 0.0.0.0/0 socket
167K 29M V2RAY all -- * * 0.0.0.0/0 0.0.0.0/0
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
11M 773M V2RAY_MASK all -- * * 0.0.0.0/0 0.0.0.0/0
Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain V2RAY (1 references)
pkts bytes target prot opt in out source destination
56 3360 RETURN all -- * * 0.0.0.0/0 127.0.0.1
0 0 RETURN all -- * * 0.0.0.0/0 224.0.0.0/4
1553 139K RETURN all -- * * 0.0.0.0/0 255.255.255.255
114K 12M RETURN tcp -- * * 0.0.0.0/0 192.168.0.0/16
37146 11M RETURN udp -- * * 0.0.0.0/0 192.168.0.0/16 udp dpt:!53
73 5171 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 mark match 0xff
1810 123K TPROXY udp -- * * 0.0.0.0/0 0.0.0.0/0 TPROXY redirect 127.0.0.1:12345 mark 0x1/0xffffffff
2869 166K TPROXY tcp -- * * 0.0.0.0/0 0.0.0.0/0 TPROXY redirect 127.0.0.1:12345 mark 0x1/0xffffffff
Chain V2RAY_MASK (1 references)
pkts bytes target prot opt in out source destination
129 15738 RETURN all -- * * 0.0.0.0/0 224.0.0.0/4
0 0 RETURN all -- * * 0.0.0.0/0 255.255.255.255
11M 746M RETURN tcp -- * * 0.0.0.0/0 192.168.0.0/16
8567 1300K RETURN udp -- * * 0.0.0.0/0 192.168.0.0/16 udp dpt:!53
93494 13M RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 mark match 0xff
82531 12M MARK udp -- * * 0.0.0.0/0 0.0.0.0/0 MARK set 0x1
192 15192 MARK tcp -- * * 0.0.0.0/0 0.0.0.0/0 MARK set 0x1
Chain DIVERT (1 references)
pkts bytes target prot opt in out source destination
11M 1246M MARK all -- * * 0.0.0.0/0 0.0.0.0/0 MARK set 0x1
11M 1246M ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
使用tcpdump抓到异常时lo口上收到的几个包,可以发现后面一直在和自己做tcp握手连接
root@arm-64:
# tcpdump -i lo -c 10 -XX -vvv -nn# htoptcpdump: listening on lo, link-type EN10MB (Ethernet), capture size 262144 bytes
22:33:46.085821 IP (tos 0x0, ttl 64, id 17308, offset 0, flags [DF], proto UDP (17), length 76)
192.168.6.44.60082 > 78.46.102.180.123: [bad udp cksum 0x7c00 -> 0x6b80!] NTPv4, length 48
Client, Leap indicator: (0), Stratum 0 (unspecified), poll 6 (64s), precision 32
Root Delay: 0.000000, Root dispersion: 0.000000, Reference-ID: (unspec)
Reference Timestamp: 0.000000000
Originator Timestamp: 0.000000000
Receive Timestamp: 0.000000000
Transmit Timestamp: 195799313.549877313 (2042/04/22 19:10:09)
Originator - Receive Timestamp: 0.000000000
Originator - Transmit Timestamp: 195799313.549877313 (2042/04/22 19:10:09)
0x0000: 0000 0000 0000 0000 0000 0000 0800 4500 ..............E.
0x0010: 004c 439c 4000 4011 7b4e c0a8 062c 4e2e .LC.@.@.{N...,N.
0x0020: 66b4 eab2 007b 0038 7c00 2300 0620 0000 f....{.8|.#.....
0x0030: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x0040: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0x0050: 0000 0bab a911 8cc4 c277 .........w
22:33:46.288610 IP (tos 0x0, ttl 64, id 43010, offset 0, flags [DF], proto UDP (17), length 76)
78.46.102.180.123 > 192.168.6.44.60082: [bad udp cksum 0x7c00 -> 0xf0f0!] NTPv4, length 48
Server, Leap indicator: (0), Stratum 3 (secondary reference), poll 6 (64s), precision -26
Root Delay: 0.008666, Root dispersion: 0.017288, Reference-ID: 176.9.157.12
Reference Timestamp: 3846061882.200220731 (2021/11/16 22:31:22)
Originator Timestamp: 195799313.549877313 (2042/04/22 19:10:09)
Receive Timestamp: 3846062026.191188704 (2021/11/16 22:33:46)
Transmit Timestamp: 3846062026.191203635 (2021/11/16 22:33:46)
Originator - Receive Timestamp: -644704583.358688609
Originator - Transmit Timestamp: -644704583.358673678
0x0000: 0000 0000 0000 0000 0000 0000 0800 4500 ..............E.
0x0010: 004c a802 4000 4011 16e8 4e2e 66b4 c0a8 .L..@[email protected]...
0x0020: 062c 007b eab2 0038 7c00 2403 06e6 0000 .,.{...8|.$.....
0x0030: 0238 0000 046d b009 9d0c e53e 3f3a 3341 .8...m.....>?:3A
0x0040: aa77 0bab a911 8cc4 c277 e53e 3fca 30f1 .w.......w.>?.0.
0x0050: be30 e53e 3fca 30f2 b8b2 .0.>?.0...
22:33:56.385814 IP (tos 0x0, ttl 64, id 13945, offset 0, flags [DF], proto UDP (17), length 71)
192.168.6.44.42612 > 192.168.6.44.53: [bad udp cksum 0x8ded -> 0x7b3f!] 51766+ PTR? 44.6.168.192.in-addr.arpa. (43)
0x0000: 0000 0000 0000 0000 0000 0000 0800 4500 ..............E.
0x0010: 0047 3679 4000 4011 7684 c0a8 062c c0a8 .G6y@[email protected]....,..
0x0020: 062c a674 0035 0033 8ded ca36 0100 0001 .,.t.5.3...6....
0x0030: 0000 0000 0000 0234 3401 3603 3136 3803 .......44.6.168.
0x0040: 3139 3207 696e 2d61 6464 7204 6172 7061 192.in-addr.arpa
0x0050: 0000 0c00 01 .....
22:33:56.385961 IP (tos 0xc0, ttl 64, id 47226, offset 0, flags [none], proto ICMP (1), length 99)
192.168.6.44 > 192.168.6.44: ICMP 192.168.6.44 udp port 53 unreachable, length 79
IP (tos 0x0, ttl 64, id 13945, offset 0, flags [DF], proto UDP (17), length 71)
192.168.6.44.42612 > 192.168.6.44.53: [bad udp cksum 0x8ded -> 0x7b3f!] 51766+ PTR? 44.6.168.192.in-addr.arpa. (43)
0x0000: 0000 0000 0000 0000 0000 0000 0800 45c0 ..............E.
0x0010: 0063 b87a 0000 4001 33b7 c0a8 062c c0a8 [email protected]....,..
0x0020: 062c 0303 783c 0000 0000 4500 0047 3679 .,..x<....E..G6y
0x0030: 4000 4011 7684 c0a8 062c c0a8 062c a674 @[email protected]....,...,.t
0x0040: 0035 0033 8ded ca36 0100 0001 0000 0000 .5.3...6........
0x0050: 0000 0234 3401 3603 3136 3803 3139 3207 ...44.6.168.192.
0x0060: 696e 2d61 6464 7204 6172 7061 0000 0c00 in-addr.arpa....
0x0070: 01 .
22:34:00.588302 IP (tos 0x0, ttl 64, id 36623, offset 0, flags [DF], proto TCP (6), length 60)
192.168.6.44.49572 > 192.168.6.44.12345: Flags [S], cksum 0x8dd7 (incorrect -> 0xeb80), seq 800792937, win 65495, options [mss 65495,sackOK,TS val 4206139171 ecr 0,nop,wscale 7], length 0
0x0000: 0000 0000 0000 0000 0000 0000 0800 4500 ..............E.
0x0010: 003c 8f0f 4000 4006 1e04 c0a8 062c c0a8 .<..@.@......,..
0x0020: 062c c1a4 3039 2fbb 2169 0000 0000 a002 .,..09/.!i......
0x0030: ffd7 8dd7 0000 0204 ffd7 0402 080a fab4 ................
0x0040: 9723 0000 0000 0103 0307 .#........
22:34:00.588374 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
192.168.6.44.12345 > 192.168.6.44.49572: Flags [S.], cksum 0x8dd7 (incorrect -> 0x90bf), seq 13879312, ack 800792938, win 65483, options [mss 65495,sackOK,TS val 4206139171 ecr 4206139171,nop,wscale 7], length 0
0x0000: 0000 0000 0000 0000 0000 0000 0800 4500 ..............E.
0x0010: 003c 0000 4000 4006 ad13 c0a8 062c c0a8 .<..@.@......,..
0x0020: 062c 3039 c1a4 00d3 c810 2fbb 216a a012 .,09....../.!j..
0x0030: ffcb 8dd7 0000 0204 ffd7 0402 080a fab4 ................
0x0040: 9723 fab4 9723 0103 0307 .#...#....
22:34:00.588443 IP (tos 0x0, ttl 64, id 36624, offset 0, flags [DF], proto TCP (6), length 52)
192.168.6.44.49572 > 192.168.6.44.12345: Flags [.], cksum 0x8dcf (incorrect -> 0xb77b), seq 1, ack 1, win 512, options [nop,nop,TS val 4206139171 ecr 4206139171], length 0
0x0000: 0000 0000 0000 0000 0000 0000 0800 4500 ..............E.
0x0010: 0034 8f10 4000 4006 1e0b c0a8 062c c0a8 .4..@.@......,..
0x0020: 062c c1a4 3039 2fbb 216a 00d3 c811 8010 .,..09/.!j......
0x0030: 0200 8dcf 0000 0101 080a fab4 9723 fab4 .............#..
0x0040: 9723 .#
22:34:00.790999 IP (tos 0x0, ttl 64, id 7538, offset 0, flags [DF], proto TCP (6), length 60)
192.168.6.44.49574 > 192.168.6.44.12345: Flags [S], cksum 0x8dd7 (incorrect -> 0xc6ce), seq 395795826, win 65495, options [mss 65495,sackOK,TS val 4206139374 ecr 0,nop,wscale 7], length 0
0x0000: 0000 0000 0000 0000 0000 0000 0800 4500 ..............E.
0x0010: 003c 1d72 4000 4006 8fa1 c0a8 062c c0a8 .<.r@.@......,..
0x0020: 062c c1a6 3039 1797 5d72 0000 0000 a002 .,..09..]r......
0x0030: ffd7 8dd7 0000 0204 ffd7 0402 080a fab4 ................
0x0040: 97ee 0000 0000 0103 0307 ..........
22:34:00.791066 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
192.168.6.44.12345 > 192.168.6.44.49574: Flags [S.], cksum 0x8dd7 (incorrect -> 0xcd6e), seq 918368250, ack 395795827, win 65483, options [mss 65495,sackOK,TS val 4206139374 ecr 4206139374,nop,wscale 7], length 0
0x0000: 0000 0000 0000 0000 0000 0000 0800 4500 ..............E.
0x0010: 003c 0000 4000 4006 ad13 c0a8 062c c0a8 .<..@.@......,..
0x0020: 062c 3039 c1a6 36bd 2ffa 1797 5d73 a012 .,09..6./...]s..
0x0030: ffcb 8dd7 0000 0204 ffd7 0402 080a fab4 ................
0x0040: 97ee fab4 97ee 0103 0307 ..........
22:34:00.791506 IP (tos 0x0, ttl 64, id 7539, offset 0, flags [DF], proto TCP (6), length 52)
192.168.6.44.49574 > 192.168.6.44.12345: Flags [.], cksum 0x8dcf (incorrect -> 0xf42a), seq 1, ack 1, win 512, options [nop,nop,TS val 4206139374 ecr 4206139374], length 0
0x0000: 0000 0000 0000 0000 0000 0000 0800 4500 ..............E.
0x0010: 0034 1d73 4000 4006 8fa8 c0a8 062c c0a8 .4.s@.@......,..
0x0020: 062c c1a6 3039 1797 5d73 36bd 2ffb 8010 .,..09..]s6./...
0x0030: 0200 8dcf 0000 0101 080a fab4 97ee fab4 ................
0x0040: 97ee ..
10 packets captured
20 packets received by filter
0 packets dropped by kernel
root@arm-64:
1 [||||||||||||||||||||||||||||||||||||||||||||| 60.0%] Hostname: arm-64
2 [|||||||||||||||||||||||||||||||||| 45.5%] Tasks: 42, 25 thr; 3 running
3 [|||||||||||||||||||||||||||||||||||||||| 54.5%] Load average: 1.03 0.45 0.17
4 [|||||||||||||||||||||||||||||||||||||||||| 55.6%] Uptime: 00:02:55
Mem[||||||||||||||||||||||||||||||| 551M/1.82G] Cpu Freq: 1.51 GHz
Swp[ 0K/933M] Eth0 IP: 192.168.6.44
Cpu Temp: 47 C Eth0 stat: 784.67 KB/s - 32979.82 KB/s (TX/RX)
PID USER PRI NI VIRT RES SHR S CPU% MEM% TIME+ Command
1945 root 20 0 19460 4244 1688 S 0.0 0.2 0:00.00 (sd-pam)
2043 root 20 0 10988 4776 3112 S 0.0 0.3 0:00.27 -bash
1944 root 20 0 16920 8120 6680 S 0.0 0.4 0:00.14 /lib/systemd/systemd --user
649 root 20 0 19320 7116 5908 S 0.0 0.4 0:00.55 /lib/systemd/systemd-journald
702 root 20 0 15004 6320 5360 S 0.0 0.3 0:00.21 /lib/systemd/systemd-logind
353 root 20 0 19316 4724 3584 S 0.0 0.2 0:00.62 /lib/systemd/systemd-udevd
953 root 20 0 8140 2084 1968 S 0.0 0.1 0:00.00 /sbin/agetty -o -p -- \u --keep-baud 115200,38400,9600 ttyAML0 linux
2135 root 20 0 8140 2100 1988 S 0.0 0.1 0:00.00 /sbin/agetty -o -p -- \u --keep-baud 1500000,115200,38400,9600 ttyS2 linux
944 root 20 0 8368 1368 1264 S 0.0 0.1 0:00.00 /sbin/agetty -o -p -- \u --noclear tty1 linux
506 root 20 0 9040 5324 4064 S 0.0 0.3 0:00.01 /sbin/dhclient -4 -v -i -pf /run/dhclient.eth0.pid -lf /var/lib/dhcp/dhclient.eth0.leases -I -df /var/li
1121 root 20 0 9040 5712 4452 S 0.0 0.3 0:00.02 /sbin/dhclient -d -q -sf /usr/lib/NetworkManager/nm-dhcp-helper -pf /run/dhclient-eth0.pid -lf /var/lib/
1 root 20 0 161M 9480 6840 S 0.0 0.5 0:11.15 /sbin/init
728 root 20 0 12788 8048 7052 S 0.0 0.4 0:00.13 /sbin/wpa_supplicant -u -s -O /run/wpa_supplicant
714 messagebu 20 0 6916 3796 3088 S 0.0 0.2 0:01.10 /usr/bin/dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only
834 root 20 0 29908 20228 7000 S 0.0 1.1 0:01.15 /usr/bin/python2 /usr/bin/supervisord -n -c /etc/supervisor/supervisord.conf
694 root 20 0 30420 16316 8852 S 0.0 0.9 0:00.58 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers
1045 root 20 0 106M 21396 11756 S 0.0 1.1 0:00.00 /usr/bin/python3 /usr/share/unattended-upgrades/unattended-upgrade-shutdown --wait-for-signal
833 root 20 0 106M 21396 11756 S 0.0 1.1 0:00.55 /usr/bin/python3 /usr/share/unattended-upgrades/unattended-upgrade-shutdown --wait-for-signal
1099 root 20 0 226M 6248 5484 S 0.0 0.3 0:00.00 /usr/lib/policykit-1/polkitd --no-debug
1101 root 20 0 226M 6248 5484 S 0.0 0.3 0:00.03 /usr/lib/policykit-1/polkitd --no-debug
1095 root 20 0 226M 6248 5484 S 0.0 0.3 0:00.08 /usr/lib/policykit-1/polkitd --no-debug
2122 root 20 0 5071M 332M 13720 S 0.0 17.8 0:00.01 /usr/local/bin/v2ray -config /etc/v2ray/config.json
2123 root 20 0 5071M 332M 13720 S 0.0 17.8 0:00.02 /usr/local/bin/v2ray -config /etc/v2ray/config.json
2124 root 20 0 5071M 332M 13720 S 50.0 17.8 0:02.27 /usr/local/bin/v2ray -config /etc/v2ray/config.json
2125 root 20 0 5071M 332M 13720 S 0.0 17.8 0:00.06 /usr/local/bin/v2ray -config /etc/v2ray/config.json
2126 root 20 0 5071M 332M 13720 S 50.0 17.8 0:02.25 /usr/local/bin/v2ray -config /etc/v2ray/config.json
2127 root 20 0 5071M 332M 13720 S 0.0 17.8 0:00.00 /usr/local/bin/v2ray -config /etc/v2ray/config.json
2128 root 20 0 5071M 332M 13720 R 100. 17.8 0:02.71 /usr/local/bin/v2ray -config /etc/v2ray/config.json
2129 root 20 0 5071M 332M 13720 S 0.0 17.8 0:02.49 /usr/local/bin/v2ray -config /etc/v2ray/config.json
2134 root 20 0 5071M 332M 13720 S 50.0 17.8 0:02.18 /usr/local/bin/v2ray -config /etc/v2ray/config.json
2121 root 20 0 5071M 332M 13720 S 250. 17.8 0:14.20 /usr/local/bin/v2ray -config /etc/v2ray/config.json
808 root 20 0 321M 15796 13128 S 0.0 0.8 0:00.00 /usr/sbin/NetworkManager --no-daemon
814 root 20 0 321M 15796 13128 S 0.0 0.8 0:00.48 /usr/sbin/NetworkManager --no-daemon
2139 root 20 0 321M 15796 13128 S 0.0 0.8 0:00.00 /usr/sbin/NetworkManager --no-daemon
root@arm-64:~# F3SearchF4FilterF5Tree F6SortByF7Nice -F8Nice +F9Kill F10Quit
如果 V2Ray 无法启动,请附上
--test
命令的输出能够正常启动,重启v2ray服务后,v2ray恢复正常
Beta Was this translation helpful? Give feedback.
All reactions