Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

间歇性抽风... #290

Closed
aRe00t opened this issue Nov 15, 2016 · 2 comments
Closed

间歇性抽风... #290

aRe00t opened this issue Nov 15, 2016 · 2 comments

Comments

@aRe00t
Copy link

aRe00t commented Nov 15, 2016

版本: V2Ray v2.5.2 (One for all) 20161109
服务器: Ubuntu 16.10 x64
客户端: macOS 10.12.1 (16B2555)
访问方式: Chrome, SwitchyOmega, socks/vmess/kcp
现象: 间歇性访问不了墙外网站

例如在访问 vultr.com 时, 突然打开新页面时就卡住了, 此时再访问google.com/twitter.com等网站时也都卡住. 重启 c/s 的 v2ray 后还是这样, 但等十几分钟后会恢复正常.

客户端日志有大量的Failed to read response header: EOF 错误.
服务器日志看不到错误信息.

只grep了vultr的日志, 这是客户端的

2016/11/15 12:39:31 [Info]Socks: TCP Connect request to tcp:www.vultr.com:443
2016/11/15 12:39:31 [Info]DefaultDispatcher: Default route for tcp:www.vultr.com:443
2016/11/15 12:39:31 [Info]VMess|Outbound: Tunneling request to tcp:www.vultr.com:443 via tcp:xxxxxxx
2016/11/15 12:39:35 [Info]Socks: TCP Connect request to tcp:my.vultr.com:443
2016/11/15 12:39:35 [Info]DefaultDispatcher: Default route for tcp:my.vultr.com:443
2016/11/15 12:39:35 [Info]VMess|Outbound: Tunneling request to tcp:my.vultr.com:443 via tcp:xxxxxxx
2016/11/15 12:40:40 [Info]Socks: TCP Connect request to tcp:my.vultr.com:443
2016/11/15 12:40:40 [Info]DefaultDispatcher: Default route for tcp:my.vultr.com:443
2016/11/15 12:40:40 [Info]VMess|Outbound: Tunneling request to tcp:my.vultr.com:443 via tcp:xxxxxxx
2016/11/15 12:41:10 [Warning]VMess|Outbound: Failed to read response from tcp:my.vultr.com:443: EOF
2016/11/15 12:41:15 [Info]Socks: TCP Connect request to tcp:my.vultr.com:443
2016/11/15 12:41:15 [Info]DefaultDispatcher: Default route for tcp:my.vultr.com:443
2016/11/15 12:41:15 [Info]VMess|Outbound: Tunneling request to tcp:my.vultr.com:443 via tcp:xxxxxxx
2016/11/15 12:44:45 [Info]Socks: TCP Connect request to tcp:my.vultr.com:443
2016/11/15 12:44:45 [Info]DefaultDispatcher: Default route for tcp:my.vultr.com:443
2016/11/15 12:44:45 [Info]VMess|Outbound: Tunneling request to tcp:my.vultr.com:443 via tcp:xxxxxxx
2016/11/15 12:45:18 [Info]Socks: TCP Connect request to tcp:my.vultr.com:443
2016/11/15 12:45:18 [Info]DefaultDispatcher: Default route for tcp:my.vultr.com:443
2016/11/15 12:45:18 [Info]VMess|Outbound: Tunneling request to tcp:my.vultr.com:443 via tcp:xxxxxxx
2016/11/15 12:45:48 [Warning]VMess|Outbound: Failed to read response from tcp:my.vultr.com:443: EOF
2016/11/15 12:46:18 [Info]Socks: TCP Connect request to tcp:my.vultr.com:443
2016/11/15 12:46:18 [Info]DefaultDispatcher: Default route for tcp:my.vultr.com:443
2016/11/15 12:46:18 [Info]VMess|Outbound: Tunneling request to tcp:my.vultr.com:443 via tcp:xxxxxxx
2016/11/15 12:47:11 [Warning]VMess|Outbound: Failed to read response from tcp:my.vultr.com:443: EOF
2016/11/15 12:47:49 [Info]Socks: TCP Connect request to tcp:my.vultr.com:443
2016/11/15 12:47:49 [Info]DefaultDispatcher: Default route for tcp:my.vultr.com:443
2016/11/15 12:47:49 [Info]VMess|Outbound: Tunneling request to tcp:my.vultr.com:443 via tcp:xxxxxxx
2016/11/15 12:48:24 [Info]Socks: TCP Connect request to tcp:my.vultr.com:443
2016/11/15 12:48:24 [Info]DefaultDispatcher: Default route for tcp:my.vultr.com:443
2016/11/15 12:48:24 [Info]VMess|Outbound: Tunneling request to tcp:my.vultr.com:443 via tcp:xxxxxxx
2016/11/15 12:48:42 [Warning]VMess|Outbound: Failed to read response from tcp:my.vultr.com:443: EOF
2016/11/15 12:50:01 [Info]Socks: TCP Connect request to tcp:my.vultr.com:443
2016/11/15 12:50:01 [Info]DefaultDispatcher: Default route for tcp:my.vultr.com:443
2016/11/15 12:50:01 [Info]VMess|Outbound: Tunneling request to tcp:my.vultr.com:443 via tcp:xxxxxxx
2016/11/15 12:50:54 [Warning]VMess|Outbound: Failed to read response from tcp:my.vultr.com:443: EOF
2016/11/15 12:50:57 [Info]Socks: TCP Connect request to tcp:my.vultr.com:443
2016/11/15 12:50:57 [Info]DefaultDispatcher: Default route for tcp:my.vultr.com:443
2016/11/15 12:50:57 [Info]VMess|Outbound: Tunneling request to tcp:my.vultr.com:443 via tcp:xxxxxxx
2016/11/15 12:52:05 [Info]Socks: TCP Connect request to tcp:my.vultr.com:443
2016/11/15 12:52:05 [Info]Socks: TCP Connect request to tcp:my.vultr.com:443
2016/11/15 12:52:05 [Info]Socks: TCP Connect request to tcp:my.vultr.com:443
2016/11/15 12:52:05 [Info]Socks: TCP Connect request to tcp:my.vultr.com:443
2016/11/15 12:52:05 [Info]Socks: TCP Connect request to tcp:my.vultr.com:443
2016/11/15 12:52:05 [Info]Socks: TCP Connect request to tcp:my.vultr.com:443
2016/11/15 12:52:05 [Info]DefaultDispatcher: Default route for tcp:my.vultr.com:443
2016/11/15 12:52:05 [Info]DefaultDispatcher: Default route for tcp:my.vultr.com:443
2016/11/15 12:52:05 [Info]DefaultDispatcher: Default route for tcp:my.vultr.com:443
2016/11/15 12:52:05 [Info]DefaultDispatcher: Default route for tcp:my.vultr.com:443
2016/11/15 12:52:05 [Info]DefaultDispatcher: Default route for tcp:my.vultr.com:443
2016/11/15 12:52:05 [Info]DefaultDispatcher: Default route for tcp:my.vultr.com:443
2016/11/15 12:52:05 [Info]VMess|Outbound: Tunneling request to tcp:my.vultr.com:443 via tcp:xxxxxxx
2016/11/15 12:52:05 [Info]VMess|Outbound: Tunneling request to tcp:my.vultr.com:443 via tcp:xxxxxxx
2016/11/15 12:52:05 [Info]VMess|Outbound: Tunneling request to tcp:my.vultr.com:443 via tcp:xxxxxxx
2016/11/15 12:52:05 [Info]VMess|Outbound: Tunneling request to tcp:my.vultr.com:443 via tcp:xxxxxxx
2016/11/15 12:52:05 [Info]VMess|Outbound: Tunneling request to tcp:my.vultr.com:443 via tcp:xxxxxxx
2016/11/15 12:52:05 [Info]VMess|Outbound: Tunneling request to tcp:my.vultr.com:443 via tcp:xxxxxxx
2016/11/15 12:52:35 [Warning]VMess|Outbound: Failed to read response from tcp:my.vultr.com:443: EOF
2016/11/15 12:52:35 [Warning]VMess|Outbound: Failed to read response from tcp:my.vultr.com:443: EOF
2016/11/15 12:52:35 [Warning]VMess|Outbound: Failed to read response from tcp:my.vultr.com:443: EOF
2016/11/15 12:52:35 [Warning]VMess|Outbound: Failed to read response from tcp:my.vultr.com:443: EOF
2016/11/15 12:55:33 [Info]Socks: TCP Connect request to tcp:www.vultr.com:443
2016/11/15 12:55:33 [Info]DefaultDispatcher: Default route for tcp:www.vultr.com:443
2016/11/15 12:55:33 [Info]VMess|Outbound: Tunneling request to tcp:www.vultr.com:443 via tcp:xxxxxxx
2016/11/15 13:11:22 [Info]Socks: TCP Connect request to tcp:my.vultr.com:443
2016/11/15 13:11:22 [Info]DefaultDispatcher: Default route for tcp:my.vultr.com:443
2016/11/15 13:11:22 [Info]VMess|Outbound: Tunneling request to tcp:my.vultr.com:443 via tcp:xxxxxxx

服务器的

2016/11/15 12:39:30 [Info]VMessIn: Received request for tcp:www.vultr.com:443
2016/11/15 12:39:30 [Info]DefaultDispatcher: Default route for tcp:www.vultr.com:443
2016/11/15 12:39:30 [Info]Freedom: Opening connection to tcp:www.vultr.com:443
2016/11/15 12:39:30 [Info]Dailing Raw TCP to tcp:www.vultr.com:443
2016/11/15 12:39:35 [Info]VMessIn: Received request for tcp:my.vultr.com:443
2016/11/15 12:39:35 [Info]DefaultDispatcher: Default route for tcp:my.vultr.com:443
2016/11/15 12:39:35 [Info]Freedom: Opening connection to tcp:my.vultr.com:443
2016/11/15 12:39:35 [Info]Dailing Raw TCP to tcp:my.vultr.com:443
2016/11/15 12:41:17 [Info]VMessIn: Received request for tcp:my.vultr.com:443
2016/11/15 12:41:17 [Info]DefaultDispatcher: Default route for tcp:my.vultr.com:443
2016/11/15 12:41:17 [Info]Freedom: Opening connection to tcp:my.vultr.com:443
2016/11/15 12:41:17 [Info]Dailing Raw TCP to tcp:my.vultr.com:443
2016/11/15 12:50:57 [Info]VMessIn: Received request for tcp:my.vultr.com:443
2016/11/15 12:50:57 [Info]DefaultDispatcher: Default route for tcp:my.vultr.com:443
2016/11/15 12:50:57 [Info]Freedom: Opening connection to tcp:my.vultr.com:443
2016/11/15 12:50:57 [Info]Dailing Raw TCP to tcp:my.vultr.com:443
2016/11/15 12:52:06 [Info]VMessIn: Received request for tcp:my.vultr.com:443
2016/11/15 12:52:06 [Info]DefaultDispatcher: Default route for tcp:my.vultr.com:443
2016/11/15 12:52:06 [Info]Freedom: Opening connection to tcp:my.vultr.com:443
2016/11/15 12:52:06 [Info]Dailing Raw TCP to tcp:my.vultr.com:443
2016/11/15 12:52:07 [Info]VMessIn: Received request for tcp:my.vultr.com:443
2016/11/15 12:52:07 [Info]DefaultDispatcher: Default route for tcp:my.vultr.com:443
2016/11/15 12:52:07 [Info]Freedom: Opening connection to tcp:my.vultr.com:443
2016/11/15 12:52:07 [Info]Dailing Raw TCP to tcp:my.vultr.com:443
2016/11/15 12:55:44 [Info]VMessIn: Received request for tcp:www.vultr.com:443
2016/11/15 12:55:44 [Info]DefaultDispatcher: Default route for tcp:www.vultr.com:443
2016/11/15 12:55:44 [Info]Freedom: Opening connection to tcp:www.vultr.com:443
2016/11/15 12:55:44 [Info]Dailing Raw TCP to tcp:www.vultr.com:443
2016/11/15 13:11:22 [Info]VMessIn: Received request for tcp:my.vultr.com:443
2016/11/15 13:11:22 [Info]DefaultDispatcher: Default route for tcp:my.vultr.com:443
2016/11/15 13:11:22 [Info]Freedom: Opening connection to tcp:my.vultr.com:443
2016/11/15 13:11:22 [Info]Dailing Raw TCP to tcp:my.vultr.com:443

客户端配置

{
  "log": {
    "access": "/var/log/v2ray/access.log",
    "error": "/var/log/v2ray/error.log",
    "loglevel": "info"
  },
  "inbound": {
    "port": 12300,
    "protocol": "socks",
    "settings": {
      "auth": "noauth",
      "udp": false
    }
  },
  "outbound": {
    "protocol": "vmess",
    "settings": {
      "vnext": [
        {
          "address": "xxxxxxxxxxx",
          "port": xxxxx,
          "users": [
            {
              "id": "86fef749-62ec-4242-b5e2-ee4bc0d80442"
            }
          ]
        }
      ]
    },
    "streamSettings": {
      "network": "kcp"
    }
  },
  "outboundDetour": [
    {
      "protocol": "freedom",
      "tag": "direct",
      "settings": {}
    },
    {
      "protocol": "blackhole",
      "tag": "block",
      "settings": {}
    },
    {
      "protocol": "blackhole",
      "tag": "httpblock",
      "settings": {
        "response": {
          "type": "http"
        }
      }
    }
  ],
  "routing": {
    "strategy": "rules",
    "settings": {
      "rules": [
        {
          "type": "field",
          "domain": [
            ".google-analytics.com"
          ],
          "outboundTag": "httpblock"
        },
        {
          "type": "chinaip",
          "outboundTag": "direct"
        },
        {
          "type": "chinasites",
          "outboundTag": "direct"
        },
        {
          "type": "field",
          "domain": [
            "huaban.com"
          ],
          "outboundTag": "direct"
        },
        {
          "type": "field",
          "ip": [
            "0.0.0.0/8",
            "10.0.0.0/8",
            "100.64.0.0/10",
            "127.0.0.0/8",
            "169.254.0.0/16",
            "172.16.0.0/12",
            "192.0.0.0/24",
            "192.0.2.0/24",
            "192.168.0.0/16",
            "198.18.0.0/15",
            "198.51.100.0/24",
            "203.0.113.0/24",
            "::1/128",
            "fc00::/7",
            "fe80::/10"
          ],
          "outboundTag": "direct"
        }
      ]
    }
  },
  "transport": {
    "tcpSettings": {
      "connectionReuse": true
    },
    "kcpSettings": {
      "mtu": 1350,
      "tti": 50,
      "uplinkCapacity": 12,
      "downlinkCapacity": 100,
      "congestion": false,
      "readBufferSize": 1,
      "writeBufferSize": 1,
      "header": {
        "type": "none"
      }
    }
  }
}

服务器配置

{
  "log": {
    "access": "/var/log/v2ray/access.log",
    "error": "/var/log/v2ray/error.log",
    "loglevel": "info"
  },
  "inbound": {
    "port": xxxx,
    "protocol": "vmess",
    "settings": {
      "clients": [
        {
          "id": "86fef749-62ec-4242-b5e2-ee4bc0d80442",
          "level": 1
        }
      ]
    },
    "streamSettings": {
      "network": "kcp"
    }
  },
  "outbound": {
    "protocol": "freedom",
    "settings": {}
  },
  "outboundDetour": [
    {
      "protocol": "blackhole",
      "settings": {},
      "tag": "blocked"
    }
  ],
  "routing": {
    "strategy": "rules",
    "settings": {
      "rules": [
        {
          "type": "field",
          "ip": [
            "0.0.0.0/8",
            "10.0.0.0/8",
            "100.64.0.0/10",
            "127.0.0.0/8",
            "169.254.0.0/16",
            "172.16.0.0/12",
            "192.0.0.0/24",
            "192.0.2.0/24",
            "192.168.0.0/16",
            "198.18.0.0/15",
            "198.51.100.0/24",
            "203.0.113.0/24",
            "::1/128",
            "fc00::/7",
            "fe80::/10"
          ],
          "outboundTag": "blocked"
        }
      ]
    }
  },
  "transport": {
    "tcpSettings": {
      "connectionReuse": true
    },
    "kcpSettings": {
      "mtu": 1350,
      "tti": 50,
      "uplinkCapacity": 12,
      "downlinkCapacity": 100,
      "congestion": false,
      "readBufferSize": 1,
      "writeBufferSize": 1,
      "header": {
        "type": "none"
      }
    }
  }
}
@aRe00t
Copy link
Author

aRe00t commented Nov 16, 2016

同一台服务器, 改用ss(v2ray) -> kcptun -> ss(v2ray)之后, 没再出现过这种情况.

@v2ray
Copy link
Collaborator

v2ray commented Nov 29, 2016

猜测是大量的并发连接导致 UDP NAT 出了什么问题,2.8 中减少了 UPD 端口的用量,对这个问题有一定的帮助。

@v2ray v2ray closed this as completed Nov 29, 2016
github-actions bot pushed a commit to 3gZ2jA/v2ray-core that referenced this issue Oct 9, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant