Operating system
Windows
System version
11 25H2 10.0.26200.8117
Installation type
zip
Version
1.1.2
Description
I created a clean copy of Throne then added a socks proxy socks5://192.168.1.50:10808#Socks
The server is running on another host in my local network.
The only changes that were made are DNS: udp://8.8.8.8 and downloaded profile Bypass_Iran.
Then started throne in Tun mode.
accessing foreign servers are fine. but accessing any Iranian website causes massive routing loop and high cpu usage.
To test I issued a single request using this command:
curl --socks5-hostname 127.0.0.1:2080 https://myadd.ir
The log file is very large. please see from line 96 onwards.
Bypass_iran.log
Note that using Proxy mode has no issues, it only happens in Tun mode.
This is the looped part:
INFO[0005] [1930231768 0ms] inbound/mixed[mixed-in]: inbound connection from 127.0.0.1:51672
INFO[0005] [1930231768 0ms] inbound/mixed[mixed-in]: inbound connection to myadd.ir:443
INFO[0005] [1930231768 0ms] router: found process path: C:\Users\***\Software\Tools\curl\curl.exe
DEBUG[0005] [1930231768 0ms] router: match[4] inbound=[mixed-in tun-in] => sniff
DEBUG[0005] [1930231768 2ms] router: sniffed protocol: tls, domain: myadd.ir
DEBUG[0005] [1930231768 2ms] router: match[7] rule_set=[geoip-ir geosite-ir] => route(direct)
INFO[0005] [1930231768 2ms] outbound/direct[direct]: outbound connection to myadd.ir:443
DEBUG[0005] [1930231768 2ms] dns: lookup domain myadd.ir
DEBUG[0005] [1930231768 11ms] dns: exchanged myadd.ir NOERROR 0
DEBUG[0005] [1930231768 20ms] dns: exchanged myadd.ir NOERROR 30
DEBUG[0005] [1930231768 35ms] dns: exchanged A myadd.ir. 30 IN A 185.231.65.63
DEBUG[0005] [1930231768 35ms] dns: lookup succeed for myadd.ir: 185.231.65.63
INFO[0005] router: found process path: C:\Throne\ThroneCore.exe
INFO[0005] [3049139582 0ms] inbound/tun[tun-in]: inbound connection from 192.168.1.3:51673
INFO[0005] [3049139582 0ms] inbound/tun[tun-in]: inbound connection to 185.231.65.63:443
INFO[0005] [3049139582 0ms] router: found process path: C:\Throne\ThroneCore.exe
DEBUG[0005] [3049139582 0ms] router: match[3] process_path=C:\Throne\ThroneCore.exe => route(direct)
INFO[0005] [3049139582 0ms] outbound/direct[direct]: outbound connection to 185.231.65.63:443
INFO[0005] router: found process path: C:\Throne\ThroneCore.exe
INFO[0005] [1086738790 0ms] inbound/tun[tun-in]: inbound connection from 192.168.1.3:51674
INFO[0005] [1086738790 0ms] inbound/tun[tun-in]: inbound connection to 185.231.65.63:443
INFO[0005] [1086738790 0ms] router: found process path: C:\Throne\ThroneCore.exe
DEBUG[0005] [1086738790 0ms] router: match[3] process_path=C:\Throne\ThroneCore.exe => route(direct)
INFO[0005] [1086738790 0ms] outbound/direct[direct]: outbound connection to 185.231.65.63:443
INFO[0005] router: found process path: C:\Throne\ThroneCore.exe
INFO[0005] [3254445648 0ms] inbound/tun[tun-in]: inbound connection from 192.168.1.3:51675
INFO[0005] [3254445648 0ms] inbound/tun[tun-in]: inbound connection to 185.231.65.63:443
INFO[0005] [3254445648 0ms] router: found process path: C:\Throne\ThroneCore.exe
DEBUG[0005] [3254445648 0ms] router: match[3] process_path=C:\Throne\ThroneCore.exe => route(direct)
INFO[0005] [3254445648 0ms] outbound/direct[direct]: outbound connection to 185.231.65.63:443
Routing profile
[{
"action": "hijack-dns",
"protocol": "dns"
}
,{
"action": "route",
"ip_is_private": true,
"outbound": "direct"
}
,{
"action": "route",
"outbound": "direct",
"rule_set": [
"geoip-ir",
"geosite-ir"
]
}
]
Default outbound
proxy
URL list
Operating system
Windows
System version
11 25H2 10.0.26200.8117
Installation type
zip
Version
1.1.2
Description
I created a clean copy of Throne then added a socks proxy
socks5://192.168.1.50:10808#SocksThe server is running on another host in my local network.
The only changes that were made are DNS: udp://8.8.8.8 and downloaded profile Bypass_Iran.
Then started throne in Tun mode.
accessing foreign servers are fine. but accessing any Iranian website causes massive routing loop and high cpu usage.
To test I issued a single request using this command:
curl --socks5-hostname 127.0.0.1:2080 https://myadd.irThe log file is very large. please see from line 96 onwards.
Bypass_iran.log
Note that using Proxy mode has no issues, it only happens in Tun mode.
This is the looped part:
Routing profile
[{ "action": "hijack-dns", "protocol": "dns" } ,{ "action": "route", "ip_is_private": true, "outbound": "direct" } ,{ "action": "route", "outbound": "direct", "rule_set": [ "geoip-ir", "geosite-ir" ] } ]Default outbound
proxy
URL list