服务端是华为云 ECS 主机,使用 udp2raw faketcp 协议伪装了 wireguard,由于 ECS 无公网 IP, 使用一个 BGP 的公网 IP 转发了 udp2raw 的端口, 服务端开启 fakehttp
客户端上海联通,使用 udp2raw 和转发后的公网 IP 成功建立连接,wireguard 也能成功连上,fakehttp 在握手的时候也能看到 FAKE(*) 日志,但是依然未能突破限速:
➜ fakehttp-linux-x86_64 ./fakehttp -e creator.douyin.com -e p3-pc-sign.douyinpic.com -e upos-sz-mirrorcos.bilivideo.com -e member.bilibili.com -e pan.wo.cn -e vd3.bdstatic.com -e iservice.10010.com -e i0.hdslb.com -e i1.hdslb.com -e www.speedtest.cn -e cloud.189.cn -i eth0
2026-04-30 11:13:59 [src/mainfun.c:382] FakeHTTP version 0.9.18
2026-04-30 11:13:59 [src/mainfun.c:383]
2026-04-30 11:13:59 [src/mainfun.c:384] FakeHTTP is free software licensed under the GPLv3.
2026-04-30 11:13:59 [src/mainfun.c:385] Distribution without the accompanying source code is not permitted.
2026-04-30 11:13:59 [src/mainfun.c:386]
2026-04-30 11:13:59 [src/mainfun.c:387] Home page: https://github.com/MikeWang000000/FakeHTTP
2026-04-30 11:13:59 [src/mainfun.c:388]
2026-04-30 11:13:59 [src/nfrules.c:051] WARNING: Falling back to iptables command, as nft command is not working.
2026-04-30 11:13:59 [src/mainfun.c:455] listening on eth0, netfilter queue number 512...
2026-04-30 11:14:27 [src/rawsend.c:496] 112.*.*.10:2089 ===SYN===> 172.16.50.52:4596
2026-04-30 11:14:27 [src/rawsend.c:449] 112.*.*.10:2089 <===FAKE(*)=== 172.16.50.52:4596
2026-04-30 11:14:27 [src/rawsend.c:475] 112.*.*.10:2089 <===SYN-ACK=== 172.16.50.52:4596
2026-04-30 11:14:27 [src/rawsend.c:530] 112.*.*.10:2089 ===(~)===> 172.16.50.52:4596
2026-04-30 11:14:27 [src/rawsend.c:530] 112.*.*.10:2089 ===(~)===> 172.16.50.52:4596
➜ : iperf3 -c 172.16.50.52
Connecting to host 172.16.50.52, port 5201
[ 4] local 192.168.6.3 port 14838 connected to 172.16.50.52 port 5201
[ ID] Interval Transfer Bandwidth
[ 4] 0.00-1.00 sec 1.50 MBytes 12.5 Mbits/sec
[ 4] 1.00-2.01 sec 384 KBytes 3.12 Mbits/sec
[ 4] 2.01-3.01 sec 512 KBytes 4.21 Mbits/sec
[ 4] 3.01-4.00 sec 384 KBytes 3.16 Mbits/sec
[ 4] 4.00-5.00 sec 512 KBytes 4.21 Mbits/sec
[ 4] 5.00-6.01 sec 512 KBytes 4.15 Mbits/sec
[ 4] 6.01-7.01 sec 256 KBytes 2.10 Mbits/sec
[ 4] 7.01-8.01 sec 512 KBytes 4.20 Mbits/sec
[ 4] 8.01-9.00 sec 512 KBytes 4.22 Mbits/sec
[ 4] 9.00-10.00 sec 512 KBytes 4.20 Mbits/sec
- - - - - - - - - - - - - - - - - - - - - - - - -
[ ID] Interval Transfer Bandwidth
[ 4] 0.00-10.00 sec 5.50 MBytes 4.61 Mbits/sec sender
[ 4] 0.00-10.00 sec 5.35 MBytes 4.49 Mbits/sec receiver
iperf Done.
所以很疑惑,是不是通过端口转发之后就失效了,必须有公网 IP 的网口监听才有效果,请各路大佬解答,感谢🙏
服务端是华为云 ECS 主机,使用 udp2raw faketcp 协议伪装了 wireguard,由于 ECS 无公网 IP, 使用一个 BGP 的公网 IP 转发了 udp2raw 的端口, 服务端开启 fakehttp
客户端上海联通,使用 udp2raw 和转发后的公网 IP 成功建立连接,wireguard 也能成功连上,fakehttp 在握手的时候也能看到 FAKE(*) 日志,但是依然未能突破限速:
所以很疑惑,是不是通过端口转发之后就失效了,必须有公网 IP 的网口监听才有效果,请各路大佬解答,感谢🙏