Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bug: wireguard - adding ipv6 rule: file exists #2521

Open
Ttfgggf opened this issue Oct 13, 2024 · 12 comments
Open

Bug: wireguard - adding ipv6 rule: file exists #2521

Ttfgggf opened this issue Oct 13, 2024 · 12 comments

Comments

@Ttfgggf
Copy link

Ttfgggf commented Oct 13, 2024

Is this urgent?

None

Host OS

Fedora 40

CPU arch

x86_64

VPN service provider

AirVPN

What are you using to run the container

Podman

What is the version of Gluetun

Running version latest built on 2024-10-11T18:31:08.386Z (commit abe9dcb)

What's the problem 🤔

The problem is a similar to one to #1991.
I made a change to my Podman Quadlet file and it stopped working although it was working before.

Share your logs (at least 10 lines)

========================================
========================================
=============== gluetun ================
========================================
=========== Made with ❤️ by ============
======= https://github.com/qdm12 =======
========================================
========================================

Running version latest built on 2024-10-11T18:31:08.386Z (commit abe9dcb)

📣 All control server routes will become private by default after the v3.41.0 release

🔧 Need help? ☕ Discussion? https://github.com/qdm12/gluetun/discussions/new/choose
🐛 Bug? ✨ New feature? https://github.com/qdm12/gluetun/issues/new/choose
💻 Email? [email protected]
💰 Help me? https://www.paypal.me/qmcgaw https://github.com/sponsors/qdm12
2024-10-13T23:14:43+01:00 INFO [routing] default route found: interface eth0, gateway 10.30.0.1, assigned IP 10.30.0.68 and family v4
2024-10-13T23:14:43+01:00 INFO [routing] default route found: interface eth0, gateway fd38:753:6ed4:4540::1, assigned IP fd38:753:6ed4:4540::44 and family v6
2024-10-13T23:14:43+01:00 INFO [routing] local ethernet link found: eth0
2024-10-13T23:14:43+01:00 INFO [routing] local ipnet found: 10.30.0.0/24
2024-10-13T23:14:43+01:00 INFO [routing] local ipnet found: fd38:753:6ed4:4540::/64
2024-10-13T23:14:43+01:00 INFO [routing] local ipnet found: fe80::/64
2024-10-13T23:15:58+01:00 INFO [firewall] enabling...
2024-10-13T23:15:59+01:00 INFO [firewall] enabled successfully
2024-10-13T23:15:59+01:00 INFO [storage] merging by most recent 20553 hardcoded servers and 20553 servers read from /gluetun/servers.json
2024-10-13T23:15:59+01:00 INFO Alpine version: 3.20.3
2024-10-13T23:15:59+01:00 INFO OpenVPN 2.5 version: 2.5.10
2024-10-13T23:15:59+01:00 INFO OpenVPN 2.6 version: 2.6.11
2024-10-13T23:15:59+01:00 INFO IPtables version: v1.8.10
2024-10-13T23:15:59+01:00 INFO Settings summary:
├── VPN settings:
|   ├── VPN provider settings:
|   |   ├── Name: airvpn
|   |   └── Server selection settings:
|   |       ├── VPN type: wireguard
|   |       ├── Cities: London
|   |       └── Wireguard selection settings:
|   └── Wireguard settings:
|       ├── Private key: #Blanked
|       ├── Pre-shared key: #Blanked
|       ├── Interface addresses:
|       |   ├── 10.182.169.209/32
|       |   └── fd7d:76ee:e68f:a993:d3e0:138a:9151:3c9a/128
|       ├── Allowed IPs:
|       |   ├── 0.0.0.0/0
|       |   └── ::/0
|       └── Network interface: tun0
|           └── MTU: 1400
├── DNS settings:
|   ├── Keep existing nameserver(s): no
|   ├── DNS server address to use: 127.0.0.1
|   └── DNS over TLS settings:
|       ├── Enabled: yes
|       ├── Update period: every 24h0m0s
|       ├── Upstream resolvers:
|       |   ├── cloudflare
|       |   └── quad9
|       ├── Caching: yes
|       ├── IPv6: yes
|       └── DNS filtering settings:
|           ├── Block malicious: yes
|           ├── Block ads: no
|           ├── Block surveillance: no
|           └── Blocked IP networks:
|               ├── 127.0.0.1/8
|               ├── 10.0.0.0/8
|               ├── 172.16.0.0/12
|               ├── 192.168.0.0/16
|               ├── 169.254.0.0/16
|               ├── ::1/128
|               ├── fc00::/7
|               ├── fe80::/10
|               ├── ::ffff:127.0.0.1/104
|               ├── ::ffff:10.0.0.0/104
|               ├── ::ffff:169.254.0.0/112
|               ├── ::ffff:172.16.0.0/108
|               └── ::ffff:192.168.0.0/112
├── Firewall settings:
|   ├── Enabled: yes
|   ├── VPN input ports:
|   |   ├── 12636
|   |   └── 32400
|   └── Outbound subnets:
|       └── 10.0.0.0/8
├── Log settings:
|   └── Log level: info
├── Health settings:
|   ├── Server listening address: 127.0.0.1:9999
|   ├── Target address: cloudflare.com:443
|   ├── Duration to wait after success: 5s
|   ├── Read header timeout: 100ms
|   ├── Read timeout: 500ms
|   └── VPN wait durations:
|       ├── Initial duration: 6s
|       └── Additional duration: 5s
├── Shadowsocks server settings:
|   ├── Enabled: yes
|   ├── Listening address: :8388
|   ├── Cipher: chacha20-ietf-poly1305
|   ├── Password: [not set]
|   └── Log addresses: no
├── HTTP proxy settings:
|   ├── Enabled: yes
|   ├── Listening address: :8888
|   ├── User: 
|   ├── Password: [not set]
|   ├── Stealth mode: no
|   ├── Log: no
|   ├── Read header timeout: 1s
|   └── Read timeout: 3s
├── Control server settings:
|   ├── Listening address: :8000
|   ├── Logging: yes
|   └── Authentication file path: /gluetun/auth/config.toml
├── Storage settings:
|   └── Filepath: /gluetun/servers.json
├── OS Alpine settings:
|   ├── Process UID: 1000
|   ├── Process GID: 1002
|   └── Timezone: Europe/London
├── Public IP settings:
|   ├── IP file path: /tmp/gluetun/ip
|   └── Public IP data API: ipinfo
├── Server data updater settings:
|   ├── Update period: 24h0m0s
|   ├── DNS address: 1.1.1.1:53
|   ├── Minimum ratio: 0.8
|   └── Providers to update: airvpn
└── Version settings:
    └── Enabled: yes
2024-10-13T23:15:59+01:00 INFO [routing] default route found: interface eth0, gateway 10.30.0.1, assigned IP 10.30.0.68 and family v4
2024-10-13T23:15:59+01:00 INFO [routing] default route found: interface eth0, gateway fd38:753:6ed4:4540::1, assigned IP fd38:753:6ed4:4540::44 and family v6
2024-10-13T23:15:59+01:00 INFO [routing] adding route for 0.0.0.0/0
2024-10-13T23:15:59+01:00 INFO [routing] adding route for ::/0
2024-10-13T23:15:59+01:00 INFO [firewall] setting allowed subnets...
2024-10-13T23:15:59+01:00 INFO [routing] default route found: interface eth0, gateway 10.30.0.1, assigned IP 10.30.0.68 and family v4
2024-10-13T23:15:59+01:00 INFO [routing] default route found: interface eth0, gateway fd38:753:6ed4:4540::1, assigned IP fd38:753:6ed4:4540::44 and family v6
2024-10-13T23:15:59+01:00 INFO [routing] adding route for 10.0.0.0/8
2024-10-13T23:15:59+01:00 INFO [dns] using plaintext DNS at address 1.1.1.1
2024-10-13T23:15:59+01:00 INFO [http proxy] listening on :8888
2024-10-13T23:15:59+01:00 INFO [http server] http server listening on [::]:8000
2024-10-13T23:15:59+01:00 INFO [healthcheck] listening on 127.0.0.1:9999
2024-10-13T23:15:59+01:00 INFO [firewall] allowing VPN connection...
2024-10-13T23:15:59+01:00 INFO [shadowsocks] listening TCP on [::]:8388
2024-10-13T23:15:59+01:00 INFO [shadowsocks] listening UDP on [::]:8388
2024-10-13T23:15:59+01:00 INFO [wireguard] Using available kernelspace implementation
2024-10-13T23:15:59+01:00 INFO [wireguard] Connecting to [IPV6 Address Here]:1637
2024-10-13T23:15:59+01:00 ERROR [vpn] adding IPv6 rule: adding rule ip rule 101: from all to all table 51820: file exists
2024-10-13T23:15:59+01:00 INFO [vpn] retrying in 15s
2024-10-13T23:16:05+01:00 INFO [healthcheck] program has been unhealthy for 6s: restarting VPN
2024-10-13T23:16:05+01:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-13T23:16:05+01:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-13T23:16:14+01:00 INFO [firewall] allowing VPN connection...
2024-10-13T23:16:14+01:00 INFO [wireguard] Using available kernelspace implementation
2024-10-13T23:16:14+01:00 INFO [wireguard] Connecting to [2001:ac8:31:254:6a6c:3102:80b:f49c]:1637
2024-10-13T23:16:14+01:00 ERROR [vpn] adding IPv6 rule: adding rule ip rule 101: from all to all table 51820: file exists
2024-10-13T23:16:14+01:00 INFO [vpn] retrying in 30s
2024-10-13T23:16:19+01:00 INFO [healthcheck] program has been unhealthy for 11s: restarting VPN
2024-10-13T23:16:19+01:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-13T23:16:19+01:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-13T23:16:35+01:00 INFO [healthcheck] program has been unhealthy for 16s: restarting VPN
2024-10-13T23:16:35+01:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-13T23:16:35+01:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-13T23:16:44+01:00 INFO [firewall] allowing VPN connection...
2024-10-13T23:16:44+01:00 INFO [wireguard] Using available kernelspace implementation
2024-10-13T23:16:44+01:00 INFO [wireguard] Connecting to [IPV6 Address Here]:1637
2024-10-13T23:16:44+01:00 ERROR [vpn] adding IPv6 rule: adding rule ip rule 101: from all to all table 51820: file exists
2024-10-13T23:16:44+01:00 INFO [vpn] retrying in 1m0s
2024-10-13T23:16:56+01:00 INFO [healthcheck] program has been unhealthy for 21s: restarting VPN
2024-10-13T23:16:56+01:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-13T23:16:56+01:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-13T23:17:22+01:00 INFO [healthcheck] program has been unhealthy for 26s: restarting VPN
2024-10-13T23:17:22+01:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-13T23:17:22+01:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-13T23:17:44+01:00 INFO [firewall] allowing VPN connection...
2024-10-13T23:17:44+01:00 INFO [wireguard] Using available kernelspace implementation
2024-10-13T23:17:44+01:00 INFO [wireguard] Connecting to [IPV6 Address Here]:1637
2024-10-13T23:17:44+01:00 ERROR [vpn] adding IPv6 rule: adding rule ip rule 101: from all to all table 51820: file exists
2024-10-13T23:17:44+01:00 INFO [vpn] retrying in 2m0s
2024-10-13T23:17:53+01:00 INFO [healthcheck] program has been unhealthy for 31s: restarting VPN
2024-10-13T23:17:53+01:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-13T23:17:53+01:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-13T23:18:29+01:00 INFO [healthcheck] program has been unhealthy for 36s: restarting VPN
2024-10-13T23:18:29+01:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-13T23:18:29+01:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-13T23:19:10+01:00 INFO [healthcheck] program has been unhealthy for 41s: restarting VPN
2024-10-13T23:19:10+01:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-13T23:19:10+01:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-13T23:19:44+01:00 INFO [firewall] allowing VPN connection...
2024-10-13T23:19:44+01:00 INFO [wireguard] Using available kernelspace implementation
2024-10-13T23:19:44+01:00 INFO [wireguard] Connecting to [IPV6 Address Here]:1637
2024-10-13T23:19:44+01:00 ERROR [vpn] adding IPv6 rule: adding rule ip rule 101: from all to all table 51820: file exists
2024-10-13T23:19:44+01:00 INFO [vpn] retrying in 4m0s
2024-10-13T23:19:56+01:00 INFO [healthcheck] program has been unhealthy for 46s: restarting VPN
2024-10-13T23:19:56+01:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-13T23:19:56+01:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-13T23:20:47+01:00 INFO [healthcheck] program has been unhealthy for 51s: restarting VPN
2024-10-13T23:20:47+01:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-13T23:20:47+01:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-13T23:21:43+01:00 INFO [healthcheck] program has been unhealthy for 56s: restarting VPN
2024-10-13T23:21:43+01:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-13T23:21:43+01:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-13T23:22:44+01:00 INFO [healthcheck] program has been unhealthy for 1m1s: restarting VPN
2024-10-13T23:22:44+01:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-13T23:22:44+01:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-13T23:23:44+01:00 INFO [firewall] allowing VPN connection...
2024-10-13T23:23:44+01:00 INFO [wireguard] Using available kernelspace implementation
2024-10-13T23:23:44+01:00 INFO [wireguard] Connecting to IPV4 Address Here:1637
2024-10-13T23:23:44+01:00 ERROR [vpn] adding IPv6 rule: adding rule ip rule 101: from all to all table 51820: file exists
2024-10-13T23:23:44+01:00 INFO [vpn] retrying in 8m0s
2024-10-13T23:23:50+01:00 INFO [healthcheck] program has been unhealthy for 1m6s: restarting VPN
2024-10-13T23:23:50+01:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-13T23:23:50+01:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-13T23:25:01+01:00 INFO [healthcheck] program has been unhealthy for 1m11s: restarting VPN
2024-10-13T23:25:01+01:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-13T23:25:01+01:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-13T23:26:17+01:00 INFO [healthcheck] program has been unhealthy for 1m16s: restarting VPN
2024-10-13T23:26:17+01:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-13T23:26:17+01:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-13T23:27:38+01:00 INFO [healthcheck] program has been unhealthy for 1m21s: restarting VPN
2024-10-13T23:27:38+01:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-13T23:27:38+01:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-13T23:29:04+01:00 INFO [healthcheck] program has been unhealthy for 1m26s: restarting VPN
2024-10-13T23:29:04+01:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-13T23:29:04+01:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-13T23:30:35+01:00 INFO [healthcheck] program has been unhealthy for 1m31s: restarting VPN
2024-10-13T23:30:35+01:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-13T23:30:35+01:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-13T23:31:44+01:00 INFO [firewall] allowing VPN connection...
2024-10-13T23:31:44+01:00 INFO [wireguard] Using available kernelspace implementation
2024-10-13T23:31:44+01:00 INFO [wireguard] Connecting to [2001:ac8:31:362::2]:1637
2024-10-13T23:31:44+01:00 ERROR [vpn] adding IPv6 rule: adding rule ip rule 101: from all to all table 51820: file exists
2024-10-13T23:31:44+01:00 INFO [vpn] retrying in 16m0s

Share your configuration

[Unit]

Description=Gluetun (VPN Connection Container)

[Container]

Image=ghcr.io/qdm12/gluetun:latest

#Network=network1forpodman


Sysctl=net.ipv6.conf.all.disable_ipv6=0

#PublishPort=8888:8888/tcp
#PublishPort=[::]:8888:8888/tcp
#PublishPort=8388:8388/tcp
#PublishPort=[::]:8388:8388/tcp
#PublishPort=8388:8388/udp
#PublishPort=[::]:8388:8388/udp

Pod=thepodforpodman.pod

AutoUpdate=registry

ContainerName=gluetun

#HostName=gluetun

AddCapability=NET_ADMIN

AddDevice=/dev/net/tun:/dev/net/tun

Volume=/hosting/services/podman/gluetun/config:/gluetun:Z

Secret=airvpnwireguardprivatekey,type=mount,uid=1000,gid=1002,target=airvpnwireguardprivatekey
Secret=airvpnwireguardpresharedkey,type=mount,uid=1000,gid=1002,target=airvpnwireguardpresharedkey
Secret=airvpnwireguardaddresses,type=mount,uid=1000,gid=1002,target=airvpnwireguardaddresses


Environment=VPN_SERVICE_PROVIDER=airvpn
Environment=VPN_TYPE=wireguard
Environment=WIREGUARD_PRIVATE_KEY_SECRETFILE=/run/secrets/airvpnwireguardprivatekey
Environment=WIREGUARD_PRESHARED_KEY_SECRETFILE=/run/secrets/airvpnwireguardpresharedkey
Environment=WIREGUARD_ADDRESSES_SECRETFILE=/run/secrets/airvpnwireguardaddresses
Environment=SERVER_CITIES=London
Environment=FIREWALL_VPN_INPUT_PORTS=12636,32400
Environment=TZ=Europe/London
Environment=DOT_PROVIDERS=cloudflare,quad9
Environment=UPDATER_PERIOD=24h
Environment=HTTPPROXY=on
Environment=SHADOWSOCKS=on
Environment=DOT_IPV6=on
Environment=FIREWALL_OUTBOUND_SUBNETS=10.0.0.0/8
#Environment=WIREGUARD_ALLOWED_IPS=10.0.0.0/8,::/0

Environment=PGID=1002
Environment=PUID=1000


[Service]
Restart=always
TimeoutStartSec=900


[Install]
WantedBy=default.target
Copy link
Contributor

@qdm12 is more or less the only maintainer of this project and works on it in his free time.
Please:

@aminerachyd
Copy link

aminerachyd commented Oct 14, 2024

Same issue found recently, can't trace exactly when it started, but I'm getting the same logs.
I'm running gluetun on a Kubernetes pod, using Mullvad VPN with gluetun version 3.38 (and 3.39.1 recently) with Wireguard configuration

@qdm12
Copy link
Owner

qdm12 commented Oct 15, 2024

Oddly it seems that ipv6 rule exists before Gluetun does anything, not too sure why, let's try to find why first.

  1. Can you report the logs running with LOG_LEVEL=debug?
  2. Can you report the output from running the command ip -6 rule within Gluetun
  3. Important: can you report the output from running the command ip -6 rule within an alpine:3.20 container with NET_ADMIN privileges? With dumb docker run that would be docker run --rm --cap-add NET_ADMIN alpine:3.20 ip -6 rule

PS: in case this cannot be fixed, I can change the code to consider "file exists" as yep it has been created ok, but I would prefer to understand the root cause if possible since this isn't normal behavior really. Also I'm inclined to think this is a host system/kernel problem, since other users are running gluetun with ipv6 just fine.

@qdm12 qdm12 changed the title Bug: Similar Issue to previous bug of endless loop of adding IPv6 rule and failing with file exists Bug: wireguard - adding ipv6 rule: file exists Oct 15, 2024
@qdm12
Copy link
Owner

qdm12 commented Oct 15, 2024

I went the extra yard (not mile yet 😄) to have an image tag pr-2526 to run (see #2526) - can you please run it? It should log at the info level all the rules in case it fails to add a rule with error file exists.

@Ttfgggf
Copy link
Author

Ttfgggf commented Oct 15, 2024

I went the extra yard (not mile yet 😄) to have an image tag pr-2526 to run (see #2526) - can you please run it? It should log at the info level all the rules in case it fails to add a rule with error file exists.

Cool. Let me give it a go.

@Ttfgggf
Copy link
Author

Ttfgggf commented Oct 15, 2024

Result of LOG_LEVEL=debug


========================================
=============== gluetun ================
========================================
=========== Made with ❤️ by ============
======= https://github.com/qdm12 =======
========================================
========================================

Running version pr-2526 built on 2024-10-15T14:07:19.546Z (commit a8399fd)

📣 All control server routes will become private by default after the v3.41.0 release

🔧 Need help? ☕ Discussion? https://github.com/qdm12/gluetun/discussions/new/choose
🐛 Bug? ✨ New feature? https://github.com/qdm12/gluetun/issues/new/choose
💻 Email? [email protected]
💰 Help me? https://www.paypal.me/qmcgaw https://github.com/sponsors/qdm12
2024-10-15T17:14:07+01:00 INFO [routing] default route found: interface eth0, gateway 10.30.0.1, assigned IP 10.30.0.145 and family v4
2024-10-15T17:14:07+01:00 INFO [routing] default route found: interface eth0, gateway fd38:753:6ed4:4540::1, assigned IP fd38:753:6ed4:4540::184 and family v6
2024-10-15T17:14:07+01:00 INFO [routing] local ethernet link found: eth0
2024-10-15T17:14:07+01:00 INFO [routing] local ipnet found: 10.30.0.0/24
2024-10-15T17:14:07+01:00 INFO [routing] local ipnet found: fd38:753:6ed4:4540::/64
2024-10-15T17:14:07+01:00 INFO [routing] local ipnet found: fe80::/64
2024-10-15T17:14:07+01:00 INFO [firewall] enabling...
2024-10-15T17:14:07+01:00 INFO [firewall] enabled successfully
2024-10-15T17:14:08+01:00 INFO [storage] merging by most recent 20553 hardcoded servers and 20553 servers read from /gluetun/servers.json
2024-10-15T17:14:08+01:00 INFO Alpine version: 3.20.3
2024-10-15T17:14:08+01:00 INFO OpenVPN 2.5 version: 2.5.10
2024-10-15T17:14:08+01:00 INFO OpenVPN 2.6 version: 2.6.11
2024-10-15T17:14:08+01:00 INFO IPtables version: v1.8.10
2024-10-15T17:14:08+01:00 INFO Settings summary:
├── VPN settings:
|   ├── VPN provider settings:
|   |   ├── Name: airvpn
|   |   └── Server selection settings:
|   |       ├── VPN type: wireguard
|   |       ├── Cities: London
|   |       └── Wireguard selection settings:
|   └── Wireguard settings:
|       ├── Private key: #Blanked
|       ├── Pre-shared key: #Blanked
|       ├── Interface addresses:
|       |   ├── 10.182.169.209/32
|       |   └── fd7d:76ee:e68f:a993:d3e0:138a:9151:3c9a/128
|       ├── Allowed IPs:
|       |   ├── 0.0.0.0/0
|       |   └── ::/0
|       └── Network interface: tun0
|           └── MTU: 1400
├── DNS settings:
|   ├── Keep existing nameserver(s): no
|   ├── DNS server address to use: 127.0.0.1
|   └── DNS over TLS settings:
|       ├── Enabled: yes
|       ├── Update period: every 24h0m0s
|       ├── Upstream resolvers:
|       |   ├── cloudflare
|       |   └── quad9
|       ├── Caching: yes
|       ├── IPv6: yes
|       └── DNS filtering settings:
|           ├── Block malicious: yes
|           ├── Block ads: no
|           ├── Block surveillance: no
|           └── Blocked IP networks:
|               ├── 127.0.0.1/8
|               ├── 10.0.0.0/8
|               ├── 172.16.0.0/12
|               ├── 192.168.0.0/16
|               ├── 169.254.0.0/16
|               ├── ::1/128
|               ├── fc00::/7
|               ├── fe80::/10
|               ├── ::ffff:127.0.0.1/104
|               ├── ::ffff:10.0.0.0/104
|               ├── ::ffff:169.254.0.0/112
|               ├── ::ffff:172.16.0.0/108
|               └── ::ffff:192.168.0.0/112
├── Firewall settings:
|   ├── Enabled: yes
|   ├── VPN input ports:
|   |   ├── 12636
|   |   └── 32400
|   └── Outbound subnets:
|       └── 10.0.0.0/8
├── Log settings:
|   └── Log level: info
├── Health settings:
|   ├── Server listening address: 127.0.0.1:9999
|   ├── Target address: cloudflare.com:443
|   ├── Duration to wait after success: 5s
|   ├── Read header timeout: 100ms
|   ├── Read timeout: 500ms
|   └── VPN wait durations:
|       ├── Initial duration: 6s
|       └── Additional duration: 5s
├── Shadowsocks server settings:
|   ├── Enabled: yes
|   ├── Listening address: :8388
|   ├── Cipher: chacha20-ietf-poly1305
|   ├── Password: [not set]
|   └── Log addresses: no
├── HTTP proxy settings:
|   ├── Enabled: yes
|   ├── Listening address: :8888
|   ├── User: 
|   ├── Password: [not set]
|   ├── Stealth mode: no
|   ├── Log: no
|   ├── Read header timeout: 1s
|   └── Read timeout: 3s
├── Control server settings:
|   ├── Listening address: :8000
|   ├── Logging: yes
|   └── Authentication file path: /gluetun/auth/config.toml
├── Storage settings:
|   └── Filepath: /gluetun/servers.json
├── OS Alpine settings:
|   ├── Process UID: 1000
|   ├── Process GID: 1002
|   └── Timezone: Europe/London
├── Public IP settings:
|   ├── IP file path: /tmp/gluetun/ip
|   └── Public IP data API: ipinfo
├── Server data updater settings:
|   ├── Update period: 24h0m0s
|   ├── DNS address: 1.1.1.1:53
|   ├── Minimum ratio: 0.8
|   └── Providers to update: airvpn
└── Version settings:
    └── Enabled: yes
2024-10-15T17:14:08+01:00 INFO [routing] default route found: interface eth0, gateway 10.30.0.1, assigned IP 10.30.0.145 and family v4
2024-10-15T17:14:08+01:00 INFO [routing] default route found: interface eth0, gateway fd38:753:6ed4:4540::1, assigned IP fd38:753:6ed4:4540::184 and family v6
2024-10-15T17:14:08+01:00 INFO [routing] adding route for 0.0.0.0/0
2024-10-15T17:14:08+01:00 INFO [routing] adding route for ::/0
2024-10-15T17:14:08+01:00 INFO [firewall] setting allowed subnets...
2024-10-15T17:14:08+01:00 INFO [routing] default route found: interface eth0, gateway 10.30.0.1, assigned IP 10.30.0.145 and family v4
2024-10-15T17:14:08+01:00 INFO [routing] default route found: interface eth0, gateway fd38:753:6ed4:4540::1, assigned IP fd38:753:6ed4:4540::184 and family v6
2024-10-15T17:14:08+01:00 INFO [routing] adding route for 10.0.0.0/8
2024-10-15T17:14:08+01:00 INFO [http proxy] listening on :8888
2024-10-15T17:14:08+01:00 INFO [dns] using plaintext DNS at address 1.1.1.1
2024-10-15T17:14:08+01:00 INFO [http server] http server listening on [::]:8000
2024-10-15T17:14:08+01:00 INFO [healthcheck] listening on 127.0.0.1:9999
2024-10-15T17:14:08+01:00 INFO [firewall] allowing VPN connection...
2024-10-15T17:14:08+01:00 INFO [shadowsocks] listening TCP on [::]:8388
2024-10-15T17:14:08+01:00 INFO [shadowsocks] listening UDP on [::]:8388
2024-10-15T17:14:08+01:00 INFO [wireguard] Using available kernelspace implementation
2024-10-15T17:14:08+01:00 INFO [wireguard] Connecting to 217.138.195.18:1637
2024-10-15T17:14:08+01:00 INFO [wireguard] Wireguard setup is complete. Note Wireguard is a silent protocol and it may or may not work, without giving any error message. Typically i/o timeout errors indicate the Wireguard connection is not working.
2024-10-15T17:14:08+01:00 INFO [firewall] setting allowed input port 12636 through interface tun0...
2024-10-15T17:14:08+01:00 INFO [firewall] setting allowed input port 32400 through interface tun0...
2024-10-15T17:14:08+01:00 INFO [dns] downloading hostnames and IP block lists
2024-10-15T17:14:09+01:00 INFO [dns] DNS server listening on [::]:53
2024-10-15T17:14:09+01:00 INFO [dns] ready
2024-10-15T17:14:09+01:00 INFO [healthcheck] healthy!
2024-10-15T17:14:09+01:00 INFO [ip getter] Public IP address is 217.138.195.19 (United Kingdom, England, London)
2024-10-15T17:14:10+01:00 INFO [vpn] There is a new release v3.39.1 (v3.39.1) created 15 days ago
2024-10-15T17:14:23+01:00 INFO [healthcheck] healthy!
2024-10-15T17:18:01+01:00 INFO [healthcheck] healthy!

Result of ip -6 rule within the container command

/ # ip -6 rule
0:      from all lookup local
98:     from all to fd38:753:6ed4:4540::/64 lookup main
98:     from all to fe80::/64 lookup main
100:    from fd38:753:6ed4:4540::184 lookup 200
101:    not from all fwmark 0xca6c lookup 51820
32766:  from all lookup main
/ # 

Result of podman run --rm --cap-add NET_ADMIN alpine:3.20 ip -6 rule

root@example:/etc/containers/systemd# podman run --rm --cap-add NET_ADMIN alpine:3.20 ip -6 rule
Resolved "alpine" as an alias (/etc/containers/registries.conf.d/000-shortnames.conf)
Trying to pull docker.io/library/alpine:3.20...
Getting image source signatures
Copying blob 43c4264eed91 skipped: already exists  
Copying config 91ef0af61f done   | 
Writing manifest to image destination
0:      from all lookup local 
32766:  from all lookup main 
root@example:/etc/containers/systemd# 

@Ttfgggf
Copy link
Author

Ttfgggf commented Oct 15, 2024

I went the extra yard (not mile yet 😄) to have an image tag pr-2526 to run (see #2526) - can you please run it? It should log at the info level all the rules in case it fails to add a rule with error file exists.

Just to add to the above info. At the moment while Gluetun isn't connected to the rest of the containers that I am running on Fedora there is a VPN connected to the Host of the containers via opnSENSE Wireguard Selective Routing. So maybe that is affecting the containers . Additionally, I run ULAs IPv6 Addresses internally on my LAN. So that is why you may see it is successful in the logs, but I am not 100% sure if that will affect it.

@qdm12
Copy link
Owner

qdm12 commented Oct 15, 2024

@Ttfgggf Wait I'm a bit confused, why is the container not crashing in the last logs you shared with the error [vpn] adding IPv6 rule: adding rule ip rule 101: from all to all table 51820: file exists on the first try, and it seems to succeed?

@Ttfgggf
Copy link
Author

Ttfgggf commented Oct 15, 2024

@Ttfgggf Wait I'm a bit confused, why is the container not crashing in the last logs you shared with the error [vpn] adding IPv6 rule: adding rule ip rule 101: from all to all table 51820: file exists on the first try, and it seems to succeed?

Not sure to be honest, but it has crashed. Could SELinux be affecting it?

Right now nothing is connected to the gluetun container. But there is another AirVPN connection to the machine hosting gluetun is using in the meantime. With a Local ULA for IPV6 and an IPV4 address.

@leovanalphen
Copy link

leovanalphen commented Oct 16, 2024

I'm running into the same issue. Tried to run pr-2526 image but get the same behavior.
Logs:

2024-10-16T12:40:43.054436502Z 2024-10-16T12:40:43Z DEBUG [wireguard] Wireguard client private key: cL5...Fg=
2024-10-16T12:40:43.054439721Z 2024-10-16T12:40:43Z DEBUG [wireguard] Wireguard pre-shared key: [not set]
2024-10-16T12:40:43.054442233Z 2024-10-16T12:40:43Z INFO [firewall] allowing VPN connection...
2024-10-16T12:40:43.054516338Z 2024-10-16T12:40:43Z INFO [wireguard] Using available kernelspace implementation
2024-10-16T12:40:43.055384038Z 2024-10-16T12:40:43Z INFO [wireguard] Connecting to 138.199.6.179:51820
2024-10-16T12:40:43.055658450Z 2024-10-16T12:40:43Z INFO [wireguard] existing rules are:
2024-10-16T12:40:43.055665878Z ip rule 0: from all to all table 255
2024-10-16T12:40:43.055670121Z ip rule 98: from all to fe80::/64 table 254
2024-10-16T12:40:43.055672327Z ip rule 101: from all to all table 51820
2024-10-16T12:40:43.055674562Z ip rule 32766: from all to all table 254
2024-10-16T12:40:43.055676924Z 2024-10-16T12:40:43Z DEBUG [wireguard] closing controller client...
2024-10-16T12:40:43.055682765Z 2024-10-16T12:40:43Z DEBUG [wireguard] shutting down link...
2024-10-16T12:40:43.055703579Z 2024-10-16T12:40:43Z ERROR [vpn] adding IPv6 rule: adding rule ip rule 101: from all to all table 51820: file exists
2024-10-16T12:40:43.055724206Z 2024-10-16T12:40:43Z INFO [vpn] retrying in 30s
2024-10-16T12:40:43.093039887Z 2024-10-16T12:40:43Z DEBUG [wireguard] deleting link...
2024-10-16T12:40:07.475309839Z ========================================
2024-10-16T12:40:07.475336998Z ========================================
2024-10-16T12:40:07.475341192Z =============== gluetun ================
2024-10-16T12:40:07.475343569Z ========================================
2024-10-16T12:40:07.475345760Z =========== Made with ❤️ by ============
2024-10-16T12:40:07.475347916Z ======= https://github.com/qdm12 =======
2024-10-16T12:40:07.475350059Z ========================================
2024-10-16T12:40:07.475352178Z ========================================
2024-10-16T12:40:07.475354210Z 
2024-10-16T12:40:07.475357138Z Running version pr-2526 built on 2024-10-15T14:07:19.546Z (commit a8399fd)
2024-10-16T12:40:07.475359160Z 
2024-10-16T12:40:07.475362047Z 📣 All control server routes will become private by default after the v3.41.0 release
2024-10-16T12:40:07.475363996Z 
2024-10-16T12:40:07.475366138Z 🔧 Need help? ☕ Discussion? https://github.com/qdm12/gluetun/discussions/new/choose
2024-10-16T12:40:07.475368290Z 🐛 Bug? ✨ New feature? https://github.com/qdm12/gluetun/issues/new/choose
2024-10-16T12:40:07.475370567Z 💻 Email? [email protected]
2024-10-16T12:40:07.475372812Z 💰 Help me? https://www.paypal.me/qmcgaw https://github.com/sponsors/qdm12
2024-10-16T12:40:07.475545163Z 2024-10-16T12:40:07Z WARN You are using the old environment variable UID, please consider changing it to PUID
2024-10-16T12:40:07.475549196Z 2024-10-16T12:40:07Z WARN You are using the old environment variable GID, please consider changing it to PGID
2024-10-16T12:40:07.477295887Z 2024-10-16T12:40:07Z INFO [routing] default route found: interface eth0, gateway 172.16.0.202, assigned IP 172.16.0.205 and family v4
2024-10-16T12:40:07.477574440Z 2024-10-16T12:40:07Z INFO [routing] local ethernet link found: eth0
2024-10-16T12:40:07.477639200Z 2024-10-16T12:40:07Z INFO [routing] local ipnet found: 172.16.0.202/32
2024-10-16T12:40:07.477757490Z 2024-10-16T12:40:07Z INFO [routing] local ipnet found: fe80::/64
2024-10-16T12:40:27.577557050Z 2024-10-16T12:40:27Z INFO [firewall] enabling...
2024-10-16T12:40:27.577677306Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/iptables --policy INPUT DROP
2024-10-16T12:40:27.601631469Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/iptables --policy OUTPUT DROP
2024-10-16T12:40:27.625594992Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/iptables --policy FORWARD DROP
2024-10-16T12:40:27.629280065Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/ip6tables --policy INPUT DROP
2024-10-16T12:40:27.682107799Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/ip6tables --policy OUTPUT DROP
2024-10-16T12:40:27.705764923Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/ip6tables --policy FORWARD DROP
2024-10-16T12:40:27.709618319Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/iptables --append INPUT -i lo -j ACCEPT
2024-10-16T12:40:27.714585041Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i lo -j ACCEPT
2024-10-16T12:40:27.720091815Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/iptables --append OUTPUT -o lo -j ACCEPT
2024-10-16T12:40:27.728740546Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/ip6tables --append OUTPUT -o lo -j ACCEPT
2024-10-16T12:40:27.731549164Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/iptables --append OUTPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
2024-10-16T12:40:27.734377519Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/ip6tables --append OUTPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
2024-10-16T12:40:27.737391650Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/iptables --append INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
2024-10-16T12:40:27.740272251Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/ip6tables --append INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
2024-10-16T12:40:27.742068981Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/iptables --append OUTPUT -o eth0 -s 172.16.0.205 -d 172.16.0.202/32 -j ACCEPT
2024-10-16T12:40:27.743828602Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/ip6tables --append OUTPUT -o eth0 -d ff02::1:ff00:0/104 -j ACCEPT
2024-10-16T12:40:27.745657961Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/ip6tables --append OUTPUT -o eth0 -s fe80::3819:6eff:fe64:cc42 -d fe80::/64 -j ACCEPT
2024-10-16T12:40:27.747117175Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/iptables --append INPUT -i eth0 -d 172.16.0.202/32 -j ACCEPT
2024-10-16T12:40:27.748374386Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i eth0 -d fe80::/64 -j ACCEPT
2024-10-16T12:40:27.749710005Z 2024-10-16T12:40:27Z INFO [firewall] enabled successfully
2024-10-16T12:40:27.955901978Z 2024-10-16T12:40:27Z INFO [storage] creating /gluetun/servers.json with 20553 hardcoded servers
2024-10-16T12:40:28.033473187Z 2024-10-16T12:40:28Z DEBUG [netlink] IPv6 is supported by link eth0
2024-10-16T12:40:28.033575378Z 2024-10-16T12:40:28Z INFO Alpine version: 3.20.3
2024-10-16T12:40:28.035868623Z 2024-10-16T12:40:28Z INFO OpenVPN 2.5 version: 2.5.10
2024-10-16T12:40:28.037733866Z 2024-10-16T12:40:28Z INFO OpenVPN 2.6 version: 2.6.11
2024-10-16T12:40:28.038451984Z 2024-10-16T12:40:28Z INFO IPtables version: v1.8.10
2024-10-16T12:40:28.038589555Z 2024-10-16T12:40:28Z INFO Settings summary:
2024-10-16T12:40:28.038596343Z ├── VPN settings:
2024-10-16T12:40:28.038600122Z |   ├── VPN provider settings:
2024-10-16T12:40:28.038603151Z |   |   ├── Name: custom
2024-10-16T12:40:28.038606214Z |   |   ├── Server selection settings:
2024-10-16T12:40:28.038609564Z |   |   |   ├── VPN type: wireguard
2024-10-16T12:40:28.038612933Z |   |   |   └── Wireguard selection settings:
2024-10-16T12:40:28.038616449Z |   |   |       ├── Endpoint IP address: 138.199.6.179
2024-10-16T12:40:28.038619903Z |   |   |       ├── Endpoint port: 51820
2024-10-16T12:40:28.038623168Z |   |   |       └── Server public key: +WRsjA7z/PQqasrqiUVo3Tug+go7W2DXjO2p3TTeagk=
2024-10-16T12:40:28.038626714Z |   |   └── Automatic port forwarding settings:
2024-10-16T12:40:28.038630194Z |   |       ├── Redirection listening port: disabled
2024-10-16T12:40:28.038633233Z |   |       ├── Use code for provider: protonvpn
2024-10-16T12:40:28.038636044Z |   |       └── Forwarded port file path: /tmp/gluetun/forwarded_port
2024-10-16T12:40:28.038638716Z |   └── Wireguard settings:
2024-10-16T12:40:28.038641311Z |       ├── Private key: cL5...Fg=
2024-10-16T12:40:28.038644038Z |       ├── Interface addresses:
2024-10-16T12:40:28.038646682Z |       |   └── 10.2.0.2/32
2024-10-16T12:40:28.038649510Z |       ├── Allowed IPs:
2024-10-16T12:40:28.038652354Z |       |   ├── 0.0.0.0/0
2024-10-16T12:40:28.038656719Z |       |   └── ::/0
2024-10-16T12:40:28.038659686Z |       └── Network interface: tun0
2024-10-16T12:40:28.038662651Z |           └── MTU: 1400
2024-10-16T12:40:28.038665406Z ├── DNS settings:
2024-10-16T12:40:28.038668362Z |   ├── Keep existing nameserver(s): no
2024-10-16T12:40:28.038671884Z |   ├── DNS server address to use: 127.0.0.1
2024-10-16T12:40:28.038675050Z |   └── DNS over TLS settings:
2024-10-16T12:40:28.038677993Z |       ├── Enabled: yes
2024-10-16T12:40:28.038681455Z |       ├── Update period: every 24h0m0s
2024-10-16T12:40:28.038684780Z |       ├── Upstream resolvers:
2024-10-16T12:40:28.038687843Z |       |   └── cloudflare
2024-10-16T12:40:28.038695877Z |       ├── Caching: yes
2024-10-16T12:40:28.038698987Z |       ├── IPv6: no
2024-10-16T12:40:28.038702180Z |       └── DNS filtering settings:
2024-10-16T12:40:28.038708668Z |           ├── Block malicious: yes
2024-10-16T12:40:28.038712058Z |           ├── Block ads: no
2024-10-16T12:40:28.038714927Z |           ├── Block surveillance: no
2024-10-16T12:40:28.038717729Z |           └── Blocked IP networks:
2024-10-16T12:40:28.038720353Z |               ├── 127.0.0.1/8
2024-10-16T12:40:28.038723228Z |               ├── 10.0.0.0/8
2024-10-16T12:40:28.038726070Z |               ├── 172.16.0.0/12
2024-10-16T12:40:28.038728823Z |               ├── 192.168.0.0/16
2024-10-16T12:40:28.038731755Z |               ├── 169.254.0.0/16
2024-10-16T12:40:28.038734725Z |               ├── ::1/128
2024-10-16T12:40:28.038737657Z |               ├── fc00::/7
2024-10-16T12:40:28.038740423Z |               ├── fe80::/10
2024-10-16T12:40:28.038742918Z |               ├── ::ffff:127.0.0.1/104
2024-10-16T12:40:28.038745493Z |               ├── ::ffff:10.0.0.0/104
2024-10-16T12:40:28.038748076Z |               ├── ::ffff:169.254.0.0/112
2024-10-16T12:40:28.038750667Z |               ├── ::ffff:172.16.0.0/108
2024-10-16T12:40:28.038753436Z |               └── ::ffff:192.168.0.0/112
2024-10-16T12:40:28.038756341Z ├── Firewall settings:
2024-10-16T12:40:28.038759277Z |   ├── Enabled: yes
2024-10-16T12:40:28.038762089Z |   ├── Debug mode: on
2024-10-16T12:40:28.038764762Z |   ├── Input ports:
2024-10-16T12:40:28.038767305Z |   |   ├── 10095
2024-10-16T12:40:28.038770159Z |   |   └── 8000
2024-10-16T12:40:28.038773185Z |   └── Outbound subnets:
2024-10-16T12:40:28.038776015Z |       ├── 172.16.0.0/16
2024-10-16T12:40:28.038779017Z |       └── 172.17.0.0/16
2024-10-16T12:40:28.038782095Z ├── Log settings:
2024-10-16T12:40:28.038785046Z |   └── Log level: debug
2024-10-16T12:40:28.038787992Z ├── Health settings:
2024-10-16T12:40:28.038792991Z |   ├── Server listening address: 127.0.0.1:9999
2024-10-16T12:40:28.038796287Z |   ├── Target address: cloudflare.com:443
2024-10-16T12:40:28.038799258Z |   ├── Duration to wait after success: 5s
2024-10-16T12:40:28.038802301Z |   ├── Read header timeout: 100ms
2024-10-16T12:40:28.038806017Z |   ├── Read timeout: 500ms
2024-10-16T12:40:28.038808993Z |   └── VPN wait durations:
2024-10-16T12:40:28.038812102Z |       ├── Initial duration: 6s
2024-10-16T12:40:28.038814936Z |       └── Additional duration: 5s
2024-10-16T12:40:28.038818052Z ├── Shadowsocks server settings:
2024-10-16T12:40:28.038820943Z |   └── Enabled: no
2024-10-16T12:40:28.038823767Z ├── HTTP proxy settings:
2024-10-16T12:40:28.038826739Z |   ├── Enabled: yes
2024-10-16T12:40:28.038829842Z |   ├── Listening address: :8888
2024-10-16T12:40:28.038832665Z |   ├── User: 
2024-10-16T12:40:28.038835716Z |   ├── Password: [not set]
2024-10-16T12:40:28.038838612Z |   ├── Stealth mode: no
2024-10-16T12:40:28.038841537Z |   ├── Log: yes
2024-10-16T12:40:28.038844443Z |   ├── Read header timeout: 1s
2024-10-16T12:40:28.038847414Z |   └── Read timeout: 3s
2024-10-16T12:40:28.038850375Z ├── Control server settings:
2024-10-16T12:40:28.038853355Z |   ├── Listening address: :8000
2024-10-16T12:40:28.038856388Z |   ├── Logging: yes
2024-10-16T12:40:28.038862438Z |   └── Authentication file path: /gluetun/auth/config.toml
2024-10-16T12:40:28.038865754Z ├── Storage settings:
2024-10-16T12:40:28.038869069Z |   └── Filepath: /gluetun/servers.json
2024-10-16T12:40:28.038871985Z ├── OS Alpine settings:
2024-10-16T12:40:28.038875241Z |   ├── Process UID: 568
2024-10-16T12:40:28.038879264Z |   ├── Process GID: 568
2024-10-16T12:40:28.038882507Z |   └── Timezone: UTC
2024-10-16T12:40:28.038885904Z ├── Public IP settings:
2024-10-16T12:40:28.038889179Z |   ├── IP file path: /tmp/gluetun/ip
2024-10-16T12:40:28.038892462Z |   └── Public IP data API: ipinfo
2024-10-16T12:40:28.038895946Z └── Version settings:
2024-10-16T12:40:28.038899294Z     └── Enabled: yes
2024-10-16T12:40:28.039164873Z 2024-10-16T12:40:28Z INFO [routing] default route found: interface eth0, gateway 172.16.0.202, assigned IP 172.16.0.205 and family v4
2024-10-16T12:40:28.039171383Z 2024-10-16T12:40:28Z DEBUG [routing] ip rule add from 172.16.0.205/32 lookup 200 pref 100
2024-10-16T12:40:28.039232590Z 2024-10-16T12:40:28Z INFO [routing] adding route for 0.0.0.0/0
2024-10-16T12:40:28.039241883Z 2024-10-16T12:40:28Z DEBUG [routing] ip route replace 0.0.0.0/0 via 172.16.0.202 dev eth0 table 200
2024-10-16T12:40:28.039382167Z 2024-10-16T12:40:28Z INFO [firewall] setting allowed subnets...
2024-10-16T12:40:28.039388337Z 2024-10-16T12:40:28Z DEBUG [firewall] /sbin/iptables --append OUTPUT -o eth0 -s 172.16.0.205 -d 172.16.0.0/16 -j ACCEPT
2024-10-16T12:40:28.040234521Z 2024-10-16T12:40:28Z DEBUG [firewall] /sbin/iptables --append OUTPUT -o eth0 -s 172.16.0.205 -d 172.17.0.0/16 -j ACCEPT
2024-10-16T12:40:28.041291363Z 2024-10-16T12:40:28Z INFO [routing] default route found: interface eth0, gateway 172.16.0.202, assigned IP 172.16.0.205 and family v4
2024-10-16T12:40:28.041308073Z 2024-10-16T12:40:28Z INFO [routing] adding route for 172.16.0.0/16
2024-10-16T12:40:28.041311255Z 2024-10-16T12:40:28Z DEBUG [routing] ip route replace 172.16.0.0/16 via 172.16.0.202 dev eth0 table 199
2024-10-16T12:40:28.041358829Z 2024-10-16T12:40:28Z DEBUG [routing] ip rule add to 172.16.0.0/16 lookup 199 pref 99
2024-10-16T12:40:28.041446216Z 2024-10-16T12:40:28Z INFO [routing] adding route for 172.17.0.0/16
2024-10-16T12:40:28.041505755Z 2024-10-16T12:40:28Z DEBUG [routing] ip route replace 172.17.0.0/16 via 172.16.0.202 dev eth0 table 199
2024-10-16T12:40:28.041582738Z 2024-10-16T12:40:28Z DEBUG [routing] ip rule add to 172.17.0.0/16 lookup 199 pref 99
2024-10-16T12:40:28.041659446Z 2024-10-16T12:40:28Z DEBUG [routing] ip rule add to 172.16.0.202/32 lookup 254 pref 98
2024-10-16T12:40:28.041707241Z 2024-10-16T12:40:28Z DEBUG [routing] ip rule add to fe80::/64 lookup 254 pref 98
2024-10-16T12:40:28.041759895Z 2024-10-16T12:40:28Z INFO TUN device is not available: open /dev/net/tun: no such file or directory; creating it...
2024-10-16T12:40:28.041824104Z 2024-10-16T12:40:28Z INFO [firewall] setting allowed input port 10095 through interface eth0...
2024-10-16T12:40:28.041901668Z 2024-10-16T12:40:28Z DEBUG [firewall] /sbin/iptables --append INPUT -i eth0 -p tcp -m tcp --dport 10095 -j ACCEPT
2024-10-16T12:40:28.042711709Z 2024-10-16T12:40:28Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i eth0 -p tcp -m tcp --dport 10095 -j ACCEPT
2024-10-16T12:40:28.043483668Z 2024-10-16T12:40:28Z DEBUG [firewall] /sbin/iptables --append INPUT -i eth0 -p udp -m udp --dport 10095 -j ACCEPT
2024-10-16T12:40:28.044403791Z 2024-10-16T12:40:28Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i eth0 -p udp -m udp --dport 10095 -j ACCEPT
2024-10-16T12:40:28.045285475Z 2024-10-16T12:40:28Z INFO [firewall] setting allowed input port 8000 through interface eth0...
2024-10-16T12:40:28.045313821Z 2024-10-16T12:40:28Z DEBUG [firewall] /sbin/iptables --append INPUT -i eth0 -p tcp -m tcp --dport 8000 -j ACCEPT
2024-10-16T12:40:28.046422281Z 2024-10-16T12:40:28Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i eth0 -p tcp -m tcp --dport 8000 -j ACCEPT
2024-10-16T12:40:28.047249981Z 2024-10-16T12:40:28Z DEBUG [firewall] /sbin/iptables --append INPUT -i eth0 -p udp -m udp --dport 8000 -j ACCEPT
2024-10-16T12:40:28.048083846Z 2024-10-16T12:40:28Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i eth0 -p udp -m udp --dport 8000 -j ACCEPT
2024-10-16T12:40:28.049122377Z 2024-10-16T12:40:28Z INFO [dns] using plaintext DNS at address 1.1.1.1
2024-10-16T12:40:28.049212872Z 2024-10-16T12:40:28Z INFO [http proxy] listening on :8888
2024-10-16T12:40:28.049405362Z 2024-10-16T12:40:28Z INFO [http server] http server listening on [::]:8000
2024-10-16T12:40:28.049414840Z 2024-10-16T12:40:28Z DEBUG [wireguard] Wireguard server public key: +WRsjA7z/PQqasrqiUVo3Tug+go7W2DXjO2p3TTeagk=
2024-10-16T12:40:28.049417592Z 2024-10-16T12:40:28Z DEBUG [wireguard] Wireguard client private key: cL5...Fg=
2024-10-16T12:40:28.049419755Z 2024-10-16T12:40:28Z DEBUG [wireguard] Wireguard pre-shared key: [not set]
2024-10-16T12:40:28.049422238Z 2024-10-16T12:40:28Z INFO [firewall] allowing VPN connection...
2024-10-16T12:40:28.049428220Z 2024-10-16T12:40:28Z INFO [healthcheck] listening on 127.0.0.1:9999
2024-10-16T12:40:28.049550163Z 2024-10-16T12:40:28Z DEBUG [firewall] /sbin/iptables --append OUTPUT -d 138.199.6.179 -o eth0 -p udp -m udp --dport 51820 -j ACCEPT
2024-10-16T12:40:28.051185445Z 2024-10-16T12:40:28Z DEBUG [firewall] /sbin/iptables --append OUTPUT -o tun0 -j ACCEPT
2024-10-16T12:40:28.052130172Z 2024-10-16T12:40:28Z DEBUG [firewall] /sbin/ip6tables --append OUTPUT -o tun0 -j ACCEPT
2024-10-16T12:40:28.053264417Z 2024-10-16T12:40:28Z INFO [wireguard] Using available kernelspace implementation
2024-10-16T12:40:28.053876589Z 2024-10-16T12:40:28Z INFO [wireguard] Connecting to 138.199.6.179:51820
2024-10-16T12:40:28.054214008Z 2024-10-16T12:40:28Z INFO [wireguard] existing rules are:
2024-10-16T12:40:28.054222099Z ip rule 0: from all to all table 255
2024-10-16T12:40:28.054224930Z ip rule 98: from all to fe80::/64 table 254
2024-10-16T12:40:28.054227106Z ip rule 101: from all to all table 51820
2024-10-16T12:40:28.054230360Z ip rule 32766: from all to all table 254
2024-10-16T12:40:28.054244294Z 2024-10-16T12:40:28Z DEBUG [wireguard] closing controller client...
2024-10-16T12:40:28.054287950Z 2024-10-16T12:40:28Z DEBUG [wireguard] shutting down link...
2024-10-16T12:40:28.054321183Z 2024-10-16T12:40:28Z ERROR [vpn] adding IPv6 rule: adding rule ip rule 101: from all to all table 51820: file exists
2024-10-16T12:40:28.054325582Z 2024-10-16T12:40:28Z INFO [vpn] retrying in 15s
2024-10-16T12:40:28.093583668Z 2024-10-16T12:40:28Z DEBUG [wireguard] deleting link...
2024-10-16T12:40:34.049663697Z 2024-10-16T12:40:34Z INFO [healthcheck] program has been unhealthy for 6s: restarting VPN
2024-10-16T12:40:34.049685918Z 2024-10-16T12:40:34Z INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-16T12:40:34.049689653Z 2024-10-16T12:40:34Z INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-16T12:40:36.804952765Z 2024-10-16T12:40:36Z WARN [http server] route GET /v1/openvpn/portforwarded is unprotected by default, please set up authentication following the documentation at https://github.com/qdm12/gluetun-wiki/setup/advanced/control-server.md#authentication since this will become no longer publicly accessible after release v3.40.
2024-10-16T12:40:36.804979028Z 2024-10-16T12:40:36Z DEBUG [http server] access to route GET /v1/openvpn/portforwarded authorized for role public
2024-10-16T12:40:36.804990115Z 2024-10-16T12:40:36Z INFO [http server] 200 GET /portforwarded wrote 11B to 172.16.0.122:54690 in 43.884µs
2024-10-16T12:40:43.054412189Z 2024-10-16T12:40:43Z DEBUG [wireguard] Wireguard server public key: +WRsjA7z/PQqasrqiUVo3Tug+go7W2DXjO2p3TTeagk=
2024-10-16T12:40:43.054436502Z 2024-10-16T12:40:43Z DEBUG [wireguard] Wireguard client private key: cL5...Fg=
2024-10-16T12:40:43.054439721Z 2024-10-16T12:40:43Z DEBUG [wireguard] Wireguard pre-shared key: [not set]
2024-10-16T12:40:43.054442233Z 2024-10-16T12:40:43Z INFO [firewall] allowing VPN connection...
2024-10-16T12:40:43.054516338Z 2024-10-16T12:40:43Z INFO [wireguard] Using available kernelspace implementation
2024-10-16T12:40:43.055384038Z 2024-10-16T12:40:43Z INFO [wireguard] Connecting to 138.199.6.179:51820
2024-10-16T12:40:43.055658450Z 2024-10-16T12:40:43Z INFO [wireguard] existing rules are:
2024-10-16T12:40:43.055665878Z ip rule 0: from all to all table 255
2024-10-16T12:40:43.055670121Z ip rule 98: from all to fe80::/64 table 254
2024-10-16T12:40:43.055672327Z ip rule 101: from all to all table 51820
2024-10-16T12:40:43.055674562Z ip rule 32766: from all to all table 254
2024-10-16T12:40:43.055676924Z 2024-10-16T12:40:43Z DEBUG [wireguard] closing controller client...
2024-10-16T12:40:43.055682765Z 2024-10-16T12:40:43Z DEBUG [wireguard] shutting down link...
2024-10-16T12:40:43.055703579Z 2024-10-16T12:40:43Z ERROR [vpn] adding IPv6 rule: adding rule ip rule 101: from all to all table 51820: file exists

With provider:custom is fails straight away, when I set the provider to protonvpn the VPN connects, everything works for between 5 tot 20 minutes. Qbittorrent can download with 200mbps in that time, then the VPN becomes unhealthy, restarts and 'bootloops' with the same iptables file exists error from which it never recovers (unless i manually restart the pod, then it works again for sometime before it fails again).

@qdm12
Copy link
Owner

qdm12 commented Oct 19, 2024

Thanks @leovanalphen for trying that image! 👍

I'm running into the same issue. Tried to run pr-2526 image but get the same behavior.

There is no fix in the image, it just logs out existing rules if adding a rule fails with file exists in its error message. And it looks like ip rule 101: from all to all table 51820 is already existing, so it makes sense it fails to add it with file exists. Now, that rule should NOT be present, especially not on a first run.

I've updated the ip rule debug logs to be better than before in commit 3dfb43e which is both in the lastest image and that image tag :pr-2562;
can you please docker pull qmcgaw/gluetun:pr-2562, restart a gluetun container using that image and copy paste the logs (especially the ip rule xxx debug logs) to see what's up? I would really like to find out what wrongly adds that ipv6 rule before it tries to rightfully add it. Thanks!

@leovanalphen
Copy link

@qdm12 No worries, glad to be able to contribute in some way. Thank you for sharing your work with all of us.

I just repulled pr-2526, waited a couple of minutes for the VPN to become unhealthy. And to my surprise this time the HC kicked in, restarted the VPN and it came back up first try. My test transfer over the VPN just kept running with a barely noticeable temporary slow down. So far it has recovered without issue three times. Added my logs below.

I haven't changed anything in my setup other than repull pr-2526. For completeness, I'm running on Kubernetes 1.30 using Talos as underlying OS. Chart I'm using as a base is from truecharts, I just edited the image url to point to pr-2526.

2024-10-19T14:36:25.049984172Z ========================================
2024-10-19T14:36:25.050008555Z ========================================
2024-10-19T14:36:25.050017523Z =============== gluetun ================
2024-10-19T14:36:25.050019941Z ========================================
2024-10-19T14:36:25.050022055Z =========== Made with ❤️ by ============
2024-10-19T14:36:25.050024209Z ======= https://github.com/qdm12 =======
2024-10-19T14:36:25.050026637Z ========================================
2024-10-19T14:36:25.050028770Z ========================================
2024-10-19T14:36:25.050030784Z 
2024-10-19T14:36:25.050033317Z Running version pr-2529 built on 2024-10-19T14:19:51.961Z (commit 4001cf6)
2024-10-19T14:36:25.050035310Z 
2024-10-19T14:36:25.050037632Z 📣 All control server routes will become private by default after the v3.41.0 release
2024-10-19T14:36:25.050039790Z 
2024-10-19T14:36:25.050042210Z 🔧 Need help? ☕ Discussion? https://github.com/qdm12/gluetun/discussions/new/choose
2024-10-19T14:36:25.050044567Z 🐛 Bug? ✨ New feature? https://github.com/qdm12/gluetun/issues/new/choose
2024-10-19T14:36:25.050047010Z 💻 Email? [email protected]
2024-10-19T14:36:25.050049224Z 💰 Help me? https://www.paypal.me/qmcgaw https://github.com/sponsors/qdm12
2024-10-19T14:36:25.050945628Z 2024-10-19T14:36:25Z WARN You are using the old environment variable UID, please consider changing it to PUID
2024-10-19T14:36:25.050962859Z 2024-10-19T14:36:25Z WARN You are using the old environment variable GID, please consider changing it to PGID
2024-10-19T14:36:25.052535989Z 2024-10-19T14:36:25Z INFO [routing] default route found: interface eth0, gateway 172.16.0.202, assigned IP 172.16.0.62 and family v4
2024-10-19T14:36:25.052575217Z 2024-10-19T14:36:25Z INFO [routing] local ethernet link found: eth0
2024-10-19T14:36:25.052613802Z 2024-10-19T14:36:25Z INFO [routing] local ipnet found: 172.16.0.202/32
2024-10-19T14:36:25.052718520Z 2024-10-19T14:36:25Z INFO [routing] local ipnet found: fe80::/64
2024-10-19T14:36:25.146623455Z 2024-10-19T14:36:25Z INFO [firewall] enabling...
2024-10-19T14:36:25.146637575Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/iptables --policy INPUT DROP
2024-10-19T14:36:25.204979987Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/iptables --policy OUTPUT DROP
2024-10-19T14:36:25.227165440Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/iptables --policy FORWARD DROP
2024-10-19T14:36:25.228156179Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/ip6tables --policy INPUT DROP
2024-10-19T14:36:25.260979740Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/ip6tables --policy OUTPUT DROP
2024-10-19T14:36:25.281014825Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/ip6tables --policy FORWARD DROP
2024-10-19T14:36:25.317139847Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/iptables --append INPUT -i lo -j ACCEPT
2024-10-19T14:36:25.318990165Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i lo -j ACCEPT
2024-10-19T14:36:25.320978646Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/iptables --append OUTPUT -o lo -j ACCEPT
2024-10-19T14:36:25.322949630Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/ip6tables --append OUTPUT -o lo -j ACCEPT
2024-10-19T14:36:25.325218726Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/iptables --append OUTPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
2024-10-19T14:36:25.327041761Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/ip6tables --append OUTPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
2024-10-19T14:36:25.328950881Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/iptables --append INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
2024-10-19T14:36:25.331031186Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/ip6tables --append INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
2024-10-19T14:36:25.333081607Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/iptables --append OUTPUT -o eth0 -s 172.16.0.62 -d 172.16.0.202/32 -j ACCEPT
2024-10-19T14:36:25.334685935Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/ip6tables --append OUTPUT -o eth0 -d ff02::1:ff00:0/104 -j ACCEPT
2024-10-19T14:36:25.336529552Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/ip6tables --append OUTPUT -o eth0 -s fe80::9cea:98ff:feee:d0ed -d fe80::/64 -j ACCEPT
2024-10-19T14:36:25.339601480Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/iptables --append INPUT -i eth0 -d 172.16.0.202/32 -j ACCEPT
2024-10-19T14:36:25.341714072Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i eth0 -d fe80::/64 -j ACCEPT
2024-10-19T14:36:25.343119387Z 2024-10-19T14:36:25Z INFO [firewall] enabled successfully
2024-10-19T14:36:25.559304985Z 2024-10-19T14:36:25Z INFO [storage] creating /gluetun/servers.json with 20553 hardcoded servers
2024-10-19T14:36:25.626676880Z 2024-10-19T14:36:25Z DEBUG [netlink] IPv6 is supported by link eth0
2024-10-19T14:36:25.626938722Z 2024-10-19T14:36:25Z INFO Alpine version: 3.20.3
2024-10-19T14:36:25.628602728Z 2024-10-19T14:36:25Z INFO OpenVPN 2.5 version: 2.5.10
2024-10-19T14:36:25.630718359Z 2024-10-19T14:36:25Z INFO OpenVPN 2.6 version: 2.6.11
2024-10-19T14:36:25.631355101Z 2024-10-19T14:36:25Z INFO IPtables version: v1.8.10
2024-10-19T14:36:25.631479927Z 2024-10-19T14:36:25Z INFO Settings summary:
2024-10-19T14:36:25.631487541Z ├── VPN settings:
2024-10-19T14:36:25.631491870Z |   ├── VPN provider settings:
2024-10-19T14:36:25.631496414Z |   |   ├── Name: custom
2024-10-19T14:36:25.631500631Z |   |   ├── Server selection settings:
2024-10-19T14:36:25.631508660Z |   |   |   ├── VPN type: wireguard
2024-10-19T14:36:25.631512726Z |   |   |   └── Wireguard selection settings:
2024-10-19T14:36:25.631517057Z |   |   |       ├── Endpoint IP address: 138.199.6.179
2024-10-19T14:36:25.631521394Z |   |   |       ├── Endpoint port: 51820
2024-10-19T14:36:25.631525634Z |   |   |       └── Server public key: +WRsjA7z/PQqasrqiUVo3Tug+go7W2DXjO2p3TTeagk=
2024-10-19T14:36:25.631529757Z |   |   └── Automatic port forwarding settings:
2024-10-19T14:36:25.631533721Z |   |       ├── Redirection listening port: disabled
2024-10-19T14:36:25.631537605Z |   |       ├── Use code for provider: protonvpn
2024-10-19T14:36:25.631542070Z |   |       └── Forwarded port file path: /tmp/gluetun/forwarded_port
2024-10-19T14:36:25.631546111Z |   └── Wireguard settings:
2024-10-19T14:36:25.631550080Z |       ├── Private key: cL5...Fg=
2024-10-19T14:36:25.631554410Z |       ├── Interface addresses:
2024-10-19T14:36:25.631558396Z |       |   └── 10.2.0.2/32
2024-10-19T14:36:25.631562323Z |       ├── Allowed IPs:
2024-10-19T14:36:25.631566162Z |       |   ├── 0.0.0.0/0
2024-10-19T14:36:25.631569992Z |       |   └── ::/0
2024-10-19T14:36:25.631574493Z |       └── Network interface: tun0
2024-10-19T14:36:25.631579025Z |           └── MTU: 1400
2024-10-19T14:36:25.631583390Z ├── DNS settings:
2024-10-19T14:36:25.631587711Z |   ├── Keep existing nameserver(s): no
2024-10-19T14:36:25.631591870Z |   ├── DNS server address to use: 127.0.0.1
2024-10-19T14:36:25.631595815Z |   └── DNS over TLS settings:
2024-10-19T14:36:25.631599994Z |       ├── Enabled: yes
2024-10-19T14:36:25.631604271Z |       ├── Update period: every 24h0m0s
2024-10-19T14:36:25.631608231Z |       ├── Upstream resolvers:
2024-10-19T14:36:25.631612181Z |       |   └── cloudflare
2024-10-19T14:36:25.631625269Z |       ├── Caching: yes
2024-10-19T14:36:25.631629820Z |       ├── IPv6: no
2024-10-19T14:36:25.631634036Z |       └── DNS filtering settings:
2024-10-19T14:36:25.631638258Z |           ├── Block malicious: yes
2024-10-19T14:36:25.631642619Z |           ├── Block ads: no
2024-10-19T14:36:25.631646588Z |           ├── Block surveillance: no
2024-10-19T14:36:25.631650651Z |           └── Blocked IP networks:
2024-10-19T14:36:25.631654964Z |               ├── 127.0.0.1/8
2024-10-19T14:36:25.631659383Z |               ├── 10.0.0.0/8
2024-10-19T14:36:25.631663314Z |               ├── 172.16.0.0/12
2024-10-19T14:36:25.631667230Z |               ├── 192.168.0.0/16
2024-10-19T14:36:25.631671228Z |               ├── 169.254.0.0/16
2024-10-19T14:36:25.631675547Z |               ├── ::1/128
2024-10-19T14:36:25.631679682Z |               ├── fc00::/7
2024-10-19T14:36:25.631683679Z |               ├── fe80::/10
2024-10-19T14:36:25.631687590Z |               ├── ::ffff:127.0.0.1/104
2024-10-19T14:36:25.631691520Z |               ├── ::ffff:10.0.0.0/104
2024-10-19T14:36:25.631695560Z |               ├── ::ffff:169.254.0.0/112
2024-10-19T14:36:25.631702556Z |               ├── ::ffff:172.16.0.0/108
2024-10-19T14:36:25.631706836Z |               └── ::ffff:192.168.0.0/112
2024-10-19T14:36:25.631711145Z ├── Firewall settings:
2024-10-19T14:36:25.631715213Z |   ├── Enabled: yes
2024-10-19T14:36:25.631719340Z |   ├── Debug mode: on
2024-10-19T14:36:25.631723238Z |   ├── Input ports:
2024-10-19T14:36:25.631727221Z |   |   ├── 10095
2024-10-19T14:36:25.631731517Z |   |   └── 8000
2024-10-19T14:36:25.631735525Z |   └── Outbound subnets:
2024-10-19T14:36:25.631739645Z |       ├── 172.16.0.0/16
2024-10-19T14:36:25.631743842Z |       └── 172.17.0.0/16
2024-10-19T14:36:25.631747854Z ├── Log settings:
2024-10-19T14:36:25.631751568Z |   └── Log level: debug
2024-10-19T14:36:25.631755586Z ├── Health settings:
2024-10-19T14:36:25.631759747Z |   ├── Server listening address: 127.0.0.1:9999
2024-10-19T14:36:25.631763605Z |   ├── Target address: cloudflare.com:443
2024-10-19T14:36:25.631767945Z |   ├── Duration to wait after success: 5s
2024-10-19T14:36:25.631772070Z |   ├── Read header timeout: 100ms
2024-10-19T14:36:25.631776169Z |   ├── Read timeout: 500ms
2024-10-19T14:36:25.631780005Z |   └── VPN wait durations:
2024-10-19T14:36:25.631784160Z |       ├── Initial duration: 6s
2024-10-19T14:36:25.631788239Z |       └── Additional duration: 5s
2024-10-19T14:36:25.631792216Z ├── Shadowsocks server settings:
2024-10-19T14:36:25.631796091Z |   └── Enabled: no
2024-10-19T14:36:25.631800308Z ├── HTTP proxy settings:
2024-10-19T14:36:25.631804340Z |   ├── Enabled: yes
2024-10-19T14:36:25.631808337Z |   ├── Listening address: :8888
2024-10-19T14:36:25.631812502Z |   ├── User: 
2024-10-19T14:36:25.631817056Z |   ├── Password: [not set]
2024-10-19T14:36:25.631820895Z |   ├── Stealth mode: no
2024-10-19T14:36:25.631825150Z |   ├── Log: yes
2024-10-19T14:36:25.631830066Z |   ├── Read header timeout: 1s
2024-10-19T14:36:25.631834105Z |   └── Read timeout: 3s
2024-10-19T14:36:25.631838092Z ├── Control server settings:
2024-10-19T14:36:25.631842286Z |   ├── Listening address: :8000
2024-10-19T14:36:25.631846261Z |   ├── Logging: yes
2024-10-19T14:36:25.631852809Z |   └── Authentication file path: /gluetun/auth/config.toml
2024-10-19T14:36:25.631857219Z ├── Storage settings:
2024-10-19T14:36:25.631861261Z |   └── Filepath: /gluetun/servers.json
2024-10-19T14:36:25.631865257Z ├── OS Alpine settings:
2024-10-19T14:36:25.631868844Z |   ├── Process UID: 568
2024-10-19T14:36:25.631872515Z |   ├── Process GID: 568
2024-10-19T14:36:25.631876605Z |   └── Timezone: UTC
2024-10-19T14:36:25.631880544Z ├── Public IP settings:
2024-10-19T14:36:25.631883517Z |   ├── IP file path: /tmp/gluetun/ip
2024-10-19T14:36:25.631886390Z |   ├── Public IP data base API: ipinfo
2024-10-19T14:36:25.631889336Z |   └── Public IP data backup APIs:
2024-10-19T14:36:25.631892325Z |       ├── ifconfigco
2024-10-19T14:36:25.631896187Z |       ├── ip2location
2024-10-19T14:36:25.631900039Z |       └── cloudflare
2024-10-19T14:36:25.631904238Z └── Version settings:
2024-10-19T14:36:25.631908484Z     └── Enabled: yes
2024-10-19T14:36:25.632442848Z 2024-10-19T14:36:25Z INFO [routing] default route found: interface eth0, gateway 172.16.0.202, assigned IP 172.16.0.62 and family v4
2024-10-19T14:36:25.632449774Z 2024-10-19T14:36:25Z DEBUG [netlink] ip -4 rule list
2024-10-19T14:36:25.632453890Z 2024-10-19T14:36:25Z DEBUG [netlink] ip -6 rule list
2024-10-19T14:36:25.632467850Z 2024-10-19T14:36:25Z DEBUG [netlink] ip rule add from 172.16.0.62/32 lookup 200 pref 100
2024-10-19T14:36:25.632522003Z 2024-10-19T14:36:25Z INFO [routing] adding route for 0.0.0.0/0
2024-10-19T14:36:25.632526120Z 2024-10-19T14:36:25Z DEBUG [routing] ip route replace 0.0.0.0/0 via 172.16.0.202 dev eth0 table 200
2024-10-19T14:36:25.632610026Z 2024-10-19T14:36:25Z INFO [firewall] setting allowed subnets...
2024-10-19T14:36:25.632639670Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/iptables --append OUTPUT -o eth0 -s 172.16.0.62 -d 172.16.0.0/16 -j ACCEPT
2024-10-19T14:36:25.633759501Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/iptables --append OUTPUT -o eth0 -s 172.16.0.62 -d 172.17.0.0/16 -j ACCEPT
2024-10-19T14:36:25.634686033Z 2024-10-19T14:36:25Z INFO [routing] default route found: interface eth0, gateway 172.16.0.202, assigned IP 172.16.0.62 and family v4
2024-10-19T14:36:25.634688972Z 2024-10-19T14:36:25Z INFO [routing] adding route for 172.16.0.0/16
2024-10-19T14:36:25.634691211Z 2024-10-19T14:36:25Z DEBUG [routing] ip route replace 172.16.0.0/16 via 172.16.0.202 dev eth0 table 199
2024-10-19T14:36:25.634726212Z 2024-10-19T14:36:25Z DEBUG [netlink] ip -4 rule list
2024-10-19T14:36:25.634729232Z 2024-10-19T14:36:25Z DEBUG [netlink] ip -6 rule list
2024-10-19T14:36:25.634747185Z 2024-10-19T14:36:25Z DEBUG [netlink] ip rule add to 172.16.0.0/16 lookup 199 pref 99
2024-10-19T14:36:25.634774850Z 2024-10-19T14:36:25Z INFO [routing] adding route for 172.17.0.0/16
2024-10-19T14:36:25.634777923Z 2024-10-19T14:36:25Z DEBUG [routing] ip route replace 172.17.0.0/16 via 172.16.0.202 dev eth0 table 199
2024-10-19T14:36:25.634810991Z 2024-10-19T14:36:25Z DEBUG [netlink] ip -4 rule list
2024-10-19T14:36:25.634813630Z 2024-10-19T14:36:25Z DEBUG [netlink] ip -6 rule list
2024-10-19T14:36:25.634834059Z 2024-10-19T14:36:25Z DEBUG [netlink] ip rule add to 172.17.0.0/16 lookup 199 pref 99
2024-10-19T14:36:25.634854871Z 2024-10-19T14:36:25Z DEBUG [netlink] ip -4 rule list
2024-10-19T14:36:25.634857317Z 2024-10-19T14:36:25Z DEBUG [netlink] ip -6 rule list
2024-10-19T14:36:25.634884745Z 2024-10-19T14:36:25Z DEBUG [netlink] ip rule add to 172.16.0.202/32 lookup 254 pref 98
2024-10-19T14:36:25.634893654Z 2024-10-19T14:36:25Z DEBUG [netlink] ip -4 rule list
2024-10-19T14:36:25.634896049Z 2024-10-19T14:36:25Z DEBUG [netlink] ip -6 rule list
2024-10-19T14:36:25.634931438Z 2024-10-19T14:36:25Z DEBUG [netlink] ip rule add to fe80::/64 lookup 254 pref 98
2024-10-19T14:36:25.634967673Z 2024-10-19T14:36:25Z INFO TUN device is not available: open /dev/net/tun: no such file or directory; creating it...
2024-10-19T14:36:25.634995946Z 2024-10-19T14:36:25Z INFO [firewall] setting allowed input port 10095 through interface eth0...
2024-10-19T14:36:25.635032142Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/iptables --append INPUT -i eth0 -p tcp -m tcp --dport 10095 -j ACCEPT
2024-10-19T14:36:25.636184072Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i eth0 -p tcp -m tcp --dport 10095 -j ACCEPT
2024-10-19T14:36:25.637140809Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/iptables --append INPUT -i eth0 -p udp -m udp --dport 10095 -j ACCEPT
2024-10-19T14:36:25.638137722Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i eth0 -p udp -m udp --dport 10095 -j ACCEPT
2024-10-19T14:36:25.639671519Z 2024-10-19T14:36:25Z INFO [firewall] setting allowed input port 8000 through interface eth0...
2024-10-19T14:36:25.639684015Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/iptables --append INPUT -i eth0 -p tcp -m tcp --dport 8000 -j ACCEPT
2024-10-19T14:36:25.640924840Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i eth0 -p tcp -m tcp --dport 8000 -j ACCEPT
2024-10-19T14:36:25.641992346Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/iptables --append INPUT -i eth0 -p udp -m udp --dport 8000 -j ACCEPT
2024-10-19T14:36:25.643540485Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i eth0 -p udp -m udp --dport 8000 -j ACCEPT
2024-10-19T14:36:25.644830531Z 2024-10-19T14:36:25Z INFO [dns] using plaintext DNS at address 1.1.1.1
2024-10-19T14:36:25.644890254Z 2024-10-19T14:36:25Z INFO [http proxy] listening on :8888
2024-10-19T14:36:25.645025728Z 2024-10-19T14:36:25Z INFO [http server] http server listening on [::]:8000
2024-10-19T14:36:25.645122165Z 2024-10-19T14:36:25Z DEBUG [wireguard] Wireguard server public key: +WRsjA7z/PQqasrqiUVo3Tug+go7W2DXjO2p3TTeagk=
2024-10-19T14:36:25.645169051Z 2024-10-19T14:36:25Z DEBUG [wireguard] Wireguard client private key: cL5...Fg=
2024-10-19T14:36:25.645173882Z 2024-10-19T14:36:25Z DEBUG [wireguard] Wireguard pre-shared key: [not set]
2024-10-19T14:36:25.645178286Z 2024-10-19T14:36:25Z INFO [healthcheck] listening on 127.0.0.1:9999
2024-10-19T14:36:25.645182443Z 2024-10-19T14:36:25Z INFO [firewall] allowing VPN connection...
2024-10-19T14:36:25.645214135Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/iptables --append OUTPUT -d 138.199.6.179 -o eth0 -p udp -m udp --dport 51820 -j ACCEPT
2024-10-19T14:36:25.646585661Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/iptables --append OUTPUT -o tun0 -j ACCEPT
2024-10-19T14:36:25.647663405Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/ip6tables --append OUTPUT -o tun0 -j ACCEPT
2024-10-19T14:36:25.649519719Z 2024-10-19T14:36:25Z INFO [wireguard] Using available kernelspace implementation
2024-10-19T14:36:25.650070648Z 2024-10-19T14:36:25Z INFO [wireguard] Connecting to 138.199.6.179:51820
2024-10-19T14:36:25.650424596Z 2024-10-19T14:36:25Z DEBUG [netlink] ip rule add lookup 51820 pref 101
2024-10-19T14:36:25.650441791Z 2024-10-19T14:36:25Z DEBUG [netlink] ip rule add lookup 51820 pref 101
2024-10-19T14:36:25.650465757Z 2024-10-19T14:36:25Z INFO [wireguard] Wireguard setup is complete. Note Wireguard is a silent protocol and it may or may not work, without giving any error message. Typically i/o timeout errors indicate the Wireguard connection is not working.
2024-10-19T14:36:25.750004560Z 2024-10-19T14:36:25Z INFO [dns] downloading hostnames and IP block lists
2024-10-19T14:36:30.772843942Z 2024-10-19T14:36:30Z INFO [healthcheck] healthy!
2024-10-19T14:36:31.422463973Z 2024-10-19T14:36:31Z INFO [dns] DNS server listening on [::]:53
2024-10-19T14:36:31.835855713Z 2024-10-19T14:36:31Z INFO [dns] ready
2024-10-19T14:36:32.152275666Z 2024-10-19T14:36:32Z INFO [ip getter] Public IP address is 149.22.89.78 (Switzerland, Zurich, Zürich - source: ipinfo)
2024-10-19T14:36:32.775349011Z 2024-10-19T14:36:32Z INFO [vpn] There is a new release v3.39.1 (v3.39.1) created 19 days ago
2024-10-19T14:36:32.775377245Z 2024-10-19T14:36:32Z INFO [port forwarding] starting
2024-10-19T14:36:32.809525452Z 2024-10-19T14:36:32Z INFO [port forwarding] gateway external IPv4 address is 149.22.89.78
2024-10-19T14:36:32.882594253Z 2024-10-19T14:36:32Z INFO [port forwarding] port forwarded is 64506
2024-10-19T14:36:32.882617164Z 2024-10-19T14:36:32Z INFO [firewall] setting allowed input port 64506 through interface tun0...
2024-10-19T14:36:32.882622730Z 2024-10-19T14:36:32Z DEBUG [firewall] /sbin/iptables --append INPUT -i tun0 -p tcp -m tcp --dport 64506 -j ACCEPT
2024-10-19T14:36:32.883656720Z 2024-10-19T14:36:32Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i tun0 -p tcp -m tcp --dport 64506 -j ACCEPT
2024-10-19T14:36:32.884520615Z 2024-10-19T14:36:32Z DEBUG [firewall] /sbin/iptables --append INPUT -i tun0 -p udp -m udp --dport 64506 -j ACCEPT
2024-10-19T14:36:32.885444654Z 2024-10-19T14:36:32Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i tun0 -p udp -m udp --dport 64506 -j ACCEPT
2024-10-19T14:36:32.886437264Z 2024-10-19T14:36:32Z INFO [port forwarding] writing port file /tmp/gluetun/forwarded_port
2024-10-19T14:36:35.833687059Z 2024-10-19T14:36:35Z WARN [http server] route GET /v1/openvpn/portforwarded is unprotected by default, please set up authentication following the documentation at https://github.com/qdm12/gluetun-wiki/setup/advanced/control-server.md#authentication since this will become no longer publicly accessible after release v3.40.
2024-10-19T14:36:35.833777243Z 2024-10-19T14:36:35Z DEBUG [http server] access to route GET /v1/openvpn/portforwarded authorized for role public
2024-10-19T14:36:35.833783813Z 2024-10-19T14:36:35Z INFO [http server] 200 GET /portforwarded wrote 15B to 172.16.0.144:43590 in 56.268µs
2024-10-19T14:37:17.887543387Z 2024-10-19T14:37:17Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:37:17.963809621Z 2024-10-19T14:37:17Z DEBUG [port forwarding] port forwarded 64506 maintained
2024-10-19T14:38:02.963886219Z 2024-10-19T14:38:02Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:38:03.031178757Z 2024-10-19T14:38:03Z DEBUG [port forwarding] port forwarded 64506 maintained
2024-10-19T14:38:48.031834393Z 2024-10-19T14:38:48Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:38:48.099113304Z 2024-10-19T14:38:48Z DEBUG [port forwarding] port forwarded 64506 maintained
2024-10-19T14:39:33.099857845Z 2024-10-19T14:39:33Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:39:33.169087015Z 2024-10-19T14:39:33Z DEBUG [port forwarding] port forwarded 64506 maintained
2024-10-19T14:40:00.933900546Z 2024-10-19T14:40:00Z WARN [http server] route GET /v1/openvpn/portforwarded is unprotected by default, please set up authentication following the documentation at https://github.com/qdm12/gluetun-wiki/setup/advanced/control-server.md#authentication since this will become no longer publicly accessible after release v3.40.
2024-10-19T14:40:00.933926086Z 2024-10-19T14:40:00Z DEBUG [http server] access to route GET /v1/openvpn/portforwarded authorized for role public
2024-10-19T14:40:00.933935404Z 2024-10-19T14:40:00Z INFO [http server] 200 GET /portforwarded wrote 15B to 172.16.0.106:32816 in 53.753µs
2024-10-19T14:40:18.169521083Z 2024-10-19T14:40:18Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:40:18.237901645Z 2024-10-19T14:40:18Z DEBUG [port forwarding] port forwarded 64506 maintained
2024-10-19T14:40:55.885671785Z 2024-10-19T14:40:55Z WARN [http server] route GET /v1/openvpn/portforwarded is unprotected by default, please set up authentication following the documentation at https://github.com/qdm12/gluetun-wiki/setup/advanced/control-server.md#authentication since this will become no longer publicly accessible after release v3.40.
2024-10-19T14:40:55.885701050Z 2024-10-19T14:40:55Z DEBUG [http server] access to route GET /v1/openvpn/portforwarded authorized for role public
2024-10-19T14:40:55.885706428Z 2024-10-19T14:40:55Z INFO [http server] 200 GET /portforwarded wrote 15B to 172.16.0.74:34274 in 47.12µs
2024-10-19T14:41:03.238840702Z 2024-10-19T14:41:03Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:41:03.322718571Z 2024-10-19T14:41:03Z DEBUG [port forwarding] port forwarded 64506 maintained
2024-10-19T14:41:48.323974662Z 2024-10-19T14:41:48Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:41:48.391751454Z 2024-10-19T14:41:48Z DEBUG [port forwarding] port forwarded 64506 maintained
2024-10-19T14:42:33.391692122Z 2024-10-19T14:42:33Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:42:33.485003229Z 2024-10-19T14:42:33Z DEBUG [port forwarding] port forwarded 64506 maintained
2024-10-19T14:43:18.486052894Z 2024-10-19T14:43:18Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:43:18.553414818Z 2024-10-19T14:43:18Z DEBUG [port forwarding] port forwarded 64506 maintained
2024-10-19T14:44:03.553517652Z 2024-10-19T14:44:03Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:44:03.619965480Z 2024-10-19T14:44:03Z DEBUG [port forwarding] port forwarded 64506 maintained
2024-10-19T14:44:48.620302976Z 2024-10-19T14:44:48Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:44:48.685996516Z 2024-10-19T14:44:48Z DEBUG [port forwarding] port forwarded 64506 maintained
2024-10-19T14:45:00.985614429Z 2024-10-19T14:45:00Z WARN [http server] route GET /v1/openvpn/portforwarded is unprotected by default, please set up authentication following the documentation at https://github.com/qdm12/gluetun-wiki/setup/advanced/control-server.md#authentication since this will become no longer publicly accessible after release v3.40.
2024-10-19T14:45:00.985651811Z 2024-10-19T14:45:00Z DEBUG [http server] access to route GET /v1/openvpn/portforwarded authorized for role public
2024-10-19T14:45:00.985658779Z 2024-10-19T14:45:00Z INFO [http server] 200 GET /portforwarded wrote 15B to 172.16.0.244:60386 in 53.327µs
2024-10-19T14:45:33.686922450Z 2024-10-19T14:45:33Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:45:33.756375424Z 2024-10-19T14:45:33Z DEBUG [port forwarding] port forwarded 64506 maintained
2024-10-19T14:46:18.757162226Z 2024-10-19T14:46:18Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:46:18.826124980Z 2024-10-19T14:46:18Z DEBUG [port forwarding] port forwarded 64506 maintained
2024-10-19T14:47:03.826356075Z 2024-10-19T14:47:03Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:47:03.892916244Z 2024-10-19T14:47:03Z DEBUG [port forwarding] port forwarded 64506 maintained
2024-10-19T14:47:48.893911412Z 2024-10-19T14:47:48Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:47:48.961211391Z 2024-10-19T14:47:48Z DEBUG [port forwarding] port forwarded 64506 maintained
2024-10-19T14:48:16.805259429Z 2024-10-19T14:48:16Z DEBUG [healthcheck] unhealthy: dialing: dial tcp4 104.16.133.229:443: i/o timeout
2024-10-19T14:48:22.806687744Z 2024-10-19T14:48:22Z INFO [healthcheck] program has been unhealthy for 6s: restarting VPN
2024-10-19T14:48:22.806715268Z 2024-10-19T14:48:22Z INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-19T14:48:22.806720378Z 2024-10-19T14:48:22Z INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-19T14:48:22.806723691Z 2024-10-19T14:48:22Z INFO [vpn] stopping
2024-10-19T14:48:22.806739094Z 2024-10-19T14:48:22Z INFO [port forwarding] stopping
2024-10-19T14:48:22.806749121Z 2024-10-19T14:48:22Z INFO [firewall] removing allowed port 64506...
2024-10-19T14:48:22.806759092Z 2024-10-19T14:48:22Z DEBUG [firewall] /sbin/iptables -t filter -L INPUT --line-numbers -n -v
2024-10-19T14:48:22.808139050Z 2024-10-19T14:48:22Z DEBUG [firewall] found iptables chain rule matching "--delete INPUT -i tun0 -p tcp -m tcp --dport 64506 -j ACCEPT" at line number 8
2024-10-19T14:48:22.808156481Z 2024-10-19T14:48:22Z DEBUG [firewall] /sbin/iptables -t filter -D INPUT 8
2024-10-19T14:48:22.828960068Z 2024-10-19T14:48:22Z DEBUG [firewall] /sbin/ip6tables -t filter -L INPUT --line-numbers -n -v
2024-10-19T14:48:22.830283729Z 2024-10-19T14:48:22Z DEBUG [firewall] found iptables chain rule matching "--delete INPUT -i tun0 -p tcp -m tcp --dport 64506 -j ACCEPT" at line number 8
2024-10-19T14:48:22.830295630Z 2024-10-19T14:48:22Z DEBUG [firewall] /sbin/ip6tables -t filter -D INPUT 8
2024-10-19T14:48:22.856945816Z 2024-10-19T14:48:22Z DEBUG [firewall] /sbin/iptables -t filter -L INPUT --line-numbers -n -v
2024-10-19T14:48:22.858305340Z 2024-10-19T14:48:22Z DEBUG [firewall] found iptables chain rule matching "--delete INPUT -i tun0 -p udp -m udp --dport 64506 -j ACCEPT" at line number 8
2024-10-19T14:48:22.858328611Z 2024-10-19T14:48:22Z DEBUG [firewall] /sbin/iptables -t filter -D INPUT 8
2024-10-19T14:48:22.859453300Z 2024-10-19T14:48:22Z DEBUG [firewall] /sbin/ip6tables -t filter -L INPUT --line-numbers -n -v
2024-10-19T14:48:22.860578149Z 2024-10-19T14:48:22Z DEBUG [firewall] found iptables chain rule matching "--delete INPUT -i tun0 -p udp -m udp --dport 64506 -j ACCEPT" at line number 8
2024-10-19T14:48:22.860593425Z 2024-10-19T14:48:22Z DEBUG [firewall] /sbin/ip6tables -t filter -D INPUT 8
2024-10-19T14:48:22.896907172Z 2024-10-19T14:48:22Z INFO [port forwarding] removing port file /tmp/gluetun/forwarded_port
2024-10-19T14:48:22.896937497Z 2024-10-19T14:48:22Z DEBUG [wireguard] closing controller client...
2024-10-19T14:48:22.896941521Z 2024-10-19T14:48:22Z DEBUG [wireguard] removing IPv6 rule...
2024-10-19T14:48:22.896944687Z 2024-10-19T14:48:22Z DEBUG [netlink] ip rule del lookup 51820 pref 101
2024-10-19T14:48:22.897035527Z 2024-10-19T14:48:22Z DEBUG [wireguard] removing IPv4 rule...
2024-10-19T14:48:22.897046083Z 2024-10-19T14:48:22Z DEBUG [netlink] ip rule del lookup 51820 pref 101
2024-10-19T14:48:22.897055491Z 2024-10-19T14:48:22Z DEBUG [wireguard] shutting down link...
2024-10-19T14:48:22.961760720Z 2024-10-19T14:48:22Z DEBUG [wireguard] deleting link...
2024-10-19T14:48:23.084855224Z 2024-10-19T14:48:23Z INFO [vpn] starting
2024-10-19T14:48:23.084883656Z 2024-10-19T14:48:23Z DEBUG [wireguard] Wireguard server public key: +WRsjA7z/PQqasrqiUVo3Tug+go7W2DXjO2p3TTeagk=
2024-10-19T14:48:23.084888195Z 2024-10-19T14:48:23Z DEBUG [wireguard] Wireguard client private key: cL5...Fg=
2024-10-19T14:48:23.084891329Z 2024-10-19T14:48:23Z DEBUG [wireguard] Wireguard pre-shared key: [not set]
2024-10-19T14:48:23.084894511Z 2024-10-19T14:48:23Z INFO [firewall] allowing VPN connection...
2024-10-19T14:48:23.085597465Z 2024-10-19T14:48:23Z INFO [wireguard] Using available kernelspace implementation
2024-10-19T14:48:23.085618084Z 2024-10-19T14:48:23Z INFO [wireguard] Connecting to 138.199.6.179:51820
2024-10-19T14:48:23.085768477Z 2024-10-19T14:48:23Z DEBUG [netlink] ip rule add lookup 51820 pref 101
2024-10-19T14:48:23.085837408Z 2024-10-19T14:48:23Z DEBUG [netlink] ip rule add lookup 51820 pref 101
2024-10-19T14:48:23.085845856Z 2024-10-19T14:48:23Z INFO [wireguard] Wireguard setup is complete. Note Wireguard is a silent protocol and it may or may not work, without giving any error message. Typically i/o timeout errors indicate the Wireguard connection is not working.
2024-10-19T14:48:25.209943139Z 2024-10-19T14:48:25Z WARN [dns] exchanging over DoT connection: read tcp 10.2.0.2:57952->1.1.1.1:853: i/o timeout
2024-10-19T14:48:25.209986476Z 2024-10-19T14:48:25Z WARN [dns] exchanging over DoT connection: read tcp 10.2.0.2:52352->1.0.0.1:853: i/o timeout
2024-10-19T14:48:25.209990512Z 2024-10-19T14:48:25Z WARN [dns] exchanging over DoT connection: read tcp 10.2.0.2:52366->1.0.0.1:853: i/o timeout
2024-10-19T14:48:27.209356741Z 2024-10-19T14:48:27Z WARN [dns] exchanging over DoT connection: read tcp 10.2.0.2:52382->1.0.0.1:853: i/o timeout
2024-10-19T14:48:27.233604112Z 2024-10-19T14:48:27Z WARN [dns] exchanging over DoT connection: read tcp 10.2.0.2:52390->1.0.0.1:853: i/o timeout
2024-10-19T14:48:27.233688730Z 2024-10-19T14:48:27Z WARN [dns] exchanging over DoT connection: read tcp 10.2.0.2:57962->1.1.1.1:853: i/o timeout
2024-10-19T14:48:27.330211433Z 2024-10-19T14:48:27Z INFO [healthcheck] healthy!
2024-10-19T14:48:27.610103992Z 2024-10-19T14:48:27Z ERROR [vpn] getting public IP address information: fetching information: Get "https://ipinfo.io/": dial tcp: lookup ipinfo.io on 127.0.0.1:53: server misbehaving
2024-10-19T14:48:27.610183056Z 2024-10-19T14:48:27Z INFO [port forwarding] starting
2024-10-19T14:48:27.646081565Z 2024-10-19T14:48:27Z INFO [port forwarding] gateway external IPv4 address is 149.22.89.78
2024-10-19T14:48:27.718060638Z 2024-10-19T14:48:27Z INFO [port forwarding] port forwarded is 34385
2024-10-19T14:48:27.718106610Z 2024-10-19T14:48:27Z INFO [firewall] setting allowed input port 34385 through interface tun0...
2024-10-19T14:48:27.718134899Z 2024-10-19T14:48:27Z DEBUG [firewall] /sbin/iptables --append INPUT -i tun0 -p tcp -m tcp --dport 34385 -j ACCEPT
2024-10-19T14:48:27.721740347Z 2024-10-19T14:48:27Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i tun0 -p tcp -m tcp --dport 34385 -j ACCEPT
2024-10-19T14:48:27.724946677Z 2024-10-19T14:48:27Z DEBUG [firewall] /sbin/iptables --append INPUT -i tun0 -p udp -m udp --dport 34385 -j ACCEPT
2024-10-19T14:48:27.730339053Z 2024-10-19T14:48:27Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i tun0 -p udp -m udp --dport 34385 -j ACCEPT
2024-10-19T14:48:27.734172277Z 2024-10-19T14:48:27Z INFO [port forwarding] writing port file /tmp/gluetun/forwarded_port
2024-10-19T14:49:12.735570052Z 2024-10-19T14:49:12Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:49:12.807618944Z 2024-10-19T14:49:12Z DEBUG [port forwarding] port forwarded 34385 maintained
2024-10-19T14:49:57.808180854Z 2024-10-19T14:49:57Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:49:57.877407829Z 2024-10-19T14:49:57Z DEBUG [port forwarding] port forwarded 34385 maintained
2024-10-19T14:50:01.616385924Z 2024-10-19T14:50:01Z WARN [http server] route GET /v1/openvpn/portforwarded is unprotected by default, please set up authentication following the documentation at https://github.com/qdm12/gluetun-wiki/setup/advanced/control-server.md#authentication since this will become no longer publicly accessible after release v3.40.
2024-10-19T14:50:01.616427794Z 2024-10-19T14:50:01Z DEBUG [http server] access to route GET /v1/openvpn/portforwarded authorized for role public
2024-10-19T14:50:01.616438264Z 2024-10-19T14:50:01Z INFO [http server] 200 GET /portforwarded wrote 15B to 172.16.0.138:46738 in 47.887µs
2024-10-19T14:50:42.878078257Z 2024-10-19T14:50:42Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:50:42.944062433Z 2024-10-19T14:50:42Z DEBUG [port forwarding] port forwarded 34385 maintained
2024-10-19T14:51:27.944949720Z 2024-10-19T14:51:27Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:51:28.013818176Z 2024-10-19T14:51:28Z DEBUG [port forwarding] port forwarded 34385 maintained
2024-10-19T14:52:13.014996526Z 2024-10-19T14:52:13Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:52:13.095175439Z 2024-10-19T14:52:13Z DEBUG [port forwarding] port forwarded 34385 maintained
2024-10-19T14:52:58.096051753Z 2024-10-19T14:52:58Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:52:58.163029218Z 2024-10-19T14:52:58Z DEBUG [port forwarding] port forwarded 34385 maintained
2024-10-19T14:53:43.163911913Z 2024-10-19T14:53:43Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:53:43.233193195Z 2024-10-19T14:53:43Z DEBUG [port forwarding] port forwarded 34385 maintained
2024-10-19T14:54:28.234949427Z 2024-10-19T14:54:28Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:54:28.302424481Z 2024-10-19T14:54:28Z DEBUG [port forwarding] port forwarded 34385 maintained
2024-10-19T14:55:01.381379967Z 2024-10-19T14:55:01Z WARN [http server] route GET /v1/openvpn/portforwarded is unprotected by default, please set up authentication following the documentation at https://github.com/qdm12/gluetun-wiki/setup/advanced/control-server.md#authentication since this will become no longer publicly accessible after release v3.40.
2024-10-19T14:55:01.381413453Z 2024-10-19T14:55:01Z DEBUG [http server] access to route GET /v1/openvpn/portforwarded authorized for role public
2024-10-19T14:55:01.381430589Z 2024-10-19T14:55:01Z INFO [http server] 200 GET /portforwarded wrote 15B to 172.16.0.131:43538 in 46.26µs
2024-10-19T14:55:13.303463969Z 2024-10-19T14:55:13Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:55:13.370151641Z 2024-10-19T14:55:13Z DEBUG [port forwarding] port forwarded 34385 maintained
2024-10-19T14:55:58.370896924Z 2024-10-19T14:55:58Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:55:58.438902301Z 2024-10-19T14:55:58Z DEBUG [port forwarding] port forwarded 34385 maintained
2024-10-19T14:56:27.048545240Z 2024-10-19T14:56:27Z DEBUG [healthcheck] unhealthy: dialing: dial tcp4 104.16.132.229:443: i/o timeout
2024-10-19T14:56:33.048856096Z 2024-10-19T14:56:33Z INFO [healthcheck] program has been unhealthy for 6s: restarting VPN
2024-10-19T14:56:33.048914255Z 2024-10-19T14:56:33Z INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-19T14:56:33.048918955Z 2024-10-19T14:56:33Z INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-19T14:56:33.048922500Z 2024-10-19T14:56:33Z INFO [vpn] stopping
2024-10-19T14:56:33.048932883Z 2024-10-19T14:56:33Z INFO [port forwarding] stopping
2024-10-19T14:56:33.048980162Z 2024-10-19T14:56:33Z INFO [firewall] removing allowed port 34385...
2024-10-19T14:56:33.048984838Z 2024-10-19T14:56:33Z DEBUG [firewall] /sbin/iptables -t filter -L INPUT --line-numbers -n -v
2024-10-19T14:56:33.050451943Z 2024-10-19T14:56:33Z DEBUG [firewall] found iptables chain rule matching "--delete INPUT -i tun0 -p tcp -m tcp --dport 34385 -j ACCEPT" at line number 8
2024-10-19T14:56:33.050477388Z 2024-10-19T14:56:33Z DEBUG [firewall] /sbin/iptables -t filter -D INPUT 8
2024-10-19T14:56:33.072919854Z 2024-10-19T14:56:33Z DEBUG [firewall] /sbin/ip6tables -t filter -L INPUT --line-numbers -n -v
2024-10-19T14:56:33.074176706Z 2024-10-19T14:56:33Z DEBUG [firewall] found iptables chain rule matching "--delete INPUT -i tun0 -p tcp -m tcp --dport 34385 -j ACCEPT" at line number 8
2024-10-19T14:56:33.074198934Z 2024-10-19T14:56:33Z DEBUG [firewall] /sbin/ip6tables -t filter -D INPUT 8
2024-10-19T14:56:33.100738896Z 2024-10-19T14:56:33Z DEBUG [firewall] /sbin/iptables -t filter -L INPUT --line-numbers -n -v
2024-10-19T14:56:33.100770453Z 2024-10-19T14:56:33Z DEBUG [firewall] found iptables chain rule matching "--delete INPUT -i tun0 -p udp -m udp --dport 34385 -j ACCEPT" at line number 8
2024-10-19T14:56:33.100776427Z 2024-10-19T14:56:33Z DEBUG [firewall] /sbin/iptables -t filter -D INPUT 8
2024-10-19T14:56:33.136979687Z 2024-10-19T14:56:33Z DEBUG [firewall] /sbin/ip6tables -t filter -L INPUT --line-numbers -n -v
2024-10-19T14:56:33.138251786Z 2024-10-19T14:56:33Z DEBUG [firewall] found iptables chain rule matching "--delete INPUT -i tun0 -p udp -m udp --dport 34385 -j ACCEPT" at line number 8
2024-10-19T14:56:33.138275340Z 2024-10-19T14:56:33Z DEBUG [firewall] /sbin/ip6tables -t filter -D INPUT 8
2024-10-19T14:56:33.139028314Z 2024-10-19T14:56:33Z INFO [port forwarding] removing port file /tmp/gluetun/forwarded_port
2024-10-19T14:56:33.139064684Z 2024-10-19T14:56:33Z DEBUG [wireguard] closing controller client...
2024-10-19T14:56:33.139070339Z 2024-10-19T14:56:33Z DEBUG [wireguard] removing IPv6 rule...
2024-10-19T14:56:33.139077794Z 2024-10-19T14:56:33Z DEBUG [netlink] ip rule del lookup 51820 pref 101
2024-10-19T14:56:33.139224912Z 2024-10-19T14:56:33Z DEBUG [wireguard] removing IPv4 rule...
2024-10-19T14:56:33.139258249Z 2024-10-19T14:56:33Z DEBUG [netlink] ip rule del lookup 51820 pref 101
2024-10-19T14:56:33.139262089Z 2024-10-19T14:56:33Z DEBUG [wireguard] shutting down link...
2024-10-19T14:56:33.200902940Z 2024-10-19T14:56:33Z DEBUG [wireguard] deleting link...
2024-10-19T14:56:33.320850115Z 2024-10-19T14:56:33Z INFO [vpn] starting
2024-10-19T14:56:33.320875071Z 2024-10-19T14:56:33Z DEBUG [wireguard] Wireguard server public key: +WRsjA7z/PQqasrqiUVo3Tug+go7W2DXjO2p3TTeagk=
2024-10-19T14:56:33.320878263Z 2024-10-19T14:56:33Z DEBUG [wireguard] Wireguard client private key: cL5...Fg=
2024-10-19T14:56:33.320880284Z 2024-10-19T14:56:33Z DEBUG [wireguard] Wireguard pre-shared key: [not set]
2024-10-19T14:56:33.320882408Z 2024-10-19T14:56:33Z INFO [firewall] allowing VPN connection...
2024-10-19T14:56:33.321007490Z 2024-10-19T14:56:33Z INFO [wireguard] Using available kernelspace implementation
2024-10-19T14:56:33.321678405Z 2024-10-19T14:56:33Z INFO [wireguard] Connecting to 138.199.6.179:51820
2024-10-19T14:56:33.322213585Z 2024-10-19T14:56:33Z DEBUG [netlink] ip rule add lookup 51820 pref 101
2024-10-19T14:56:33.322226580Z 2024-10-19T14:56:33Z DEBUG [netlink] ip rule add lookup 51820 pref 101
2024-10-19T14:56:33.322232081Z 2024-10-19T14:56:33Z INFO [wireguard] Wireguard setup is complete. Note Wireguard is a silent protocol and it may or may not work, without giving any error message. Typically i/o timeout errors indicate the Wireguard connection is not working.
2024-10-19T14:56:33.446037301Z 2024-10-19T14:56:33Z INFO [healthcheck] healthy!
2024-10-19T14:56:35.448727471Z 2024-10-19T14:56:35Z WARN [dns] exchanging over DoT connection: read tcp 10.2.0.2:47616->1.0.0.1:853: i/o timeout
2024-10-19T14:56:35.448757319Z 2024-10-19T14:56:35Z WARN [dns] exchanging over DoT connection: read tcp 10.2.0.2:46446->1.1.1.1:853: i/o timeout
2024-10-19T14:56:37.470697432Z 2024-10-19T14:56:37Z WARN [dns] exchanging over DoT connection: read tcp 10.2.0.2:46448->1.1.1.1:853: i/o timeout
2024-10-19T14:56:37.470925656Z 2024-10-19T14:56:37Z WARN [dns] exchanging over DoT connection: read tcp 10.2.0.2:46456->1.1.1.1:853: i/o timeout
2024-10-19T14:56:37.795174028Z 2024-10-19T14:56:37Z ERROR [vpn] getting public IP address information: fetching information: Get "https://ipinfo.io/": dial tcp: lookup ipinfo.io on 127.0.0.1:53: server misbehaving
2024-10-19T14:56:37.795198241Z 2024-10-19T14:56:37Z INFO [port forwarding] starting
2024-10-19T14:56:37.830168285Z 2024-10-19T14:56:37Z INFO [port forwarding] gateway external IPv4 address is 149.22.89.78
2024-10-19T14:56:37.936603150Z 2024-10-19T14:56:37Z INFO [port forwarding] port forwarded is 62232
2024-10-19T14:56:37.936743818Z 2024-10-19T14:56:37Z INFO [firewall] setting allowed input port 62232 through interface tun0...
2024-10-19T14:56:37.936792806Z 2024-10-19T14:56:37Z DEBUG [firewall] /sbin/iptables --append INPUT -i tun0 -p tcp -m tcp --dport 62232 -j ACCEPT
2024-10-19T14:56:37.941173384Z 2024-10-19T14:56:37Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i tun0 -p tcp -m tcp --dport 62232 -j ACCEPT
2024-10-19T14:56:37.945240354Z 2024-10-19T14:56:37Z DEBUG [firewall] /sbin/iptables --append INPUT -i tun0 -p udp -m udp --dport 62232 -j ACCEPT
2024-10-19T14:56:37.950124120Z 2024-10-19T14:56:37Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i tun0 -p udp -m udp --dport 62232 -j ACCEPT
2024-10-19T14:56:37.954439014Z 2024-10-19T14:56:37Z INFO [port forwarding] writing port file /tmp/gluetun/forwarded_port
2024-10-19T14:57:22.955144507Z 2024-10-19T14:57:22Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:57:23.025888170Z 2024-10-19T14:57:23Z DEBUG [port forwarding] port forwarded 62232 maintained
2024-10-19T14:58:08.027198965Z 2024-10-19T14:58:08Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:58:08.095227652Z 2024-10-19T14:58:08Z DEBUG [port forwarding] port forwarded 62232 maintained
2024-10-19T14:58:53.096726116Z 2024-10-19T14:58:53Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:58:53.172828872Z 2024-10-19T14:58:53Z DEBUG [port forwarding] port forwarded 62232 maintained
2024-10-19T14:59:38.174156801Z 2024-10-19T14:59:38Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:59:38.242881735Z 2024-10-19T14:59:38Z DEBUG [port forwarding] port forwarded 62232 maintained
2024-10-19T14:56:33.139077794Z 2024-10-19T14:56:33Z DEBUG [netlink] ip rule del lookup 51820 pref 101
2024-10-19T14:56:33.139224912Z 2024-10-19T14:56:33Z DEBUG [wireguard] removing IPv4 rule...
2024-10-19T14:56:33.139258249Z 2024-10-19T14:56:33Z DEBUG [netlink] ip rule del lookup 51820 pref 101
2024-10-19T14:56:33.139262089Z 2024-10-19T14:56:33Z DEBUG [wireguard] shutting down link...
2024-10-19T14:56:33.200902940Z 2024-10-19T14:56:33Z DEBUG [wireguard] deleting link...
2024-10-19T14:56:33.320850115Z 2024-10-19T14:56:33Z INFO [vpn] starting
2024-10-19T14:56:33.320875071Z 2024-10-19T14:56:33Z DEBUG [wireguard] Wireguard server public key: +WRsjA7z/PQqasrqiUVo3Tug+go7W2DXjO2p3TTeagk=
2024-10-19T14:56:33.320878263Z 2024-10-19T14:56:33Z DEBUG [wireguard] Wireguard client private key: cL5...Fg=
2024-10-19T14:56:33.320880284Z 2024-10-19T14:56:33Z DEBUG [wireguard] Wireguard pre-shared key: [not set]
2024-10-19T14:56:33.320882408Z 2024-10-19T14:56:33Z INFO [firewall] allowing VPN connection...
2024-10-19T14:56:33.321007490Z 2024-10-19T14:56:33Z INFO [wireguard] Using available kernelspace implementation
2024-10-19T14:56:33.321678405Z 2024-10-19T14:56:33Z INFO [wireguard] Connecting to 138.199.6.179:51820
2024-10-19T14:56:33.322213585Z 2024-10-19T14:56:33Z DEBUG [netlink] ip rule add lookup 51820 pref 101
2024-10-19T14:56:33.322226580Z 2024-10-19T14:56:33Z DEBUG [netlink] ip rule add lookup 51820 pref 101
2024-10-19T14:56:33.322232081Z 2024-10-19T14:56:33Z INFO [wireguard] Wireguard setup is complete. Note Wireguard is a silent protocol and it may or may not work, without giving any error message. Typically i/o timeout errors indicate the Wireguard connection is not working.
2024-10-19T14:56:33.446037301Z 2024-10-19T14:56:33Z INFO [healthcheck] healthy!
2024-10-19T14:56:35.448727471Z 2024-10-19T14:56:35Z WARN [dns] exchanging over DoT connection: read tcp 10.2.0.2:47616->1.0.0.1:853: i/o timeout
2024-10-19T14:56:35.448757319Z 2024-10-19T14:56:35Z WARN [dns] exchanging over DoT connection: read tcp 10.2.0.2:46446->1.1.1.1:853: i/o timeout
2024-10-19T14:56:37.470697432Z 2024-10-19T14:56:37Z WARN [dns] exchanging over DoT connection: read tcp 10.2.0.2:46448->1.1.1.1:853: i/o timeout
2024-10-19T14:56:37.470925656Z 2024-10-19T14:56:37Z WARN [dns] exchanging over DoT connection: read tcp 10.2.0.2:46456->1.1.1.1:853: i/o timeout
2024-10-19T14:56:37.795174028Z 2024-10-19T14:56:37Z ERROR [vpn] getting public IP address information: fetching information: Get "https://ipinfo.io/": dial tcp: lookup ipinfo.io on 127.0.0.1:53: server misbehaving
2024-10-19T14:56:37.795198241Z 2024-10-19T14:56:37Z INFO [port forwarding] starting
2024-10-19T14:56:37.830168285Z 2024-10-19T14:56:37Z INFO [port forwarding] gateway external IPv4 address is 149.22.89.78
2024-10-19T14:56:37.936603150Z 2024-10-19T14:56:37Z INFO [port forwarding] port forwarded is 62232
2024-10-19T14:56:37.936743818Z 2024-10-19T14:56:37Z INFO [firewall] setting allowed input port 62232 through interface tun0...
2024-10-19T14:56:37.936792806Z 2024-10-19T14:56:37Z DEBUG [firewall] /sbin/iptables --append INPUT -i tun0 -p tcp -m tcp --dport 62232 -j ACCEPT
2024-10-19T14:56:37.941173384Z 2024-10-19T14:56:37Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i tun0 -p tcp -m tcp --dport 62232 -j ACCEPT
2024-10-19T14:56:37.945240354Z 2024-10-19T14:56:37Z DEBUG [firewall] /sbin/iptables --append INPUT -i tun0 -p udp -m udp --dport 62232 -j ACCEPT
2024-10-19T14:56:37.950124120Z 2024-10-19T14:56:37Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i tun0 -p udp -m udp --dport 62232 -j ACCEPT
2024-10-19T14:56:37.954439014Z 2024-10-19T14:56:37Z INFO [port forwarding] writing port file /tmp/gluetun/forwarded_port
2024-10-19T14:57:22.955144507Z 2024-10-19T14:57:22Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:57:23.025888170Z 2024-10-19T14:57:23Z DEBUG [port forwarding] port forwarded 62232 maintained
2024-10-19T14:58:08.027198965Z 2024-10-19T14:58:08Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:58:08.095227652Z 2024-10-19T14:58:08Z DEBUG [port forwarding] port forwarded 62232 maintained
2024-10-19T14:58:53.096726116Z 2024-10-19T14:58:53Z DEBUG [port forwarding] refreshing port forward since 45 seconds have ela

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

4 participants