gluetun: Bug: Wireguard not working after v3.35.0

Is this urgent?

No

Host OS

Unraid

CPU arch

x86_64

VPN service provider

Custom

What are you using to run the container

docker run

What is the version of Gluetun

2023-08-11T11:08:54.752Z (commit e556871)

What’s the problem πŸ€”

I have an issue where this block of text will keep on repeating:

2023-08-24T00:25:14-07:00 INFO [healthcheck] program has been unhealthy for 36s: restarting VPN (see https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md)

2023-08-24T00:25:14-07:00 INFO [vpn] stopping

2023-08-24T00:25:14-07:00 DEBUG [wireguard] closing controller client…

2023-08-24T00:25:14-07:00 DEBUG [wireguard] removing IPv4 rule…

2023-08-24T00:25:14-07:00 DEBUG [wireguard] shutting down link…

2023-08-24T00:25:14-07:00 DEBUG [wireguard] deleting link…

2023-08-24T00:25:14-07:00 INFO [vpn] starting

2023-08-24T00:25:14-07:00 DEBUG [wireguard] Wireguard server public key: pD8KPLHTUnyGvfZxSZn5mgedaIZIr+CV8Ci264WdEWU=

2023-08-24T00:25:14-07:00 DEBUG [wireguard] Wireguard client private key: 2Ia…0s=

2023-08-24T00:25:14-07:00 DEBUG [wireguard] Wireguard pre-shared key: [not set]

2023-08-24T00:25:14-07:00 INFO [firewall] allowing VPN connection…

2023-08-24T00:25:14-07:00 INFO [wireguard] Using available kernelspace implementation

2023-08-24T00:25:14-07:00 INFO [wireguard] Connecting to 146.70.195.34:51820

2023-08-24T00:25:14-07:00 INFO [wireguard] Wireguard setup is complete. Note Wireguard is a silent protocol and it may or may not work, without giving any error message. Typically i/o timeout errors indicate the Wireguard connection is not working.

Logs are not telling me what’s preventing the vpn from connecting. My setup has been working with no issues for a long time, randomly no longer works.

Share your logs

========================================
08/24/2023 12:15:50 AM
========================================
08/24/2023 12:15:50 AM
=============== gluetun ================
08/24/2023 12:15:50 AM
========================================
08/24/2023 12:15:50 AM
=========== Made with ❀️ by ============
08/24/2023 12:15:50 AM
======= https://github.com/qdm12 =======
08/24/2023 12:15:50 AM
========================================
08/24/2023 12:15:50 AM
========================================
08/24/2023 12:15:50 AM
08/24/2023 12:15:50 AM
Running version latest built on 2023-08-11T11:08:54.752Z (commit e556871)
08/24/2023 12:15:50 AM
08/24/2023 12:15:50 AM
πŸ”§ Need help? https://github.com/qdm12/gluetun/discussions/new
08/24/2023 12:15:50 AM
πŸ› Bug? https://github.com/qdm12/gluetun/issues/new
08/24/2023 12:15:50 AM
✨ New feature? https://github.com/qdm12/gluetun/issues/new
08/24/2023 12:15:50 AM
β˜• Discussion? https://github.com/qdm12/gluetun/discussions/new
08/24/2023 12:15:50 AM
πŸ’» Email? quentin.mcgaw@gmail.com
08/24/2023 12:15:50 AM
πŸ’° Help me? https://www.paypal.me/qmcgaw https://github.com/sponsors/qdm12
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [routing] default route found: interface eth0, gateway 172.19.0.1, assigned IP 172.19.0.2 and family v4
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [routing] local ethernet link found: eth0
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [routing] local ipnet found: 172.19.0.0/16
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [firewall] enabling...
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --policy INPUT DROP
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --policy OUTPUT DROP
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --policy FORWARD DROP
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --policy INPUT DROP
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --policy OUTPUT DROP
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --policy FORWARD DROP
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append INPUT -i lo -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --append INPUT -i lo -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append OUTPUT -o lo -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --append OUTPUT -o lo -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append OUTPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --append OUTPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --append INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append OUTPUT -o eth0 -s 172.19.0.2 -d 172.19.0.0/16 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --append OUTPUT -o eth0 -d ff02::1:ff/104 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append INPUT -i eth0 -d 172.19.0.0/16 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [firewall] enabled successfully
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [storage] merging by most recent 17692 hardcoded servers and 17692 servers read from /gluetun/servers.json
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [netlink] IPv6 is not supported after searching 0 routes
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO Alpine version: 3.18.3
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO OpenVPN 2.5 version: 2.5.8
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO OpenVPN 2.6 version: 2.6.5
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO Unbound version: 1.17.1
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO IPtables version: v1.8.9
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO Settings summary:
08/24/2023 12:15:50 AM
β”œβ”€β”€ VPN settings:
08/24/2023 12:15:50 AM
|   β”œβ”€β”€ VPN provider settings:
08/24/2023 12:15:50 AM
|   |   β”œβ”€β”€ Name: custom
08/24/2023 12:15:50 AM
|   |   └── Server selection settings:
08/24/2023 12:15:50 AM
|   |       β”œβ”€β”€ VPN type: wireguard
08/24/2023 12:15:50 AM
|   |       └── Wireguard selection settings:
08/24/2023 12:15:50 AM
|   |           β”œβ”€β”€ Endpoint IP address: 146.70.195.34
08/24/2023 12:15:50 AM
|   |           β”œβ”€β”€ Endpoint port: 51820
08/24/2023 12:15:50 AM
|   |           └── Server public key: pD8KPLHTUnyGvfZxSZn5mgedaIZIr+CV8Ci264WdEWU=
08/24/2023 12:15:50 AM
|   └── Wireguard settings:
08/24/2023 12:15:50 AM
|       β”œβ”€β”€ Private key: 2Ia...0s=
08/24/2023 12:15:50 AM
|       β”œβ”€β”€ Interface addresses:
08/24/2023 12:15:50 AM
|       |   └── 10.2.0.2/32
08/24/2023 12:15:50 AM
|       β”œβ”€β”€ Allowed IPs:
08/24/2023 12:15:50 AM
|       |   β”œβ”€β”€ 0.0.0.0/0
08/24/2023 12:15:50 AM
|       |   └── ::/0
08/24/2023 12:15:50 AM
|       └── Network interface: wg0
08/24/2023 12:15:50 AM
|           └── MTU: 1400
08/24/2023 12:15:50 AM
β”œβ”€β”€ DNS settings:
08/24/2023 12:15:50 AM
|   └── Keep existing nameserver(s): yes
08/24/2023 12:15:50 AM
β”œβ”€β”€ Firewall settings:
08/24/2023 12:15:50 AM
|   β”œβ”€β”€ Enabled: yes
08/24/2023 12:15:50 AM
|   β”œβ”€β”€ Debug mode: on
08/24/2023 12:15:50 AM
|   β”œβ”€β”€ Input ports:
08/24/2023 12:15:50 AM
|   |   β”œβ”€β”€ 7777
08/24/2023 12:15:50 AM
|   |   β”œβ”€β”€ 9117
08/24/2023 12:15:50 AM
|   |   β”œβ”€β”€ 7878
08/24/2023 12:15:50 AM
|   |   β”œβ”€β”€ 8989
08/24/2023 12:15:50 AM
|   |   β”œβ”€β”€ 8112
08/24/2023 12:15:50 AM
|   |   └── 6767
08/24/2023 12:15:50 AM
|   └── Outbound subnets:
08/24/2023 12:15:50 AM
|       β”œβ”€β”€ 10.253.0.0/24
08/24/2023 12:15:50 AM
|       β”œβ”€β”€ 192.168.4.0/24
08/24/2023 12:15:50 AM
|       └── 192.168.7.0/24
08/24/2023 12:15:50 AM
β”œβ”€β”€ Log settings:
08/24/2023 12:15:50 AM
|   └── Log level: DEBUG
08/24/2023 12:15:50 AM
β”œβ”€β”€ Health settings:
08/24/2023 12:15:50 AM
|   β”œβ”€β”€ Server listening address: 127.0.0.1:9999
08/24/2023 12:15:50 AM
|   β”œβ”€β”€ Target address: github.com:443
08/24/2023 12:15:50 AM
|   β”œβ”€β”€ Duration to wait after success: 5s
08/24/2023 12:15:50 AM
|   β”œβ”€β”€ Read header timeout: 100ms
08/24/2023 12:15:50 AM
|   β”œβ”€β”€ Read timeout: 500ms
08/24/2023 12:15:50 AM
|   └── VPN wait durations:
08/24/2023 12:15:50 AM
|       β”œβ”€β”€ Initial duration: 6s
08/24/2023 12:15:50 AM
|       └── Additional duration: 5s
08/24/2023 12:15:50 AM
β”œβ”€β”€ Shadowsocks server settings:
08/24/2023 12:15:50 AM
|   └── Enabled: no
08/24/2023 12:15:50 AM
β”œβ”€β”€ HTTP proxy settings:
08/24/2023 12:15:50 AM
|   └── Enabled: no
08/24/2023 12:15:50 AM
β”œβ”€β”€ Control server settings:
08/24/2023 12:15:50 AM
|   β”œβ”€β”€ Listening address: :8000
08/24/2023 12:15:50 AM
|   └── Logging: yes
08/24/2023 12:15:50 AM
β”œβ”€β”€ OS Alpine settings:
08/24/2023 12:15:50 AM
|   β”œβ”€β”€ Process UID: 1000
08/24/2023 12:15:50 AM
|   β”œβ”€β”€ Process GID: 1000
08/24/2023 12:15:50 AM
|   └── Timezone: america/los_angeles
08/24/2023 12:15:50 AM
β”œβ”€β”€ Public IP settings:
08/24/2023 12:15:50 AM
|   β”œβ”€β”€ Fetching: every 12h0m0s
08/24/2023 12:15:50 AM
|   └── IP file path: /gluetun/ip
08/24/2023 12:15:50 AM
└── Version settings:
08/24/2023 12:15:50 AM
    └── Enabled: yes
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [routing] default route found: interface eth0, gateway 172.19.0.1, assigned IP 172.19.0.2 and family v4
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [routing] ip rule add from 172.19.0.2/32 lookup 200 pref 100
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [routing] adding route for 0.0.0.0/0
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [routing] ip route replace 0.0.0.0/0 via 172.19.0.1 dev eth0 table 200
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [firewall] setting allowed subnets...
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append OUTPUT -o eth0 -s 172.19.0.2 -d 10.253.0.0/24 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append OUTPUT -o eth0 -s 172.19.0.2 -d 192.168.4.0/24 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append OUTPUT -o eth0 -s 172.19.0.2 -d 192.168.7.0/24 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [routing] default route found: interface eth0, gateway 172.19.0.1, assigned IP 172.19.0.2 and family v4
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [routing] adding route for 10.253.0.0/24
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [routing] ip route replace 10.253.0.0/24 via 172.19.0.1 dev eth0 table 199
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [routing] ip rule add to 10.253.0.0/24 lookup 199 pref 99
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [routing] adding route for 192.168.4.0/24
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [routing] ip route replace 192.168.4.0/24 via 172.19.0.1 dev eth0 table 199
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [routing] ip rule add to 192.168.4.0/24 lookup 199 pref 99
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [routing] adding route for 192.168.7.0/24
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [routing] ip route replace 192.168.7.0/24 via 172.19.0.1 dev eth0 table 199
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [routing] ip rule add to 192.168.7.0/24 lookup 199 pref 99
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [routing] ip rule add to 172.19.0.0/16 lookup 254 pref 98
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO TUN device is not available: open /dev/net/tun: no such file or directory; creating it...
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [firewall] setting allowed input port 7777 through interface eth0...
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append INPUT -i eth0 -p tcp --dport 7777 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --append INPUT -i eth0 -p tcp --dport 7777 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append INPUT -i eth0 -p udp --dport 7777 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --append INPUT -i eth0 -p udp --dport 7777 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [firewall] setting allowed input port 9117 through interface eth0...
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append INPUT -i eth0 -p tcp --dport 9117 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --append INPUT -i eth0 -p tcp --dport 9117 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append INPUT -i eth0 -p udp --dport 9117 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --append INPUT -i eth0 -p udp --dport 9117 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [firewall] setting allowed input port 7878 through interface eth0...
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append INPUT -i eth0 -p tcp --dport 7878 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --append INPUT -i eth0 -p tcp --dport 7878 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append INPUT -i eth0 -p udp --dport 7878 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --append INPUT -i eth0 -p udp --dport 7878 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [firewall] setting allowed input port 8989 through interface eth0...
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append INPUT -i eth0 -p tcp --dport 8989 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --append INPUT -i eth0 -p tcp --dport 8989 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append INPUT -i eth0 -p udp --dport 8989 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --append INPUT -i eth0 -p udp --dport 8989 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [firewall] setting allowed input port 8112 through interface eth0...
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append INPUT -i eth0 -p tcp --dport 8112 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --append INPUT -i eth0 -p tcp --dport 8112 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append INPUT -i eth0 -p udp --dport 8112 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --append INPUT -i eth0 -p udp --dport 8112 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [firewall] setting allowed input port 6767 through interface eth0...
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append INPUT -i eth0 -p tcp --dport 6767 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --append INPUT -i eth0 -p tcp --dport 6767 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append INPUT -i eth0 -p udp --dport 6767 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --append INPUT -i eth0 -p udp --dport 6767 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 WARN [dns] ⚠️⚠️⚠️  keeping the default container nameservers, this will likely leak DNS traffic outside the VPN and go through your container network DNS outside the VPN tunnel!
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [http server] http server listening on [::]:8000
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [wireguard] Wireguard server public key: pD8KPLHTUnyGvfZxSZn5mgedaIZIr+CV8Ci264WdEWU=
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [wireguard] Wireguard client private key: 2Ia...0s=
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [wireguard] Wireguard pre-shared key: [not set]
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [firewall] allowing VPN connection...
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append OUTPUT -d 146.70.195.34 -o eth0 -p udp -m udp --dport 51820 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [healthcheck] listening on 127.0.0.1:9999
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append OUTPUT -o wg0 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --append OUTPUT -o wg0 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [wireguard] Using available kernelspace implementation
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [wireguard] Connecting to 146.70.195.34:51820
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [wireguard] Wireguard setup is complete. Note Wireguard is a silent protocol and it may or may not work, without giving any error message. Typically i/o timeout errors indicate the Wireguard connection is not working.
08/24/2023 12:15:57 AM
2023-08-24T00:15:57-07:00 INFO [healthcheck] program has been unhealthy for 6s: restarting VPN (see https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md)
08/24/2023 12:15:57 AM
2023-08-24T00:15:57-07:00 INFO [vpn] stopping
08/24/2023 12:15:57 AM
2023-08-24T00:15:57-07:00 DEBUG [wireguard] closing controller client...
08/24/2023 12:15:57 AM
2023-08-24T00:15:57-07:00 DEBUG [wireguard] removing IPv4 rule...
08/24/2023 12:15:57 AM
2023-08-24T00:15:57-07:00 ERROR [vpn] cannot get version information: Get "https://api.github.com/repos/qdm12/gluetun/commits": context canceled
08/24/2023 12:15:57 AM
2023-08-24T00:15:57-07:00 DEBUG [wireguard] shutting down link...
08/24/2023 12:15:57 AM
2023-08-24T00:15:57-07:00 DEBUG [wireguard] deleting link...
08/24/2023 12:15:57 AM
2023-08-24T00:15:57-07:00 INFO [vpn] starting
08/24/2023 12:15:57 AM
2023-08-24T00:15:57-07:00 DEBUG [wireguard] Wireguard server public key: pD8KPLHTUnyGvfZxSZn5mgedaIZIr+CV8Ci264WdEWU=
08/24/2023 12:15:57 AM
2023-08-24T00:15:57-07:00 DEBUG [wireguard] Wireguard client private key: 2Ia...0s=
08/24/2023 12:15:57 AM
2023-08-24T00:15:57-07:00 DEBUG [wireguard] Wireguard pre-shared key: [not set]
08/24/2023 12:15:57 AM
2023-08-24T00:15:57-07:00 INFO [firewall] allowing VPN connection...
08/24/2023 12:15:57 AM
2023-08-24T00:15:57-07:00 INFO [wireguard] Using available kernelspace implementation
08/24/2023 12:15:57 AM
2023-08-24T00:15:57-07:00 INFO [wireguard] Connecting to 146.70.195.34:51820
08/24/2023 12:15:57 AM
2023-08-24T00:15:57-07:00 INFO [wireguard] Wireguard setup is complete. Note Wireguard is a silent protocol and it may or may not work, without giving any error message. Typically i/o timeout errors indicate the Wireguard connection is not working.

Share your configuration

docker run
  -d
  --name='gluetunvpn'
  --net='proxynet'
  -e TZ="America/Los_Angeles"
  -e HOST_OS="Unraid"
  -e HOST_HOSTNAME="TERRA"
  -e HOST_CONTAINERNAME="gluetunvpn"
  -e 'TZ'='America/Los_Angeles'
  -e 'VPN_SERVICE_PROVIDER'='custom'
  -e 'VPN_TYPE'='wireguard'
  -e 'VPN_INTERFACE'='wg0'
  -e 'VPN_ENDPOINT_PORT'=''
  -e 'VPN_ENDPOINT_IP'=''
  -e 'WIREGUARD_IMPLEMENTATION'='auto'
  -e 'WIREGUARD_PRIVATE_KEY'=''
  -e 'WIREGUARD_PRESHARED_KEY'=''
  -e 'WIREGUARD_PUBLIC_KEY'=''
  -e 'WIREGUARD_ADDRESSES'=''
  -e 'FIREWALL'='on'
  -e 'FIREWALL_VPN_INPUT_PORTS'=''
  -e 'FIREWALL_INPUT_PORTS'='7777,9117,7878,8989,8112,6767'
  -e 'FIREWALL_OUTBOUND_SUBNETS'='10.253.0.0/24,192.168.4.0/24,192.168.7.0/24'
  -e 'FIREWALL_DEBUG'='on'
  -e 'LOG_LEVEL'='debug'
  -e 'DOT'='on'
  -e 'DOT_PROVIDERS'='cloudflare'
  -e 'DOT_PRIVATE_ADDRESS'='127.0.0.1/8,10.0.0.0/8,172.16.0.0/12,192.168.0.0/16,169.254.0.0/16,::1/128,fc00::/7,fe80::/10,::ffff:7f00:1/104,::ffff:a00:0/104,::ffff:a9fe:0/112,::ffff:ac10:0/108,::ffff:c0a8:0/112'
  -e 'DOT_VERBOSITY'='1'
  -e 'DOT_VERBOSITY_DETAILS'='0'
  -e 'DOT_VALIDATION_LOGLEVEL'='0'
  -e 'DOT_CACHING'='on'
  -e 'DOT_IPV6'='off'
  -e 'BLOCK_MALICIOUS'='on'
  -e 'BLOCK_SURVEILLANCE'='on'
  -e 'BLOCK_ADS'='on'
  -e 'UNBLOCK'=''
  -e 'DNS_UPDATE_PERIOD'='24h'
  -e 'DNS_ADDRESS'=''
  -e 'DNS_KEEP_NAMESERVER'='on'
  -e 'HTTPPROXY'='off'
  -e 'HTTPPROXY_LOG'='off'
  -e 'HTTPPROXY_USER'=''
  -e 'HTTPPROXY_PASSWORD'=''
  -e 'HTTPPROXY_STEALTH'='off'
  -e 'SHADOWSOCKS'='off'
  -e 'SHADOWSOCKS_LOG'='off'
  -e ':8388'=':8388'
  -e 'SHADOWSOCKS_PASSWORD'=''
  -e 'SHADOWSOCKS_CIPHER'='chacha20-ietf-poly1305'
  -e 'HEALTH_SERVER_ADDRESS'='127.0.0.1:9999'
  -e 'HEALTH_TARGET_ADDRESS'='github.com:443'
  -e 'HEALTH_VPN_DURATION_INITIAL'='6s'
  -e 'HEALTH_VPN_DURATION_ADDITION'='5s'
  -e 'UPDATER_PERIOD'='0'
  -e 'PUBLICIP_FILE'='/gluetun/ip'
  -e 'PUBLICIP_PERIOD'='12h'
  -e 'VERSION_INFORMATION'='on'
  -e 'HTTP_CONTROL_SERVER_LOG'='on'
  -e 'PUID'='1000'
  -e 'PGID'='1000'
  -l net.unraid.docker.managed=dockerman
  -l net.unraid.docker.webui='http://[IP]:[PORT:8000]'
  -l net.unraid.docker.icon='https://raw.githubusercontent.com/qdm12/gluetun/master/doc/logo_256.png'
  -p '8877:8888/tcp'
  -p '7777:7777/tcp'
  -p '9117:9117/tcp'
  -p '7878:7878/tcp'
  -p '8989:8989/tcp'
  -p '8112:8112/tcp'
  -p '6767:6767/tcp'
  -p '8000:8000/tcp'
  -v '/mnt/user/appdata/gluetun':'/gluetun':'rw'
  --cap-add=NET_ADMIN
  --restart always 'qmcgaw/gluetun'

wg0.conf:

[Interface]
# Key for TERRA
# Bouncing = 0
# NetShield = 0
# Moderate NAT = off
# NAT-PMP (Port Forwarding) = off
# VPN Accelerator = on
PrivateKey = 2Ia...0s=
Address = 10.2.0.2/32
DNS = 10.2.0.1

[Peer]
# US-CA#295
PublicKey = pD8KPLHTUnyGvfZxSZn5mgedaIZIr+CV8Ci264WdEWU=
AllowedIPs = 0.0.0.0/0
Endpoint = 146.70.195.34:51820

About this issue

  • Original URL
  • State: closed
  • Created 10 months ago
  • Reactions: 4
  • Comments: 15 (7 by maintainers)

Most upvoted comments

I am experiencing the same problems. I just can’t get any connection working.