gluetun: Bug: Wireguard not working after v3.35.0
Is this urgent?
No
Host OS
Unraid
CPU arch
x86_64
VPN service provider
Custom
What are you using to run the container
docker run
What is the version of Gluetun
2023-08-11T11:08:54.752Z (commit e556871)
Whatβs the problem π€
I have an issue where this block of text will keep on repeating:
2023-08-24T00:25:14-07:00 INFO [healthcheck] program has been unhealthy for 36s: restarting VPN (see https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md)
2023-08-24T00:25:14-07:00 INFO [vpn] stopping
2023-08-24T00:25:14-07:00 DEBUG [wireguard] closing controller clientβ¦
2023-08-24T00:25:14-07:00 DEBUG [wireguard] removing IPv4 ruleβ¦
2023-08-24T00:25:14-07:00 DEBUG [wireguard] shutting down linkβ¦
2023-08-24T00:25:14-07:00 DEBUG [wireguard] deleting linkβ¦
2023-08-24T00:25:14-07:00 INFO [vpn] starting
2023-08-24T00:25:14-07:00 DEBUG [wireguard] Wireguard server public key: pD8KPLHTUnyGvfZxSZn5mgedaIZIr+CV8Ci264WdEWU=
2023-08-24T00:25:14-07:00 DEBUG [wireguard] Wireguard client private key: 2Iaβ¦0s=
2023-08-24T00:25:14-07:00 DEBUG [wireguard] Wireguard pre-shared key: [not set]
2023-08-24T00:25:14-07:00 INFO [firewall] allowing VPN connectionβ¦
2023-08-24T00:25:14-07:00 INFO [wireguard] Using available kernelspace implementation
2023-08-24T00:25:14-07:00 INFO [wireguard] Connecting to 146.70.195.34:51820
2023-08-24T00:25:14-07:00 INFO [wireguard] Wireguard setup is complete. Note Wireguard is a silent protocol and it may or may not work, without giving any error message. Typically i/o timeout errors indicate the Wireguard connection is not working.
Logs are not telling me whatβs preventing the vpn from connecting. My setup has been working with no issues for a long time, randomly no longer works.
Share your logs
========================================
08/24/2023 12:15:50 AM
========================================
08/24/2023 12:15:50 AM
=============== gluetun ================
08/24/2023 12:15:50 AM
========================================
08/24/2023 12:15:50 AM
=========== Made with β€οΈ by ============
08/24/2023 12:15:50 AM
======= https://github.com/qdm12 =======
08/24/2023 12:15:50 AM
========================================
08/24/2023 12:15:50 AM
========================================
08/24/2023 12:15:50 AM
08/24/2023 12:15:50 AM
Running version latest built on 2023-08-11T11:08:54.752Z (commit e556871)
08/24/2023 12:15:50 AM
08/24/2023 12:15:50 AM
π§ Need help? https://github.com/qdm12/gluetun/discussions/new
08/24/2023 12:15:50 AM
π Bug? https://github.com/qdm12/gluetun/issues/new
08/24/2023 12:15:50 AM
β¨ New feature? https://github.com/qdm12/gluetun/issues/new
08/24/2023 12:15:50 AM
β Discussion? https://github.com/qdm12/gluetun/discussions/new
08/24/2023 12:15:50 AM
π» Email? quentin.mcgaw@gmail.com
08/24/2023 12:15:50 AM
π° Help me? https://www.paypal.me/qmcgaw https://github.com/sponsors/qdm12
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [routing] default route found: interface eth0, gateway 172.19.0.1, assigned IP 172.19.0.2 and family v4
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [routing] local ethernet link found: eth0
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [routing] local ipnet found: 172.19.0.0/16
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [firewall] enabling...
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --policy INPUT DROP
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --policy OUTPUT DROP
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --policy FORWARD DROP
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --policy INPUT DROP
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --policy OUTPUT DROP
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --policy FORWARD DROP
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append INPUT -i lo -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --append INPUT -i lo -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append OUTPUT -o lo -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --append OUTPUT -o lo -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append OUTPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --append OUTPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --append INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append OUTPUT -o eth0 -s 172.19.0.2 -d 172.19.0.0/16 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --append OUTPUT -o eth0 -d ff02::1:ff/104 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append INPUT -i eth0 -d 172.19.0.0/16 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [firewall] enabled successfully
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [storage] merging by most recent 17692 hardcoded servers and 17692 servers read from /gluetun/servers.json
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [netlink] IPv6 is not supported after searching 0 routes
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO Alpine version: 3.18.3
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO OpenVPN 2.5 version: 2.5.8
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO OpenVPN 2.6 version: 2.6.5
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO Unbound version: 1.17.1
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO IPtables version: v1.8.9
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO Settings summary:
08/24/2023 12:15:50 AM
βββ VPN settings:
08/24/2023 12:15:50 AM
| βββ VPN provider settings:
08/24/2023 12:15:50 AM
| | βββ Name: custom
08/24/2023 12:15:50 AM
| | βββ Server selection settings:
08/24/2023 12:15:50 AM
| | βββ VPN type: wireguard
08/24/2023 12:15:50 AM
| | βββ Wireguard selection settings:
08/24/2023 12:15:50 AM
| | βββ Endpoint IP address: 146.70.195.34
08/24/2023 12:15:50 AM
| | βββ Endpoint port: 51820
08/24/2023 12:15:50 AM
| | βββ Server public key: pD8KPLHTUnyGvfZxSZn5mgedaIZIr+CV8Ci264WdEWU=
08/24/2023 12:15:50 AM
| βββ Wireguard settings:
08/24/2023 12:15:50 AM
| βββ Private key: 2Ia...0s=
08/24/2023 12:15:50 AM
| βββ Interface addresses:
08/24/2023 12:15:50 AM
| | βββ 10.2.0.2/32
08/24/2023 12:15:50 AM
| βββ Allowed IPs:
08/24/2023 12:15:50 AM
| | βββ 0.0.0.0/0
08/24/2023 12:15:50 AM
| | βββ ::/0
08/24/2023 12:15:50 AM
| βββ Network interface: wg0
08/24/2023 12:15:50 AM
| βββ MTU: 1400
08/24/2023 12:15:50 AM
βββ DNS settings:
08/24/2023 12:15:50 AM
| βββ Keep existing nameserver(s): yes
08/24/2023 12:15:50 AM
βββ Firewall settings:
08/24/2023 12:15:50 AM
| βββ Enabled: yes
08/24/2023 12:15:50 AM
| βββ Debug mode: on
08/24/2023 12:15:50 AM
| βββ Input ports:
08/24/2023 12:15:50 AM
| | βββ 7777
08/24/2023 12:15:50 AM
| | βββ 9117
08/24/2023 12:15:50 AM
| | βββ 7878
08/24/2023 12:15:50 AM
| | βββ 8989
08/24/2023 12:15:50 AM
| | βββ 8112
08/24/2023 12:15:50 AM
| | βββ 6767
08/24/2023 12:15:50 AM
| βββ Outbound subnets:
08/24/2023 12:15:50 AM
| βββ 10.253.0.0/24
08/24/2023 12:15:50 AM
| βββ 192.168.4.0/24
08/24/2023 12:15:50 AM
| βββ 192.168.7.0/24
08/24/2023 12:15:50 AM
βββ Log settings:
08/24/2023 12:15:50 AM
| βββ Log level: DEBUG
08/24/2023 12:15:50 AM
βββ Health settings:
08/24/2023 12:15:50 AM
| βββ Server listening address: 127.0.0.1:9999
08/24/2023 12:15:50 AM
| βββ Target address: github.com:443
08/24/2023 12:15:50 AM
| βββ Duration to wait after success: 5s
08/24/2023 12:15:50 AM
| βββ Read header timeout: 100ms
08/24/2023 12:15:50 AM
| βββ Read timeout: 500ms
08/24/2023 12:15:50 AM
| βββ VPN wait durations:
08/24/2023 12:15:50 AM
| βββ Initial duration: 6s
08/24/2023 12:15:50 AM
| βββ Additional duration: 5s
08/24/2023 12:15:50 AM
βββ Shadowsocks server settings:
08/24/2023 12:15:50 AM
| βββ Enabled: no
08/24/2023 12:15:50 AM
βββ HTTP proxy settings:
08/24/2023 12:15:50 AM
| βββ Enabled: no
08/24/2023 12:15:50 AM
βββ Control server settings:
08/24/2023 12:15:50 AM
| βββ Listening address: :8000
08/24/2023 12:15:50 AM
| βββ Logging: yes
08/24/2023 12:15:50 AM
βββ OS Alpine settings:
08/24/2023 12:15:50 AM
| βββ Process UID: 1000
08/24/2023 12:15:50 AM
| βββ Process GID: 1000
08/24/2023 12:15:50 AM
| βββ Timezone: america/los_angeles
08/24/2023 12:15:50 AM
βββ Public IP settings:
08/24/2023 12:15:50 AM
| βββ Fetching: every 12h0m0s
08/24/2023 12:15:50 AM
| βββ IP file path: /gluetun/ip
08/24/2023 12:15:50 AM
βββ Version settings:
08/24/2023 12:15:50 AM
βββ Enabled: yes
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [routing] default route found: interface eth0, gateway 172.19.0.1, assigned IP 172.19.0.2 and family v4
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [routing] ip rule add from 172.19.0.2/32 lookup 200 pref 100
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [routing] adding route for 0.0.0.0/0
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [routing] ip route replace 0.0.0.0/0 via 172.19.0.1 dev eth0 table 200
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [firewall] setting allowed subnets...
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append OUTPUT -o eth0 -s 172.19.0.2 -d 10.253.0.0/24 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append OUTPUT -o eth0 -s 172.19.0.2 -d 192.168.4.0/24 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append OUTPUT -o eth0 -s 172.19.0.2 -d 192.168.7.0/24 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [routing] default route found: interface eth0, gateway 172.19.0.1, assigned IP 172.19.0.2 and family v4
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [routing] adding route for 10.253.0.0/24
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [routing] ip route replace 10.253.0.0/24 via 172.19.0.1 dev eth0 table 199
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [routing] ip rule add to 10.253.0.0/24 lookup 199 pref 99
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [routing] adding route for 192.168.4.0/24
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [routing] ip route replace 192.168.4.0/24 via 172.19.0.1 dev eth0 table 199
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [routing] ip rule add to 192.168.4.0/24 lookup 199 pref 99
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [routing] adding route for 192.168.7.0/24
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [routing] ip route replace 192.168.7.0/24 via 172.19.0.1 dev eth0 table 199
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [routing] ip rule add to 192.168.7.0/24 lookup 199 pref 99
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [routing] ip rule add to 172.19.0.0/16 lookup 254 pref 98
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO TUN device is not available: open /dev/net/tun: no such file or directory; creating it...
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [firewall] setting allowed input port 7777 through interface eth0...
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append INPUT -i eth0 -p tcp --dport 7777 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --append INPUT -i eth0 -p tcp --dport 7777 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append INPUT -i eth0 -p udp --dport 7777 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --append INPUT -i eth0 -p udp --dport 7777 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [firewall] setting allowed input port 9117 through interface eth0...
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append INPUT -i eth0 -p tcp --dport 9117 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --append INPUT -i eth0 -p tcp --dport 9117 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append INPUT -i eth0 -p udp --dport 9117 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --append INPUT -i eth0 -p udp --dport 9117 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [firewall] setting allowed input port 7878 through interface eth0...
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append INPUT -i eth0 -p tcp --dport 7878 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --append INPUT -i eth0 -p tcp --dport 7878 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append INPUT -i eth0 -p udp --dport 7878 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --append INPUT -i eth0 -p udp --dport 7878 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [firewall] setting allowed input port 8989 through interface eth0...
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append INPUT -i eth0 -p tcp --dport 8989 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --append INPUT -i eth0 -p tcp --dport 8989 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append INPUT -i eth0 -p udp --dport 8989 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --append INPUT -i eth0 -p udp --dport 8989 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [firewall] setting allowed input port 8112 through interface eth0...
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append INPUT -i eth0 -p tcp --dport 8112 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --append INPUT -i eth0 -p tcp --dport 8112 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append INPUT -i eth0 -p udp --dport 8112 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --append INPUT -i eth0 -p udp --dport 8112 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [firewall] setting allowed input port 6767 through interface eth0...
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append INPUT -i eth0 -p tcp --dport 6767 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --append INPUT -i eth0 -p tcp --dport 6767 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append INPUT -i eth0 -p udp --dport 6767 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --append INPUT -i eth0 -p udp --dport 6767 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 WARN [dns] β οΈβ οΈβ οΈ keeping the default container nameservers, this will likely leak DNS traffic outside the VPN and go through your container network DNS outside the VPN tunnel!
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [http server] http server listening on [::]:8000
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [wireguard] Wireguard server public key: pD8KPLHTUnyGvfZxSZn5mgedaIZIr+CV8Ci264WdEWU=
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [wireguard] Wireguard client private key: 2Ia...0s=
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [wireguard] Wireguard pre-shared key: [not set]
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [firewall] allowing VPN connection...
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append OUTPUT -d 146.70.195.34 -o eth0 -p udp -m udp --dport 51820 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [healthcheck] listening on 127.0.0.1:9999
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] iptables --append OUTPUT -o wg0 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 DEBUG [firewall] ip6tables --append OUTPUT -o wg0 -j ACCEPT
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [wireguard] Using available kernelspace implementation
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [wireguard] Connecting to 146.70.195.34:51820
08/24/2023 12:15:50 AM
2023-08-24T00:15:50-07:00 INFO [wireguard] Wireguard setup is complete. Note Wireguard is a silent protocol and it may or may not work, without giving any error message. Typically i/o timeout errors indicate the Wireguard connection is not working.
08/24/2023 12:15:57 AM
2023-08-24T00:15:57-07:00 INFO [healthcheck] program has been unhealthy for 6s: restarting VPN (see https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md)
08/24/2023 12:15:57 AM
2023-08-24T00:15:57-07:00 INFO [vpn] stopping
08/24/2023 12:15:57 AM
2023-08-24T00:15:57-07:00 DEBUG [wireguard] closing controller client...
08/24/2023 12:15:57 AM
2023-08-24T00:15:57-07:00 DEBUG [wireguard] removing IPv4 rule...
08/24/2023 12:15:57 AM
2023-08-24T00:15:57-07:00 ERROR [vpn] cannot get version information: Get "https://api.github.com/repos/qdm12/gluetun/commits": context canceled
08/24/2023 12:15:57 AM
2023-08-24T00:15:57-07:00 DEBUG [wireguard] shutting down link...
08/24/2023 12:15:57 AM
2023-08-24T00:15:57-07:00 DEBUG [wireguard] deleting link...
08/24/2023 12:15:57 AM
2023-08-24T00:15:57-07:00 INFO [vpn] starting
08/24/2023 12:15:57 AM
2023-08-24T00:15:57-07:00 DEBUG [wireguard] Wireguard server public key: pD8KPLHTUnyGvfZxSZn5mgedaIZIr+CV8Ci264WdEWU=
08/24/2023 12:15:57 AM
2023-08-24T00:15:57-07:00 DEBUG [wireguard] Wireguard client private key: 2Ia...0s=
08/24/2023 12:15:57 AM
2023-08-24T00:15:57-07:00 DEBUG [wireguard] Wireguard pre-shared key: [not set]
08/24/2023 12:15:57 AM
2023-08-24T00:15:57-07:00 INFO [firewall] allowing VPN connection...
08/24/2023 12:15:57 AM
2023-08-24T00:15:57-07:00 INFO [wireguard] Using available kernelspace implementation
08/24/2023 12:15:57 AM
2023-08-24T00:15:57-07:00 INFO [wireguard] Connecting to 146.70.195.34:51820
08/24/2023 12:15:57 AM
2023-08-24T00:15:57-07:00 INFO [wireguard] Wireguard setup is complete. Note Wireguard is a silent protocol and it may or may not work, without giving any error message. Typically i/o timeout errors indicate the Wireguard connection is not working.
Share your configuration
docker run
-d
--name='gluetunvpn'
--net='proxynet'
-e TZ="America/Los_Angeles"
-e HOST_OS="Unraid"
-e HOST_HOSTNAME="TERRA"
-e HOST_CONTAINERNAME="gluetunvpn"
-e 'TZ'='America/Los_Angeles'
-e 'VPN_SERVICE_PROVIDER'='custom'
-e 'VPN_TYPE'='wireguard'
-e 'VPN_INTERFACE'='wg0'
-e 'VPN_ENDPOINT_PORT'=''
-e 'VPN_ENDPOINT_IP'=''
-e 'WIREGUARD_IMPLEMENTATION'='auto'
-e 'WIREGUARD_PRIVATE_KEY'=''
-e 'WIREGUARD_PRESHARED_KEY'=''
-e 'WIREGUARD_PUBLIC_KEY'=''
-e 'WIREGUARD_ADDRESSES'=''
-e 'FIREWALL'='on'
-e 'FIREWALL_VPN_INPUT_PORTS'=''
-e 'FIREWALL_INPUT_PORTS'='7777,9117,7878,8989,8112,6767'
-e 'FIREWALL_OUTBOUND_SUBNETS'='10.253.0.0/24,192.168.4.0/24,192.168.7.0/24'
-e 'FIREWALL_DEBUG'='on'
-e 'LOG_LEVEL'='debug'
-e 'DOT'='on'
-e 'DOT_PROVIDERS'='cloudflare'
-e 'DOT_PRIVATE_ADDRESS'='127.0.0.1/8,10.0.0.0/8,172.16.0.0/12,192.168.0.0/16,169.254.0.0/16,::1/128,fc00::/7,fe80::/10,::ffff:7f00:1/104,::ffff:a00:0/104,::ffff:a9fe:0/112,::ffff:ac10:0/108,::ffff:c0a8:0/112'
-e 'DOT_VERBOSITY'='1'
-e 'DOT_VERBOSITY_DETAILS'='0'
-e 'DOT_VALIDATION_LOGLEVEL'='0'
-e 'DOT_CACHING'='on'
-e 'DOT_IPV6'='off'
-e 'BLOCK_MALICIOUS'='on'
-e 'BLOCK_SURVEILLANCE'='on'
-e 'BLOCK_ADS'='on'
-e 'UNBLOCK'=''
-e 'DNS_UPDATE_PERIOD'='24h'
-e 'DNS_ADDRESS'=''
-e 'DNS_KEEP_NAMESERVER'='on'
-e 'HTTPPROXY'='off'
-e 'HTTPPROXY_LOG'='off'
-e 'HTTPPROXY_USER'=''
-e 'HTTPPROXY_PASSWORD'=''
-e 'HTTPPROXY_STEALTH'='off'
-e 'SHADOWSOCKS'='off'
-e 'SHADOWSOCKS_LOG'='off'
-e ':8388'=':8388'
-e 'SHADOWSOCKS_PASSWORD'=''
-e 'SHADOWSOCKS_CIPHER'='chacha20-ietf-poly1305'
-e 'HEALTH_SERVER_ADDRESS'='127.0.0.1:9999'
-e 'HEALTH_TARGET_ADDRESS'='github.com:443'
-e 'HEALTH_VPN_DURATION_INITIAL'='6s'
-e 'HEALTH_VPN_DURATION_ADDITION'='5s'
-e 'UPDATER_PERIOD'='0'
-e 'PUBLICIP_FILE'='/gluetun/ip'
-e 'PUBLICIP_PERIOD'='12h'
-e 'VERSION_INFORMATION'='on'
-e 'HTTP_CONTROL_SERVER_LOG'='on'
-e 'PUID'='1000'
-e 'PGID'='1000'
-l net.unraid.docker.managed=dockerman
-l net.unraid.docker.webui='http://[IP]:[PORT:8000]'
-l net.unraid.docker.icon='https://raw.githubusercontent.com/qdm12/gluetun/master/doc/logo_256.png'
-p '8877:8888/tcp'
-p '7777:7777/tcp'
-p '9117:9117/tcp'
-p '7878:7878/tcp'
-p '8989:8989/tcp'
-p '8112:8112/tcp'
-p '6767:6767/tcp'
-p '8000:8000/tcp'
-v '/mnt/user/appdata/gluetun':'/gluetun':'rw'
--cap-add=NET_ADMIN
--restart always 'qmcgaw/gluetun'
wg0.conf:
[Interface]
# Key for TERRA
# Bouncing = 0
# NetShield = 0
# Moderate NAT = off
# NAT-PMP (Port Forwarding) = off
# VPN Accelerator = on
PrivateKey = 2Ia...0s=
Address = 10.2.0.2/32
DNS = 10.2.0.1
[Peer]
# US-CA#295
PublicKey = pD8KPLHTUnyGvfZxSZn5mgedaIZIr+CV8Ci264WdEWU=
AllowedIPs = 0.0.0.0/0
Endpoint = 146.70.195.34:51820
About this issue
- Original URL
- State: closed
- Created 10 months ago
- Reactions: 4
- Comments: 15 (7 by maintainers)
I am experiencing the same problems. I just canβt get any connection working.