Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bug: wireguard - adding ipv6 rule: file exists #2521

Open
Ttfgggf opened this issue Oct 13, 2024 · 21 comments
Open

Bug: wireguard - adding ipv6 rule: file exists #2521

Ttfgggf opened this issue Oct 13, 2024 · 21 comments

Comments

@Ttfgggf
Copy link

Ttfgggf commented Oct 13, 2024

Is this urgent?

None

Host OS

Fedora 40

CPU arch

x86_64

VPN service provider

AirVPN

What are you using to run the container

Podman

What is the version of Gluetun

Running version latest built on 2024-10-11T18:31:08.386Z (commit abe9dcb)

What's the problem 🤔

The problem is a similar to one to #1991.
I made a change to my Podman Quadlet file and it stopped working although it was working before.

Share your logs (at least 10 lines)

========================================
========================================
=============== gluetun ================
========================================
=========== Made with ❤️ by ============
======= https://github.com/qdm12 =======
========================================
========================================

Running version latest built on 2024-10-11T18:31:08.386Z (commit abe9dcb)

📣 All control server routes will become private by default after the v3.41.0 release

🔧 Need help? ☕ Discussion? https://github.com/qdm12/gluetun/discussions/new/choose
🐛 Bug? ✨ New feature? https://github.com/qdm12/gluetun/issues/new/choose
💻 Email? quentin.mcgaw@gmail.com
💰 Help me? https://www.paypal.me/qmcgaw https://github.com/sponsors/qdm12
2024-10-13T23:14:43+01:00 INFO [routing] default route found: interface eth0, gateway 10.30.0.1, assigned IP 10.30.0.68 and family v4
2024-10-13T23:14:43+01:00 INFO [routing] default route found: interface eth0, gateway fd38:753:6ed4:4540::1, assigned IP fd38:753:6ed4:4540::44 and family v6
2024-10-13T23:14:43+01:00 INFO [routing] local ethernet link found: eth0
2024-10-13T23:14:43+01:00 INFO [routing] local ipnet found: 10.30.0.0/24
2024-10-13T23:14:43+01:00 INFO [routing] local ipnet found: fd38:753:6ed4:4540::/64
2024-10-13T23:14:43+01:00 INFO [routing] local ipnet found: fe80::/64
2024-10-13T23:15:58+01:00 INFO [firewall] enabling...
2024-10-13T23:15:59+01:00 INFO [firewall] enabled successfully
2024-10-13T23:15:59+01:00 INFO [storage] merging by most recent 20553 hardcoded servers and 20553 servers read from /gluetun/servers.json
2024-10-13T23:15:59+01:00 INFO Alpine version: 3.20.3
2024-10-13T23:15:59+01:00 INFO OpenVPN 2.5 version: 2.5.10
2024-10-13T23:15:59+01:00 INFO OpenVPN 2.6 version: 2.6.11
2024-10-13T23:15:59+01:00 INFO IPtables version: v1.8.10
2024-10-13T23:15:59+01:00 INFO Settings summary:
├── VPN settings:
|   ├── VPN provider settings:
|   |   ├── Name: airvpn
|   |   └── Server selection settings:
|   |       ├── VPN type: wireguard
|   |       ├── Cities: London
|   |       └── Wireguard selection settings:
|   └── Wireguard settings:
|       ├── Private key: #Blanked
|       ├── Pre-shared key: #Blanked
|       ├── Interface addresses:
|       |   ├── 10.182.169.209/32
|       |   └── fd7d:76ee:e68f:a993:d3e0:138a:9151:3c9a/128
|       ├── Allowed IPs:
|       |   ├── 0.0.0.0/0
|       |   └── ::/0
|       └── Network interface: tun0
|           └── MTU: 1400
├── DNS settings:
|   ├── Keep existing nameserver(s): no
|   ├── DNS server address to use: 127.0.0.1
|   └── DNS over TLS settings:
|       ├── Enabled: yes
|       ├── Update period: every 24h0m0s
|       ├── Upstream resolvers:
|       |   ├── cloudflare
|       |   └── quad9
|       ├── Caching: yes
|       ├── IPv6: yes
|       └── DNS filtering settings:
|           ├── Block malicious: yes
|           ├── Block ads: no
|           ├── Block surveillance: no
|           └── Blocked IP networks:
|               ├── 127.0.0.1/8
|               ├── 10.0.0.0/8
|               ├── 172.16.0.0/12
|               ├── 192.168.0.0/16
|               ├── 169.254.0.0/16
|               ├── ::1/128
|               ├── fc00::/7
|               ├── fe80::/10
|               ├── ::ffff:127.0.0.1/104
|               ├── ::ffff:10.0.0.0/104
|               ├── ::ffff:169.254.0.0/112
|               ├── ::ffff:172.16.0.0/108
|               └── ::ffff:192.168.0.0/112
├── Firewall settings:
|   ├── Enabled: yes
|   ├── VPN input ports:
|   |   ├── 12636
|   |   └── 32400
|   └── Outbound subnets:
|       └── 10.0.0.0/8
├── Log settings:
|   └── Log level: info
├── Health settings:
|   ├── Server listening address: 127.0.0.1:9999
|   ├── Target address: cloudflare.com:443
|   ├── Duration to wait after success: 5s
|   ├── Read header timeout: 100ms
|   ├── Read timeout: 500ms
|   └── VPN wait durations:
|       ├── Initial duration: 6s
|       └── Additional duration: 5s
├── Shadowsocks server settings:
|   ├── Enabled: yes
|   ├── Listening address: :8388
|   ├── Cipher: chacha20-ietf-poly1305
|   ├── Password: [not set]
|   └── Log addresses: no
├── HTTP proxy settings:
|   ├── Enabled: yes
|   ├── Listening address: :8888
|   ├── User: 
|   ├── Password: [not set]
|   ├── Stealth mode: no
|   ├── Log: no
|   ├── Read header timeout: 1s
|   └── Read timeout: 3s
├── Control server settings:
|   ├── Listening address: :8000
|   ├── Logging: yes
|   └── Authentication file path: /gluetun/auth/config.toml
├── Storage settings:
|   └── Filepath: /gluetun/servers.json
├── OS Alpine settings:
|   ├── Process UID: 1000
|   ├── Process GID: 1002
|   └── Timezone: Europe/London
├── Public IP settings:
|   ├── IP file path: /tmp/gluetun/ip
|   └── Public IP data API: ipinfo
├── Server data updater settings:
|   ├── Update period: 24h0m0s
|   ├── DNS address: 1.1.1.1:53
|   ├── Minimum ratio: 0.8
|   └── Providers to update: airvpn
└── Version settings:
    └── Enabled: yes
2024-10-13T23:15:59+01:00 INFO [routing] default route found: interface eth0, gateway 10.30.0.1, assigned IP 10.30.0.68 and family v4
2024-10-13T23:15:59+01:00 INFO [routing] default route found: interface eth0, gateway fd38:753:6ed4:4540::1, assigned IP fd38:753:6ed4:4540::44 and family v6
2024-10-13T23:15:59+01:00 INFO [routing] adding route for 0.0.0.0/0
2024-10-13T23:15:59+01:00 INFO [routing] adding route for ::/0
2024-10-13T23:15:59+01:00 INFO [firewall] setting allowed subnets...
2024-10-13T23:15:59+01:00 INFO [routing] default route found: interface eth0, gateway 10.30.0.1, assigned IP 10.30.0.68 and family v4
2024-10-13T23:15:59+01:00 INFO [routing] default route found: interface eth0, gateway fd38:753:6ed4:4540::1, assigned IP fd38:753:6ed4:4540::44 and family v6
2024-10-13T23:15:59+01:00 INFO [routing] adding route for 10.0.0.0/8
2024-10-13T23:15:59+01:00 INFO [dns] using plaintext DNS at address 1.1.1.1
2024-10-13T23:15:59+01:00 INFO [http proxy] listening on :8888
2024-10-13T23:15:59+01:00 INFO [http server] http server listening on [::]:8000
2024-10-13T23:15:59+01:00 INFO [healthcheck] listening on 127.0.0.1:9999
2024-10-13T23:15:59+01:00 INFO [firewall] allowing VPN connection...
2024-10-13T23:15:59+01:00 INFO [shadowsocks] listening TCP on [::]:8388
2024-10-13T23:15:59+01:00 INFO [shadowsocks] listening UDP on [::]:8388
2024-10-13T23:15:59+01:00 INFO [wireguard] Using available kernelspace implementation
2024-10-13T23:15:59+01:00 INFO [wireguard] Connecting to [IPV6 Address Here]:1637
2024-10-13T23:15:59+01:00 ERROR [vpn] adding IPv6 rule: adding rule ip rule 101: from all to all table 51820: file exists
2024-10-13T23:15:59+01:00 INFO [vpn] retrying in 15s
2024-10-13T23:16:05+01:00 INFO [healthcheck] program has been unhealthy for 6s: restarting VPN
2024-10-13T23:16:05+01:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-13T23:16:05+01:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-13T23:16:14+01:00 INFO [firewall] allowing VPN connection...
2024-10-13T23:16:14+01:00 INFO [wireguard] Using available kernelspace implementation
2024-10-13T23:16:14+01:00 INFO [wireguard] Connecting to [2001:ac8:31:254:6a6c:3102:80b:f49c]:1637
2024-10-13T23:16:14+01:00 ERROR [vpn] adding IPv6 rule: adding rule ip rule 101: from all to all table 51820: file exists
2024-10-13T23:16:14+01:00 INFO [vpn] retrying in 30s
2024-10-13T23:16:19+01:00 INFO [healthcheck] program has been unhealthy for 11s: restarting VPN
2024-10-13T23:16:19+01:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-13T23:16:19+01:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-13T23:16:35+01:00 INFO [healthcheck] program has been unhealthy for 16s: restarting VPN
2024-10-13T23:16:35+01:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-13T23:16:35+01:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-13T23:16:44+01:00 INFO [firewall] allowing VPN connection...
2024-10-13T23:16:44+01:00 INFO [wireguard] Using available kernelspace implementation
2024-10-13T23:16:44+01:00 INFO [wireguard] Connecting to [IPV6 Address Here]:1637
2024-10-13T23:16:44+01:00 ERROR [vpn] adding IPv6 rule: adding rule ip rule 101: from all to all table 51820: file exists
2024-10-13T23:16:44+01:00 INFO [vpn] retrying in 1m0s
2024-10-13T23:16:56+01:00 INFO [healthcheck] program has been unhealthy for 21s: restarting VPN
2024-10-13T23:16:56+01:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-13T23:16:56+01:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-13T23:17:22+01:00 INFO [healthcheck] program has been unhealthy for 26s: restarting VPN
2024-10-13T23:17:22+01:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-13T23:17:22+01:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-13T23:17:44+01:00 INFO [firewall] allowing VPN connection...
2024-10-13T23:17:44+01:00 INFO [wireguard] Using available kernelspace implementation
2024-10-13T23:17:44+01:00 INFO [wireguard] Connecting to [IPV6 Address Here]:1637
2024-10-13T23:17:44+01:00 ERROR [vpn] adding IPv6 rule: adding rule ip rule 101: from all to all table 51820: file exists
2024-10-13T23:17:44+01:00 INFO [vpn] retrying in 2m0s
2024-10-13T23:17:53+01:00 INFO [healthcheck] program has been unhealthy for 31s: restarting VPN
2024-10-13T23:17:53+01:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-13T23:17:53+01:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-13T23:18:29+01:00 INFO [healthcheck] program has been unhealthy for 36s: restarting VPN
2024-10-13T23:18:29+01:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-13T23:18:29+01:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-13T23:19:10+01:00 INFO [healthcheck] program has been unhealthy for 41s: restarting VPN
2024-10-13T23:19:10+01:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-13T23:19:10+01:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-13T23:19:44+01:00 INFO [firewall] allowing VPN connection...
2024-10-13T23:19:44+01:00 INFO [wireguard] Using available kernelspace implementation
2024-10-13T23:19:44+01:00 INFO [wireguard] Connecting to [IPV6 Address Here]:1637
2024-10-13T23:19:44+01:00 ERROR [vpn] adding IPv6 rule: adding rule ip rule 101: from all to all table 51820: file exists
2024-10-13T23:19:44+01:00 INFO [vpn] retrying in 4m0s
2024-10-13T23:19:56+01:00 INFO [healthcheck] program has been unhealthy for 46s: restarting VPN
2024-10-13T23:19:56+01:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-13T23:19:56+01:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-13T23:20:47+01:00 INFO [healthcheck] program has been unhealthy for 51s: restarting VPN
2024-10-13T23:20:47+01:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-13T23:20:47+01:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-13T23:21:43+01:00 INFO [healthcheck] program has been unhealthy for 56s: restarting VPN
2024-10-13T23:21:43+01:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-13T23:21:43+01:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-13T23:22:44+01:00 INFO [healthcheck] program has been unhealthy for 1m1s: restarting VPN
2024-10-13T23:22:44+01:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-13T23:22:44+01:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-13T23:23:44+01:00 INFO [firewall] allowing VPN connection...
2024-10-13T23:23:44+01:00 INFO [wireguard] Using available kernelspace implementation
2024-10-13T23:23:44+01:00 INFO [wireguard] Connecting to IPV4 Address Here:1637
2024-10-13T23:23:44+01:00 ERROR [vpn] adding IPv6 rule: adding rule ip rule 101: from all to all table 51820: file exists
2024-10-13T23:23:44+01:00 INFO [vpn] retrying in 8m0s
2024-10-13T23:23:50+01:00 INFO [healthcheck] program has been unhealthy for 1m6s: restarting VPN
2024-10-13T23:23:50+01:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-13T23:23:50+01:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-13T23:25:01+01:00 INFO [healthcheck] program has been unhealthy for 1m11s: restarting VPN
2024-10-13T23:25:01+01:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-13T23:25:01+01:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-13T23:26:17+01:00 INFO [healthcheck] program has been unhealthy for 1m16s: restarting VPN
2024-10-13T23:26:17+01:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-13T23:26:17+01:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-13T23:27:38+01:00 INFO [healthcheck] program has been unhealthy for 1m21s: restarting VPN
2024-10-13T23:27:38+01:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-13T23:27:38+01:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-13T23:29:04+01:00 INFO [healthcheck] program has been unhealthy for 1m26s: restarting VPN
2024-10-13T23:29:04+01:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-13T23:29:04+01:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-13T23:30:35+01:00 INFO [healthcheck] program has been unhealthy for 1m31s: restarting VPN
2024-10-13T23:30:35+01:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-13T23:30:35+01:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-13T23:31:44+01:00 INFO [firewall] allowing VPN connection...
2024-10-13T23:31:44+01:00 INFO [wireguard] Using available kernelspace implementation
2024-10-13T23:31:44+01:00 INFO [wireguard] Connecting to [2001:ac8:31:362::2]:1637
2024-10-13T23:31:44+01:00 ERROR [vpn] adding IPv6 rule: adding rule ip rule 101: from all to all table 51820: file exists
2024-10-13T23:31:44+01:00 INFO [vpn] retrying in 16m0s

Share your configuration

[Unit]

Description=Gluetun (VPN Connection Container)

[Container]

Image=ghcr.io/qdm12/gluetun:latest

#Network=network1forpodman


Sysctl=net.ipv6.conf.all.disable_ipv6=0

#PublishPort=8888:8888/tcp
#PublishPort=[::]:8888:8888/tcp
#PublishPort=8388:8388/tcp
#PublishPort=[::]:8388:8388/tcp
#PublishPort=8388:8388/udp
#PublishPort=[::]:8388:8388/udp

Pod=thepodforpodman.pod

AutoUpdate=registry

ContainerName=gluetun

#HostName=gluetun

AddCapability=NET_ADMIN

AddDevice=/dev/net/tun:/dev/net/tun

Volume=/hosting/services/podman/gluetun/config:/gluetun:Z

Secret=airvpnwireguardprivatekey,type=mount,uid=1000,gid=1002,target=airvpnwireguardprivatekey
Secret=airvpnwireguardpresharedkey,type=mount,uid=1000,gid=1002,target=airvpnwireguardpresharedkey
Secret=airvpnwireguardaddresses,type=mount,uid=1000,gid=1002,target=airvpnwireguardaddresses


Environment=VPN_SERVICE_PROVIDER=airvpn
Environment=VPN_TYPE=wireguard
Environment=WIREGUARD_PRIVATE_KEY_SECRETFILE=/run/secrets/airvpnwireguardprivatekey
Environment=WIREGUARD_PRESHARED_KEY_SECRETFILE=/run/secrets/airvpnwireguardpresharedkey
Environment=WIREGUARD_ADDRESSES_SECRETFILE=/run/secrets/airvpnwireguardaddresses
Environment=SERVER_CITIES=London
Environment=FIREWALL_VPN_INPUT_PORTS=12636,32400
Environment=TZ=Europe/London
Environment=DOT_PROVIDERS=cloudflare,quad9
Environment=UPDATER_PERIOD=24h
Environment=HTTPPROXY=on
Environment=SHADOWSOCKS=on
Environment=DOT_IPV6=on
Environment=FIREWALL_OUTBOUND_SUBNETS=10.0.0.0/8
#Environment=WIREGUARD_ALLOWED_IPS=10.0.0.0/8,::/0

Environment=PGID=1002
Environment=PUID=1000


[Service]
Restart=always
TimeoutStartSec=900


[Install]
WantedBy=default.target
Copy link
Contributor

@qdm12 is more or less the only maintainer of this project and works on it in his free time.
Please:

@aminerachyd
Copy link

aminerachyd commented Oct 14, 2024

Same issue found recently, can't trace exactly when it started, but I'm getting the same logs.
I'm running gluetun on a Kubernetes pod, using Mullvad VPN with gluetun version 3.38 (and 3.39.1 recently) with Wireguard configuration

@qdm12
Copy link
Owner

qdm12 commented Oct 15, 2024

Oddly it seems that ipv6 rule exists before Gluetun does anything, not too sure why, let's try to find why first.

  1. Can you report the logs running with LOG_LEVEL=debug?
  2. Can you report the output from running the command ip -6 rule within Gluetun
  3. Important: can you report the output from running the command ip -6 rule within an alpine:3.20 container with NET_ADMIN privileges? With dumb docker run that would be docker run --rm --cap-add NET_ADMIN alpine:3.20 ip -6 rule

PS: in case this cannot be fixed, I can change the code to consider "file exists" as yep it has been created ok, but I would prefer to understand the root cause if possible since this isn't normal behavior really. Also I'm inclined to think this is a host system/kernel problem, since other users are running gluetun with ipv6 just fine.

@qdm12 qdm12 changed the title Bug: Similar Issue to previous bug of endless loop of adding IPv6 rule and failing with file exists Bug: wireguard - adding ipv6 rule: file exists Oct 15, 2024
@qdm12
Copy link
Owner

qdm12 commented Oct 15, 2024

I went the extra yard (not mile yet 😄) to have an image tag pr-2526 to run (see #2526) - can you please run it? It should log at the info level all the rules in case it fails to add a rule with error file exists.

@Ttfgggf
Copy link
Author

Ttfgggf commented Oct 15, 2024

I went the extra yard (not mile yet 😄) to have an image tag pr-2526 to run (see #2526) - can you please run it? It should log at the info level all the rules in case it fails to add a rule with error file exists.

Cool. Let me give it a go.

@Ttfgggf
Copy link
Author

Ttfgggf commented Oct 15, 2024

Result of LOG_LEVEL=debug


========================================
=============== gluetun ================
========================================
=========== Made with ❤️ by ============
======= https://github.com/qdm12 =======
========================================
========================================

Running version pr-2526 built on 2024-10-15T14:07:19.546Z (commit a8399fd)

📣 All control server routes will become private by default after the v3.41.0 release

🔧 Need help? ☕ Discussion? https://github.com/qdm12/gluetun/discussions/new/choose
🐛 Bug? ✨ New feature? https://github.com/qdm12/gluetun/issues/new/choose
💻 Email? quentin.mcgaw@gmail.com
💰 Help me? https://www.paypal.me/qmcgaw https://github.com/sponsors/qdm12
2024-10-15T17:14:07+01:00 INFO [routing] default route found: interface eth0, gateway 10.30.0.1, assigned IP 10.30.0.145 and family v4
2024-10-15T17:14:07+01:00 INFO [routing] default route found: interface eth0, gateway fd38:753:6ed4:4540::1, assigned IP fd38:753:6ed4:4540::184 and family v6
2024-10-15T17:14:07+01:00 INFO [routing] local ethernet link found: eth0
2024-10-15T17:14:07+01:00 INFO [routing] local ipnet found: 10.30.0.0/24
2024-10-15T17:14:07+01:00 INFO [routing] local ipnet found: fd38:753:6ed4:4540::/64
2024-10-15T17:14:07+01:00 INFO [routing] local ipnet found: fe80::/64
2024-10-15T17:14:07+01:00 INFO [firewall] enabling...
2024-10-15T17:14:07+01:00 INFO [firewall] enabled successfully
2024-10-15T17:14:08+01:00 INFO [storage] merging by most recent 20553 hardcoded servers and 20553 servers read from /gluetun/servers.json
2024-10-15T17:14:08+01:00 INFO Alpine version: 3.20.3
2024-10-15T17:14:08+01:00 INFO OpenVPN 2.5 version: 2.5.10
2024-10-15T17:14:08+01:00 INFO OpenVPN 2.6 version: 2.6.11
2024-10-15T17:14:08+01:00 INFO IPtables version: v1.8.10
2024-10-15T17:14:08+01:00 INFO Settings summary:
├── VPN settings:
|   ├── VPN provider settings:
|   |   ├── Name: airvpn
|   |   └── Server selection settings:
|   |       ├── VPN type: wireguard
|   |       ├── Cities: London
|   |       └── Wireguard selection settings:
|   └── Wireguard settings:
|       ├── Private key: #Blanked
|       ├── Pre-shared key: #Blanked
|       ├── Interface addresses:
|       |   ├── 10.182.169.209/32
|       |   └── fd7d:76ee:e68f:a993:d3e0:138a:9151:3c9a/128
|       ├── Allowed IPs:
|       |   ├── 0.0.0.0/0
|       |   └── ::/0
|       └── Network interface: tun0
|           └── MTU: 1400
├── DNS settings:
|   ├── Keep existing nameserver(s): no
|   ├── DNS server address to use: 127.0.0.1
|   └── DNS over TLS settings:
|       ├── Enabled: yes
|       ├── Update period: every 24h0m0s
|       ├── Upstream resolvers:
|       |   ├── cloudflare
|       |   └── quad9
|       ├── Caching: yes
|       ├── IPv6: yes
|       └── DNS filtering settings:
|           ├── Block malicious: yes
|           ├── Block ads: no
|           ├── Block surveillance: no
|           └── Blocked IP networks:
|               ├── 127.0.0.1/8
|               ├── 10.0.0.0/8
|               ├── 172.16.0.0/12
|               ├── 192.168.0.0/16
|               ├── 169.254.0.0/16
|               ├── ::1/128
|               ├── fc00::/7
|               ├── fe80::/10
|               ├── ::ffff:127.0.0.1/104
|               ├── ::ffff:10.0.0.0/104
|               ├── ::ffff:169.254.0.0/112
|               ├── ::ffff:172.16.0.0/108
|               └── ::ffff:192.168.0.0/112
├── Firewall settings:
|   ├── Enabled: yes
|   ├── VPN input ports:
|   |   ├── 12636
|   |   └── 32400
|   └── Outbound subnets:
|       └── 10.0.0.0/8
├── Log settings:
|   └── Log level: info
├── Health settings:
|   ├── Server listening address: 127.0.0.1:9999
|   ├── Target address: cloudflare.com:443
|   ├── Duration to wait after success: 5s
|   ├── Read header timeout: 100ms
|   ├── Read timeout: 500ms
|   └── VPN wait durations:
|       ├── Initial duration: 6s
|       └── Additional duration: 5s
├── Shadowsocks server settings:
|   ├── Enabled: yes
|   ├── Listening address: :8388
|   ├── Cipher: chacha20-ietf-poly1305
|   ├── Password: [not set]
|   └── Log addresses: no
├── HTTP proxy settings:
|   ├── Enabled: yes
|   ├── Listening address: :8888
|   ├── User: 
|   ├── Password: [not set]
|   ├── Stealth mode: no
|   ├── Log: no
|   ├── Read header timeout: 1s
|   └── Read timeout: 3s
├── Control server settings:
|   ├── Listening address: :8000
|   ├── Logging: yes
|   └── Authentication file path: /gluetun/auth/config.toml
├── Storage settings:
|   └── Filepath: /gluetun/servers.json
├── OS Alpine settings:
|   ├── Process UID: 1000
|   ├── Process GID: 1002
|   └── Timezone: Europe/London
├── Public IP settings:
|   ├── IP file path: /tmp/gluetun/ip
|   └── Public IP data API: ipinfo
├── Server data updater settings:
|   ├── Update period: 24h0m0s
|   ├── DNS address: 1.1.1.1:53
|   ├── Minimum ratio: 0.8
|   └── Providers to update: airvpn
└── Version settings:
    └── Enabled: yes
2024-10-15T17:14:08+01:00 INFO [routing] default route found: interface eth0, gateway 10.30.0.1, assigned IP 10.30.0.145 and family v4
2024-10-15T17:14:08+01:00 INFO [routing] default route found: interface eth0, gateway fd38:753:6ed4:4540::1, assigned IP fd38:753:6ed4:4540::184 and family v6
2024-10-15T17:14:08+01:00 INFO [routing] adding route for 0.0.0.0/0
2024-10-15T17:14:08+01:00 INFO [routing] adding route for ::/0
2024-10-15T17:14:08+01:00 INFO [firewall] setting allowed subnets...
2024-10-15T17:14:08+01:00 INFO [routing] default route found: interface eth0, gateway 10.30.0.1, assigned IP 10.30.0.145 and family v4
2024-10-15T17:14:08+01:00 INFO [routing] default route found: interface eth0, gateway fd38:753:6ed4:4540::1, assigned IP fd38:753:6ed4:4540::184 and family v6
2024-10-15T17:14:08+01:00 INFO [routing] adding route for 10.0.0.0/8
2024-10-15T17:14:08+01:00 INFO [http proxy] listening on :8888
2024-10-15T17:14:08+01:00 INFO [dns] using plaintext DNS at address 1.1.1.1
2024-10-15T17:14:08+01:00 INFO [http server] http server listening on [::]:8000
2024-10-15T17:14:08+01:00 INFO [healthcheck] listening on 127.0.0.1:9999
2024-10-15T17:14:08+01:00 INFO [firewall] allowing VPN connection...
2024-10-15T17:14:08+01:00 INFO [shadowsocks] listening TCP on [::]:8388
2024-10-15T17:14:08+01:00 INFO [shadowsocks] listening UDP on [::]:8388
2024-10-15T17:14:08+01:00 INFO [wireguard] Using available kernelspace implementation
2024-10-15T17:14:08+01:00 INFO [wireguard] Connecting to 217.138.195.18:1637
2024-10-15T17:14:08+01:00 INFO [wireguard] Wireguard setup is complete. Note Wireguard is a silent protocol and it may or may not work, without giving any error message. Typically i/o timeout errors indicate the Wireguard connection is not working.
2024-10-15T17:14:08+01:00 INFO [firewall] setting allowed input port 12636 through interface tun0...
2024-10-15T17:14:08+01:00 INFO [firewall] setting allowed input port 32400 through interface tun0...
2024-10-15T17:14:08+01:00 INFO [dns] downloading hostnames and IP block lists
2024-10-15T17:14:09+01:00 INFO [dns] DNS server listening on [::]:53
2024-10-15T17:14:09+01:00 INFO [dns] ready
2024-10-15T17:14:09+01:00 INFO [healthcheck] healthy!
2024-10-15T17:14:09+01:00 INFO [ip getter] Public IP address is 217.138.195.19 (United Kingdom, England, London)
2024-10-15T17:14:10+01:00 INFO [vpn] There is a new release v3.39.1 (v3.39.1) created 15 days ago
2024-10-15T17:14:23+01:00 INFO [healthcheck] healthy!
2024-10-15T17:18:01+01:00 INFO [healthcheck] healthy!

Result of ip -6 rule within the container command

/ # ip -6 rule
0:      from all lookup local
98:     from all to fd38:753:6ed4:4540::/64 lookup main
98:     from all to fe80::/64 lookup main
100:    from fd38:753:6ed4:4540::184 lookup 200
101:    not from all fwmark 0xca6c lookup 51820
32766:  from all lookup main
/ # 

Result of podman run --rm --cap-add NET_ADMIN alpine:3.20 ip -6 rule

root@example:/etc/containers/systemd# podman run --rm --cap-add NET_ADMIN alpine:3.20 ip -6 rule
Resolved "alpine" as an alias (/etc/containers/registries.conf.d/000-shortnames.conf)
Trying to pull docker.io/library/alpine:3.20...
Getting image source signatures
Copying blob 43c4264eed91 skipped: already exists  
Copying config 91ef0af61f done   | 
Writing manifest to image destination
0:      from all lookup local 
32766:  from all lookup main 
root@example:/etc/containers/systemd# 

@Ttfgggf
Copy link
Author

Ttfgggf commented Oct 15, 2024

I went the extra yard (not mile yet 😄) to have an image tag pr-2526 to run (see #2526) - can you please run it? It should log at the info level all the rules in case it fails to add a rule with error file exists.

Just to add to the above info. At the moment while Gluetun isn't connected to the rest of the containers that I am running on Fedora there is a VPN connected to the Host of the containers via opnSENSE Wireguard Selective Routing. So maybe that is affecting the containers . Additionally, I run ULAs IPv6 Addresses internally on my LAN. So that is why you may see it is successful in the logs, but I am not 100% sure if that will affect it.

@qdm12
Copy link
Owner

qdm12 commented Oct 15, 2024

@Ttfgggf Wait I'm a bit confused, why is the container not crashing in the last logs you shared with the error [vpn] adding IPv6 rule: adding rule ip rule 101: from all to all table 51820: file exists on the first try, and it seems to succeed?

@Ttfgggf
Copy link
Author

Ttfgggf commented Oct 15, 2024

@Ttfgggf Wait I'm a bit confused, why is the container not crashing in the last logs you shared with the error [vpn] adding IPv6 rule: adding rule ip rule 101: from all to all table 51820: file exists on the first try, and it seems to succeed?

Not sure to be honest, but it has crashed. Could SELinux be affecting it?

Right now nothing is connected to the gluetun container. But there is another AirVPN connection to the machine hosting gluetun is using in the meantime. With a Local ULA for IPV6 and an IPV4 address.

@leovanalphen
Copy link

leovanalphen commented Oct 16, 2024

I'm running into the same issue. Tried to run pr-2526 image but get the same behavior.
Logs:

2024-10-16T12:40:43.054436502Z 2024-10-16T12:40:43Z DEBUG [wireguard] Wireguard client private key: cL5...Fg=
2024-10-16T12:40:43.054439721Z 2024-10-16T12:40:43Z DEBUG [wireguard] Wireguard pre-shared key: [not set]
2024-10-16T12:40:43.054442233Z 2024-10-16T12:40:43Z INFO [firewall] allowing VPN connection...
2024-10-16T12:40:43.054516338Z 2024-10-16T12:40:43Z INFO [wireguard] Using available kernelspace implementation
2024-10-16T12:40:43.055384038Z 2024-10-16T12:40:43Z INFO [wireguard] Connecting to 138.199.6.179:51820
2024-10-16T12:40:43.055658450Z 2024-10-16T12:40:43Z INFO [wireguard] existing rules are:
2024-10-16T12:40:43.055665878Z ip rule 0: from all to all table 255
2024-10-16T12:40:43.055670121Z ip rule 98: from all to fe80::/64 table 254
2024-10-16T12:40:43.055672327Z ip rule 101: from all to all table 51820
2024-10-16T12:40:43.055674562Z ip rule 32766: from all to all table 254
2024-10-16T12:40:43.055676924Z 2024-10-16T12:40:43Z DEBUG [wireguard] closing controller client...
2024-10-16T12:40:43.055682765Z 2024-10-16T12:40:43Z DEBUG [wireguard] shutting down link...
2024-10-16T12:40:43.055703579Z 2024-10-16T12:40:43Z ERROR [vpn] adding IPv6 rule: adding rule ip rule 101: from all to all table 51820: file exists
2024-10-16T12:40:43.055724206Z 2024-10-16T12:40:43Z INFO [vpn] retrying in 30s
2024-10-16T12:40:43.093039887Z 2024-10-16T12:40:43Z DEBUG [wireguard] deleting link...
2024-10-16T12:40:07.475309839Z ========================================
2024-10-16T12:40:07.475336998Z ========================================
2024-10-16T12:40:07.475341192Z =============== gluetun ================
2024-10-16T12:40:07.475343569Z ========================================
2024-10-16T12:40:07.475345760Z =========== Made with ❤️ by ============
2024-10-16T12:40:07.475347916Z ======= https://github.com/qdm12 =======
2024-10-16T12:40:07.475350059Z ========================================
2024-10-16T12:40:07.475352178Z ========================================
2024-10-16T12:40:07.475354210Z 
2024-10-16T12:40:07.475357138Z Running version pr-2526 built on 2024-10-15T14:07:19.546Z (commit a8399fd)
2024-10-16T12:40:07.475359160Z 
2024-10-16T12:40:07.475362047Z 📣 All control server routes will become private by default after the v3.41.0 release
2024-10-16T12:40:07.475363996Z 
2024-10-16T12:40:07.475366138Z 🔧 Need help? ☕ Discussion? https://github.com/qdm12/gluetun/discussions/new/choose
2024-10-16T12:40:07.475368290Z 🐛 Bug? ✨ New feature? https://github.com/qdm12/gluetun/issues/new/choose
2024-10-16T12:40:07.475370567Z 💻 Email? quentin.mcgaw@gmail.com
2024-10-16T12:40:07.475372812Z 💰 Help me? https://www.paypal.me/qmcgaw https://github.com/sponsors/qdm12
2024-10-16T12:40:07.475545163Z 2024-10-16T12:40:07Z WARN You are using the old environment variable UID, please consider changing it to PUID
2024-10-16T12:40:07.475549196Z 2024-10-16T12:40:07Z WARN You are using the old environment variable GID, please consider changing it to PGID
2024-10-16T12:40:07.477295887Z 2024-10-16T12:40:07Z INFO [routing] default route found: interface eth0, gateway 172.16.0.202, assigned IP 172.16.0.205 and family v4
2024-10-16T12:40:07.477574440Z 2024-10-16T12:40:07Z INFO [routing] local ethernet link found: eth0
2024-10-16T12:40:07.477639200Z 2024-10-16T12:40:07Z INFO [routing] local ipnet found: 172.16.0.202/32
2024-10-16T12:40:07.477757490Z 2024-10-16T12:40:07Z INFO [routing] local ipnet found: fe80::/64
2024-10-16T12:40:27.577557050Z 2024-10-16T12:40:27Z INFO [firewall] enabling...
2024-10-16T12:40:27.577677306Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/iptables --policy INPUT DROP
2024-10-16T12:40:27.601631469Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/iptables --policy OUTPUT DROP
2024-10-16T12:40:27.625594992Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/iptables --policy FORWARD DROP
2024-10-16T12:40:27.629280065Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/ip6tables --policy INPUT DROP
2024-10-16T12:40:27.682107799Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/ip6tables --policy OUTPUT DROP
2024-10-16T12:40:27.705764923Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/ip6tables --policy FORWARD DROP
2024-10-16T12:40:27.709618319Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/iptables --append INPUT -i lo -j ACCEPT
2024-10-16T12:40:27.714585041Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i lo -j ACCEPT
2024-10-16T12:40:27.720091815Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/iptables --append OUTPUT -o lo -j ACCEPT
2024-10-16T12:40:27.728740546Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/ip6tables --append OUTPUT -o lo -j ACCEPT
2024-10-16T12:40:27.731549164Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/iptables --append OUTPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
2024-10-16T12:40:27.734377519Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/ip6tables --append OUTPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
2024-10-16T12:40:27.737391650Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/iptables --append INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
2024-10-16T12:40:27.740272251Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/ip6tables --append INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
2024-10-16T12:40:27.742068981Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/iptables --append OUTPUT -o eth0 -s 172.16.0.205 -d 172.16.0.202/32 -j ACCEPT
2024-10-16T12:40:27.743828602Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/ip6tables --append OUTPUT -o eth0 -d ff02::1:ff00:0/104 -j ACCEPT
2024-10-16T12:40:27.745657961Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/ip6tables --append OUTPUT -o eth0 -s fe80::3819:6eff:fe64:cc42 -d fe80::/64 -j ACCEPT
2024-10-16T12:40:27.747117175Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/iptables --append INPUT -i eth0 -d 172.16.0.202/32 -j ACCEPT
2024-10-16T12:40:27.748374386Z 2024-10-16T12:40:27Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i eth0 -d fe80::/64 -j ACCEPT
2024-10-16T12:40:27.749710005Z 2024-10-16T12:40:27Z INFO [firewall] enabled successfully
2024-10-16T12:40:27.955901978Z 2024-10-16T12:40:27Z INFO [storage] creating /gluetun/servers.json with 20553 hardcoded servers
2024-10-16T12:40:28.033473187Z 2024-10-16T12:40:28Z DEBUG [netlink] IPv6 is supported by link eth0
2024-10-16T12:40:28.033575378Z 2024-10-16T12:40:28Z INFO Alpine version: 3.20.3
2024-10-16T12:40:28.035868623Z 2024-10-16T12:40:28Z INFO OpenVPN 2.5 version: 2.5.10
2024-10-16T12:40:28.037733866Z 2024-10-16T12:40:28Z INFO OpenVPN 2.6 version: 2.6.11
2024-10-16T12:40:28.038451984Z 2024-10-16T12:40:28Z INFO IPtables version: v1.8.10
2024-10-16T12:40:28.038589555Z 2024-10-16T12:40:28Z INFO Settings summary:
2024-10-16T12:40:28.038596343Z ├── VPN settings:
2024-10-16T12:40:28.038600122Z |   ├── VPN provider settings:
2024-10-16T12:40:28.038603151Z |   |   ├── Name: custom
2024-10-16T12:40:28.038606214Z |   |   ├── Server selection settings:
2024-10-16T12:40:28.038609564Z |   |   |   ├── VPN type: wireguard
2024-10-16T12:40:28.038612933Z |   |   |   └── Wireguard selection settings:
2024-10-16T12:40:28.038616449Z |   |   |       ├── Endpoint IP address: 138.199.6.179
2024-10-16T12:40:28.038619903Z |   |   |       ├── Endpoint port: 51820
2024-10-16T12:40:28.038623168Z |   |   |       └── Server public key: +WRsjA7z/PQqasrqiUVo3Tug+go7W2DXjO2p3TTeagk=
2024-10-16T12:40:28.038626714Z |   |   └── Automatic port forwarding settings:
2024-10-16T12:40:28.038630194Z |   |       ├── Redirection listening port: disabled
2024-10-16T12:40:28.038633233Z |   |       ├── Use code for provider: protonvpn
2024-10-16T12:40:28.038636044Z |   |       └── Forwarded port file path: /tmp/gluetun/forwarded_port
2024-10-16T12:40:28.038638716Z |   └── Wireguard settings:
2024-10-16T12:40:28.038641311Z |       ├── Private key: cL5...Fg=
2024-10-16T12:40:28.038644038Z |       ├── Interface addresses:
2024-10-16T12:40:28.038646682Z |       |   └── 10.2.0.2/32
2024-10-16T12:40:28.038649510Z |       ├── Allowed IPs:
2024-10-16T12:40:28.038652354Z |       |   ├── 0.0.0.0/0
2024-10-16T12:40:28.038656719Z |       |   └── ::/0
2024-10-16T12:40:28.038659686Z |       └── Network interface: tun0
2024-10-16T12:40:28.038662651Z |           └── MTU: 1400
2024-10-16T12:40:28.038665406Z ├── DNS settings:
2024-10-16T12:40:28.038668362Z |   ├── Keep existing nameserver(s): no
2024-10-16T12:40:28.038671884Z |   ├── DNS server address to use: 127.0.0.1
2024-10-16T12:40:28.038675050Z |   └── DNS over TLS settings:
2024-10-16T12:40:28.038677993Z |       ├── Enabled: yes
2024-10-16T12:40:28.038681455Z |       ├── Update period: every 24h0m0s
2024-10-16T12:40:28.038684780Z |       ├── Upstream resolvers:
2024-10-16T12:40:28.038687843Z |       |   └── cloudflare
2024-10-16T12:40:28.038695877Z |       ├── Caching: yes
2024-10-16T12:40:28.038698987Z |       ├── IPv6: no
2024-10-16T12:40:28.038702180Z |       └── DNS filtering settings:
2024-10-16T12:40:28.038708668Z |           ├── Block malicious: yes
2024-10-16T12:40:28.038712058Z |           ├── Block ads: no
2024-10-16T12:40:28.038714927Z |           ├── Block surveillance: no
2024-10-16T12:40:28.038717729Z |           └── Blocked IP networks:
2024-10-16T12:40:28.038720353Z |               ├── 127.0.0.1/8
2024-10-16T12:40:28.038723228Z |               ├── 10.0.0.0/8
2024-10-16T12:40:28.038726070Z |               ├── 172.16.0.0/12
2024-10-16T12:40:28.038728823Z |               ├── 192.168.0.0/16
2024-10-16T12:40:28.038731755Z |               ├── 169.254.0.0/16
2024-10-16T12:40:28.038734725Z |               ├── ::1/128
2024-10-16T12:40:28.038737657Z |               ├── fc00::/7
2024-10-16T12:40:28.038740423Z |               ├── fe80::/10
2024-10-16T12:40:28.038742918Z |               ├── ::ffff:127.0.0.1/104
2024-10-16T12:40:28.038745493Z |               ├── ::ffff:10.0.0.0/104
2024-10-16T12:40:28.038748076Z |               ├── ::ffff:169.254.0.0/112
2024-10-16T12:40:28.038750667Z |               ├── ::ffff:172.16.0.0/108
2024-10-16T12:40:28.038753436Z |               └── ::ffff:192.168.0.0/112
2024-10-16T12:40:28.038756341Z ├── Firewall settings:
2024-10-16T12:40:28.038759277Z |   ├── Enabled: yes
2024-10-16T12:40:28.038762089Z |   ├── Debug mode: on
2024-10-16T12:40:28.038764762Z |   ├── Input ports:
2024-10-16T12:40:28.038767305Z |   |   ├── 10095
2024-10-16T12:40:28.038770159Z |   |   └── 8000
2024-10-16T12:40:28.038773185Z |   └── Outbound subnets:
2024-10-16T12:40:28.038776015Z |       ├── 172.16.0.0/16
2024-10-16T12:40:28.038779017Z |       └── 172.17.0.0/16
2024-10-16T12:40:28.038782095Z ├── Log settings:
2024-10-16T12:40:28.038785046Z |   └── Log level: debug
2024-10-16T12:40:28.038787992Z ├── Health settings:
2024-10-16T12:40:28.038792991Z |   ├── Server listening address: 127.0.0.1:9999
2024-10-16T12:40:28.038796287Z |   ├── Target address: cloudflare.com:443
2024-10-16T12:40:28.038799258Z |   ├── Duration to wait after success: 5s
2024-10-16T12:40:28.038802301Z |   ├── Read header timeout: 100ms
2024-10-16T12:40:28.038806017Z |   ├── Read timeout: 500ms
2024-10-16T12:40:28.038808993Z |   └── VPN wait durations:
2024-10-16T12:40:28.038812102Z |       ├── Initial duration: 6s
2024-10-16T12:40:28.038814936Z |       └── Additional duration: 5s
2024-10-16T12:40:28.038818052Z ├── Shadowsocks server settings:
2024-10-16T12:40:28.038820943Z |   └── Enabled: no
2024-10-16T12:40:28.038823767Z ├── HTTP proxy settings:
2024-10-16T12:40:28.038826739Z |   ├── Enabled: yes
2024-10-16T12:40:28.038829842Z |   ├── Listening address: :8888
2024-10-16T12:40:28.038832665Z |   ├── User: 
2024-10-16T12:40:28.038835716Z |   ├── Password: [not set]
2024-10-16T12:40:28.038838612Z |   ├── Stealth mode: no
2024-10-16T12:40:28.038841537Z |   ├── Log: yes
2024-10-16T12:40:28.038844443Z |   ├── Read header timeout: 1s
2024-10-16T12:40:28.038847414Z |   └── Read timeout: 3s
2024-10-16T12:40:28.038850375Z ├── Control server settings:
2024-10-16T12:40:28.038853355Z |   ├── Listening address: :8000
2024-10-16T12:40:28.038856388Z |   ├── Logging: yes
2024-10-16T12:40:28.038862438Z |   └── Authentication file path: /gluetun/auth/config.toml
2024-10-16T12:40:28.038865754Z ├── Storage settings:
2024-10-16T12:40:28.038869069Z |   └── Filepath: /gluetun/servers.json
2024-10-16T12:40:28.038871985Z ├── OS Alpine settings:
2024-10-16T12:40:28.038875241Z |   ├── Process UID: 568
2024-10-16T12:40:28.038879264Z |   ├── Process GID: 568
2024-10-16T12:40:28.038882507Z |   └── Timezone: UTC
2024-10-16T12:40:28.038885904Z ├── Public IP settings:
2024-10-16T12:40:28.038889179Z |   ├── IP file path: /tmp/gluetun/ip
2024-10-16T12:40:28.038892462Z |   └── Public IP data API: ipinfo
2024-10-16T12:40:28.038895946Z └── Version settings:
2024-10-16T12:40:28.038899294Z     └── Enabled: yes
2024-10-16T12:40:28.039164873Z 2024-10-16T12:40:28Z INFO [routing] default route found: interface eth0, gateway 172.16.0.202, assigned IP 172.16.0.205 and family v4
2024-10-16T12:40:28.039171383Z 2024-10-16T12:40:28Z DEBUG [routing] ip rule add from 172.16.0.205/32 lookup 200 pref 100
2024-10-16T12:40:28.039232590Z 2024-10-16T12:40:28Z INFO [routing] adding route for 0.0.0.0/0
2024-10-16T12:40:28.039241883Z 2024-10-16T12:40:28Z DEBUG [routing] ip route replace 0.0.0.0/0 via 172.16.0.202 dev eth0 table 200
2024-10-16T12:40:28.039382167Z 2024-10-16T12:40:28Z INFO [firewall] setting allowed subnets...
2024-10-16T12:40:28.039388337Z 2024-10-16T12:40:28Z DEBUG [firewall] /sbin/iptables --append OUTPUT -o eth0 -s 172.16.0.205 -d 172.16.0.0/16 -j ACCEPT
2024-10-16T12:40:28.040234521Z 2024-10-16T12:40:28Z DEBUG [firewall] /sbin/iptables --append OUTPUT -o eth0 -s 172.16.0.205 -d 172.17.0.0/16 -j ACCEPT
2024-10-16T12:40:28.041291363Z 2024-10-16T12:40:28Z INFO [routing] default route found: interface eth0, gateway 172.16.0.202, assigned IP 172.16.0.205 and family v4
2024-10-16T12:40:28.041308073Z 2024-10-16T12:40:28Z INFO [routing] adding route for 172.16.0.0/16
2024-10-16T12:40:28.041311255Z 2024-10-16T12:40:28Z DEBUG [routing] ip route replace 172.16.0.0/16 via 172.16.0.202 dev eth0 table 199
2024-10-16T12:40:28.041358829Z 2024-10-16T12:40:28Z DEBUG [routing] ip rule add to 172.16.0.0/16 lookup 199 pref 99
2024-10-16T12:40:28.041446216Z 2024-10-16T12:40:28Z INFO [routing] adding route for 172.17.0.0/16
2024-10-16T12:40:28.041505755Z 2024-10-16T12:40:28Z DEBUG [routing] ip route replace 172.17.0.0/16 via 172.16.0.202 dev eth0 table 199
2024-10-16T12:40:28.041582738Z 2024-10-16T12:40:28Z DEBUG [routing] ip rule add to 172.17.0.0/16 lookup 199 pref 99
2024-10-16T12:40:28.041659446Z 2024-10-16T12:40:28Z DEBUG [routing] ip rule add to 172.16.0.202/32 lookup 254 pref 98
2024-10-16T12:40:28.041707241Z 2024-10-16T12:40:28Z DEBUG [routing] ip rule add to fe80::/64 lookup 254 pref 98
2024-10-16T12:40:28.041759895Z 2024-10-16T12:40:28Z INFO TUN device is not available: open /dev/net/tun: no such file or directory; creating it...
2024-10-16T12:40:28.041824104Z 2024-10-16T12:40:28Z INFO [firewall] setting allowed input port 10095 through interface eth0...
2024-10-16T12:40:28.041901668Z 2024-10-16T12:40:28Z DEBUG [firewall] /sbin/iptables --append INPUT -i eth0 -p tcp -m tcp --dport 10095 -j ACCEPT
2024-10-16T12:40:28.042711709Z 2024-10-16T12:40:28Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i eth0 -p tcp -m tcp --dport 10095 -j ACCEPT
2024-10-16T12:40:28.043483668Z 2024-10-16T12:40:28Z DEBUG [firewall] /sbin/iptables --append INPUT -i eth0 -p udp -m udp --dport 10095 -j ACCEPT
2024-10-16T12:40:28.044403791Z 2024-10-16T12:40:28Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i eth0 -p udp -m udp --dport 10095 -j ACCEPT
2024-10-16T12:40:28.045285475Z 2024-10-16T12:40:28Z INFO [firewall] setting allowed input port 8000 through interface eth0...
2024-10-16T12:40:28.045313821Z 2024-10-16T12:40:28Z DEBUG [firewall] /sbin/iptables --append INPUT -i eth0 -p tcp -m tcp --dport 8000 -j ACCEPT
2024-10-16T12:40:28.046422281Z 2024-10-16T12:40:28Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i eth0 -p tcp -m tcp --dport 8000 -j ACCEPT
2024-10-16T12:40:28.047249981Z 2024-10-16T12:40:28Z DEBUG [firewall] /sbin/iptables --append INPUT -i eth0 -p udp -m udp --dport 8000 -j ACCEPT
2024-10-16T12:40:28.048083846Z 2024-10-16T12:40:28Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i eth0 -p udp -m udp --dport 8000 -j ACCEPT
2024-10-16T12:40:28.049122377Z 2024-10-16T12:40:28Z INFO [dns] using plaintext DNS at address 1.1.1.1
2024-10-16T12:40:28.049212872Z 2024-10-16T12:40:28Z INFO [http proxy] listening on :8888
2024-10-16T12:40:28.049405362Z 2024-10-16T12:40:28Z INFO [http server] http server listening on [::]:8000
2024-10-16T12:40:28.049414840Z 2024-10-16T12:40:28Z DEBUG [wireguard] Wireguard server public key: +WRsjA7z/PQqasrqiUVo3Tug+go7W2DXjO2p3TTeagk=
2024-10-16T12:40:28.049417592Z 2024-10-16T12:40:28Z DEBUG [wireguard] Wireguard client private key: cL5...Fg=
2024-10-16T12:40:28.049419755Z 2024-10-16T12:40:28Z DEBUG [wireguard] Wireguard pre-shared key: [not set]
2024-10-16T12:40:28.049422238Z 2024-10-16T12:40:28Z INFO [firewall] allowing VPN connection...
2024-10-16T12:40:28.049428220Z 2024-10-16T12:40:28Z INFO [healthcheck] listening on 127.0.0.1:9999
2024-10-16T12:40:28.049550163Z 2024-10-16T12:40:28Z DEBUG [firewall] /sbin/iptables --append OUTPUT -d 138.199.6.179 -o eth0 -p udp -m udp --dport 51820 -j ACCEPT
2024-10-16T12:40:28.051185445Z 2024-10-16T12:40:28Z DEBUG [firewall] /sbin/iptables --append OUTPUT -o tun0 -j ACCEPT
2024-10-16T12:40:28.052130172Z 2024-10-16T12:40:28Z DEBUG [firewall] /sbin/ip6tables --append OUTPUT -o tun0 -j ACCEPT
2024-10-16T12:40:28.053264417Z 2024-10-16T12:40:28Z INFO [wireguard] Using available kernelspace implementation
2024-10-16T12:40:28.053876589Z 2024-10-16T12:40:28Z INFO [wireguard] Connecting to 138.199.6.179:51820
2024-10-16T12:40:28.054214008Z 2024-10-16T12:40:28Z INFO [wireguard] existing rules are:
2024-10-16T12:40:28.054222099Z ip rule 0: from all to all table 255
2024-10-16T12:40:28.054224930Z ip rule 98: from all to fe80::/64 table 254
2024-10-16T12:40:28.054227106Z ip rule 101: from all to all table 51820
2024-10-16T12:40:28.054230360Z ip rule 32766: from all to all table 254
2024-10-16T12:40:28.054244294Z 2024-10-16T12:40:28Z DEBUG [wireguard] closing controller client...
2024-10-16T12:40:28.054287950Z 2024-10-16T12:40:28Z DEBUG [wireguard] shutting down link...
2024-10-16T12:40:28.054321183Z 2024-10-16T12:40:28Z ERROR [vpn] adding IPv6 rule: adding rule ip rule 101: from all to all table 51820: file exists
2024-10-16T12:40:28.054325582Z 2024-10-16T12:40:28Z INFO [vpn] retrying in 15s
2024-10-16T12:40:28.093583668Z 2024-10-16T12:40:28Z DEBUG [wireguard] deleting link...
2024-10-16T12:40:34.049663697Z 2024-10-16T12:40:34Z INFO [healthcheck] program has been unhealthy for 6s: restarting VPN
2024-10-16T12:40:34.049685918Z 2024-10-16T12:40:34Z INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-16T12:40:34.049689653Z 2024-10-16T12:40:34Z INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-16T12:40:36.804952765Z 2024-10-16T12:40:36Z WARN [http server] route GET /v1/openvpn/portforwarded is unprotected by default, please set up authentication following the documentation at https://github.com/qdm12/gluetun-wiki/setup/advanced/control-server.md#authentication since this will become no longer publicly accessible after release v3.40.
2024-10-16T12:40:36.804979028Z 2024-10-16T12:40:36Z DEBUG [http server] access to route GET /v1/openvpn/portforwarded authorized for role public
2024-10-16T12:40:36.804990115Z 2024-10-16T12:40:36Z INFO [http server] 200 GET /portforwarded wrote 11B to 172.16.0.122:54690 in 43.884µs
2024-10-16T12:40:43.054412189Z 2024-10-16T12:40:43Z DEBUG [wireguard] Wireguard server public key: +WRsjA7z/PQqasrqiUVo3Tug+go7W2DXjO2p3TTeagk=
2024-10-16T12:40:43.054436502Z 2024-10-16T12:40:43Z DEBUG [wireguard] Wireguard client private key: cL5...Fg=
2024-10-16T12:40:43.054439721Z 2024-10-16T12:40:43Z DEBUG [wireguard] Wireguard pre-shared key: [not set]
2024-10-16T12:40:43.054442233Z 2024-10-16T12:40:43Z INFO [firewall] allowing VPN connection...
2024-10-16T12:40:43.054516338Z 2024-10-16T12:40:43Z INFO [wireguard] Using available kernelspace implementation
2024-10-16T12:40:43.055384038Z 2024-10-16T12:40:43Z INFO [wireguard] Connecting to 138.199.6.179:51820
2024-10-16T12:40:43.055658450Z 2024-10-16T12:40:43Z INFO [wireguard] existing rules are:
2024-10-16T12:40:43.055665878Z ip rule 0: from all to all table 255
2024-10-16T12:40:43.055670121Z ip rule 98: from all to fe80::/64 table 254
2024-10-16T12:40:43.055672327Z ip rule 101: from all to all table 51820
2024-10-16T12:40:43.055674562Z ip rule 32766: from all to all table 254
2024-10-16T12:40:43.055676924Z 2024-10-16T12:40:43Z DEBUG [wireguard] closing controller client...
2024-10-16T12:40:43.055682765Z 2024-10-16T12:40:43Z DEBUG [wireguard] shutting down link...
2024-10-16T12:40:43.055703579Z 2024-10-16T12:40:43Z ERROR [vpn] adding IPv6 rule: adding rule ip rule 101: from all to all table 51820: file exists

With provider:custom is fails straight away, when I set the provider to protonvpn the VPN connects, everything works for between 5 tot 20 minutes. Qbittorrent can download with 200mbps in that time, then the VPN becomes unhealthy, restarts and 'bootloops' with the same iptables file exists error from which it never recovers (unless i manually restart the pod, then it works again for sometime before it fails again).

@qdm12
Copy link
Owner

qdm12 commented Oct 19, 2024

Thanks @leovanalphen for trying that image! 👍

I'm running into the same issue. Tried to run pr-2526 image but get the same behavior.

There is no fix in the image, it just logs out existing rules if adding a rule fails with file exists in its error message. And it looks like ip rule 101: from all to all table 51820 is already existing, so it makes sense it fails to add it with file exists. Now, that rule should NOT be present, especially not on a first run.

I've updated the ip rule debug logs to be better than before in commit 3dfb43e which is both in the lastest image and that image tag :pr-2562;
can you please docker pull qmcgaw/gluetun:pr-2562, restart a gluetun container using that image and copy paste the logs (especially the ip rule xxx debug logs) to see what's up? I would really like to find out what wrongly adds that ipv6 rule before it tries to rightfully add it. Thanks!

@leovanalphen
Copy link

@qdm12 No worries, glad to be able to contribute in some way. Thank you for sharing your work with all of us.

I just repulled pr-2526, waited a couple of minutes for the VPN to become unhealthy. And to my surprise this time the HC kicked in, restarted the VPN and it came back up first try. My test transfer over the VPN just kept running with a barely noticeable temporary slow down. So far it has recovered without issue three times. Added my logs below.

I haven't changed anything in my setup other than repull pr-2526. For completeness, I'm running on Kubernetes 1.30 using Talos as underlying OS. Chart I'm using as a base is from truecharts, I just edited the image url to point to pr-2526.

2024-10-19T14:36:25.049984172Z ========================================
2024-10-19T14:36:25.050008555Z ========================================
2024-10-19T14:36:25.050017523Z =============== gluetun ================
2024-10-19T14:36:25.050019941Z ========================================
2024-10-19T14:36:25.050022055Z =========== Made with ❤️ by ============
2024-10-19T14:36:25.050024209Z ======= https://github.com/qdm12 =======
2024-10-19T14:36:25.050026637Z ========================================
2024-10-19T14:36:25.050028770Z ========================================
2024-10-19T14:36:25.050030784Z 
2024-10-19T14:36:25.050033317Z Running version pr-2529 built on 2024-10-19T14:19:51.961Z (commit 4001cf6)
2024-10-19T14:36:25.050035310Z 
2024-10-19T14:36:25.050037632Z 📣 All control server routes will become private by default after the v3.41.0 release
2024-10-19T14:36:25.050039790Z 
2024-10-19T14:36:25.050042210Z 🔧 Need help? ☕ Discussion? https://github.com/qdm12/gluetun/discussions/new/choose
2024-10-19T14:36:25.050044567Z 🐛 Bug? ✨ New feature? https://github.com/qdm12/gluetun/issues/new/choose
2024-10-19T14:36:25.050047010Z 💻 Email? quentin.mcgaw@gmail.com
2024-10-19T14:36:25.050049224Z 💰 Help me? https://www.paypal.me/qmcgaw https://github.com/sponsors/qdm12
2024-10-19T14:36:25.050945628Z 2024-10-19T14:36:25Z WARN You are using the old environment variable UID, please consider changing it to PUID
2024-10-19T14:36:25.050962859Z 2024-10-19T14:36:25Z WARN You are using the old environment variable GID, please consider changing it to PGID
2024-10-19T14:36:25.052535989Z 2024-10-19T14:36:25Z INFO [routing] default route found: interface eth0, gateway 172.16.0.202, assigned IP 172.16.0.62 and family v4
2024-10-19T14:36:25.052575217Z 2024-10-19T14:36:25Z INFO [routing] local ethernet link found: eth0
2024-10-19T14:36:25.052613802Z 2024-10-19T14:36:25Z INFO [routing] local ipnet found: 172.16.0.202/32
2024-10-19T14:36:25.052718520Z 2024-10-19T14:36:25Z INFO [routing] local ipnet found: fe80::/64
2024-10-19T14:36:25.146623455Z 2024-10-19T14:36:25Z INFO [firewall] enabling...
2024-10-19T14:36:25.146637575Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/iptables --policy INPUT DROP
2024-10-19T14:36:25.204979987Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/iptables --policy OUTPUT DROP
2024-10-19T14:36:25.227165440Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/iptables --policy FORWARD DROP
2024-10-19T14:36:25.228156179Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/ip6tables --policy INPUT DROP
2024-10-19T14:36:25.260979740Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/ip6tables --policy OUTPUT DROP
2024-10-19T14:36:25.281014825Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/ip6tables --policy FORWARD DROP
2024-10-19T14:36:25.317139847Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/iptables --append INPUT -i lo -j ACCEPT
2024-10-19T14:36:25.318990165Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i lo -j ACCEPT
2024-10-19T14:36:25.320978646Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/iptables --append OUTPUT -o lo -j ACCEPT
2024-10-19T14:36:25.322949630Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/ip6tables --append OUTPUT -o lo -j ACCEPT
2024-10-19T14:36:25.325218726Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/iptables --append OUTPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
2024-10-19T14:36:25.327041761Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/ip6tables --append OUTPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
2024-10-19T14:36:25.328950881Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/iptables --append INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
2024-10-19T14:36:25.331031186Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/ip6tables --append INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
2024-10-19T14:36:25.333081607Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/iptables --append OUTPUT -o eth0 -s 172.16.0.62 -d 172.16.0.202/32 -j ACCEPT
2024-10-19T14:36:25.334685935Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/ip6tables --append OUTPUT -o eth0 -d ff02::1:ff00:0/104 -j ACCEPT
2024-10-19T14:36:25.336529552Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/ip6tables --append OUTPUT -o eth0 -s fe80::9cea:98ff:feee:d0ed -d fe80::/64 -j ACCEPT
2024-10-19T14:36:25.339601480Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/iptables --append INPUT -i eth0 -d 172.16.0.202/32 -j ACCEPT
2024-10-19T14:36:25.341714072Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i eth0 -d fe80::/64 -j ACCEPT
2024-10-19T14:36:25.343119387Z 2024-10-19T14:36:25Z INFO [firewall] enabled successfully
2024-10-19T14:36:25.559304985Z 2024-10-19T14:36:25Z INFO [storage] creating /gluetun/servers.json with 20553 hardcoded servers
2024-10-19T14:36:25.626676880Z 2024-10-19T14:36:25Z DEBUG [netlink] IPv6 is supported by link eth0
2024-10-19T14:36:25.626938722Z 2024-10-19T14:36:25Z INFO Alpine version: 3.20.3
2024-10-19T14:36:25.628602728Z 2024-10-19T14:36:25Z INFO OpenVPN 2.5 version: 2.5.10
2024-10-19T14:36:25.630718359Z 2024-10-19T14:36:25Z INFO OpenVPN 2.6 version: 2.6.11
2024-10-19T14:36:25.631355101Z 2024-10-19T14:36:25Z INFO IPtables version: v1.8.10
2024-10-19T14:36:25.631479927Z 2024-10-19T14:36:25Z INFO Settings summary:
2024-10-19T14:36:25.631487541Z ├── VPN settings:
2024-10-19T14:36:25.631491870Z |   ├── VPN provider settings:
2024-10-19T14:36:25.631496414Z |   |   ├── Name: custom
2024-10-19T14:36:25.631500631Z |   |   ├── Server selection settings:
2024-10-19T14:36:25.631508660Z |   |   |   ├── VPN type: wireguard
2024-10-19T14:36:25.631512726Z |   |   |   └── Wireguard selection settings:
2024-10-19T14:36:25.631517057Z |   |   |       ├── Endpoint IP address: 138.199.6.179
2024-10-19T14:36:25.631521394Z |   |   |       ├── Endpoint port: 51820
2024-10-19T14:36:25.631525634Z |   |   |       └── Server public key: +WRsjA7z/PQqasrqiUVo3Tug+go7W2DXjO2p3TTeagk=
2024-10-19T14:36:25.631529757Z |   |   └── Automatic port forwarding settings:
2024-10-19T14:36:25.631533721Z |   |       ├── Redirection listening port: disabled
2024-10-19T14:36:25.631537605Z |   |       ├── Use code for provider: protonvpn
2024-10-19T14:36:25.631542070Z |   |       └── Forwarded port file path: /tmp/gluetun/forwarded_port
2024-10-19T14:36:25.631546111Z |   └── Wireguard settings:
2024-10-19T14:36:25.631550080Z |       ├── Private key: cL5...Fg=
2024-10-19T14:36:25.631554410Z |       ├── Interface addresses:
2024-10-19T14:36:25.631558396Z |       |   └── 10.2.0.2/32
2024-10-19T14:36:25.631562323Z |       ├── Allowed IPs:
2024-10-19T14:36:25.631566162Z |       |   ├── 0.0.0.0/0
2024-10-19T14:36:25.631569992Z |       |   └── ::/0
2024-10-19T14:36:25.631574493Z |       └── Network interface: tun0
2024-10-19T14:36:25.631579025Z |           └── MTU: 1400
2024-10-19T14:36:25.631583390Z ├── DNS settings:
2024-10-19T14:36:25.631587711Z |   ├── Keep existing nameserver(s): no
2024-10-19T14:36:25.631591870Z |   ├── DNS server address to use: 127.0.0.1
2024-10-19T14:36:25.631595815Z |   └── DNS over TLS settings:
2024-10-19T14:36:25.631599994Z |       ├── Enabled: yes
2024-10-19T14:36:25.631604271Z |       ├── Update period: every 24h0m0s
2024-10-19T14:36:25.631608231Z |       ├── Upstream resolvers:
2024-10-19T14:36:25.631612181Z |       |   └── cloudflare
2024-10-19T14:36:25.631625269Z |       ├── Caching: yes
2024-10-19T14:36:25.631629820Z |       ├── IPv6: no
2024-10-19T14:36:25.631634036Z |       └── DNS filtering settings:
2024-10-19T14:36:25.631638258Z |           ├── Block malicious: yes
2024-10-19T14:36:25.631642619Z |           ├── Block ads: no
2024-10-19T14:36:25.631646588Z |           ├── Block surveillance: no
2024-10-19T14:36:25.631650651Z |           └── Blocked IP networks:
2024-10-19T14:36:25.631654964Z |               ├── 127.0.0.1/8
2024-10-19T14:36:25.631659383Z |               ├── 10.0.0.0/8
2024-10-19T14:36:25.631663314Z |               ├── 172.16.0.0/12
2024-10-19T14:36:25.631667230Z |               ├── 192.168.0.0/16
2024-10-19T14:36:25.631671228Z |               ├── 169.254.0.0/16
2024-10-19T14:36:25.631675547Z |               ├── ::1/128
2024-10-19T14:36:25.631679682Z |               ├── fc00::/7
2024-10-19T14:36:25.631683679Z |               ├── fe80::/10
2024-10-19T14:36:25.631687590Z |               ├── ::ffff:127.0.0.1/104
2024-10-19T14:36:25.631691520Z |               ├── ::ffff:10.0.0.0/104
2024-10-19T14:36:25.631695560Z |               ├── ::ffff:169.254.0.0/112
2024-10-19T14:36:25.631702556Z |               ├── ::ffff:172.16.0.0/108
2024-10-19T14:36:25.631706836Z |               └── ::ffff:192.168.0.0/112
2024-10-19T14:36:25.631711145Z ├── Firewall settings:
2024-10-19T14:36:25.631715213Z |   ├── Enabled: yes
2024-10-19T14:36:25.631719340Z |   ├── Debug mode: on
2024-10-19T14:36:25.631723238Z |   ├── Input ports:
2024-10-19T14:36:25.631727221Z |   |   ├── 10095
2024-10-19T14:36:25.631731517Z |   |   └── 8000
2024-10-19T14:36:25.631735525Z |   └── Outbound subnets:
2024-10-19T14:36:25.631739645Z |       ├── 172.16.0.0/16
2024-10-19T14:36:25.631743842Z |       └── 172.17.0.0/16
2024-10-19T14:36:25.631747854Z ├── Log settings:
2024-10-19T14:36:25.631751568Z |   └── Log level: debug
2024-10-19T14:36:25.631755586Z ├── Health settings:
2024-10-19T14:36:25.631759747Z |   ├── Server listening address: 127.0.0.1:9999
2024-10-19T14:36:25.631763605Z |   ├── Target address: cloudflare.com:443
2024-10-19T14:36:25.631767945Z |   ├── Duration to wait after success: 5s
2024-10-19T14:36:25.631772070Z |   ├── Read header timeout: 100ms
2024-10-19T14:36:25.631776169Z |   ├── Read timeout: 500ms
2024-10-19T14:36:25.631780005Z |   └── VPN wait durations:
2024-10-19T14:36:25.631784160Z |       ├── Initial duration: 6s
2024-10-19T14:36:25.631788239Z |       └── Additional duration: 5s
2024-10-19T14:36:25.631792216Z ├── Shadowsocks server settings:
2024-10-19T14:36:25.631796091Z |   └── Enabled: no
2024-10-19T14:36:25.631800308Z ├── HTTP proxy settings:
2024-10-19T14:36:25.631804340Z |   ├── Enabled: yes
2024-10-19T14:36:25.631808337Z |   ├── Listening address: :8888
2024-10-19T14:36:25.631812502Z |   ├── User: 
2024-10-19T14:36:25.631817056Z |   ├── Password: [not set]
2024-10-19T14:36:25.631820895Z |   ├── Stealth mode: no
2024-10-19T14:36:25.631825150Z |   ├── Log: yes
2024-10-19T14:36:25.631830066Z |   ├── Read header timeout: 1s
2024-10-19T14:36:25.631834105Z |   └── Read timeout: 3s
2024-10-19T14:36:25.631838092Z ├── Control server settings:
2024-10-19T14:36:25.631842286Z |   ├── Listening address: :8000
2024-10-19T14:36:25.631846261Z |   ├── Logging: yes
2024-10-19T14:36:25.631852809Z |   └── Authentication file path: /gluetun/auth/config.toml
2024-10-19T14:36:25.631857219Z ├── Storage settings:
2024-10-19T14:36:25.631861261Z |   └── Filepath: /gluetun/servers.json
2024-10-19T14:36:25.631865257Z ├── OS Alpine settings:
2024-10-19T14:36:25.631868844Z |   ├── Process UID: 568
2024-10-19T14:36:25.631872515Z |   ├── Process GID: 568
2024-10-19T14:36:25.631876605Z |   └── Timezone: UTC
2024-10-19T14:36:25.631880544Z ├── Public IP settings:
2024-10-19T14:36:25.631883517Z |   ├── IP file path: /tmp/gluetun/ip
2024-10-19T14:36:25.631886390Z |   ├── Public IP data base API: ipinfo
2024-10-19T14:36:25.631889336Z |   └── Public IP data backup APIs:
2024-10-19T14:36:25.631892325Z |       ├── ifconfigco
2024-10-19T14:36:25.631896187Z |       ├── ip2location
2024-10-19T14:36:25.631900039Z |       └── cloudflare
2024-10-19T14:36:25.631904238Z └── Version settings:
2024-10-19T14:36:25.631908484Z     └── Enabled: yes
2024-10-19T14:36:25.632442848Z 2024-10-19T14:36:25Z INFO [routing] default route found: interface eth0, gateway 172.16.0.202, assigned IP 172.16.0.62 and family v4
2024-10-19T14:36:25.632449774Z 2024-10-19T14:36:25Z DEBUG [netlink] ip -4 rule list
2024-10-19T14:36:25.632453890Z 2024-10-19T14:36:25Z DEBUG [netlink] ip -6 rule list
2024-10-19T14:36:25.632467850Z 2024-10-19T14:36:25Z DEBUG [netlink] ip rule add from 172.16.0.62/32 lookup 200 pref 100
2024-10-19T14:36:25.632522003Z 2024-10-19T14:36:25Z INFO [routing] adding route for 0.0.0.0/0
2024-10-19T14:36:25.632526120Z 2024-10-19T14:36:25Z DEBUG [routing] ip route replace 0.0.0.0/0 via 172.16.0.202 dev eth0 table 200
2024-10-19T14:36:25.632610026Z 2024-10-19T14:36:25Z INFO [firewall] setting allowed subnets...
2024-10-19T14:36:25.632639670Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/iptables --append OUTPUT -o eth0 -s 172.16.0.62 -d 172.16.0.0/16 -j ACCEPT
2024-10-19T14:36:25.633759501Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/iptables --append OUTPUT -o eth0 -s 172.16.0.62 -d 172.17.0.0/16 -j ACCEPT
2024-10-19T14:36:25.634686033Z 2024-10-19T14:36:25Z INFO [routing] default route found: interface eth0, gateway 172.16.0.202, assigned IP 172.16.0.62 and family v4
2024-10-19T14:36:25.634688972Z 2024-10-19T14:36:25Z INFO [routing] adding route for 172.16.0.0/16
2024-10-19T14:36:25.634691211Z 2024-10-19T14:36:25Z DEBUG [routing] ip route replace 172.16.0.0/16 via 172.16.0.202 dev eth0 table 199
2024-10-19T14:36:25.634726212Z 2024-10-19T14:36:25Z DEBUG [netlink] ip -4 rule list
2024-10-19T14:36:25.634729232Z 2024-10-19T14:36:25Z DEBUG [netlink] ip -6 rule list
2024-10-19T14:36:25.634747185Z 2024-10-19T14:36:25Z DEBUG [netlink] ip rule add to 172.16.0.0/16 lookup 199 pref 99
2024-10-19T14:36:25.634774850Z 2024-10-19T14:36:25Z INFO [routing] adding route for 172.17.0.0/16
2024-10-19T14:36:25.634777923Z 2024-10-19T14:36:25Z DEBUG [routing] ip route replace 172.17.0.0/16 via 172.16.0.202 dev eth0 table 199
2024-10-19T14:36:25.634810991Z 2024-10-19T14:36:25Z DEBUG [netlink] ip -4 rule list
2024-10-19T14:36:25.634813630Z 2024-10-19T14:36:25Z DEBUG [netlink] ip -6 rule list
2024-10-19T14:36:25.634834059Z 2024-10-19T14:36:25Z DEBUG [netlink] ip rule add to 172.17.0.0/16 lookup 199 pref 99
2024-10-19T14:36:25.634854871Z 2024-10-19T14:36:25Z DEBUG [netlink] ip -4 rule list
2024-10-19T14:36:25.634857317Z 2024-10-19T14:36:25Z DEBUG [netlink] ip -6 rule list
2024-10-19T14:36:25.634884745Z 2024-10-19T14:36:25Z DEBUG [netlink] ip rule add to 172.16.0.202/32 lookup 254 pref 98
2024-10-19T14:36:25.634893654Z 2024-10-19T14:36:25Z DEBUG [netlink] ip -4 rule list
2024-10-19T14:36:25.634896049Z 2024-10-19T14:36:25Z DEBUG [netlink] ip -6 rule list
2024-10-19T14:36:25.634931438Z 2024-10-19T14:36:25Z DEBUG [netlink] ip rule add to fe80::/64 lookup 254 pref 98
2024-10-19T14:36:25.634967673Z 2024-10-19T14:36:25Z INFO TUN device is not available: open /dev/net/tun: no such file or directory; creating it...
2024-10-19T14:36:25.634995946Z 2024-10-19T14:36:25Z INFO [firewall] setting allowed input port 10095 through interface eth0...
2024-10-19T14:36:25.635032142Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/iptables --append INPUT -i eth0 -p tcp -m tcp --dport 10095 -j ACCEPT
2024-10-19T14:36:25.636184072Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i eth0 -p tcp -m tcp --dport 10095 -j ACCEPT
2024-10-19T14:36:25.637140809Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/iptables --append INPUT -i eth0 -p udp -m udp --dport 10095 -j ACCEPT
2024-10-19T14:36:25.638137722Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i eth0 -p udp -m udp --dport 10095 -j ACCEPT
2024-10-19T14:36:25.639671519Z 2024-10-19T14:36:25Z INFO [firewall] setting allowed input port 8000 through interface eth0...
2024-10-19T14:36:25.639684015Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/iptables --append INPUT -i eth0 -p tcp -m tcp --dport 8000 -j ACCEPT
2024-10-19T14:36:25.640924840Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i eth0 -p tcp -m tcp --dport 8000 -j ACCEPT
2024-10-19T14:36:25.641992346Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/iptables --append INPUT -i eth0 -p udp -m udp --dport 8000 -j ACCEPT
2024-10-19T14:36:25.643540485Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i eth0 -p udp -m udp --dport 8000 -j ACCEPT
2024-10-19T14:36:25.644830531Z 2024-10-19T14:36:25Z INFO [dns] using plaintext DNS at address 1.1.1.1
2024-10-19T14:36:25.644890254Z 2024-10-19T14:36:25Z INFO [http proxy] listening on :8888
2024-10-19T14:36:25.645025728Z 2024-10-19T14:36:25Z INFO [http server] http server listening on [::]:8000
2024-10-19T14:36:25.645122165Z 2024-10-19T14:36:25Z DEBUG [wireguard] Wireguard server public key: +WRsjA7z/PQqasrqiUVo3Tug+go7W2DXjO2p3TTeagk=
2024-10-19T14:36:25.645169051Z 2024-10-19T14:36:25Z DEBUG [wireguard] Wireguard client private key: cL5...Fg=
2024-10-19T14:36:25.645173882Z 2024-10-19T14:36:25Z DEBUG [wireguard] Wireguard pre-shared key: [not set]
2024-10-19T14:36:25.645178286Z 2024-10-19T14:36:25Z INFO [healthcheck] listening on 127.0.0.1:9999
2024-10-19T14:36:25.645182443Z 2024-10-19T14:36:25Z INFO [firewall] allowing VPN connection...
2024-10-19T14:36:25.645214135Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/iptables --append OUTPUT -d 138.199.6.179 -o eth0 -p udp -m udp --dport 51820 -j ACCEPT
2024-10-19T14:36:25.646585661Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/iptables --append OUTPUT -o tun0 -j ACCEPT
2024-10-19T14:36:25.647663405Z 2024-10-19T14:36:25Z DEBUG [firewall] /sbin/ip6tables --append OUTPUT -o tun0 -j ACCEPT
2024-10-19T14:36:25.649519719Z 2024-10-19T14:36:25Z INFO [wireguard] Using available kernelspace implementation
2024-10-19T14:36:25.650070648Z 2024-10-19T14:36:25Z INFO [wireguard] Connecting to 138.199.6.179:51820
2024-10-19T14:36:25.650424596Z 2024-10-19T14:36:25Z DEBUG [netlink] ip rule add lookup 51820 pref 101
2024-10-19T14:36:25.650441791Z 2024-10-19T14:36:25Z DEBUG [netlink] ip rule add lookup 51820 pref 101
2024-10-19T14:36:25.650465757Z 2024-10-19T14:36:25Z INFO [wireguard] Wireguard setup is complete. Note Wireguard is a silent protocol and it may or may not work, without giving any error message. Typically i/o timeout errors indicate the Wireguard connection is not working.
2024-10-19T14:36:25.750004560Z 2024-10-19T14:36:25Z INFO [dns] downloading hostnames and IP block lists
2024-10-19T14:36:30.772843942Z 2024-10-19T14:36:30Z INFO [healthcheck] healthy!
2024-10-19T14:36:31.422463973Z 2024-10-19T14:36:31Z INFO [dns] DNS server listening on [::]:53
2024-10-19T14:36:31.835855713Z 2024-10-19T14:36:31Z INFO [dns] ready
2024-10-19T14:36:32.152275666Z 2024-10-19T14:36:32Z INFO [ip getter] Public IP address is 149.22.89.78 (Switzerland, Zurich, Zürich - source: ipinfo)
2024-10-19T14:36:32.775349011Z 2024-10-19T14:36:32Z INFO [vpn] There is a new release v3.39.1 (v3.39.1) created 19 days ago
2024-10-19T14:36:32.775377245Z 2024-10-19T14:36:32Z INFO [port forwarding] starting
2024-10-19T14:36:32.809525452Z 2024-10-19T14:36:32Z INFO [port forwarding] gateway external IPv4 address is 149.22.89.78
2024-10-19T14:36:32.882594253Z 2024-10-19T14:36:32Z INFO [port forwarding] port forwarded is 64506
2024-10-19T14:36:32.882617164Z 2024-10-19T14:36:32Z INFO [firewall] setting allowed input port 64506 through interface tun0...
2024-10-19T14:36:32.882622730Z 2024-10-19T14:36:32Z DEBUG [firewall] /sbin/iptables --append INPUT -i tun0 -p tcp -m tcp --dport 64506 -j ACCEPT
2024-10-19T14:36:32.883656720Z 2024-10-19T14:36:32Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i tun0 -p tcp -m tcp --dport 64506 -j ACCEPT
2024-10-19T14:36:32.884520615Z 2024-10-19T14:36:32Z DEBUG [firewall] /sbin/iptables --append INPUT -i tun0 -p udp -m udp --dport 64506 -j ACCEPT
2024-10-19T14:36:32.885444654Z 2024-10-19T14:36:32Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i tun0 -p udp -m udp --dport 64506 -j ACCEPT
2024-10-19T14:36:32.886437264Z 2024-10-19T14:36:32Z INFO [port forwarding] writing port file /tmp/gluetun/forwarded_port
2024-10-19T14:36:35.833687059Z 2024-10-19T14:36:35Z WARN [http server] route GET /v1/openvpn/portforwarded is unprotected by default, please set up authentication following the documentation at https://github.com/qdm12/gluetun-wiki/setup/advanced/control-server.md#authentication since this will become no longer publicly accessible after release v3.40.
2024-10-19T14:36:35.833777243Z 2024-10-19T14:36:35Z DEBUG [http server] access to route GET /v1/openvpn/portforwarded authorized for role public
2024-10-19T14:36:35.833783813Z 2024-10-19T14:36:35Z INFO [http server] 200 GET /portforwarded wrote 15B to 172.16.0.144:43590 in 56.268µs
2024-10-19T14:37:17.887543387Z 2024-10-19T14:37:17Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:37:17.963809621Z 2024-10-19T14:37:17Z DEBUG [port forwarding] port forwarded 64506 maintained
2024-10-19T14:38:02.963886219Z 2024-10-19T14:38:02Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:38:03.031178757Z 2024-10-19T14:38:03Z DEBUG [port forwarding] port forwarded 64506 maintained
2024-10-19T14:38:48.031834393Z 2024-10-19T14:38:48Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:38:48.099113304Z 2024-10-19T14:38:48Z DEBUG [port forwarding] port forwarded 64506 maintained
2024-10-19T14:39:33.099857845Z 2024-10-19T14:39:33Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:39:33.169087015Z 2024-10-19T14:39:33Z DEBUG [port forwarding] port forwarded 64506 maintained
2024-10-19T14:40:00.933900546Z 2024-10-19T14:40:00Z WARN [http server] route GET /v1/openvpn/portforwarded is unprotected by default, please set up authentication following the documentation at https://github.com/qdm12/gluetun-wiki/setup/advanced/control-server.md#authentication since this will become no longer publicly accessible after release v3.40.
2024-10-19T14:40:00.933926086Z 2024-10-19T14:40:00Z DEBUG [http server] access to route GET /v1/openvpn/portforwarded authorized for role public
2024-10-19T14:40:00.933935404Z 2024-10-19T14:40:00Z INFO [http server] 200 GET /portforwarded wrote 15B to 172.16.0.106:32816 in 53.753µs
2024-10-19T14:40:18.169521083Z 2024-10-19T14:40:18Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:40:18.237901645Z 2024-10-19T14:40:18Z DEBUG [port forwarding] port forwarded 64506 maintained
2024-10-19T14:40:55.885671785Z 2024-10-19T14:40:55Z WARN [http server] route GET /v1/openvpn/portforwarded is unprotected by default, please set up authentication following the documentation at https://github.com/qdm12/gluetun-wiki/setup/advanced/control-server.md#authentication since this will become no longer publicly accessible after release v3.40.
2024-10-19T14:40:55.885701050Z 2024-10-19T14:40:55Z DEBUG [http server] access to route GET /v1/openvpn/portforwarded authorized for role public
2024-10-19T14:40:55.885706428Z 2024-10-19T14:40:55Z INFO [http server] 200 GET /portforwarded wrote 15B to 172.16.0.74:34274 in 47.12µs
2024-10-19T14:41:03.238840702Z 2024-10-19T14:41:03Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:41:03.322718571Z 2024-10-19T14:41:03Z DEBUG [port forwarding] port forwarded 64506 maintained
2024-10-19T14:41:48.323974662Z 2024-10-19T14:41:48Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:41:48.391751454Z 2024-10-19T14:41:48Z DEBUG [port forwarding] port forwarded 64506 maintained
2024-10-19T14:42:33.391692122Z 2024-10-19T14:42:33Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:42:33.485003229Z 2024-10-19T14:42:33Z DEBUG [port forwarding] port forwarded 64506 maintained
2024-10-19T14:43:18.486052894Z 2024-10-19T14:43:18Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:43:18.553414818Z 2024-10-19T14:43:18Z DEBUG [port forwarding] port forwarded 64506 maintained
2024-10-19T14:44:03.553517652Z 2024-10-19T14:44:03Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:44:03.619965480Z 2024-10-19T14:44:03Z DEBUG [port forwarding] port forwarded 64506 maintained
2024-10-19T14:44:48.620302976Z 2024-10-19T14:44:48Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:44:48.685996516Z 2024-10-19T14:44:48Z DEBUG [port forwarding] port forwarded 64506 maintained
2024-10-19T14:45:00.985614429Z 2024-10-19T14:45:00Z WARN [http server] route GET /v1/openvpn/portforwarded is unprotected by default, please set up authentication following the documentation at https://github.com/qdm12/gluetun-wiki/setup/advanced/control-server.md#authentication since this will become no longer publicly accessible after release v3.40.
2024-10-19T14:45:00.985651811Z 2024-10-19T14:45:00Z DEBUG [http server] access to route GET /v1/openvpn/portforwarded authorized for role public
2024-10-19T14:45:00.985658779Z 2024-10-19T14:45:00Z INFO [http server] 200 GET /portforwarded wrote 15B to 172.16.0.244:60386 in 53.327µs
2024-10-19T14:45:33.686922450Z 2024-10-19T14:45:33Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:45:33.756375424Z 2024-10-19T14:45:33Z DEBUG [port forwarding] port forwarded 64506 maintained
2024-10-19T14:46:18.757162226Z 2024-10-19T14:46:18Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:46:18.826124980Z 2024-10-19T14:46:18Z DEBUG [port forwarding] port forwarded 64506 maintained
2024-10-19T14:47:03.826356075Z 2024-10-19T14:47:03Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:47:03.892916244Z 2024-10-19T14:47:03Z DEBUG [port forwarding] port forwarded 64506 maintained
2024-10-19T14:47:48.893911412Z 2024-10-19T14:47:48Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:47:48.961211391Z 2024-10-19T14:47:48Z DEBUG [port forwarding] port forwarded 64506 maintained
2024-10-19T14:48:16.805259429Z 2024-10-19T14:48:16Z DEBUG [healthcheck] unhealthy: dialing: dial tcp4 104.16.133.229:443: i/o timeout
2024-10-19T14:48:22.806687744Z 2024-10-19T14:48:22Z INFO [healthcheck] program has been unhealthy for 6s: restarting VPN
2024-10-19T14:48:22.806715268Z 2024-10-19T14:48:22Z INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-19T14:48:22.806720378Z 2024-10-19T14:48:22Z INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-19T14:48:22.806723691Z 2024-10-19T14:48:22Z INFO [vpn] stopping
2024-10-19T14:48:22.806739094Z 2024-10-19T14:48:22Z INFO [port forwarding] stopping
2024-10-19T14:48:22.806749121Z 2024-10-19T14:48:22Z INFO [firewall] removing allowed port 64506...
2024-10-19T14:48:22.806759092Z 2024-10-19T14:48:22Z DEBUG [firewall] /sbin/iptables -t filter -L INPUT --line-numbers -n -v
2024-10-19T14:48:22.808139050Z 2024-10-19T14:48:22Z DEBUG [firewall] found iptables chain rule matching "--delete INPUT -i tun0 -p tcp -m tcp --dport 64506 -j ACCEPT" at line number 8
2024-10-19T14:48:22.808156481Z 2024-10-19T14:48:22Z DEBUG [firewall] /sbin/iptables -t filter -D INPUT 8
2024-10-19T14:48:22.828960068Z 2024-10-19T14:48:22Z DEBUG [firewall] /sbin/ip6tables -t filter -L INPUT --line-numbers -n -v
2024-10-19T14:48:22.830283729Z 2024-10-19T14:48:22Z DEBUG [firewall] found iptables chain rule matching "--delete INPUT -i tun0 -p tcp -m tcp --dport 64506 -j ACCEPT" at line number 8
2024-10-19T14:48:22.830295630Z 2024-10-19T14:48:22Z DEBUG [firewall] /sbin/ip6tables -t filter -D INPUT 8
2024-10-19T14:48:22.856945816Z 2024-10-19T14:48:22Z DEBUG [firewall] /sbin/iptables -t filter -L INPUT --line-numbers -n -v
2024-10-19T14:48:22.858305340Z 2024-10-19T14:48:22Z DEBUG [firewall] found iptables chain rule matching "--delete INPUT -i tun0 -p udp -m udp --dport 64506 -j ACCEPT" at line number 8
2024-10-19T14:48:22.858328611Z 2024-10-19T14:48:22Z DEBUG [firewall] /sbin/iptables -t filter -D INPUT 8
2024-10-19T14:48:22.859453300Z 2024-10-19T14:48:22Z DEBUG [firewall] /sbin/ip6tables -t filter -L INPUT --line-numbers -n -v
2024-10-19T14:48:22.860578149Z 2024-10-19T14:48:22Z DEBUG [firewall] found iptables chain rule matching "--delete INPUT -i tun0 -p udp -m udp --dport 64506 -j ACCEPT" at line number 8
2024-10-19T14:48:22.860593425Z 2024-10-19T14:48:22Z DEBUG [firewall] /sbin/ip6tables -t filter -D INPUT 8
2024-10-19T14:48:22.896907172Z 2024-10-19T14:48:22Z INFO [port forwarding] removing port file /tmp/gluetun/forwarded_port
2024-10-19T14:48:22.896937497Z 2024-10-19T14:48:22Z DEBUG [wireguard] closing controller client...
2024-10-19T14:48:22.896941521Z 2024-10-19T14:48:22Z DEBUG [wireguard] removing IPv6 rule...
2024-10-19T14:48:22.896944687Z 2024-10-19T14:48:22Z DEBUG [netlink] ip rule del lookup 51820 pref 101
2024-10-19T14:48:22.897035527Z 2024-10-19T14:48:22Z DEBUG [wireguard] removing IPv4 rule...
2024-10-19T14:48:22.897046083Z 2024-10-19T14:48:22Z DEBUG [netlink] ip rule del lookup 51820 pref 101
2024-10-19T14:48:22.897055491Z 2024-10-19T14:48:22Z DEBUG [wireguard] shutting down link...
2024-10-19T14:48:22.961760720Z 2024-10-19T14:48:22Z DEBUG [wireguard] deleting link...
2024-10-19T14:48:23.084855224Z 2024-10-19T14:48:23Z INFO [vpn] starting
2024-10-19T14:48:23.084883656Z 2024-10-19T14:48:23Z DEBUG [wireguard] Wireguard server public key: +WRsjA7z/PQqasrqiUVo3Tug+go7W2DXjO2p3TTeagk=
2024-10-19T14:48:23.084888195Z 2024-10-19T14:48:23Z DEBUG [wireguard] Wireguard client private key: cL5...Fg=
2024-10-19T14:48:23.084891329Z 2024-10-19T14:48:23Z DEBUG [wireguard] Wireguard pre-shared key: [not set]
2024-10-19T14:48:23.084894511Z 2024-10-19T14:48:23Z INFO [firewall] allowing VPN connection...
2024-10-19T14:48:23.085597465Z 2024-10-19T14:48:23Z INFO [wireguard] Using available kernelspace implementation
2024-10-19T14:48:23.085618084Z 2024-10-19T14:48:23Z INFO [wireguard] Connecting to 138.199.6.179:51820
2024-10-19T14:48:23.085768477Z 2024-10-19T14:48:23Z DEBUG [netlink] ip rule add lookup 51820 pref 101
2024-10-19T14:48:23.085837408Z 2024-10-19T14:48:23Z DEBUG [netlink] ip rule add lookup 51820 pref 101
2024-10-19T14:48:23.085845856Z 2024-10-19T14:48:23Z INFO [wireguard] Wireguard setup is complete. Note Wireguard is a silent protocol and it may or may not work, without giving any error message. Typically i/o timeout errors indicate the Wireguard connection is not working.
2024-10-19T14:48:25.209943139Z 2024-10-19T14:48:25Z WARN [dns] exchanging over DoT connection: read tcp 10.2.0.2:57952->1.1.1.1:853: i/o timeout
2024-10-19T14:48:25.209986476Z 2024-10-19T14:48:25Z WARN [dns] exchanging over DoT connection: read tcp 10.2.0.2:52352->1.0.0.1:853: i/o timeout
2024-10-19T14:48:25.209990512Z 2024-10-19T14:48:25Z WARN [dns] exchanging over DoT connection: read tcp 10.2.0.2:52366->1.0.0.1:853: i/o timeout
2024-10-19T14:48:27.209356741Z 2024-10-19T14:48:27Z WARN [dns] exchanging over DoT connection: read tcp 10.2.0.2:52382->1.0.0.1:853: i/o timeout
2024-10-19T14:48:27.233604112Z 2024-10-19T14:48:27Z WARN [dns] exchanging over DoT connection: read tcp 10.2.0.2:52390->1.0.0.1:853: i/o timeout
2024-10-19T14:48:27.233688730Z 2024-10-19T14:48:27Z WARN [dns] exchanging over DoT connection: read tcp 10.2.0.2:57962->1.1.1.1:853: i/o timeout
2024-10-19T14:48:27.330211433Z 2024-10-19T14:48:27Z INFO [healthcheck] healthy!
2024-10-19T14:48:27.610103992Z 2024-10-19T14:48:27Z ERROR [vpn] getting public IP address information: fetching information: Get "https://ipinfo.io/": dial tcp: lookup ipinfo.io on 127.0.0.1:53: server misbehaving
2024-10-19T14:48:27.610183056Z 2024-10-19T14:48:27Z INFO [port forwarding] starting
2024-10-19T14:48:27.646081565Z 2024-10-19T14:48:27Z INFO [port forwarding] gateway external IPv4 address is 149.22.89.78
2024-10-19T14:48:27.718060638Z 2024-10-19T14:48:27Z INFO [port forwarding] port forwarded is 34385
2024-10-19T14:48:27.718106610Z 2024-10-19T14:48:27Z INFO [firewall] setting allowed input port 34385 through interface tun0...
2024-10-19T14:48:27.718134899Z 2024-10-19T14:48:27Z DEBUG [firewall] /sbin/iptables --append INPUT -i tun0 -p tcp -m tcp --dport 34385 -j ACCEPT
2024-10-19T14:48:27.721740347Z 2024-10-19T14:48:27Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i tun0 -p tcp -m tcp --dport 34385 -j ACCEPT
2024-10-19T14:48:27.724946677Z 2024-10-19T14:48:27Z DEBUG [firewall] /sbin/iptables --append INPUT -i tun0 -p udp -m udp --dport 34385 -j ACCEPT
2024-10-19T14:48:27.730339053Z 2024-10-19T14:48:27Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i tun0 -p udp -m udp --dport 34385 -j ACCEPT
2024-10-19T14:48:27.734172277Z 2024-10-19T14:48:27Z INFO [port forwarding] writing port file /tmp/gluetun/forwarded_port
2024-10-19T14:49:12.735570052Z 2024-10-19T14:49:12Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:49:12.807618944Z 2024-10-19T14:49:12Z DEBUG [port forwarding] port forwarded 34385 maintained
2024-10-19T14:49:57.808180854Z 2024-10-19T14:49:57Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:49:57.877407829Z 2024-10-19T14:49:57Z DEBUG [port forwarding] port forwarded 34385 maintained
2024-10-19T14:50:01.616385924Z 2024-10-19T14:50:01Z WARN [http server] route GET /v1/openvpn/portforwarded is unprotected by default, please set up authentication following the documentation at https://github.com/qdm12/gluetun-wiki/setup/advanced/control-server.md#authentication since this will become no longer publicly accessible after release v3.40.
2024-10-19T14:50:01.616427794Z 2024-10-19T14:50:01Z DEBUG [http server] access to route GET /v1/openvpn/portforwarded authorized for role public
2024-10-19T14:50:01.616438264Z 2024-10-19T14:50:01Z INFO [http server] 200 GET /portforwarded wrote 15B to 172.16.0.138:46738 in 47.887µs
2024-10-19T14:50:42.878078257Z 2024-10-19T14:50:42Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:50:42.944062433Z 2024-10-19T14:50:42Z DEBUG [port forwarding] port forwarded 34385 maintained
2024-10-19T14:51:27.944949720Z 2024-10-19T14:51:27Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:51:28.013818176Z 2024-10-19T14:51:28Z DEBUG [port forwarding] port forwarded 34385 maintained
2024-10-19T14:52:13.014996526Z 2024-10-19T14:52:13Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:52:13.095175439Z 2024-10-19T14:52:13Z DEBUG [port forwarding] port forwarded 34385 maintained
2024-10-19T14:52:58.096051753Z 2024-10-19T14:52:58Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:52:58.163029218Z 2024-10-19T14:52:58Z DEBUG [port forwarding] port forwarded 34385 maintained
2024-10-19T14:53:43.163911913Z 2024-10-19T14:53:43Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:53:43.233193195Z 2024-10-19T14:53:43Z DEBUG [port forwarding] port forwarded 34385 maintained
2024-10-19T14:54:28.234949427Z 2024-10-19T14:54:28Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:54:28.302424481Z 2024-10-19T14:54:28Z DEBUG [port forwarding] port forwarded 34385 maintained
2024-10-19T14:55:01.381379967Z 2024-10-19T14:55:01Z WARN [http server] route GET /v1/openvpn/portforwarded is unprotected by default, please set up authentication following the documentation at https://github.com/qdm12/gluetun-wiki/setup/advanced/control-server.md#authentication since this will become no longer publicly accessible after release v3.40.
2024-10-19T14:55:01.381413453Z 2024-10-19T14:55:01Z DEBUG [http server] access to route GET /v1/openvpn/portforwarded authorized for role public
2024-10-19T14:55:01.381430589Z 2024-10-19T14:55:01Z INFO [http server] 200 GET /portforwarded wrote 15B to 172.16.0.131:43538 in 46.26µs
2024-10-19T14:55:13.303463969Z 2024-10-19T14:55:13Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:55:13.370151641Z 2024-10-19T14:55:13Z DEBUG [port forwarding] port forwarded 34385 maintained
2024-10-19T14:55:58.370896924Z 2024-10-19T14:55:58Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:55:58.438902301Z 2024-10-19T14:55:58Z DEBUG [port forwarding] port forwarded 34385 maintained
2024-10-19T14:56:27.048545240Z 2024-10-19T14:56:27Z DEBUG [healthcheck] unhealthy: dialing: dial tcp4 104.16.132.229:443: i/o timeout
2024-10-19T14:56:33.048856096Z 2024-10-19T14:56:33Z INFO [healthcheck] program has been unhealthy for 6s: restarting VPN
2024-10-19T14:56:33.048914255Z 2024-10-19T14:56:33Z INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-10-19T14:56:33.048918955Z 2024-10-19T14:56:33Z INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-10-19T14:56:33.048922500Z 2024-10-19T14:56:33Z INFO [vpn] stopping
2024-10-19T14:56:33.048932883Z 2024-10-19T14:56:33Z INFO [port forwarding] stopping
2024-10-19T14:56:33.048980162Z 2024-10-19T14:56:33Z INFO [firewall] removing allowed port 34385...
2024-10-19T14:56:33.048984838Z 2024-10-19T14:56:33Z DEBUG [firewall] /sbin/iptables -t filter -L INPUT --line-numbers -n -v
2024-10-19T14:56:33.050451943Z 2024-10-19T14:56:33Z DEBUG [firewall] found iptables chain rule matching "--delete INPUT -i tun0 -p tcp -m tcp --dport 34385 -j ACCEPT" at line number 8
2024-10-19T14:56:33.050477388Z 2024-10-19T14:56:33Z DEBUG [firewall] /sbin/iptables -t filter -D INPUT 8
2024-10-19T14:56:33.072919854Z 2024-10-19T14:56:33Z DEBUG [firewall] /sbin/ip6tables -t filter -L INPUT --line-numbers -n -v
2024-10-19T14:56:33.074176706Z 2024-10-19T14:56:33Z DEBUG [firewall] found iptables chain rule matching "--delete INPUT -i tun0 -p tcp -m tcp --dport 34385 -j ACCEPT" at line number 8
2024-10-19T14:56:33.074198934Z 2024-10-19T14:56:33Z DEBUG [firewall] /sbin/ip6tables -t filter -D INPUT 8
2024-10-19T14:56:33.100738896Z 2024-10-19T14:56:33Z DEBUG [firewall] /sbin/iptables -t filter -L INPUT --line-numbers -n -v
2024-10-19T14:56:33.100770453Z 2024-10-19T14:56:33Z DEBUG [firewall] found iptables chain rule matching "--delete INPUT -i tun0 -p udp -m udp --dport 34385 -j ACCEPT" at line number 8
2024-10-19T14:56:33.100776427Z 2024-10-19T14:56:33Z DEBUG [firewall] /sbin/iptables -t filter -D INPUT 8
2024-10-19T14:56:33.136979687Z 2024-10-19T14:56:33Z DEBUG [firewall] /sbin/ip6tables -t filter -L INPUT --line-numbers -n -v
2024-10-19T14:56:33.138251786Z 2024-10-19T14:56:33Z DEBUG [firewall] found iptables chain rule matching "--delete INPUT -i tun0 -p udp -m udp --dport 34385 -j ACCEPT" at line number 8
2024-10-19T14:56:33.138275340Z 2024-10-19T14:56:33Z DEBUG [firewall] /sbin/ip6tables -t filter -D INPUT 8
2024-10-19T14:56:33.139028314Z 2024-10-19T14:56:33Z INFO [port forwarding] removing port file /tmp/gluetun/forwarded_port
2024-10-19T14:56:33.139064684Z 2024-10-19T14:56:33Z DEBUG [wireguard] closing controller client...
2024-10-19T14:56:33.139070339Z 2024-10-19T14:56:33Z DEBUG [wireguard] removing IPv6 rule...
2024-10-19T14:56:33.139077794Z 2024-10-19T14:56:33Z DEBUG [netlink] ip rule del lookup 51820 pref 101
2024-10-19T14:56:33.139224912Z 2024-10-19T14:56:33Z DEBUG [wireguard] removing IPv4 rule...
2024-10-19T14:56:33.139258249Z 2024-10-19T14:56:33Z DEBUG [netlink] ip rule del lookup 51820 pref 101
2024-10-19T14:56:33.139262089Z 2024-10-19T14:56:33Z DEBUG [wireguard] shutting down link...
2024-10-19T14:56:33.200902940Z 2024-10-19T14:56:33Z DEBUG [wireguard] deleting link...
2024-10-19T14:56:33.320850115Z 2024-10-19T14:56:33Z INFO [vpn] starting
2024-10-19T14:56:33.320875071Z 2024-10-19T14:56:33Z DEBUG [wireguard] Wireguard server public key: +WRsjA7z/PQqasrqiUVo3Tug+go7W2DXjO2p3TTeagk=
2024-10-19T14:56:33.320878263Z 2024-10-19T14:56:33Z DEBUG [wireguard] Wireguard client private key: cL5...Fg=
2024-10-19T14:56:33.320880284Z 2024-10-19T14:56:33Z DEBUG [wireguard] Wireguard pre-shared key: [not set]
2024-10-19T14:56:33.320882408Z 2024-10-19T14:56:33Z INFO [firewall] allowing VPN connection...
2024-10-19T14:56:33.321007490Z 2024-10-19T14:56:33Z INFO [wireguard] Using available kernelspace implementation
2024-10-19T14:56:33.321678405Z 2024-10-19T14:56:33Z INFO [wireguard] Connecting to 138.199.6.179:51820
2024-10-19T14:56:33.322213585Z 2024-10-19T14:56:33Z DEBUG [netlink] ip rule add lookup 51820 pref 101
2024-10-19T14:56:33.322226580Z 2024-10-19T14:56:33Z DEBUG [netlink] ip rule add lookup 51820 pref 101
2024-10-19T14:56:33.322232081Z 2024-10-19T14:56:33Z INFO [wireguard] Wireguard setup is complete. Note Wireguard is a silent protocol and it may or may not work, without giving any error message. Typically i/o timeout errors indicate the Wireguard connection is not working.
2024-10-19T14:56:33.446037301Z 2024-10-19T14:56:33Z INFO [healthcheck] healthy!
2024-10-19T14:56:35.448727471Z 2024-10-19T14:56:35Z WARN [dns] exchanging over DoT connection: read tcp 10.2.0.2:47616->1.0.0.1:853: i/o timeout
2024-10-19T14:56:35.448757319Z 2024-10-19T14:56:35Z WARN [dns] exchanging over DoT connection: read tcp 10.2.0.2:46446->1.1.1.1:853: i/o timeout
2024-10-19T14:56:37.470697432Z 2024-10-19T14:56:37Z WARN [dns] exchanging over DoT connection: read tcp 10.2.0.2:46448->1.1.1.1:853: i/o timeout
2024-10-19T14:56:37.470925656Z 2024-10-19T14:56:37Z WARN [dns] exchanging over DoT connection: read tcp 10.2.0.2:46456->1.1.1.1:853: i/o timeout
2024-10-19T14:56:37.795174028Z 2024-10-19T14:56:37Z ERROR [vpn] getting public IP address information: fetching information: Get "https://ipinfo.io/": dial tcp: lookup ipinfo.io on 127.0.0.1:53: server misbehaving
2024-10-19T14:56:37.795198241Z 2024-10-19T14:56:37Z INFO [port forwarding] starting
2024-10-19T14:56:37.830168285Z 2024-10-19T14:56:37Z INFO [port forwarding] gateway external IPv4 address is 149.22.89.78
2024-10-19T14:56:37.936603150Z 2024-10-19T14:56:37Z INFO [port forwarding] port forwarded is 62232
2024-10-19T14:56:37.936743818Z 2024-10-19T14:56:37Z INFO [firewall] setting allowed input port 62232 through interface tun0...
2024-10-19T14:56:37.936792806Z 2024-10-19T14:56:37Z DEBUG [firewall] /sbin/iptables --append INPUT -i tun0 -p tcp -m tcp --dport 62232 -j ACCEPT
2024-10-19T14:56:37.941173384Z 2024-10-19T14:56:37Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i tun0 -p tcp -m tcp --dport 62232 -j ACCEPT
2024-10-19T14:56:37.945240354Z 2024-10-19T14:56:37Z DEBUG [firewall] /sbin/iptables --append INPUT -i tun0 -p udp -m udp --dport 62232 -j ACCEPT
2024-10-19T14:56:37.950124120Z 2024-10-19T14:56:37Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i tun0 -p udp -m udp --dport 62232 -j ACCEPT
2024-10-19T14:56:37.954439014Z 2024-10-19T14:56:37Z INFO [port forwarding] writing port file /tmp/gluetun/forwarded_port
2024-10-19T14:57:22.955144507Z 2024-10-19T14:57:22Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:57:23.025888170Z 2024-10-19T14:57:23Z DEBUG [port forwarding] port forwarded 62232 maintained
2024-10-19T14:58:08.027198965Z 2024-10-19T14:58:08Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:58:08.095227652Z 2024-10-19T14:58:08Z DEBUG [port forwarding] port forwarded 62232 maintained
2024-10-19T14:58:53.096726116Z 2024-10-19T14:58:53Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:58:53.172828872Z 2024-10-19T14:58:53Z DEBUG [port forwarding] port forwarded 62232 maintained
2024-10-19T14:59:38.174156801Z 2024-10-19T14:59:38Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:59:38.242881735Z 2024-10-19T14:59:38Z DEBUG [port forwarding] port forwarded 62232 maintained
2024-10-19T14:56:33.139077794Z 2024-10-19T14:56:33Z DEBUG [netlink] ip rule del lookup 51820 pref 101
2024-10-19T14:56:33.139224912Z 2024-10-19T14:56:33Z DEBUG [wireguard] removing IPv4 rule...
2024-10-19T14:56:33.139258249Z 2024-10-19T14:56:33Z DEBUG [netlink] ip rule del lookup 51820 pref 101
2024-10-19T14:56:33.139262089Z 2024-10-19T14:56:33Z DEBUG [wireguard] shutting down link...
2024-10-19T14:56:33.200902940Z 2024-10-19T14:56:33Z DEBUG [wireguard] deleting link...
2024-10-19T14:56:33.320850115Z 2024-10-19T14:56:33Z INFO [vpn] starting
2024-10-19T14:56:33.320875071Z 2024-10-19T14:56:33Z DEBUG [wireguard] Wireguard server public key: +WRsjA7z/PQqasrqiUVo3Tug+go7W2DXjO2p3TTeagk=
2024-10-19T14:56:33.320878263Z 2024-10-19T14:56:33Z DEBUG [wireguard] Wireguard client private key: cL5...Fg=
2024-10-19T14:56:33.320880284Z 2024-10-19T14:56:33Z DEBUG [wireguard] Wireguard pre-shared key: [not set]
2024-10-19T14:56:33.320882408Z 2024-10-19T14:56:33Z INFO [firewall] allowing VPN connection...
2024-10-19T14:56:33.321007490Z 2024-10-19T14:56:33Z INFO [wireguard] Using available kernelspace implementation
2024-10-19T14:56:33.321678405Z 2024-10-19T14:56:33Z INFO [wireguard] Connecting to 138.199.6.179:51820
2024-10-19T14:56:33.322213585Z 2024-10-19T14:56:33Z DEBUG [netlink] ip rule add lookup 51820 pref 101
2024-10-19T14:56:33.322226580Z 2024-10-19T14:56:33Z DEBUG [netlink] ip rule add lookup 51820 pref 101
2024-10-19T14:56:33.322232081Z 2024-10-19T14:56:33Z INFO [wireguard] Wireguard setup is complete. Note Wireguard is a silent protocol and it may or may not work, without giving any error message. Typically i/o timeout errors indicate the Wireguard connection is not working.
2024-10-19T14:56:33.446037301Z 2024-10-19T14:56:33Z INFO [healthcheck] healthy!
2024-10-19T14:56:35.448727471Z 2024-10-19T14:56:35Z WARN [dns] exchanging over DoT connection: read tcp 10.2.0.2:47616->1.0.0.1:853: i/o timeout
2024-10-19T14:56:35.448757319Z 2024-10-19T14:56:35Z WARN [dns] exchanging over DoT connection: read tcp 10.2.0.2:46446->1.1.1.1:853: i/o timeout
2024-10-19T14:56:37.470697432Z 2024-10-19T14:56:37Z WARN [dns] exchanging over DoT connection: read tcp 10.2.0.2:46448->1.1.1.1:853: i/o timeout
2024-10-19T14:56:37.470925656Z 2024-10-19T14:56:37Z WARN [dns] exchanging over DoT connection: read tcp 10.2.0.2:46456->1.1.1.1:853: i/o timeout
2024-10-19T14:56:37.795174028Z 2024-10-19T14:56:37Z ERROR [vpn] getting public IP address information: fetching information: Get "https://ipinfo.io/": dial tcp: lookup ipinfo.io on 127.0.0.1:53: server misbehaving
2024-10-19T14:56:37.795198241Z 2024-10-19T14:56:37Z INFO [port forwarding] starting
2024-10-19T14:56:37.830168285Z 2024-10-19T14:56:37Z INFO [port forwarding] gateway external IPv4 address is 149.22.89.78
2024-10-19T14:56:37.936603150Z 2024-10-19T14:56:37Z INFO [port forwarding] port forwarded is 62232
2024-10-19T14:56:37.936743818Z 2024-10-19T14:56:37Z INFO [firewall] setting allowed input port 62232 through interface tun0...
2024-10-19T14:56:37.936792806Z 2024-10-19T14:56:37Z DEBUG [firewall] /sbin/iptables --append INPUT -i tun0 -p tcp -m tcp --dport 62232 -j ACCEPT
2024-10-19T14:56:37.941173384Z 2024-10-19T14:56:37Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i tun0 -p tcp -m tcp --dport 62232 -j ACCEPT
2024-10-19T14:56:37.945240354Z 2024-10-19T14:56:37Z DEBUG [firewall] /sbin/iptables --append INPUT -i tun0 -p udp -m udp --dport 62232 -j ACCEPT
2024-10-19T14:56:37.950124120Z 2024-10-19T14:56:37Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i tun0 -p udp -m udp --dport 62232 -j ACCEPT
2024-10-19T14:56:37.954439014Z 2024-10-19T14:56:37Z INFO [port forwarding] writing port file /tmp/gluetun/forwarded_port
2024-10-19T14:57:22.955144507Z 2024-10-19T14:57:22Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:57:23.025888170Z 2024-10-19T14:57:23Z DEBUG [port forwarding] port forwarded 62232 maintained
2024-10-19T14:58:08.027198965Z 2024-10-19T14:58:08Z DEBUG [port forwarding] refreshing port forward since 45 seconds have elapsed
2024-10-19T14:58:08.095227652Z 2024-10-19T14:58:08Z DEBUG [port forwarding] port forwarded 62232 maintained
2024-10-19T14:58:53.096726116Z 2024-10-19T14:58:53Z DEBUG [port forwarding] refreshing port forward since 45 seconds have ela

@qdm12
Copy link
Owner

qdm12 commented Oct 27, 2024

Thanks @leovanalphen that's really not what I was expecting! Anyone else can try? FYI that PR (files changes: https://github.com/qdm12/gluetun/pull/2526/files) does not really change anything except log rules when it errors. Kind of weird it's fixed now.

@leovanalphen
Copy link

Thanks @leovanalphen that's really not what I was expecting! Anyone else can try? FYI that PR (files changes: https://github.com/qdm12/gluetun/pull/2526/files) does not really change anything except log rules when it errors. Kind of weird it's fixed now.

I have no idea what's going on, but I noticed the VPN stopped working again a couple of days ago. I just redeployed (also recreating the container) and the VPN doesn't come up anymore with the firewall rule already exists error:

2024-11-02T18:06:16.053547315Z ========================================
2024-11-02T18:06:16.053570672Z ========================================
2024-11-02T18:06:16.053573577Z =============== gluetun ================
2024-11-02T18:06:16.053575372Z ========================================
2024-11-02T18:06:16.053577198Z =========== Made with ❤️ by ============
2024-11-02T18:06:16.053578910Z ======= https://github.com/qdm12 =======
2024-11-02T18:06:16.053581135Z ========================================
2024-11-02T18:06:16.053583295Z ========================================
2024-11-02T18:06:16.053585303Z 
2024-11-02T18:06:16.053587675Z Running version pr-2526 built on 2024-10-19T12:47:11.259Z (commit ac998e9)
2024-11-02T18:06:16.053589718Z 
2024-11-02T18:06:16.053592191Z 📣 All control server routes will become private by default after the v3.41.0 release
2024-11-02T18:06:16.053594459Z 
2024-11-02T18:06:16.053596213Z 🔧 Need help? ☕ Discussion? https://github.com/qdm12/gluetun/discussions/new/choose
2024-11-02T18:06:16.053597916Z 🐛 Bug? ✨ New feature? https://github.com/qdm12/gluetun/issues/new/choose
2024-11-02T18:06:16.053599563Z 💻 Email? quentin.mcgaw@gmail.com
2024-11-02T18:06:16.053601257Z 💰 Help me? https://www.paypal.me/qmcgaw https://github.com/sponsors/qdm12
2024-11-02T18:06:16.053834225Z 2024-11-02T18:06:16Z WARN You are using the old environment variable UID, please consider changing it to PUID
2024-11-02T18:06:16.053841955Z 2024-11-02T18:06:16Z WARN You are using the old environment variable GID, please consider changing it to PGID
2024-11-02T18:06:16.055419202Z 2024-11-02T18:06:16Z INFO [routing] default route found: interface eth0, gateway 172.16.0.202, assigned IP 172.16.0.3 and family v4
2024-11-02T18:06:16.055502130Z 2024-11-02T18:06:16Z INFO [routing] local ethernet link found: eth0
2024-11-02T18:06:16.055548298Z 2024-11-02T18:06:16Z INFO [routing] local ipnet found: 172.16.0.202/32
2024-11-02T18:06:16.055646457Z 2024-11-02T18:06:16Z INFO [routing] local ipnet found: fe80::/64
2024-11-02T18:06:16.225211384Z 2024-11-02T18:06:16Z INFO [firewall] enabling...
2024-11-02T18:06:16.225228782Z 2024-11-02T18:06:16Z DEBUG [firewall] /sbin/iptables --policy INPUT DROP
2024-11-02T18:06:16.257415748Z 2024-11-02T18:06:16Z DEBUG [firewall] /sbin/iptables --policy OUTPUT DROP
2024-11-02T18:06:16.260568078Z 2024-11-02T18:06:16Z DEBUG [firewall] /sbin/iptables --policy FORWARD DROP
2024-11-02T18:06:16.321831632Z 2024-11-02T18:06:16Z DEBUG [firewall] /sbin/ip6tables --policy INPUT DROP
2024-11-02T18:06:16.341774487Z 2024-11-02T18:06:16Z DEBUG [firewall] /sbin/ip6tables --policy OUTPUT DROP
2024-11-02T18:06:16.362166770Z 2024-11-02T18:06:16Z DEBUG [firewall] /sbin/ip6tables --policy FORWARD DROP
2024-11-02T18:06:16.393153699Z 2024-11-02T18:06:16Z DEBUG [firewall] /sbin/iptables --append INPUT -i lo -j ACCEPT
2024-11-02T18:06:16.394786337Z 2024-11-02T18:06:16Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i lo -j ACCEPT
2024-11-02T18:06:16.396395851Z 2024-11-02T18:06:16Z DEBUG [firewall] /sbin/iptables --append OUTPUT -o lo -j ACCEPT
2024-11-02T18:06:16.398640059Z 2024-11-02T18:06:16Z DEBUG [firewall] /sbin/ip6tables --append OUTPUT -o lo -j ACCEPT
2024-11-02T18:06:16.400093162Z 2024-11-02T18:06:16Z DEBUG [firewall] /sbin/iptables --append OUTPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
2024-11-02T18:06:16.401258569Z 2024-11-02T18:06:16Z DEBUG [firewall] /sbin/ip6tables --append OUTPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
2024-11-02T18:06:16.402969584Z 2024-11-02T18:06:16Z DEBUG [firewall] /sbin/iptables --append INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
2024-11-02T18:06:16.404302026Z 2024-11-02T18:06:16Z DEBUG [firewall] /sbin/ip6tables --append INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
2024-11-02T18:06:16.407242164Z 2024-11-02T18:06:16Z DEBUG [firewall] /sbin/iptables --append OUTPUT -o eth0 -s 172.16.0.3 -d 172.16.0.202/32 -j ACCEPT
2024-11-02T18:06:16.408812207Z 2024-11-02T18:06:16Z DEBUG [firewall] /sbin/ip6tables --append OUTPUT -o eth0 -d ff02::1:ff00:0/104 -j ACCEPT
2024-11-02T18:06:16.409711654Z 2024-11-02T18:06:16Z DEBUG [firewall] /sbin/ip6tables --append OUTPUT -o eth0 -s fe80::5438:aeff:fec3:4320 -d fe80::/64 -j ACCEPT
2024-11-02T18:06:16.410593954Z 2024-11-02T18:06:16Z DEBUG [firewall] /sbin/iptables --append INPUT -i eth0 -d 172.16.0.202/32 -j ACCEPT
2024-11-02T18:06:16.411716797Z 2024-11-02T18:06:16Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i eth0 -d fe80::/64 -j ACCEPT
2024-11-02T18:06:16.412407947Z 2024-11-02T18:06:16Z INFO [firewall] enabled successfully
2024-11-02T18:06:16.675223719Z 2024-11-02T18:06:16Z INFO [storage] creating /gluetun/servers.json with 20553 hardcoded servers
2024-11-02T18:06:16.753927075Z 2024-11-02T18:06:16Z DEBUG [netlink] IPv6 is supported by link tun0
2024-11-02T18:06:16.754033983Z 2024-11-02T18:06:16Z INFO Alpine version: 3.20.3
2024-11-02T18:06:16.756447977Z 2024-11-02T18:06:16Z INFO OpenVPN 2.5 version: 2.5.10
2024-11-02T18:06:16.759158813Z 2024-11-02T18:06:16Z INFO OpenVPN 2.6 version: 2.6.11
2024-11-02T18:06:16.760044648Z 2024-11-02T18:06:16Z INFO IPtables version: v1.8.10
2024-11-02T18:06:16.760136425Z 2024-11-02T18:06:16Z INFO Settings summary:
2024-11-02T18:06:16.760139196Z ├── VPN settings:
2024-11-02T18:06:16.760141064Z |   ├── VPN provider settings:
2024-11-02T18:06:16.760142960Z |   |   ├── Name: custom
2024-11-02T18:06:16.760144660Z |   |   ├── Server selection settings:
2024-11-02T18:06:16.760146357Z |   |   |   ├── VPN type: wireguard
2024-11-02T18:06:16.760148270Z |   |   |   └── Wireguard selection settings:
2024-11-02T18:06:16.760149905Z |   |   |       ├── Endpoint IP address: 138.199.6.179
2024-11-02T18:06:16.760151711Z |   |   |       ├── Endpoint port: 51820
2024-11-02T18:06:16.760153620Z |   |   |       └── Server public key: +WRsjA7z/PQqasrqiUVo3Tug+go7W2DXjO2p3TTeagk=
2024-11-02T18:06:16.760155318Z |   |   └── Automatic port forwarding settings:
2024-11-02T18:06:16.760156999Z |   |       ├── Redirection listening port: disabled
2024-11-02T18:06:16.760158639Z |   |       ├── Use code for provider: protonvpn
2024-11-02T18:06:16.760160508Z |   |       └── Forwarded port file path: /tmp/gluetun/forwarded_port
2024-11-02T18:06:16.760162216Z |   └── Wireguard settings:
2024-11-02T18:06:16.760165755Z |       ├── Private key: cL5...Fg=
2024-11-02T18:06:16.760167731Z |       ├── Interface addresses:
2024-11-02T18:06:16.760169643Z |       |   └── 10.2.0.2/32
2024-11-02T18:06:16.760171313Z |       ├── Allowed IPs:
2024-11-02T18:06:16.760172997Z |       |   ├── 0.0.0.0/0
2024-11-02T18:06:16.760174683Z |       |   └── ::/0
2024-11-02T18:06:16.760176365Z |       └── Network interface: tun0
2024-11-02T18:06:16.760178029Z |           └── MTU: 1400
2024-11-02T18:06:16.760179696Z ├── DNS settings:
2024-11-02T18:06:16.760181433Z |   ├── Keep existing nameserver(s): no
2024-11-02T18:06:16.760183143Z |   ├── DNS server address to use: 127.0.0.1
2024-11-02T18:06:16.760184792Z |   └── DNS over TLS settings:
2024-11-02T18:06:16.760186475Z |       ├── Enabled: yes
2024-11-02T18:06:16.760188140Z |       ├── Update period: every 24h0m0s
2024-11-02T18:06:16.760189796Z |       ├── Upstream resolvers:
2024-11-02T18:06:16.760191459Z |       |   └── cloudflare
2024-11-02T18:06:16.760199084Z |       ├── Caching: yes
2024-11-02T18:06:16.760200906Z |       ├── IPv6: no
2024-11-02T18:06:16.760202592Z |       └── DNS filtering settings:
2024-11-02T18:06:16.760204290Z |           ├── Block malicious: yes
2024-11-02T18:06:16.760205937Z |           ├── Block ads: no
2024-11-02T18:06:16.760207660Z |           ├── Block surveillance: no
2024-11-02T18:06:16.760209307Z |           └── Blocked IP networks:
2024-11-02T18:06:16.760210953Z |               ├── 127.0.0.1/8
2024-11-02T18:06:16.760212630Z |               ├── 10.0.0.0/8
2024-11-02T18:06:16.760215181Z |               ├── 172.16.0.0/12
2024-11-02T18:06:16.760216903Z |               ├── 192.168.0.0/16
2024-11-02T18:06:16.760218572Z |               ├── 169.254.0.0/16
2024-11-02T18:06:16.760220226Z |               ├── ::1/128
2024-11-02T18:06:16.760221881Z |               ├── fc00::/7
2024-11-02T18:06:16.760223534Z |               ├── fe80::/10
2024-11-02T18:06:16.760225158Z |               ├── ::ffff:127.0.0.1/104
2024-11-02T18:06:16.760226852Z |               ├── ::ffff:10.0.0.0/104
2024-11-02T18:06:16.760228572Z |               ├── ::ffff:169.254.0.0/112
2024-11-02T18:06:16.760230252Z |               ├── ::ffff:172.16.0.0/108
2024-11-02T18:06:16.760231976Z |               └── ::ffff:192.168.0.0/112
2024-11-02T18:06:16.760233686Z ├── Firewall settings:
2024-11-02T18:06:16.760235387Z |   ├── Enabled: yes
2024-11-02T18:06:16.760237128Z |   ├── Debug mode: on
2024-11-02T18:06:16.760238810Z |   ├── Input ports:
2024-11-02T18:06:16.760240499Z |   |   ├── 10095
2024-11-02T18:06:16.760242230Z |   |   └── 8000
2024-11-02T18:06:16.760243925Z |   └── Outbound subnets:
2024-11-02T18:06:16.760245638Z |       ├── 172.16.0.0/16
2024-11-02T18:06:16.760247265Z |       └── 172.17.0.0/16
2024-11-02T18:06:16.760248935Z ├── Log settings:
2024-11-02T18:06:16.760250576Z |   └── Log level: debug
2024-11-02T18:06:16.760252301Z ├── Health settings:
2024-11-02T18:06:16.760254075Z |   ├── Server listening address: 127.0.0.1:9999
2024-11-02T18:06:16.760255809Z |   ├── Target address: cloudflare.com:443
2024-11-02T18:06:16.760257462Z |   ├── Duration to wait after success: 5s
2024-11-02T18:06:16.760259078Z |   ├── Read header timeout: 100ms
2024-11-02T18:06:16.760260750Z |   ├── Read timeout: 500ms
2024-11-02T18:06:16.760262413Z |   └── VPN wait durations:
2024-11-02T18:06:16.760264087Z |       ├── Initial duration: 6s
2024-11-02T18:06:16.760265724Z |       └── Additional duration: 5s
2024-11-02T18:06:16.760267372Z ├── Shadowsocks server settings:
2024-11-02T18:06:16.760269148Z |   └── Enabled: no
2024-11-02T18:06:16.760270853Z ├── HTTP proxy settings:
2024-11-02T18:06:16.760272529Z |   ├── Enabled: yes
2024-11-02T18:06:16.760274220Z |   ├── Listening address: :8888
2024-11-02T18:06:16.760275889Z |   ├── User: 
2024-11-02T18:06:16.760277534Z |   ├── Password: [not set]
2024-11-02T18:06:16.760279283Z |   ├── Stealth mode: no
2024-11-02T18:06:16.760280962Z |   ├── Log: yes
2024-11-02T18:06:16.760282672Z |   ├── Read header timeout: 1s
2024-11-02T18:06:16.760284328Z |   └── Read timeout: 3s
2024-11-02T18:06:16.760286010Z ├── Control server settings:
2024-11-02T18:06:16.760287639Z |   ├── Listening address: :8000
2024-11-02T18:06:16.760289320Z |   ├── Logging: yes
2024-11-02T18:06:16.760292155Z |   └── Authentication file path: /gluetun/auth/config.toml
2024-11-02T18:06:16.760293968Z ├── Storage settings:
2024-11-02T18:06:16.760295629Z |   └── Filepath: /gluetun/servers.json
2024-11-02T18:06:16.760297302Z ├── OS Alpine settings:
2024-11-02T18:06:16.760299201Z |   ├── Process UID: 568
2024-11-02T18:06:16.760301587Z |   ├── Process GID: 568
2024-11-02T18:06:16.760303752Z |   └── Timezone: UTC
2024-11-02T18:06:16.760305866Z ├── Public IP settings:
2024-11-02T18:06:16.760308006Z |   ├── IP file path: /tmp/gluetun/ip
2024-11-02T18:06:16.760309999Z |   └── Public IP data API: ipinfo
2024-11-02T18:06:16.760311889Z └── Version settings:
2024-11-02T18:06:16.760313959Z     └── Enabled: yes
2024-11-02T18:06:16.760758454Z 2024-11-02T18:06:16Z INFO [routing] default route found: interface eth0, gateway 172.16.0.202, assigned IP 172.16.0.3 and family v4
2024-11-02T18:06:16.760764070Z 2024-11-02T18:06:16Z DEBUG [netlink] ip -4 rule list
2024-11-02T18:06:16.760765972Z 2024-11-02T18:06:16Z DEBUG [netlink] ip -6 rule list
2024-11-02T18:06:16.760792410Z 2024-11-02T18:06:16Z INFO [routing] adding route for 0.0.0.0/0
2024-11-02T18:06:16.760795691Z 2024-11-02T18:06:16Z DEBUG [routing] ip route replace 0.0.0.0/0 via 172.16.0.202 dev eth0 table 200
2024-11-02T18:06:16.760862376Z 2024-11-02T18:06:16Z INFO [firewall] setting allowed subnets...
2024-11-02T18:06:16.760917105Z 2024-11-02T18:06:16Z DEBUG [firewall] /sbin/iptables --append OUTPUT -o eth0 -s 172.16.0.3 -d 172.16.0.0/16 -j ACCEPT
2024-11-02T18:06:16.761749480Z 2024-11-02T18:06:16Z DEBUG [firewall] /sbin/iptables --append OUTPUT -o eth0 -s 172.16.0.3 -d 172.17.0.0/16 -j ACCEPT
2024-11-02T18:06:16.762648259Z 2024-11-02T18:06:16Z INFO [routing] default route found: interface eth0, gateway 172.16.0.202, assigned IP 172.16.0.3 and family v4
2024-11-02T18:06:16.762652081Z 2024-11-02T18:06:16Z INFO [routing] adding route for 172.16.0.0/16
2024-11-02T18:06:16.762653928Z 2024-11-02T18:06:16Z DEBUG [routing] ip route replace 172.16.0.0/16 via 172.16.0.202 dev eth0 table 199
2024-11-02T18:06:16.762691844Z 2024-11-02T18:06:16Z DEBUG [netlink] ip -4 rule list
2024-11-02T18:06:16.762693877Z 2024-11-02T18:06:16Z DEBUG [netlink] ip -6 rule list
2024-11-02T18:06:16.762760941Z 2024-11-02T18:06:16Z INFO [routing] adding route for 172.17.0.0/16
2024-11-02T18:06:16.762762967Z 2024-11-02T18:06:16Z DEBUG [routing] ip route replace 172.17.0.0/16 via 172.16.0.202 dev eth0 table 199
2024-11-02T18:06:16.762780899Z 2024-11-02T18:06:16Z DEBUG [netlink] ip -4 rule list
2024-11-02T18:06:16.762782830Z 2024-11-02T18:06:16Z DEBUG [netlink] ip -6 rule list
2024-11-02T18:06:16.762833864Z 2024-11-02T18:06:16Z DEBUG [netlink] ip -4 rule list
2024-11-02T18:06:16.762838526Z 2024-11-02T18:06:16Z DEBUG [netlink] ip -6 rule list
2024-11-02T18:06:16.762856552Z 2024-11-02T18:06:16Z DEBUG [netlink] ip -4 rule list
2024-11-02T18:06:16.762879495Z 2024-11-02T18:06:16Z DEBUG [netlink] ip -6 rule list
2024-11-02T18:06:16.762935377Z 2024-11-02T18:06:16Z INFO TUN device is not available: open /dev/net/tun: no such file or directory; creating it...
2024-11-02T18:06:16.762976593Z 2024-11-02T18:06:16Z INFO [firewall] setting allowed input port 10095 through interface eth0...
2024-11-02T18:06:16.762989837Z 2024-11-02T18:06:16Z DEBUG [firewall] /sbin/iptables --append INPUT -i eth0 -p tcp -m tcp --dport 10095 -j ACCEPT
2024-11-02T18:06:16.763800469Z 2024-11-02T18:06:16Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i eth0 -p tcp -m tcp --dport 10095 -j ACCEPT
2024-11-02T18:06:16.764545904Z 2024-11-02T18:06:16Z DEBUG [firewall] /sbin/iptables --append INPUT -i eth0 -p udp -m udp --dport 10095 -j ACCEPT
2024-11-02T18:06:16.765328128Z 2024-11-02T18:06:16Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i eth0 -p udp -m udp --dport 10095 -j ACCEPT
2024-11-02T18:06:16.766096469Z 2024-11-02T18:06:16Z INFO [firewall] setting allowed input port 8000 through interface eth0...
2024-11-02T18:06:16.766111377Z 2024-11-02T18:06:16Z DEBUG [firewall] /sbin/iptables --append INPUT -i eth0 -p tcp -m tcp --dport 8000 -j ACCEPT
2024-11-02T18:06:16.767138127Z 2024-11-02T18:06:16Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i eth0 -p tcp -m tcp --dport 8000 -j ACCEPT
2024-11-02T18:06:16.768107201Z 2024-11-02T18:06:16Z DEBUG [firewall] /sbin/iptables --append INPUT -i eth0 -p udp -m udp --dport 8000 -j ACCEPT
2024-11-02T18:06:16.769157256Z 2024-11-02T18:06:16Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i eth0 -p udp -m udp --dport 8000 -j ACCEPT
2024-11-02T18:06:16.770499416Z 2024-11-02T18:06:16Z INFO [dns] using plaintext DNS at address 1.1.1.1
2024-11-02T18:06:16.771055651Z 2024-11-02T18:06:16Z INFO [http proxy] listening on :8888
2024-11-02T18:06:16.771202465Z 2024-11-02T18:06:16Z INFO [http server] http server listening on [::]:8000
2024-11-02T18:06:16.771320418Z 2024-11-02T18:06:16Z INFO [healthcheck] listening on 127.0.0.1:9999
2024-11-02T18:06:16.771502002Z 2024-11-02T18:06:16Z DEBUG [wireguard] Wireguard server public key: +WRsjA7z/PQqasrqiUVo3Tug+go7W2DXjO2p3TTeagk=
2024-11-02T18:06:16.771567565Z 2024-11-02T18:06:16Z DEBUG [wireguard] Wireguard client private key: cL5...Fg=
2024-11-02T18:06:16.771598898Z 2024-11-02T18:06:16Z DEBUG [wireguard] Wireguard pre-shared key: [not set]
2024-11-02T18:06:16.771658689Z 2024-11-02T18:06:16Z INFO [firewall] allowing VPN connection...
2024-11-02T18:06:16.771764719Z 2024-11-02T18:06:16Z DEBUG [firewall] /sbin/iptables --append OUTPUT -d 138.199.6.179 -o eth0 -p udp -m udp --dport 51820 -j ACCEPT
2024-11-02T18:06:16.773449145Z 2024-11-02T18:06:16Z DEBUG [firewall] /sbin/iptables --append OUTPUT -o tun0 -j ACCEPT
2024-11-02T18:06:16.774528185Z 2024-11-02T18:06:16Z DEBUG [firewall] /sbin/ip6tables --append OUTPUT -o tun0 -j ACCEPT
2024-11-02T18:06:16.776528594Z 2024-11-02T18:06:16Z INFO [wireguard] Using available kernelspace implementation
2024-11-02T18:06:16.938310588Z 2024-11-02T18:06:16Z INFO [wireguard] Connecting to 138.199.6.179:51820
2024-11-02T18:06:16.939431069Z 2024-11-02T18:06:16Z DEBUG [netlink] ip rule add lookup 51820 pref 101
2024-11-02T18:06:16.939505120Z 2024-11-02T18:06:16Z DEBUG [netlink] ip -6 rule list
2024-11-02T18:06:16.939684197Z 2024-11-02T18:06:16Z INFO [wireguard] existing rules are:
2024-11-02T18:06:16.939694270Z ip rule 0: from all to all table 255
2024-11-02T18:06:16.939702232Z ip rule 98: from all to fe80::/64 table 254
2024-11-02T18:06:16.939737149Z ip rule 101: from all to all table 51820
2024-11-02T18:06:16.939746630Z ip rule 32766: from all to all table 254
2024-11-02T18:06:16.939767506Z 2024-11-02T18:06:16Z DEBUG [wireguard] closing controller client...
2024-11-02T18:06:16.939775687Z 2024-11-02T18:06:16Z DEBUG [wireguard] shutting down link...
2024-11-02T18:06:16.940567519Z 2024-11-02T18:06:16Z ERROR [vpn] adding IPv6 rule: adding rule ip rule 101: from all to all table 51820: file exists
2024-11-02T18:06:16.940762537Z 2024-11-02T18:06:16Z INFO [vpn] retrying in 15s
2024-11-02T18:06:16.977571294Z 2024-11-02T18:06:16Z DEBUG [wireguard] deleting link...
2024-11-02T18:06:22.771513090Z 2024-11-02T18:06:22Z INFO [healthcheck] program has been unhealthy for 6s: restarting VPN
2024-11-02T18:06:22.771531956Z 2024-11-02T18:06:22Z INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-11-02T18:06:22.771540043Z 2024-11-02T18:06:22Z INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-11-02T18:06:31.946103588Z 2024-11-02T18:06:31Z DEBUG [wireguard] Wireguard server public key: +WRsjA7z/PQqasrqiUVo3Tug+go7W2DXjO2p3TTeagk=
2024-11-02T18:06:31.946187698Z 2024-11-02T18:06:31Z DEBUG [wireguard] Wireguard client private key: cL5...Fg=
2024-11-02T18:06:31.946209635Z 2024-11-02T18:06:31Z DEBUG [wireguard] Wireguard pre-shared key: [not set]
2024-11-02T18:06:31.946301500Z 2024-11-02T18:06:31Z INFO [firewall] allowing VPN connection...
2024-11-02T18:06:31.946641263Z 2024-11-02T18:06:31Z INFO [wireguard] Using available kernelspace implementation
2024-11-02T18:06:31.948442284Z 2024-11-02T18:06:31Z INFO [wireguard] Connecting to 138.199.6.179:51820
2024-11-02T18:06:31.952143890Z 2024-11-02T18:06:31Z DEBUG [netlink] ip rule add lookup 51820 pref 101
2024-11-02T18:06:31.952196122Z 2024-11-02T18:06:31Z DEBUG [netlink] ip -6 rule list
2024-11-02T18:06:31.952211383Z 2024-11-02T18:06:31Z INFO [wireguard] existing rules are:
2024-11-02T18:06:31.952222909Z ip rule 0: from all to all table 255
2024-11-02T18:06:31.952235693Z ip rule 98: from all to fe80::/64 table 254
2024-11-02T18:06:31.952248960Z ip rule 101: from all to all table 51820
2024-11-02T18:06:31.952261021Z ip rule 32766: from all to all table 254
2024-11-02T18:06:31.952273041Z 2024-11-02T18:06:31Z DEBUG [wireguard] closing controller client...
2024-11-02T18:06:31.952286014Z 2024-11-02T18:06:31Z DEBUG [wireguard] shutting down link...
2024-11-02T18:06:31.952298113Z 2024-11-02T18:06:31Z ERROR [vpn] adding IPv6 rule: adding rule ip rule 101: from all to all table 51820: file exists
2024-11-02T18:06:31.952311413Z 2024-11-02T18:06:31Z INFO [vpn] retrying in 30s
2024-11-02T18:06:31.988861131Z 2024-11-02T18:06:31Z DEBUG [wireguard] deleting link...
2024-11-02T18:06:42.946090548Z 2024-11-02T18:06:42Z INFO [healthcheck] program has been unhealthy for 11s: restarting VPN
2024-11-02T18:06:42.946110064Z 2024-11-02T18:06:42Z INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-11-02T18:06:42.946112398Z 2024-11-02T18:06:42Z INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-11-02T18:06:58.946293292Z 2024-11-02T18:06:58Z INFO [healthcheck] program has been unhealthy for 16s: restarting VPN
2024-11-02T18:06:58.946316490Z 2024-11-02T18:06:58Z INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-11-02T18:06:58.946321080Z 2024-11-02T18:06:58Z INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-11-02T18:07:01.951695281Z 2024-11-02T18:07:01Z DEBUG [wireguard] Wireguard server public key: +WRsjA7z/PQqasrqiUVo3Tug+go7W2DXjO2p3TTeagk=
2024-11-02T18:07:01.951738078Z 2024-11-02T18:07:01Z DEBUG [wireguard] Wireguard client private key: cL5...Fg=
2024-11-02T18:07:01.951749025Z 2024-11-02T18:07:01Z DEBUG [wireguard] Wireguard pre-shared key: [not set]
2024-11-02T18:07:01.951758685Z 2024-11-02T18:07:01Z INFO [firewall] allowing VPN connection...
2024-11-02T18:07:01.951768161Z 2024-11-02T18:07:01Z INFO [wireguard] Using available kernelspace implementation
2024-11-02T18:07:01.956805011Z 2024-11-02T18:07:01Z INFO [wireguard] Connecting to 138.199.6.179:51820
2024-11-02T18:07:01.957537829Z 2024-11-02T18:07:01Z DEBUG [netlink] ip rule add lookup 51820 pref 101
2024-11-02T18:07:01.957563489Z 2024-11-02T18:07:01Z DEBUG [netlink] ip -6 rule list
2024-11-02T18:07:01.957764327Z 2024-11-02T18:07:01Z INFO [wireguard] existing rules are:
2024-11-02T18:07:01.957775941Z ip rule 0: from all to all table 255
2024-11-02T18:07:01.957783957Z ip rule 98: from all to fe80::/64 table 254
2024-11-02T18:07:01.957791780Z ip rule 101: from all to all table 51820
2024-11-02T18:07:01.957799492Z ip rule 32766: from all to all table 254
2024-11-02T18:07:01.957837724Z 2024-11-02T18:07:01Z DEBUG [wireguard] closing controller client...
2024-11-02T18:07:01.957846939Z 2024-11-02T18:07:01Z ERROR [vpn] adding IPv6 rule: adding rule ip rule 101: from all to all table 51820: file exists
2024-11-02T18:07:01.957854308Z 2024-11-02T18:07:01Z INFO [vpn] retrying in 1m0s
2024-11-02T18:07:01.957861674Z 2024-11-02T18:07:01Z DEBUG [wireguard] shutting down link...
2024-11-02T18:07:02.011232727Z 2024-11-02T18:07:02Z DEBUG [wireguard] deleting link...
2024-11-02T18:07:19.946416604Z 2024-11-02T18:07:19Z INFO [healthcheck] program has been unhealthy for 21s: restarting VPN
2024-11-02T18:07:19.946438273Z 2024-11-02T18:07:19Z INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-11-02T18:07:19.946442170Z 2024-11-02T18:07:19Z INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-11-02T18:07:45.946541629Z 2024-11-02T18:07:45Z INFO [healthcheck] program has been unhealthy for 26s: restarting VPN
2024-11-02T18:07:45.946556541Z 2024-11-02T18:07:45Z INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-11-02T18:07:45.946559222Z 2024-11-02T18:07:45Z INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-11-02T18:07:57.902942121Z 2024-11-02T18:07:57Z WARN [http server] route GET /v1/openvpn/portforwarded is unprotected by default, please set up authentication following the documentation at https://github.com/qdm12/gluetun-wiki/setup/advanced/control-server.md#authentication since this will become no longer publicly accessible after release v3.40.
2024-11-02T18:07:57.902961796Z 2024-11-02T18:07:57Z DEBUG [http server] access to route GET /v1/openvpn/portforwarded authorized for role public
2024-11-02T18:07:57.902982189Z 2024-11-02T18:07:57Z INFO [http server] 200 GET /portforwarded wrote 11B to 172.16.0.42:58122 in 39.59µs
2024-11-02T18:08:01.957402390Z 2024-11-02T18:08:01Z DEBUG [wireguard] Wireguard server public key: +WRsjA7z/PQqasrqiUVo3Tug+go7W2DXjO2p3TTeagk=
2024-11-02T18:08:01.957437273Z 2024-11-02T18:08:01Z DEBUG [wireguard] Wireguard client private key: cL5...Fg=
2024-11-02T18:08:01.957444391Z 2024-11-02T18:08:01Z DEBUG [wireguard] Wireguard pre-shared key: [not set]
2024-11-02T18:08:01.957450367Z 2024-11-02T18:08:01Z INFO [firewall] allowing VPN connection...
2024-11-02T18:08:01.957803227Z 2024-11-02T18:08:01Z INFO [wireguard] Using available kernelspace implementation
2024-11-02T18:08:01.959547176Z 2024-11-02T18:08:01Z INFO [wireguard] Connecting to 138.199.6.179:51820
2024-11-02T18:08:01.959630839Z 2024-11-02T18:08:01Z DEBUG [netlink] ip rule add lookup 51820 pref 101
2024-11-02T18:08:01.959639086Z 2024-11-02T18:08:01Z DEBUG [netlink] ip -6 rule list
2024-11-02T18:08:01.959747495Z 2024-11-02T18:08:01Z INFO [wireguard] existing rules are:
2024-11-02T18:08:01.959754608Z ip rule 0: from all to all table 255
2024-11-02T18:08:01.959759747Z ip rule 98: from all to fe80::/64 table 254
2024-11-02T18:08:01.959767559Z ip rule 101: from all to all table 51820
2024-11-02T18:08:01.959772475Z ip rule 32766: from all to all table 254
2024-11-02T18:08:01.959777455Z 2024-11-02T18:08:01Z DEBUG [wireguard] closing controller client...
2024-11-02T18:08:01.959782092Z 2024-11-02T18:08:01Z DEBUG [wireguard] shutting down link...
2024-11-02T18:08:01.959946272Z 2024-11-02T18:08:01Z ERROR [vpn] adding IPv6 rule: adding rule ip rule 101: from all to all table 51820: file exists

I'm trying to think if I changed anything anywhere on my side but I can't come up with anything that would influence this container in this way.

@qdm12
Copy link
Owner

qdm12 commented Nov 3, 2024

👍 my apologies, can you pull the image tag :pr-2526 again and try to see what's logged? It should now log both IPv4 and IPv6 rules BEFORE and AFTER trying to add the 'existing' rule. Before, it would only log out rules after trying to add the rule, showing it is there (question is, was it there before we tried to add it, hence this image tag update). I'm ready to hit the assume-its-ok-if-file-exists-error-encountered in case it's some niche kernel bug which I'm suspecting it is.

@leovanalphen
Copy link

leovanalphen commented Nov 3, 2024

@qdm12 I think the logs I posted above should contain that logging. I just repulled the pr-2526 tag, but when I start the container I get the same version string in the logs as my post directly preceding this one.

Running version pr-2526 built on 2024-10-19T12:47:11.259Z (commit ac998e9)

Unless I am missing something, I do get a pull event (Successfully pulled image "qmcgaw/gluetun:pr-2526" in 21ms (21ms including waiting). Image size: 13660822 bytes.) so I am fairly certain it repulled and recreated.

Edit: Wanted to add for completeness, though it might already be obvious to you, or I might be completely wrong, but if I disable port forwarding the container works fine, other than that it has to reconnect a bit more than i'd like. It seems to me the issue might be in the port forwarding code.

@qdm12
Copy link
Owner

qdm12 commented Nov 3, 2024

Please re-pull I think? I just pulled it and the version log line says Running version pr-2526 built on 2024-11-03T16:54:25.798Z (commit 1819d08).

Wanted to add for completeness, though it might already be obvious to you, or I might be completely wrong, but if I disable port forwarding the container works fine, other than that it has to reconnect a bit more than i'd like. It seems to me the issue might be in the port forwarding code.

Noted, although port forwarding doesn't do anything with ip rules (it does with iptables chains/rules though), so that's unlikely but let's see!

@leovanalphen
Copy link

@qdm12 My apologies. Turns out kubernetes does not actually repull images it has in the cache, even with imagePullPolicy: Always. With some help from stackoverflow I figured out I can specify an image digest to force a repull, and that worked. Still learning new things everyday...

I also separated the gluetun image from my truecharts helm qbittorrent deployment. I'm now just started the gluetun container by itself without helm by just using a kubernetes manifest file and using kubectl apply -f. Since in the helm deployment it is started as a sidecar container and the qbittorent container has bunch of volume mounts which I was unsure if it could influence the gluetun behavior.

I added the pod specification I used to start the container, and the container logs below.

Pod Spec:

apiVersion: v1
kind: Pod
metadata:
  name: gluetun
  namespace: qbittorrent
spec:
  containers:
  - name: qbittorrent-vpn
    image: qmcgaw/gluetun:pr2526@sha256:4e37d9a46570fa6c5ad4c8f5474566bc3187464b42a0784f42ab334a7879215f
    env:
      - name: TZ
        value: UTC
      - name: UMASK
        value: '0022'
      - name: UMASK_SET
        value: '0022'
      - name: PUID
        value: '568'
      - name: USER_ID
        value: '568'
      - name: UID
        value: '568'
      - name: PGID
        value: '568'
      - name: GROUP_ID
        value: '568'
      - name: GID
        value: '568'
      - name: DNS_KEEP_NAMESERVER
        value: 'off'
      - name: DOT
        value: 'on'
      - name: FIREWALL
        value: 'on'
      - name: FIREWALL_DEBUG
        value: 'on'
      - name: FIREWALL_INPUT_PORTS
        value: 10095,8000
      - name: FIREWALL_OUTBOUND_SUBNETS
        value: 172.16.0.0/16,172.17.0.0/16
      - name: HTTPPROXY
        value: 'on'
      - name: HTTPPROXY_LOG
        value: 'on'
      - name: LOG_LEVEL
        value: debug
      - name: VPN_PORT_FORWARDING
        value: 'on'
      - name: VPN_PORT_FORWARDING_PROVIDER
        value: protonvpn
      - name: VPN_SERVICE_PROVIDER
        value: custom
      - name: VPN_TYPE
        value: wireguard
      - name: WIREGUARD_ADDRESSES
        value: 10.2.0.2/32
      - name: WIREGUARD_ENDPOINT_IP
        value: 138.199.6.179
      - name: WIREGUARD_ENDPOINT_PORT
        value: '51820'
      - name: WIREGUARD_PRIVATE_KEY
        value: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
      - name: WIREGUARD_PUBLIC_KEY
        value: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
    resources:
      limits:
        cpu: 100m
        memory: 100Mi
      requests:
        cpu: 10m
        memory: 50Mi
    volumeMounts:
    terminationMessagePath: /dev/termination-log
    terminationMessagePolicy: File
    imagePullPolicy: Always
    securityContext:
      capabilities:
        add:
          - NET_ADMIN
          - NET_RAW
          - MKNOD
          - CHOWN
          - SETUID
          - SETGID
          - FOWNER
          - DAC_OVERRIDE
        drop:
          - ALL
      privileged: false
      runAsUser: 0
      runAsGroup: 568
      runAsNonRoot: false
      readOnlyRootFilesystem: false
      allowPrivilegeEscalation: false
      seccompProfile:
        type: RuntimeDefault

And the pod logs:

2024-11-03T18:17:15.160468505Z ========================================
2024-11-03T18:17:15.160491252Z ========================================
2024-11-03T18:17:15.160494787Z =============== gluetun ================
2024-11-03T18:17:15.160496812Z ========================================
2024-11-03T18:17:15.160498835Z =========== Made with ❤️ by ============
2024-11-03T18:17:15.160500842Z ======= https://github.com/qdm12 =======
2024-11-03T18:17:15.160502859Z ========================================
2024-11-03T18:17:15.160506673Z ========================================
2024-11-03T18:17:15.160508610Z 
2024-11-03T18:17:15.160511182Z Running version pr-2526 built on 2024-11-03T16:54:25.798Z (commit 1819d08)
2024-11-03T18:17:15.160513169Z 
2024-11-03T18:17:15.160515488Z 📣 All control server routes will become private by default after the v3.41.0 release
2024-11-03T18:17:15.160517287Z 
2024-11-03T18:17:15.160520007Z 🔧 Need help? ☕ Discussion? https://github.com/qdm12/gluetun/discussions/new/choose
2024-11-03T18:17:15.160522634Z 🐛 Bug? ✨ New feature? https://github.com/qdm12/gluetun/issues/new/choose
2024-11-03T18:17:15.160525322Z 💻 Email? quentin.mcgaw@gmail.com
2024-11-03T18:17:15.160528014Z 💰 Help me? https://www.paypal.me/qmcgaw https://github.com/sponsors/qdm12
2024-11-03T18:17:15.161958382Z 2024-11-03T18:17:15Z WARN You are using the old environment variable UID, please consider changing it to PUID
2024-11-03T18:17:15.161968459Z 2024-11-03T18:17:15Z WARN You are using the old environment variable GID, please consider changing it to PGID
2024-11-03T18:17:15.162495041Z 2024-11-03T18:17:15Z INFO [routing] default route found: interface eth0, gateway 172.16.0.202, assigned IP 172.16.0.247 and family v4
2024-11-03T18:17:15.162552338Z 2024-11-03T18:17:15Z INFO [routing] local ethernet link found: eth0
2024-11-03T18:17:15.162609714Z 2024-11-03T18:17:15Z INFO [routing] local ipnet found: 172.16.0.202/32
2024-11-03T18:17:15.162703759Z 2024-11-03T18:17:15Z INFO [routing] local ipnet found: fe80::/64
2024-11-03T18:17:15.556442048Z 2024-11-03T18:17:15Z INFO [firewall] enabling...
2024-11-03T18:17:15.556571171Z 2024-11-03T18:17:15Z DEBUG [firewall] /sbin/iptables --policy INPUT DROP
2024-11-03T18:17:15.609821112Z 2024-11-03T18:17:15Z DEBUG [firewall] /sbin/iptables --policy OUTPUT DROP
2024-11-03T18:17:15.655079973Z 2024-11-03T18:17:15Z DEBUG [firewall] /sbin/iptables --policy FORWARD DROP
2024-11-03T18:17:15.722002438Z 2024-11-03T18:17:15Z DEBUG [firewall] /sbin/ip6tables --policy INPUT DROP
2024-11-03T18:17:15.781913673Z 2024-11-03T18:17:15Z DEBUG [firewall] /sbin/ip6tables --policy OUTPUT DROP
2024-11-03T18:17:15.854967924Z 2024-11-03T18:17:15Z DEBUG [firewall] /sbin/ip6tables --policy FORWARD DROP
2024-11-03T18:17:15.889180269Z 2024-11-03T18:17:15Z DEBUG [firewall] /sbin/iptables --append INPUT -i lo -j ACCEPT
2024-11-03T18:17:15.900152396Z 2024-11-03T18:17:15Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i lo -j ACCEPT
2024-11-03T18:17:15.955285229Z 2024-11-03T18:17:15Z DEBUG [firewall] /sbin/iptables --append OUTPUT -o lo -j ACCEPT
2024-11-03T18:17:16.000488501Z 2024-11-03T18:17:16Z DEBUG [firewall] /sbin/ip6tables --append OUTPUT -o lo -j ACCEPT
2024-11-03T18:17:16.004316069Z 2024-11-03T18:17:16Z DEBUG [firewall] /sbin/iptables --append OUTPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
2024-11-03T18:17:16.054227644Z 2024-11-03T18:17:16Z DEBUG [firewall] /sbin/ip6tables --append OUTPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
2024-11-03T18:17:16.154521190Z 2024-11-03T18:17:16Z DEBUG [firewall] /sbin/iptables --append INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
2024-11-03T18:17:16.158789320Z 2024-11-03T18:17:16Z DEBUG [firewall] /sbin/ip6tables --append INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
2024-11-03T18:17:16.255716354Z 2024-11-03T18:17:16Z DEBUG [firewall] /sbin/iptables --append OUTPUT -o eth0 -s 172.16.0.247 -d 172.16.0.202/32 -j ACCEPT
2024-11-03T18:17:16.259534128Z 2024-11-03T18:17:16Z DEBUG [firewall] /sbin/ip6tables --append OUTPUT -o eth0 -d ff02::1:ff00:0/104 -j ACCEPT
2024-11-03T18:17:16.356693245Z 2024-11-03T18:17:16Z DEBUG [firewall] /sbin/ip6tables --append OUTPUT -o eth0 -s fe80::7c08:e8ff:fe38:ae73 -d fe80::/64 -j ACCEPT
2024-11-03T18:17:16.453937437Z 2024-11-03T18:17:16Z DEBUG [firewall] /sbin/iptables --append INPUT -i eth0 -d 172.16.0.202/32 -j ACCEPT
2024-11-03T18:17:16.458527897Z 2024-11-03T18:17:16Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i eth0 -d fe80::/64 -j ACCEPT
2024-11-03T18:17:16.559429219Z 2024-11-03T18:17:16Z INFO [firewall] enabled successfully
2024-11-03T18:17:22.304543014Z 2024-11-03T18:17:22Z INFO [storage] creating /gluetun/servers.json with 20553 hardcoded servers
2024-11-03T18:17:24.906638070Z 2024-11-03T18:17:24Z DEBUG [netlink] IPv6 is supported by link tun0
2024-11-03T18:17:24.906907890Z 2024-11-03T18:17:24Z INFO Alpine version: 3.20.3
2024-11-03T18:17:25.002686755Z 2024-11-03T18:17:25Z INFO OpenVPN 2.5 version: 2.5.10
2024-11-03T18:17:25.104998298Z 2024-11-03T18:17:25Z INFO OpenVPN 2.6 version: 2.6.11
2024-11-03T18:17:25.105601869Z 2024-11-03T18:17:25Z INFO IPtables version: v1.8.10
2024-11-03T18:17:25.105716349Z 2024-11-03T18:17:25Z INFO Settings summary:
2024-11-03T18:17:25.105719035Z ├── VPN settings:
2024-11-03T18:17:25.105720955Z |   ├── VPN provider settings:
2024-11-03T18:17:25.105722776Z |   |   ├── Name: custom
2024-11-03T18:17:25.105724534Z |   |   ├── Server selection settings:
2024-11-03T18:17:25.105726271Z |   |   |   ├── VPN type: wireguard
2024-11-03T18:17:25.105728209Z |   |   |   └── Wireguard selection settings:
2024-11-03T18:17:25.105729926Z |   |   |       ├── Endpoint IP address: 138.199.6.179
2024-11-03T18:17:25.105731564Z |   |   |       ├── Endpoint port: 51820
2024-11-03T18:17:25.105733470Z |   |   |       └── Server public key: +WRsjA7z/PQqasrqiUVo3Tug+go7W2DXjO2p3TTeagk=
2024-11-03T18:17:25.105735173Z |   |   └── Automatic port forwarding settings:
2024-11-03T18:17:25.105736886Z |   |       ├── Redirection listening port: disabled
2024-11-03T18:17:25.105738593Z |   |       ├── Use code for provider: protonvpn
2024-11-03T18:17:25.105740555Z |   |       └── Forwarded port file path: /tmp/gluetun/forwarded_port
2024-11-03T18:17:25.105742245Z |   └── Wireguard settings:
2024-11-03T18:17:25.105743907Z |       ├── Private key: cL5...Fg=
2024-11-03T18:17:25.105745546Z |       ├── Interface addresses:
2024-11-03T18:17:25.105747292Z |       |   └── 10.2.0.2/32
2024-11-03T18:17:25.105748971Z |       ├── Allowed IPs:
2024-11-03T18:17:25.105750649Z |       |   ├── 0.0.0.0/0
2024-11-03T18:17:25.105752317Z |       |   └── ::/0
2024-11-03T18:17:25.105753961Z |       └── Network interface: tun0
2024-11-03T18:17:25.105755642Z |           └── MTU: 1400
2024-11-03T18:17:25.105757302Z ├── DNS settings:
2024-11-03T18:17:25.105759000Z |   ├── Keep existing nameserver(s): no
2024-11-03T18:17:25.105760725Z |   ├── DNS server address to use: 127.0.0.1
2024-11-03T18:17:25.105762403Z |   └── DNS over TLS settings:
2024-11-03T18:17:25.105764131Z |       ├── Enabled: yes
2024-11-03T18:17:25.105765762Z |       ├── Update period: every 24h0m0s
2024-11-03T18:17:25.105767392Z |       ├── Upstream resolvers:
2024-11-03T18:17:25.105769081Z |       |   └── cloudflare
2024-11-03T18:17:25.105775290Z |       ├── Caching: yes
2024-11-03T18:17:25.105777114Z |       ├── IPv6: no
2024-11-03T18:17:25.105778827Z |       └── DNS filtering settings:
2024-11-03T18:17:25.105780493Z |           ├── Block malicious: yes
2024-11-03T18:17:25.105782190Z |           ├── Block ads: no
2024-11-03T18:17:25.105783879Z |           ├── Block surveillance: no
2024-11-03T18:17:25.105785544Z |           └── Blocked IP networks:
2024-11-03T18:17:25.105787273Z |               ├── 127.0.0.1/8
2024-11-03T18:17:25.105788973Z |               ├── 10.0.0.0/8
2024-11-03T18:17:25.105790957Z |               ├── 172.16.0.0/12
2024-11-03T18:17:25.105792719Z |               ├── 192.168.0.0/16
2024-11-03T18:17:25.105794403Z |               ├── 169.254.0.0/16
2024-11-03T18:17:25.105796237Z |               ├── ::1/128
2024-11-03T18:17:25.105797987Z |               ├── fc00::/7
2024-11-03T18:17:25.105799620Z |               ├── fe80::/10
2024-11-03T18:17:25.105801352Z |               ├── ::ffff:127.0.0.1/104
2024-11-03T18:17:25.105802987Z |               ├── ::ffff:10.0.0.0/104
2024-11-03T18:17:25.105804687Z |               ├── ::ffff:169.254.0.0/112
2024-11-03T18:17:25.105806364Z |               ├── ::ffff:172.16.0.0/108
2024-11-03T18:17:25.105808088Z |               └── ::ffff:192.168.0.0/112
2024-11-03T18:17:25.105809833Z ├── Firewall settings:
2024-11-03T18:17:25.105811515Z |   ├── Enabled: yes
2024-11-03T18:17:25.105813227Z |   ├── Debug mode: on
2024-11-03T18:17:25.105814950Z |   ├── Input ports:
2024-11-03T18:17:25.105816650Z |   |   ├── 10095
2024-11-03T18:17:25.105818336Z |   |   └── 8000
2024-11-03T18:17:25.105820054Z |   └── Outbound subnets:
2024-11-03T18:17:25.105821727Z |       ├── 172.16.0.0/16
2024-11-03T18:17:25.105823373Z |       └── 172.17.0.0/16
2024-11-03T18:17:25.105825029Z ├── Log settings:
2024-11-03T18:17:25.105826658Z |   └── Log level: debug
2024-11-03T18:17:25.105828346Z ├── Health settings:
2024-11-03T18:17:25.105830066Z |   ├── Server listening address: 127.0.0.1:9999
2024-11-03T18:17:25.105831807Z |   ├── Target address: cloudflare.com:443
2024-11-03T18:17:25.105833461Z |   ├── Duration to wait after success: 5s
2024-11-03T18:17:25.105835108Z |   ├── Read header timeout: 100ms
2024-11-03T18:17:25.105836830Z |   ├── Read timeout: 500ms
2024-11-03T18:17:25.105838618Z |   └── VPN wait durations:
2024-11-03T18:17:25.105840287Z |       ├── Initial duration: 6s
2024-11-03T18:17:25.105842011Z |       └── Additional duration: 5s
2024-11-03T18:17:25.105843667Z ├── Shadowsocks server settings:
2024-11-03T18:17:25.105845300Z |   └── Enabled: no
2024-11-03T18:17:25.105846997Z ├── HTTP proxy settings:
2024-11-03T18:17:25.105848665Z |   ├── Enabled: yes
2024-11-03T18:17:25.105850362Z |   ├── Listening address: :8888
2024-11-03T18:17:25.105852036Z |   ├── User: 
2024-11-03T18:17:25.105853775Z |   ├── Password: [not set]
2024-11-03T18:17:25.105857599Z |   ├── Stealth mode: no
2024-11-03T18:17:25.105859287Z |   ├── Log: yes
2024-11-03T18:17:25.105860944Z |   ├── Read header timeout: 1s
2024-11-03T18:17:25.105862584Z |   └── Read timeout: 3s
2024-11-03T18:17:25.105864293Z ├── Control server settings:
2024-11-03T18:17:25.105865925Z |   ├── Listening address: :8000
2024-11-03T18:17:25.105867622Z |   ├── Logging: yes
2024-11-03T18:17:25.105870529Z |   └── Authentication file path: /gluetun/auth/config.toml
2024-11-03T18:17:25.105872320Z ├── Storage settings:
2024-11-03T18:17:25.105874000Z |   └── Filepath: /gluetun/servers.json
2024-11-03T18:17:25.105875731Z ├── OS Alpine settings:
2024-11-03T18:17:25.105877474Z |   ├── Process UID: 568
2024-11-03T18:17:25.105879148Z |   ├── Process GID: 568
2024-11-03T18:17:25.105880828Z |   └── Timezone: utc
2024-11-03T18:17:25.105882521Z ├── Public IP settings:
2024-11-03T18:17:25.105884212Z |   ├── IP file path: /tmp/gluetun/ip
2024-11-03T18:17:25.105885879Z |   ├── Public IP data base API: ipinfo
2024-11-03T18:17:25.105887560Z |   └── Public IP data backup APIs:
2024-11-03T18:17:25.105889278Z |       ├── ifconfigco
2024-11-03T18:17:25.105890936Z |       ├── ip2location
2024-11-03T18:17:25.105892601Z |       └── cloudflare
2024-11-03T18:17:25.105894241Z └── Version settings:
2024-11-03T18:17:25.105896089Z     └── Enabled: yes
2024-11-03T18:17:25.106383498Z 2024-11-03T18:17:25Z INFO [routing] default route found: interface eth0, gateway 172.16.0.202, assigned IP 172.16.0.247 and family v4
2024-11-03T18:17:25.106387240Z 2024-11-03T18:17:25Z DEBUG [netlink] ip -4 rule list
2024-11-03T18:17:25.106388995Z 2024-11-03T18:17:25Z DEBUG [netlink] ip -6 rule list
2024-11-03T18:17:25.106430449Z 2024-11-03T18:17:25Z INFO [routing] adding route for 0.0.0.0/0
2024-11-03T18:17:25.106437001Z 2024-11-03T18:17:25Z DEBUG [routing] ip route replace 0.0.0.0/0 via 172.16.0.202 dev eth0 table 200
2024-11-03T18:17:25.106499885Z 2024-11-03T18:17:25Z INFO [firewall] setting allowed subnets...
2024-11-03T18:17:25.106526156Z 2024-11-03T18:17:25Z DEBUG [firewall] /sbin/iptables --append OUTPUT -o eth0 -s 172.16.0.247 -d 172.16.0.0/16 -j ACCEPT
2024-11-03T18:17:25.108122645Z 2024-11-03T18:17:25Z DEBUG [firewall] /sbin/iptables --append OUTPUT -o eth0 -s 172.16.0.247 -d 172.17.0.0/16 -j ACCEPT
2024-11-03T18:17:25.109186165Z 2024-11-03T18:17:25Z INFO [routing] default route found: interface eth0, gateway 172.16.0.202, assigned IP 172.16.0.247 and family v4
2024-11-03T18:17:25.109199058Z 2024-11-03T18:17:25Z INFO [routing] adding route for 172.16.0.0/16
2024-11-03T18:17:25.109201247Z 2024-11-03T18:17:25Z DEBUG [routing] ip route replace 172.16.0.0/16 via 172.16.0.202 dev eth0 table 199
2024-11-03T18:17:25.109239863Z 2024-11-03T18:17:25Z DEBUG [netlink] ip -4 rule list
2024-11-03T18:17:25.109241983Z 2024-11-03T18:17:25Z DEBUG [netlink] ip -6 rule list
2024-11-03T18:17:25.109276493Z 2024-11-03T18:17:25Z INFO [routing] adding route for 172.17.0.0/16
2024-11-03T18:17:25.109278579Z 2024-11-03T18:17:25Z DEBUG [routing] ip route replace 172.17.0.0/16 via 172.16.0.202 dev eth0 table 199
2024-11-03T18:17:25.109340991Z 2024-11-03T18:17:25Z DEBUG [netlink] ip -4 rule list
2024-11-03T18:17:25.109348044Z 2024-11-03T18:17:25Z DEBUG [netlink] ip -6 rule list
2024-11-03T18:17:25.109368834Z 2024-11-03T18:17:25Z DEBUG [netlink] ip -4 rule list
2024-11-03T18:17:25.109371499Z 2024-11-03T18:17:25Z DEBUG [netlink] ip -6 rule list
2024-11-03T18:17:25.109436413Z 2024-11-03T18:17:25Z DEBUG [netlink] ip -4 rule list
2024-11-03T18:17:25.109439274Z 2024-11-03T18:17:25Z DEBUG [netlink] ip -6 rule list
2024-11-03T18:17:25.109490744Z 2024-11-03T18:17:25Z INFO TUN device is not available: open /dev/net/tun: no such file or directory; creating it...
2024-11-03T18:17:25.109522916Z 2024-11-03T18:17:25Z INFO [firewall] setting allowed input port 10095 through interface eth0...
2024-11-03T18:17:25.109555117Z 2024-11-03T18:17:25Z DEBUG [firewall] /sbin/iptables --append INPUT -i eth0 -p tcp -m tcp --dport 10095 -j ACCEPT
2024-11-03T18:17:25.110449990Z 2024-11-03T18:17:25Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i eth0 -p tcp -m tcp --dport 10095 -j ACCEPT
2024-11-03T18:17:25.111296527Z 2024-11-03T18:17:25Z DEBUG [firewall] /sbin/iptables --append INPUT -i eth0 -p udp -m udp --dport 10095 -j ACCEPT
2024-11-03T18:17:25.153743226Z 2024-11-03T18:17:25Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i eth0 -p udp -m udp --dport 10095 -j ACCEPT
2024-11-03T18:17:25.154862995Z 2024-11-03T18:17:25Z INFO [firewall] setting allowed input port 8000 through interface eth0...
2024-11-03T18:17:25.154874548Z 2024-11-03T18:17:25Z DEBUG [firewall] /sbin/iptables --append INPUT -i eth0 -p tcp -m tcp --dport 8000 -j ACCEPT
2024-11-03T18:17:25.155906196Z 2024-11-03T18:17:25Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i eth0 -p tcp -m tcp --dport 8000 -j ACCEPT
2024-11-03T18:17:25.156780611Z 2024-11-03T18:17:25Z DEBUG [firewall] /sbin/iptables --append INPUT -i eth0 -p udp -m udp --dport 8000 -j ACCEPT
2024-11-03T18:17:25.200940281Z 2024-11-03T18:17:25Z DEBUG [firewall] /sbin/ip6tables --append INPUT -i eth0 -p udp -m udp --dport 8000 -j ACCEPT
2024-11-03T18:17:25.201936274Z 2024-11-03T18:17:25Z INFO [dns] using plaintext DNS at address 1.1.1.1
2024-11-03T18:17:25.201975378Z 2024-11-03T18:17:25Z INFO [http proxy] listening on :8888
2024-11-03T18:17:25.202175521Z 2024-11-03T18:17:25Z INFO [http server] http server listening on [::]:8000
2024-11-03T18:17:25.202183169Z 2024-11-03T18:17:25Z DEBUG [wireguard] Wireguard server public key: +WRsjA7z/PQqasrqiUVo3Tug+go7W2DXjO2p3TTeagk=
2024-11-03T18:17:25.202185748Z 2024-11-03T18:17:25Z DEBUG [wireguard] Wireguard client private key: cL5...Fg=
2024-11-03T18:17:25.202187776Z 2024-11-03T18:17:25Z DEBUG [wireguard] Wireguard pre-shared key: [not set]
2024-11-03T18:17:25.202190301Z 2024-11-03T18:17:25Z INFO [firewall] allowing VPN connection...
2024-11-03T18:17:25.202192949Z 2024-11-03T18:17:25Z DEBUG [firewall] /sbin/iptables --append OUTPUT -d 138.199.6.179 -o eth0 -p udp -m udp --dport 51820 -j ACCEPT
2024-11-03T18:17:25.202200938Z 2024-11-03T18:17:25Z INFO [healthcheck] listening on 127.0.0.1:9999
2024-11-03T18:17:25.203058694Z 2024-11-03T18:17:25Z DEBUG [firewall] /sbin/iptables --append OUTPUT -o tun0 -j ACCEPT
2024-11-03T18:17:25.254802738Z 2024-11-03T18:17:25Z DEBUG [firewall] /sbin/ip6tables --append OUTPUT -o tun0 -j ACCEPT
2024-11-03T18:17:25.301459160Z 2024-11-03T18:17:25Z INFO [wireguard] Using available kernelspace implementation
2024-11-03T18:17:25.453343170Z 2024-11-03T18:17:25Z INFO [wireguard] Connecting to 138.199.6.179:51820
2024-11-03T18:17:25.453955654Z 2024-11-03T18:17:25Z DEBUG [netlink] ip -4 rule list
2024-11-03T18:17:25.454069391Z 2024-11-03T18:17:25Z DEBUG [netlink] ip -6 rule list
2024-11-03T18:17:25.454145057Z 2024-11-03T18:17:25Z DEBUG [netlink] ip rule add lookup 51820 pref 101
2024-11-03T18:17:25.454211458Z 2024-11-03T18:17:25Z DEBUG [netlink] ip -4 rule list
2024-11-03T18:17:25.454268099Z 2024-11-03T18:17:25Z DEBUG [netlink] ip -6 rule list
2024-11-03T18:17:25.454366019Z 2024-11-03T18:17:25Z INFO [wireguard] 
2024-11-03T18:17:25.454373424Z IPv4 rules before adding rule:
2024-11-03T18:17:25.454379379Z ip rule 0: from all to all table 255
2024-11-03T18:17:25.454385603Z ip rule 98: from all to 172.16.0.202/32 table 254
2024-11-03T18:17:25.454391435Z ip rule 99: from all to 172.16.0.0/16 table 199
2024-11-03T18:17:25.454397231Z ip rule 99: from all to 172.17.0.0/16 table 199
2024-11-03T18:17:25.454402760Z ip rule 100: from 172.16.0.247/32 to all table 200
2024-11-03T18:17:25.454408985Z ip rule 101: from all to all table 51820
2024-11-03T18:17:25.454415168Z ip rule 32766: from all to all table 254
2024-11-03T18:17:25.454421155Z ip rule 32767: from all to all table 253
2024-11-03T18:17:25.454441273Z IPv4 rules after adding rule:
2024-11-03T18:17:25.454462950Z ip rule 0: from all to all table 255
2024-11-03T18:17:25.454469354Z ip rule 98: from all to 172.16.0.202/32 table 254
2024-11-03T18:17:25.454475383Z ip rule 99: from all to 172.16.0.0/16 table 199
2024-11-03T18:17:25.454481543Z ip rule 99: from all to 172.17.0.0/16 table 199
2024-11-03T18:17:25.454491506Z ip rule 100: from 172.16.0.247/32 to all table 200
2024-11-03T18:17:25.454497262Z ip rule 101: from all to all table 51820
2024-11-03T18:17:25.454503030Z ip rule 32766: from all to all table 254
2024-11-03T18:17:25.454509237Z ip rule 32767: from all to all table 253
2024-11-03T18:17:25.454515486Z IPv6 rules before adding rule:
2024-11-03T18:17:25.454521329Z ip rule 0: from all to all table 255
2024-11-03T18:17:25.454527183Z ip rule 98: from all to fe80::/64 table 254
2024-11-03T18:17:25.454532831Z ip rule 101: from all to all table 51820
2024-11-03T18:17:25.454538552Z ip rule 32766: from all to all table 254
2024-11-03T18:17:25.454544298Z nIPv6 rules after adding rule:
2024-11-03T18:17:25.454550033Z ip rule 0: from all to all table 255
2024-11-03T18:17:25.454555826Z ip rule 98: from all to fe80::/64 table 254
2024-11-03T18:17:25.454561875Z ip rule 101: from all to all table 51820
2024-11-03T18:17:25.454567732Z ip rule 32766: from all to all table 254
2024-11-03T18:17:25.454601444Z 2024-11-03T18:17:25Z DEBUG [wireguard] closing controller client...
2024-11-03T18:17:25.454632236Z 2024-11-03T18:17:25Z DEBUG [wireguard] shutting down link...
2024-11-03T18:17:25.454819175Z 2024-11-03T18:17:25Z ERROR [vpn] adding IPv6 rule: adding rule ip rule 101: from all to all table 51820: file exists
2024-11-03T18:17:25.454835204Z 2024-11-03T18:17:25Z INFO [vpn] retrying in 15s
2024-11-03T18:17:25.510063848Z 2024-11-03T18:17:25Z DEBUG [wireguard] deleting link...
2024-11-03T18:17:31.203060190Z 2024-11-03T18:17:31Z INFO [healthcheck] program has been unhealthy for 6s: restarting VPN
2024-11-03T18:17:31.203135548Z 2024-11-03T18:17:31Z INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-11-03T18:17:31.203188116Z 2024-11-03T18:17:31Z INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-11-03T18:17:40.458295733Z 2024-11-03T18:17:40Z DEBUG [wireguard] Wireguard server public key: +WRsjA7z/PQqasrqiUVo3Tug+go7W2DXjO2p3TTeagk=
2024-11-03T18:17:40.458377942Z 2024-11-03T18:17:40Z DEBUG [wireguard] Wireguard client private key: cL5...Fg=
2024-11-03T18:17:40.458399153Z 2024-11-03T18:17:40Z DEBUG [wireguard] Wireguard pre-shared key: [not set]
2024-11-03T18:17:40.458414723Z 2024-11-03T18:17:40Z INFO [firewall] allowing VPN connection...
2024-11-03T18:17:40.458430143Z 2024-11-03T18:17:40Z INFO [wireguard] Using available kernelspace implementation
2024-11-03T18:17:40.459991369Z 2024-11-03T18:17:40Z INFO [wireguard] Connecting to 138.199.6.179:51820
2024-11-03T18:17:40.557210434Z 2024-11-03T18:17:40Z DEBUG [netlink] ip -4 rule list
2024-11-03T18:17:40.557285237Z 2024-11-03T18:17:40Z DEBUG [netlink] ip -6 rule list
2024-11-03T18:17:40.557304834Z 2024-11-03T18:17:40Z DEBUG [netlink] ip rule add lookup 51820 pref 101
2024-11-03T18:17:40.557318251Z 2024-11-03T18:17:40Z DEBUG [netlink] ip -4 rule list
2024-11-03T18:17:40.557330807Z 2024-11-03T18:17:40Z DEBUG [netlink] ip -6 rule list
2024-11-03T18:17:40.557344140Z 2024-11-03T18:17:40Z INFO [wireguard] 
2024-11-03T18:17:40.557359273Z IPv4 rules before adding rule:
2024-11-03T18:17:40.557372905Z ip rule 0: from all to all table 255
2024-11-03T18:17:40.557385512Z ip rule 98: from all to 172.16.0.202/32 table 254
2024-11-03T18:17:40.557400433Z ip rule 99: from all to 172.16.0.0/16 table 199
2024-11-03T18:17:40.557454741Z ip rule 99: from all to 172.17.0.0/16 table 199
2024-11-03T18:17:40.557472427Z ip rule 100: from 172.16.0.247/32 to all table 200
2024-11-03T18:17:40.557486139Z ip rule 101: from all to all table 51820
2024-11-03T18:17:40.557498553Z ip rule 32766: from all to all table 254
2024-11-03T18:17:40.557512549Z ip rule 32767: from all to all table 253
2024-11-03T18:17:40.557526099Z IPv4 rules after adding rule:
2024-11-03T18:17:40.557541313Z ip rule 0: from all to all table 255
2024-11-03T18:17:40.557554488Z ip rule 98: from all to 172.16.0.202/32 table 254
2024-11-03T18:17:40.557567933Z ip rule 99: from all to 172.16.0.0/16 table 199
2024-11-03T18:17:40.557581552Z ip rule 99: from all to 172.17.0.0/16 table 199
2024-11-03T18:17:40.557594534Z ip rule 100: from 172.16.0.247/32 to all table 200
2024-11-03T18:17:40.557607491Z ip rule 101: from all to all table 51820
2024-11-03T18:17:40.557620238Z ip rule 32766: from all to all table 254
2024-11-03T18:17:40.557633580Z ip rule 32767: from all to all table 253
2024-11-03T18:17:40.557647135Z IPv6 rules before adding rule:
2024-11-03T18:17:40.557661211Z ip rule 0: from all to all table 255
2024-11-03T18:17:40.557675497Z ip rule 98: from all to fe80::/64 table 254
2024-11-03T18:17:40.557688687Z ip rule 101: from all to all table 51820
2024-11-03T18:17:40.557703180Z ip rule 32766: from all to all table 254
2024-11-03T18:17:40.557716648Z nIPv6 rules after adding rule:
2024-11-03T18:17:40.557730796Z ip rule 0: from all to all table 255
2024-11-03T18:17:40.557744598Z ip rule 98: from all to fe80::/64 table 254
2024-11-03T18:17:40.557757749Z ip rule 101: from all to all table 51820
2024-11-03T18:17:40.557772240Z ip rule 32766: from all to all table 254
2024-11-03T18:17:40.557785633Z 2024-11-03T18:17:40Z DEBUG [wireguard] closing controller client...
2024-11-03T18:17:40.557799384Z 2024-11-03T18:17:40Z DEBUG [wireguard] shutting down link...
2024-11-03T18:17:40.600477308Z 2024-11-03T18:17:40Z ERROR [vpn] adding IPv6 rule: adding rule ip rule 101: from all to all table 51820: file exists
2024-11-03T18:17:40.600558043Z 2024-11-03T18:17:40Z INFO [vpn] retrying in 30s
2024-11-03T18:17:40.798486032Z 2024-11-03T18:17:40Z DEBUG [wireguard] deleting link...
2024-11-03T18:17:51.553712836Z 2024-11-03T18:17:51Z INFO [healthcheck] program has been unhealthy for 11s: restarting VPN
2024-11-03T18:17:51.553732481Z 2024-11-03T18:17:51Z INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-11-03T18:17:51.553736167Z 2024-11-03T18:17:51Z INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-11-03T18:18:07.554958792Z 2024-11-03T18:18:07Z INFO [healthcheck] program has been unhealthy for 16s: restarting VPN
2024-11-03T18:18:07.555053442Z 2024-11-03T18:18:07Z INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-11-03T18:18:07.555074698Z 2024-11-03T18:18:07Z INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-11-03T18:18:10.600479475Z 2024-11-03T18:18:10Z DEBUG [wireguard] Wireguard server public key: +WRsjA7z/PQqasrqiUVo3Tug+go7W2DXjO2p3TTeagk=
2024-11-03T18:18:10.600519095Z 2024-11-03T18:18:10Z DEBUG [wireguard] Wireguard client private key: cL5...Fg=
2024-11-03T18:18:10.600526395Z 2024-11-03T18:18:10Z DEBUG [wireguard] Wireguard pre-shared key: [not set]
2024-11-03T18:18:10.600532401Z 2024-11-03T18:18:10Z INFO [firewall] allowing VPN connection...
2024-11-03T18:18:10.600769069Z 2024-11-03T18:18:10Z INFO [wireguard] Using available kernelspace implementation
2024-11-03T18:18:10.601731572Z 2024-11-03T18:18:10Z INFO [wireguard] Connecting to 138.199.6.179:51820
2024-11-03T18:18:10.800761792Z 2024-11-03T18:18:10Z DEBUG [netlink] ip -4 rule list
2024-11-03T18:18:10.800876130Z 2024-11-03T18:18:10Z DEBUG [netlink] ip -6 rule list
2024-11-03T18:18:10.801221161Z 2024-11-03T18:18:10Z DEBUG [netlink] ip rule add lookup 51820 pref 101
2024-11-03T18:18:10.801246120Z 2024-11-03T18:18:10Z DEBUG [netlink] ip -4 rule list
2024-11-03T18:18:10.802055076Z 2024-11-03T18:18:10Z DEBUG [netlink] ip -6 rule list
2024-11-03T18:18:10.802089973Z 2024-11-03T18:18:10Z INFO [wireguard] 
2024-11-03T18:18:10.802102942Z IPv4 rules before adding rule:
2024-11-03T18:18:10.802113432Z ip rule 0: from all to all table 255
2024-11-03T18:18:10.802124037Z ip rule 98: from all to 172.16.0.202/32 table 254
2024-11-03T18:18:10.802133938Z ip rule 99: from all to 172.16.0.0/16 table 199
2024-11-03T18:18:10.802144121Z ip rule 99: from all to 172.17.0.0/16 table 199
2024-11-03T18:18:10.802154616Z ip rule 100: from 172.16.0.247/32 to all table 200
2024-11-03T18:18:10.802164756Z ip rule 101: from all to all table 51820
2024-11-03T18:18:10.802174750Z ip rule 32766: from all to all table 254
2024-11-03T18:18:10.802184943Z ip rule 32767: from all to all table 253
2024-11-03T18:18:10.802195544Z IPv4 rules after adding rule:
2024-11-03T18:18:10.802205922Z ip rule 0: from all to all table 255
2024-11-03T18:18:10.802215857Z ip rule 98: from all to 172.16.0.202/32 table 254
2024-11-03T18:18:10.802225856Z ip rule 99: from all to 172.16.0.0/16 table 199
2024-11-03T18:18:10.802235583Z ip rule 99: from all to 172.17.0.0/16 table 199
2024-11-03T18:18:10.802245581Z ip rule 100: from 172.16.0.247/32 to all table 200
2024-11-03T18:18:10.802255347Z ip rule 101: from all to all table 51820
2024-11-03T18:18:10.802270754Z ip rule 32766: from all to all table 254
2024-11-03T18:18:10.802280502Z ip rule 32767: from all to all table 253
2024-11-03T18:18:10.802292169Z IPv6 rules before adding rule:
2024-11-03T18:18:10.802302154Z ip rule 0: from all to all table 255
2024-11-03T18:18:10.802311886Z ip rule 98: from all to fe80::/64 table 254
2024-11-03T18:18:10.802321818Z ip rule 101: from all to all table 51820
2024-11-03T18:18:10.802331983Z ip rule 32766: from all to all table 254
2024-11-03T18:18:10.802341788Z nIPv6 rules after adding rule:
2024-11-03T18:18:10.802351668Z ip rule 0: from all to all table 255
2024-11-03T18:18:10.802361339Z ip rule 98: from all to fe80::/64 table 254
2024-11-03T18:18:10.802371011Z ip rule 101: from all to all table 51820
2024-11-03T18:18:10.802380741Z ip rule 32766: from all to all table 254
2024-11-03T18:18:10.802390909Z 2024-11-03T18:18:10Z DEBUG [wireguard] closing controller client...
2024-11-03T18:18:10.802400988Z 2024-11-03T18:18:10Z DEBUG [wireguard] shutting down link...
2024-11-03T18:18:10.853543368Z 2024-11-03T18:18:10Z DEBUG [wireguard] deleting link...
2024-11-03T18:18:10.901235090Z 2024-11-03T18:18:10Z ERROR [vpn] adding IPv6 rule: adding rule ip rule 101: from all to all table 51820: file exists
2024-11-03T18:18:10.901303231Z 2024-11-03T18:18:10Z INFO [vpn] retrying in 15s
2024-11-03T18:18:25.900678325Z 2024-11-03T18:18:25Z DEBUG [wireguard] Wireguard server public key: +WRsjA7z/PQqasrqiUVo3Tug+go7W2DXjO2p3TTeagk=
2024-11-03T18:18:25.900707599Z 2024-11-03T18:18:25Z DEBUG [wireguard] Wireguard client private key: cL5...Fg=
2024-11-03T18:18:25.900711958Z 2024-11-03T18:18:25Z DEBUG [wireguard] Wireguard pre-shared key: [not set]
2024-11-03T18:18:25.900715581Z 2024-11-03T18:18:25Z INFO [firewall] allowing VPN connection...
2024-11-03T18:18:25.900923015Z 2024-11-03T18:18:25Z INFO [wireguard] Using available kernelspace implementation
2024-11-03T18:18:25.902277656Z 2024-11-03T18:18:25Z INFO [wireguard] Connecting to 138.199.6.179:51820
2024-11-03T18:18:25.904001212Z 2024-11-03T18:18:25Z DEBUG [netlink] ip -4 rule list
2024-11-03T18:18:25.904038948Z 2024-11-03T18:18:25Z DEBUG [netlink] ip -6 rule list
2024-11-03T18:18:25.904050988Z 2024-11-03T18:18:25Z DEBUG [netlink] ip rule add lookup 51820 pref 101
2024-11-03T18:18:25.904060043Z 2024-11-03T18:18:25Z DEBUG [netlink] ip -4 rule list
2024-11-03T18:18:25.904083288Z 2024-11-03T18:18:25Z DEBUG [netlink] ip -6 rule list
2024-11-03T18:18:25.904316648Z 2024-11-03T18:18:25Z INFO [wireguard] 
2024-11-03T18:18:25.904330632Z IPv4 rules before adding rule:
2024-11-03T18:18:25.904340003Z ip rule 0: from all to all table 255
2024-11-03T18:18:25.904348904Z ip rule 98: from all to 172.16.0.202/32 table 254
2024-11-03T18:18:25.904358061Z ip rule 99: from all to 172.16.0.0/16 table 199
2024-11-03T18:18:25.904367113Z ip rule 99: from all to 172.17.0.0/16 table 199
2024-11-03T18:18:25.904375667Z ip rule 100: from 172.16.0.247/32 to all table 200
2024-11-03T18:18:25.904384659Z ip rule 101: from all to all table 51820
2024-11-03T18:18:25.904393999Z ip rule 32766: from all to all table 254
2024-11-03T18:18:25.904406990Z ip rule 32767: from all to all table 253
2024-11-03T18:18:25.904416424Z IPv4 rules after adding rule:
2024-11-03T18:18:25.904425066Z ip rule 0: from all to all table 255
2024-11-03T18:18:25.904433720Z ip rule 98: from all to 172.16.0.202/32 table 254
2024-11-03T18:18:25.904441908Z ip rule 99: from all to 172.16.0.0/16 table 199
2024-11-03T18:18:25.904450710Z ip rule 99: from all to 172.17.0.0/16 table 199
2024-11-03T18:18:25.904459320Z ip rule 100: from 172.16.0.247/32 to all table 200
2024-11-03T18:18:25.904468977Z ip rule 101: from all to all table 51820
2024-11-03T18:18:25.904478204Z ip rule 32766: from all to all table 254
2024-11-03T18:18:25.904486555Z ip rule 32767: from all to all table 253
2024-11-03T18:18:25.904495231Z IPv6 rules before adding rule:
2024-11-03T18:18:25.904504459Z ip rule 0: from all to all table 255
2024-11-03T18:18:25.904512798Z ip rule 98: from all to fe80::/64 table 254
2024-11-03T18:18:25.904521092Z ip rule 101: from all to all table 51820
2024-11-03T18:18:25.904529739Z ip rule 32766: from all to all table 254
2024-11-03T18:18:25.904538218Z nIPv6 rules after adding rule:
2024-11-03T18:18:25.904546687Z ip rule 0: from all to all table 255
2024-11-03T18:18:25.904555760Z ip rule 98: from all to fe80::/64 table 254
2024-11-03T18:18:25.904564626Z ip rule 101: from all to all table 51820
2024-11-03T18:18:25.904573406Z ip rule 32766: from all to all table 254
2024-11-03T18:18:25.904582529Z 2024-11-03T18:18:25Z DEBUG [wireguard] closing controller client...
2024-11-03T18:18:25.904591761Z 2024-11-03T18:18:25Z DEBUG [wireguard] shutting down link...
2024-11-03T18:18:25.904613778Z 2024-11-03T18:18:25Z ERROR [vpn] adding IPv6 rule: adding rule ip rule 101: from all to all table 51820: file exists
2024-11-03T18:18:25.904623274Z 2024-11-03T18:18:25Z INFO [vpn] retrying in 30s
2024-11-03T18:18:26.037886451Z 2024-11-03T18:18:26Z DEBUG [wireguard] deleting link...
2024-11-03T18:18:30.955455860Z 2024-11-03T18:18:30Z INFO [healthcheck] program has been unhealthy for 21s: restarting VPN
2024-11-03T18:18:30.955534968Z 2024-11-03T18:18:30Z INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-11-03T18:18:30.955555641Z 2024-11-03T18:18:30Z INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-11-03T18:18:55.904755860Z 2024-11-03T18:18:55Z DEBUG [wireguard] Wireguard server public key: +WRsjA7z/PQqasrqiUVo3Tug+go7W2DXjO2p3TTeagk=
2024-11-03T18:18:55.904811958Z 2024-11-03T18:18:55Z DEBUG [wireguard] Wireguard client private key: cL5...Fg=
2024-11-03T18:18:55.904844598Z 2024-11-03T18:18:55Z DEBUG [wireguard] Wireguard pre-shared key: [not set]
2024-11-03T18:18:55.904855161Z 2024-11-03T18:18:55Z INFO [firewall] allowing VPN connection...
2024-11-03T18:18:55.906127765Z 2024-11-03T18:18:55Z INFO [wireguard] Using available kernelspace implementation
2024-11-03T18:18:55.906910445Z 2024-11-03T18:18:55Z INFO [wireguard] Connecting to 138.199.6.179:51820
2024-11-03T18:18:56.000807942Z 2024-11-03T18:18:56Z DEBUG [netlink] ip -4 rule list
2024-11-03T18:18:56.001022430Z 2024-11-03T18:18:56Z DEBUG [netlink] ip -6 rule list
2024-11-03T18:18:56.001286792Z 2024-11-03T18:18:56Z DEBUG [netlink] ip rule add lookup 51820 pref 101
2024-11-03T18:18:56.001452566Z 2024-11-03T18:18:56Z DEBUG [netlink] ip -4 rule list
2024-11-03T18:18:56.001637318Z 2024-11-03T18:18:56Z DEBUG [netlink] ip -6 rule list
2024-11-03T18:18:56.001858369Z 2024-11-03T18:18:56Z INFO [wireguard] 
2024-11-03T18:18:56.001878571Z IPv4 rules before adding rule:
2024-11-03T18:18:56.001893705Z ip rule 0: from all to all table 255
2024-11-03T18:18:56.001907334Z ip rule 98: from all to 172.16.0.202/32 table 254
2024-11-03T18:18:56.001921632Z ip rule 99: from all to 172.16.0.0/16 table 199
2024-11-03T18:18:56.001936204Z ip rule 99: from all to 172.17.0.0/16 table 199
2024-11-03T18:18:56.001955804Z ip rule 100: from 172.16.0.247/32 to all table 200
2024-11-03T18:18:56.002135289Z ip rule 101: from all to all table 51820
2024-11-03T18:18:56.002151489Z ip rule 32766: from all to all table 254
2024-11-03T18:18:56.002168035Z ip rule 32767: from all to all table 253
2024-11-03T18:18:56.002183376Z IPv4 rules after adding rule:
2024-11-03T18:18:56.002197752Z ip rule 0: from all to all table 255
2024-11-03T18:18:56.002211667Z ip rule 98: from all to 172.16.0.202/32 table 254
2024-11-03T18:18:56.002227125Z ip rule 99: from all to 172.16.0.0/16 table 199
2024-11-03T18:18:56.002240366Z ip rule 99: from all to 172.17.0.0/16 table 199
2024-11-03T18:18:56.002254194Z ip rule 100: from 172.16.0.247/32 to all table 200
2024-11-03T18:18:56.002266372Z ip rule 101: from all to all table 51820
2024-11-03T18:18:56.002278378Z ip rule 32766: from all to all table 254
2024-11-03T18:18:56.002291037Z ip rule 32767: from all to all table 253
2024-11-03T18:18:56.002304788Z IPv6 rules before adding rule:
2024-11-03T18:18:56.002318106Z ip rule 0: from all to all table 255
2024-11-03T18:18:56.002331288Z ip rule 98: from all to fe80::/64 table 254
2024-11-03T18:18:56.002344605Z ip rule 101: from all to all table 51820
2024-11-03T18:18:56.002359865Z ip rule 32766: from all to all table 254
2024-11-03T18:18:56.002374478Z nIPv6 rules after adding rule:
2024-11-03T18:18:56.002387809Z ip rule 0: from all to all table 255
2024-11-03T18:18:56.002400193Z ip rule 98: from all to fe80::/64 table 254
2024-11-03T18:18:56.002412543Z ip rule 101: from all to all table 51820
2024-11-03T18:18:56.002426512Z ip rule 32766: from all to all table 254
2024-11-03T18:18:56.002479298Z 2024-11-03T18:18:56Z DEBUG [wireguard] closing controller client...
2024-11-03T18:18:56.002491226Z 2024-11-03T18:18:56Z DEBUG [wireguard] shutting down link...
2024-11-03T18:18:56.002515779Z 2024-11-03T18:18:56Z ERROR [vpn] adding IPv6 rule: adding rule ip rule 101: from all to all table 51820: file exists
2024-11-03T18:18:56.002526070Z 2024-11-03T18:18:56Z INFO [vpn] retrying in 1m0s
2024-11-03T18:18:56.057751256Z 2024-11-03T18:18:56Z DEBUG [wireguard] deleting link...
2024-11-03T18:19:01.002124260Z 2024-11-03T18:19:01Z INFO [healthcheck] program has been unhealthy for 26s: restarting VPN
2024-11-03T18:19:01.002220562Z 2024-11-03T18:19:01Z INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-11-03T18:19:01.002266335Z 2024-11-03T18:19:01Z INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-11-03T18:19:32.002112567Z 2024-11-03T18:19:32Z INFO [healthcheck] program has been unhealthy for 31s: restarting VPN
2024-11-03T18:19:32.002133768Z 2024-11-03T18:19:32Z INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-11-03T18:19:32.002137583Z 2024-11-03T18:19:32Z INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-11-03T18:19:56.002559205Z 2024-11-03T18:19:56Z DEBUG [wireguard] Wireguard server public key: +WRsjA7z/PQqasrqiUVo3Tug+go7W2DXjO2p3TTeagk=
2024-11-03T18:19:56.002644829Z 2024-11-03T18:19:56Z DEBUG [wireguard] Wireguard client private key: cL5...Fg=
2024-11-03T18:19:56.002661822Z 2024-11-03T18:19:56Z DEBUG [wireguard] Wireguard pre-shared key: [not set]
2024-11-03T18:19:56.002684808Z 2024-11-03T18:19:56Z INFO [firewall] allowing VPN connection...
2024-11-03T18:19:56.003351844Z 2024-11-03T18:19:56Z INFO [wireguard] Using available kernelspace implementation
2024-11-03T18:19:56.005646481Z 2024-11-03T18:19:56Z INFO [wireguard] Connecting to 138.199.6.179:51820
2024-11-03T18:19:56.006786963Z 2024-11-03T18:19:56Z DEBUG [netlink] ip -4 rule list
2024-11-03T18:19:56.006858875Z 2024-11-03T18:19:56Z DEBUG [netlink] ip -6 rule list
2024-11-03T18:19:56.007119566Z 2024-11-03T18:19:56Z DEBUG [netlink] ip rule add lookup 51820 pref 101
2024-11-03T18:19:56.007180480Z 2024-11-03T18:19:56Z DEBUG [netlink] ip -4 rule list
2024-11-03T18:19:56.007373847Z 2024-11-03T18:19:56Z DEBUG [netlink] ip -6 rule list
2024-11-03T18:19:56.007620285Z 2024-11-03T18:19:56Z INFO [wireguard] 
2024-11-03T18:19:56.007637756Z IPv4 rules before adding rule:
2024-11-03T18:19:56.007647947Z ip rule 0: from all to all table 255
2024-11-03T18:19:56.007659652Z ip rule 98: from all to 172.16.0.202/32 table 254
2024-11-03T18:19:56.007670117Z ip rule 99: from all to 172.16.0.0/16 table 199
2024-11-03T18:19:56.007680036Z ip rule 99: from all to 172.17.0.0/16 table 199
2024-11-03T18:19:56.007689931Z ip rule 100: from 172.16.0.247/32 to all table 200
2024-11-03T18:19:56.007699627Z ip rule 101: from all to all table 51820
2024-11-03T18:19:56.007771566Z ip rule 32766: from all to all table 254
2024-11-03T18:19:56.007781443Z ip rule 32767: from all to all table 253
2024-11-03T18:19:56.007791541Z IPv4 rules after adding rule:
2024-11-03T18:19:56.007801373Z ip rule 0: from all to all table 255
2024-11-03T18:19:56.007811240Z ip rule 98: from all to 172.16.0.202/32 table 254
2024-11-03T18:19:56.007821253Z ip rule 99: from all to 172.16.0.0/16 table 199
2024-11-03T18:19:56.007831097Z ip rule 99: from all to 172.17.0.0/16 table 199
2024-11-03T18:19:56.007840733Z ip rule 100: from 172.16.0.247/32 to all table 200
2024-11-03T18:19:56.007850569Z ip rule 101: from all to all table 51820
2024-11-03T18:19:56.007914705Z ip rule 32766: from all to all table 254
2024-11-03T18:19:56.007926198Z ip rule 32767: from all to all table 253
2024-11-03T18:19:56.007936353Z IPv6 rules before adding rule:
2024-11-03T18:19:56.007946310Z ip rule 0: from all to all table 255
2024-11-03T18:19:56.007956337Z ip rule 98: from all to fe80::/64 table 254
2024-11-03T18:19:56.007966077Z ip rule 101: from all to all table 51820
2024-11-03T18:19:56.007975775Z ip rule 32766: from all to all table 254
2024-11-03T18:19:56.007985635Z nIPv6 rules after adding rule:
2024-11-03T18:19:56.007995602Z ip rule 0: from all to all table 255
2024-11-03T18:19:56.008005135Z ip rule 98: from all to fe80::/64 table 254
2024-11-03T18:19:56.008034217Z ip rule 101: from all to all table 51820
2024-11-03T18:19:56.008045195Z ip rule 32766: from all to all table 254
2024-11-03T18:19:56.008056403Z 2024-11-03T18:19:56Z DEBUG [wireguard] closing controller client...
2024-11-03T18:19:56.008094916Z 2024-11-03T18:19:56Z DEBUG [wireguard] shutting down link...
2024-11-03T18:19:56.054080646Z 2024-11-03T18:19:56Z ERROR [vpn] adding IPv6 rule: adding rule ip rule 101: from all to all table 51820: file exists
2024-11-03T18:19:56.054145959Z 2024-11-03T18:19:56Z INFO [vpn] retrying in 2m0s
2024-11-03T18:19:56.145139635Z 2024-11-03T18:19:56Z DEBUG [wireguard] deleting link...

Hope this is what you're looking for.

@qdm12
Copy link
Owner

qdm12 commented Nov 3, 2024

Nice, thank you!

Looking at the first 'crash':

IPv4 rules before adding rule:
ip rule 0: from all to all table 255
ip rule 98: from all to 172.16.0.202/32 table 254
ip rule 99: from all to 172.16.0.0/16 table 199
ip rule 99: from all to 172.17.0.0/16 table 199
ip rule 100: from 172.16.0.247/32 to all table 200
ip rule 101: from all to all table 51820 🔴
ip rule 32766: from all to all table 254
ip rule 32767: from all to all table 253
IPv4 rules after adding rule:
ip rule 0: from all to all table 255
ip rule 98: from all to 172.16.0.202/32 table 254
ip rule 99: from all to 172.16.0.0/16 table 199
ip rule 99: from all to 172.17.0.0/16 table 199
ip rule 100: from 172.16.0.247/32 to all table 200
ip rule 101: from all to all table 51820
ip rule 32766: from all to all table 254
ip rule 32767: from all to all table 253
IPv6 rules before adding rule:
ip rule 0: from all to all table 255
ip rule 98: from all to fe80::/64 table 254
ip rule 101: from all to all table 51820 🔴
ip rule 32766: from all to all table 254
IPv6 rules after adding rule:
ip rule 0: from all to all table 255
ip rule 98: from all to fe80::/64 table 254
ip rule 101: from all to all table 51820
ip rule 32766: from all to all table 254

It looks like both IPv4 AND IPv6 have the rule ip rule 101: from all to all table 51820 already before trying to add the IPv6 ip rule. Note in the code currently the IPv6 rule is added before the IPv4 rule, so the IPv4 rule addition is never run since the IPv6 rule addition fails. I have no clue why the container keeps the rules (for both IPv4 and IPv6) and clearly (from the debug logs) it's not the Gluetun code adding it before.

One last thing out of curiosity, can you change the entrypoint of Gluetun to be ip -f inet rule list and see what it logs? (also with ip -f inet6 rule list ideally). I'm guessing Kubernetes keeps the ip rules from the last container run perhaps, or these were not cleaned up properly from a previous container run? 🤔

Finally, since those rules seem to be there no matter what, I pushed e92d07f to that PR image tag, where it now simply considers the file exists error as success, can you try it out (re-pull 😉) and check it works fine? Thanks!!

@qdm12 qdm12 added Status: 🟡 Nearly resolved This might be resolved or is about to be resolved and removed Priority: 🚨 Urgent labels Nov 3, 2024
@kvangent
Copy link

kvangent commented Nov 3, 2024

Hey @qdm12 -- I have a belated response to #2471 (comment). My initial proposed solution did not hold, but I believe I may have discovered the cause.

Something that I did not realize prior was that iptables entries are not ephemeral to a single pod (and the containers in it), but seem to be shared by all containers on the machine. I think the iptables rule conflcit is being cause by 2 things:

  • Hastily executed pods: k8s typically gives 30s after a sigterm, gluten is either occasionally exceeding that time or being shutdown without it (a node shutdown or power event)
  • Replacement pods: The default strategy for k8s is "RollingUpdate" which will instantiate a new version of a pod before the old one is terminated. If the new pod lands on the same node, they will have a conflict between rules.

The second one seems particularly tricky -- even deleting the rule with the pod starts up is not guaranteed to fix the issue because the first instance of the pod may delete the newer version of the rule created by the second pod before it's replaced.

For my current workaround, I had to both add a post-start hook to remove the rule (to account for the first scenario) and changed my deployment strategy to "Recreate" (to account for the second. So far, this has worked for a couple of weeks now without issue.

I've been using the following deployment for a few weeks now (which has the bonus of automatically configuring the forwarded_port) and it seems to be working excellently:

apiVersion: apps/v1
kind: Deployment
metadata:
  name: qbittorrent
  labels:
    app: qbittorrent
  annotations:
    network.beta.kubernetes.io/ipv6: "false"
spec:
  strategy:
    type: Recreate
  replicas: 1
  selector:
    matchLabels:
      app: qbittorrent
  template:
    metadata:
      labels:
        app: qbittorrent
    spec:
      containers:
        - name: qbittorrent
          image: linuxserver/qbittorrent:5.0.1-r0-ls362
          env:
            - name: PUID
              value: "1000"
            - name: GID
              value: "1000"
            - name: DOCKER_MODS
              value: ghcr.io/vuetorrent/vuetorrent-lsio-mod:latest
          ports:
            - containerPort: 8080
            - containerPort: 6881
              protocol: TCP
            - containerPort: 6881
              protocol: UDP
          volumeMounts:
            - name: qbittorent-config
              mountPath: /config
            - name: media
              mountPath: /media
          resources:
            requests:
              cpu: 500m
              memory: 1Gi
            limits:
              cpu: 1
              memory: 1Gi
          livenessProbe:
            httpGet:
              path: /#/
              port: 8080
            initialDelaySeconds: 300
            periodSeconds: 15
            failureThreshold: 2
        - name: vpn
          image: qmcgaw/gluetun:v3.39.0
          securityContext:
            capabilities:
              add:
                - NET_ADMIN
          env:
            - name: VPN_SERVICE_PROVIDER
              value: "protonvpn"
            - name: VPN_TYPE
              value: "wireguard"
            - name: WIREGUARD_PRIVATE_KEY
              valueFrom:
                secretKeyRef:
                  name: protonvpn-credentials
                  key: wiregaurd-private-key
            - name: SERVER_COUNTRIES
              value:  <REDACTED>
            - name: PORT_FORWARD_ONLY
              value: "on"
            - name: VPN_PORT_FORWARDING
              value: "on"
            - name: TZ
              value:  <REDACTED>
            # - name: LOG_LEVEL
            #   value: "debug"
          resources:
            requests:
              cpu: 250m
              memory: 1Gi
            limits:
              cpu: 500m
              memory: 1Gi
          lifecycle:
            postStart:
              exec:
                command: ["/bin/sh", "-c", "(ip rule del table 51820; ip -6 rule del table 51820) || true"]
          startupProbe:
            exec:
              command:
                - "/bin/sh"
                - "-c"
                - >
                  set -eu;
                  PORT=$(cat /tmp/gluetun/forwarded_port);
                  wget --header="Content-Type: application/x-www-form-urlencoded" \
                    --post-data='json={"listen_port": '$PORT'}' \
                    --output-document - \
                    http://localhost:8080/api/v2/app/setPreferences;
            periodSeconds: 30
            failureThreshold: 10
          livenessProbe:
            exec:
              command: ["/gluetun-entrypoint", "healthcheck"]
            initialDelaySeconds: 500
            periodSeconds: 30
            failureThreshold: 3
      volumes:
        - name: qbittorent-config
          nfs:
            server: <REDACTED>
            path:  <REDACTED>
        - name: media
          nfs:
            server:  <REDACTED>
            path:  <REDACTED>

I believe the fix in your PR would help ignore the first scenario. I think it would probably still help with the 2nd, as gluten seems to attempt to recreate the rule if it is missing?

@qdm12
Copy link
Owner

qdm12 commented Nov 7, 2024

omething that I did not realize prior was that iptables entries are not ephemeral to a single pod (and the containers in it), but seem to be shared by all containers on the machine. ........

That's awesome, congratulations for digging this out! 🎖️

gluten seems to attempt to recreate the rule if it is missing?

It doesn't really check for now, it only keeps the state of rules within itself, so it assumes it's blank at start even if it's not.

iptables rule

Note it's an ip rule, not an iptables rule. iptables is the firewall, which, by the way, also has rules within chains (INPUT, OUTPUT, etc.) within tables (filter, nat, etc.)... but these two are unrelated and also awfully similar in their names.

I believe the fix in your PR would help ignore the first scenario. I think it would probably still help with the 2nd, as gluten seems to attempt to recreate the rule if it is missing?

The PR would fix the first one, and also a faster, more deterministic shutdown would help (I'm working on this slowly, reworking all 'run loops' within gluetun).
For the second point, that's a tough one, I'm thinking about adding an option to disable deletion of ip rules on shutdown? But here comes my other question, does it keep only ip rules on the pod or also ip routes/iptables rules?? If it's just ip rules, I can add a somewhat ugly option to disable IP rule deletion at shutdown i.e. KUBERNETES_SHUTDOWN_IP_RULE_DELETION=on which you could change to off.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

5 participants