-
-
Notifications
You must be signed in to change notification settings - Fork 391
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(protonvpn): Wireguard support #2390
Conversation
be0c12b
to
51dd103
Compare
Currently running this PR but it just switch servers constantly by beeing unhealthy : env settings :
|
@TheRealBix thanks for trying it out!
Perhaps drop the MTU |
I'll try dropping the MTU after work. Indeed they support both openvpn and wireguard, openvpn config with those same servers works fine. |
Looks good to me! I don't really have any traffic on it at the moment though. I'll try some more servers I'd usually use. |
I added country and city to get on faster/closer servers and it's been fine for a few hours. I changed servers a few times by restarting container it's come back up fine every time.
|
I added "VPN_PORT_FORWARDED=on" and "VPN_DNS_ADDRESS=10.2.0.1" that I missed on first try, plus allowed more servers for the night (whole Paris servers). Did not tried to change MTU yet but I will. I still had some unhealthy states and ipgetter seems to fail somehow https://hastebin.skyra.pw/ajolabopom.yaml edit bonus : unbelievable how wireguard is light compared to openvpn |
@TheRealBix Great thanks for the feedback! A bit odd how it stays online only for 5 minutes then dies... (except the last one!??) |
I'm currently adding documentation to the wiki, can anyone please describe a little few steps (just text and links please) on how to get your wireguard configuration file? A bit like described for Mullvad at https://github.com/qdm12/gluetun-wiki/blob/main/setup/providers/mullvad.md#wireguard-only Thank you 🙏 ! |
Well indeed it's not stable. Here a try with 1300 bytes MTU https://hastebin.skyra.pw/cubewiqiwa.yaml Guess I'll try messing with private keys now. |
@qdm12 I think private key is all you need from the config downloaded, as address and DNS (optional?) are the same for all servers.
The protonVPN configuration downloads page is terribly laggy to load the server lists.😄 @TheRealBix Was wireguard with protonVPN as a custom provider stable for you previously on :latest image? |
@dougNetD Great, address is automatically set to |
edit about OpenVPN : I finally have the same connection unstability with openvpn https://hastebin.skyra.pw/bijepotahu.yaml definitely an issue on my end... I did not run a lot with gluetun on wg config file, only for testing purposes. It could very well be an issue on my end, maybe with my ISP peering with proton servers. As for the wiki (removed ProtonVPNTLDRdocker run -it --rm --cap-add=NET_ADMIN -e VPN_SERVICE_PROVIDER=protonvpn \
-e OPENVPN_USER=abc -e OPENVPN_PASSWORD=abc \
-e SERVER_COUNTRIES=Netherlands qmcgaw/gluetun version: "3"
services:
gluetun:
image: qmcgaw/gluetun
cap_add:
- NET_ADMIN
environment:
- VPN_SERVICE_PROVIDER=protonvpn
- OPENVPN_USER=abc
- OPENVPN_PASSWORD=abc
- SERVER_COUNTRIES=Netherlands Required environment variables
OpenVPN
Wireguard
Optional environment variables
VPN server port forwardingRequirements:
Multi hop regionsSimply set the For example setting Moderate NAT/NAT Type 2Paid ProtonVPN subscribers can optionally use Moderate NAT on their connections. To do so, the OpenVPN username assigned by ProtonVPN should have ServersTo see a list of servers available, list the VPN servers with Gluetun. |
💩 happens 🤷 For the wiki:
Merging this ⛵ ! |
I think a detail has gone wrong here. The wiki still includes the following paragraph (directly under the docker compose) that should not be there anymore, since that info has been redacted and put in the Wireguard section further down. Particularly the "custom provider" part makes this confusing.
I just switched to Wireguard and it seems to be working fine. Thank you as always! |
Hi all, thank you for this implementation! I tried (every combination of):
But, as soon as i set Does this work correctly for anyone else ? |
* Remove the section that recommends users use follow the "custom provider" documentation. This section was accidentally left in, in #2390 but should have been removed (as @heronimoo [points out][1]). Removing this section will prevent users from following the "custom provider" instructions and incorrectly setting values like `WIREGUARD_ENDPOINT_IP`, `WIREGUARD_ENDPOINT_PORT`, `WIREGUARD_PUBLIC_KEY` and `WIREGUARD_ADDRESSES`. If the user sets `WIREGUARD_ENDPOINT_PORT` it triggers the ["endpoint port is set" error][2] * Remove the note about each WireGuard server using it's own private key (as later in the page it states that the private key is the same for all servers) * Expand the documentation about the `WIREGUARD_PRIVATE_KEY` value to state explicitly to ignore all the unused values in the ProtonVPN generated configuration file. This also changes the link from the ProtonVPN downloads page to the ProtonVPN page for generating WireGuard configs. * Reorganize the VPN server port forwarding section to clarify which settings apply to OpenVPN and which apply to WireGuard. * Add the `PORT_FORWARD_ONLY` setting to the VPN server port forwarding section * Add examples to clarify the OpenVPN username appending trick for port forwarding and moderate NAT. * Fix capitalization of WireGuard [1]: qdm12/gluetun#2390 (comment) [2]: https://github.com/qdm12/gluetun/blob/68ddbfc0fed316f2e22c3b979b2186522a194da1/internal/configuration/settings/wireguardselection.go#L59-L64
Image is
qmcgaw/gluetun:pr-2390
You can use it by using
VPN_SERVICE_PROVIDER=protonvpn
,VPN_TYPE=wireguard
, and then setWIREGUARD_PRIVATE_KEY
.