Replies: 1 comment
-
Here is my docker compose file services: I have confirmed that PureVPN connects using my username and password. Thanks |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Hi All
I have been trying to get Gluetun working for days and the status is always unhealthy, I continually see the error "write: operation not permitted" after the healthcheck, could anyone help me please get Gluetun working.
I am running the container through Portainer on a Synology NAS running DSM 7.1.1-42962 Update 7.
VPN Provider is PureVPN.
This is my logfile:
Running version latest built on 2024-12-27T20:18:46.989Z (commit 61b053f)
🔧 Need help? ☕ Discussion? https://github.com/qdm12/gluetun/discussions/new/choose
🐛 Bug? ✨ New feature? https://github.com/qdm12/gluetun/issues/new/choose
💻 Email? [email protected]
💰 Help me? https://www.paypal.me/qmcgaw https://github.com/sponsors/qdm12
2024-12-28T18:19:30Z INFO [routing] default route found: interface eth0, gateway 192.168.32.1, assigned IP 192.168.32.2 and family v4
2024-12-28T18:19:30Z INFO [routing] local ethernet link found: eth0
2024-12-28T18:19:30Z INFO [routing] local ipnet found: 192.168.32.0/20
2024-12-28T18:19:30Z INFO [firewall] enabling...
2024-12-28T18:19:30Z DEBUG [firewall] /sbin/iptables-legacy --policy INPUT DROP
2024-12-28T18:19:30Z DEBUG [firewall] /sbin/iptables-legacy --policy OUTPUT DROP
2024-12-28T18:19:30Z DEBUG [firewall] /sbin/iptables-legacy --policy FORWARD DROP
2024-12-28T18:19:30Z DEBUG [firewall] /sbin/ip6tables-legacy --policy INPUT DROP
2024-12-28T18:19:30Z DEBUG [firewall] /sbin/ip6tables-legacy --policy OUTPUT DROP
2024-12-28T18:19:30Z DEBUG [firewall] /sbin/ip6tables-legacy --policy FORWARD DROP
2024-12-28T18:19:30Z DEBUG [firewall] /sbin/iptables-legacy --append INPUT -i lo -j ACCEPT
2024-12-28T18:19:30Z DEBUG [firewall] /sbin/ip6tables-legacy --append INPUT -i lo -j ACCEPT
2024-12-28T18:19:30Z DEBUG [firewall] /sbin/iptables-legacy --append OUTPUT -o lo -j ACCEPT
2024-12-28T18:19:30Z DEBUG [firewall] /sbin/ip6tables-legacy --append OUTPUT -o lo -j ACCEPT
2024-12-28T18:19:30Z DEBUG [firewall] /sbin/iptables-legacy --append OUTPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
2024-12-28T18:19:30Z DEBUG [firewall] /sbin/ip6tables-legacy --append OUTPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
2024-12-28T18:19:30Z DEBUG [firewall] /sbin/iptables-legacy --append INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
2024-12-28T18:19:30Z DEBUG [firewall] /sbin/ip6tables-legacy --append INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
2024-12-28T18:19:30Z DEBUG [firewall] /sbin/iptables-legacy --append OUTPUT -o eth0 -s 192.168.32.2 -d 192.168.32.0/20 -j ACCEPT
2024-12-28T18:19:30Z DEBUG [firewall] /sbin/ip6tables-legacy --append OUTPUT -o eth0 -d ff02::1:ff00:0/104 -j ACCEPT
2024-12-28T18:19:30Z DEBUG [firewall] /sbin/iptables-legacy --append INPUT -i eth0 -d 192.168.32.0/20 -j ACCEPT
2024-12-28T18:19:30Z INFO [firewall] enabled successfully
2024-12-28T18:19:31Z INFO [storage] merging by most recent 20776 hardcoded servers and 20776 servers read from /gluetun/servers.json
2024-12-28T18:19:32Z DEBUG [netlink] IPv6 is supported by link lo
2024-12-28T18:19:32Z INFO Alpine version: 3.20.3
2024-12-28T18:19:32Z INFO OpenVPN 2.5 version: 2.5.10
2024-12-28T18:19:32Z INFO OpenVPN 2.6 version: 2.6.11
2024-12-28T18:19:32Z INFO IPtables version: v1.8.10
2024-12-28T18:19:32Z INFO Settings summary:
├── VPN settings:
| ├── VPN provider settings:
| | ├── Name: purevpn
| | └── Server selection settings:
| | ├── VPN type: openvpn
| | ├── Countries: albania
| | └── OpenVPN server selection settings:
| | └── Protocol: UDP
| └── OpenVPN settings:
| ├── OpenVPN version: 2.6
| ├── User: [set]
| ├── Password: [set]
| ├── Network interface: tun0
| ├── Run OpenVPN as: root
| └── Verbosity level: 1
├── DNS settings:
| ├── Keep existing nameserver(s): no
| ├── DNS server address to use: 127.0.0.1
| └── DNS over TLS settings:
| ├── Enabled: yes
| ├── Update period: every 24h0m0s
| ├── Upstream resolvers:
| | └── cloudflare
| ├── Caching: yes
| ├── IPv6: no
| └── DNS filtering settings:
| ├── Block malicious: yes
| ├── Block ads: no
| ├── Block surveillance: no
| └── Blocked IP networks:
| ├── 127.0.0.1/8
| ├── 10.0.0.0/8
| ├── 172.16.0.0/12
| ├── 192.168.0.0/16
| ├── 169.254.0.0/16
| ├── ::1/128
| ├── fc00::/7
| ├── fe80::/10
| ├── ::ffff:127.0.0.1/104
| ├── ::ffff:10.0.0.0/104
| ├── ::ffff:169.254.0.0/112
| ├── ::ffff:172.16.0.0/108
| └── ::ffff:192.168.0.0/112
├── Firewall settings:
| ├── Enabled: yes
| └── Debug mode: on
├── Log settings:
| └── Log level: debug
├── Health settings:
| ├── Server listening address: 127.0.0.1:9999
| ├── Target address: cloudflare.com:443
| ├── Duration to wait after success: 5s
| ├── Read header timeout: 100ms
| ├── Read timeout: 500ms
| └── VPN wait durations:
| ├── Initial duration: 6s
| └── Additional duration: 5s
├── Shadowsocks server settings:
| └── Enabled: no
├── HTTP proxy settings:
| └── Enabled: no
├── Control server settings:
| ├── Listening address: :8000
| ├── Logging: yes
| └── Authentication file path: /gluetun/auth/config.toml
├── Storage settings:
| └── Filepath: /gluetun/servers.json
├── OS Alpine settings:
| ├── Process UID: 1026
| ├── Process GID: 1000
| └── Timezone: europe/london
├── Public IP settings:
| ├── IP file path: /tmp/gluetun/ip
| ├── Public IP data base API: ipinfo
| └── Public IP data backup APIs:
| ├── ifconfigco
| ├── ip2location
| └── cloudflare
├── Server data updater settings:
| ├── Update period: 12h0m0s
| ├── DNS address: 1.1.1.1:53
| ├── Minimum ratio: 0.8
| └── Providers to update: purevpn
└── Version settings:
└── Enabled: yes
2024-12-28T18:19:32Z INFO [routing] default route found: interface eth0, gateway 192.168.32.1, assigned IP 192.168.32.2 and family v4
2024-12-28T18:19:32Z DEBUG [netlink] ip -4 rule list
2024-12-28T18:19:32Z DEBUG [netlink] ip -6 rule list
2024-12-28T18:19:32Z DEBUG [netlink] ip -f 0 rule add from 192.168.32.2/32 lookup 200 pref 100
2024-12-28T18:19:32Z INFO [routing] adding route for 0.0.0.0/0
2024-12-28T18:19:32Z DEBUG [routing] ip route replace 0.0.0.0/0 via 192.168.32.1 dev eth0 table 200
2024-12-28T18:19:32Z INFO [firewall] setting allowed subnets...
2024-12-28T18:19:32Z INFO [routing] default route found: interface eth0, gateway 192.168.32.1, assigned IP 192.168.32.2 and family v4
2024-12-28T18:19:32Z DEBUG [netlink] ip -4 rule list
2024-12-28T18:19:32Z DEBUG [netlink] ip -6 rule list
2024-12-28T18:19:32Z DEBUG [netlink] ip -f 0 rule add to 192.168.32.0/20 lookup 254 pref 98
2024-12-28T18:19:32Z INFO [dns] using plaintext DNS at address 1.1.1.1
2024-12-28T18:19:32Z INFO [http server] http server listening on [::]:8000
2024-12-28T18:19:32Z INFO [healthcheck] listening on 127.0.0.1:9999
2024-12-28T18:19:32Z INFO [firewall] allowing VPN connection...
2024-12-28T18:19:32Z DEBUG [firewall] /sbin/iptables-legacy --append OUTPUT -d 31.171.155.198 -o eth0 -p udp -m udp --dport 53 -j ACCEPT
2024-12-28T18:19:32Z DEBUG [firewall] /sbin/iptables-legacy --append OUTPUT -o tun0 -j ACCEPT
2024-12-28T18:19:32Z DEBUG [firewall] /sbin/ip6tables-legacy --append OUTPUT -o tun0 -j ACCEPT
2024-12-28T18:19:32Z INFO [openvpn] OpenVPN 2.6.11 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
2024-12-28T18:19:32Z INFO [openvpn] library versions: OpenSSL 3.3.2 3 Sep 2024, LZO 2.10
2024-12-28T18:19:32Z INFO [openvpn] TCP/UDP: Preserving recently used remote address: [AF_INET]31.171.155.198:53
2024-12-28T18:19:32Z INFO [openvpn] UDPv4 link local: (not bound)
2024-12-28T18:19:32Z INFO [openvpn] UDPv4 link remote: [AF_INET]31.171.155.198:53
2024-12-28T18:19:38Z INFO [healthcheck] program has been unhealthy for 6s: restarting VPN (healthcheck error: dialing: dial tcp4: lookup cloudflare.com on 1.1.1.1:53: write udp 192.168.32.2:51047->1.1.1.1:53: write: operation not permitted)
Beta Was this translation helpful? Give feedback.
All reactions