You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Don't know if there is any potential leak while the VPN is down because of this but thought I'd create a bug to document it.
Also got this working a year ago or so
Share your logs (at least 10 lines)
2024-12-20T06:47:44-06:00 INFO [healthcheck] healthy!
2024-12-20T06:47:55-06:00 INFO [healthcheck] healthy!
2024-12-20T06:51:02-06:00 INFO [healthcheck] program has been unhealthy for 6s: restarting VPN
2024-12-20T06:51:02-06:00 INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2024-12-20T06:51:02-06:00 INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2024-12-20T06:51:02-06:00 INFO [vpn] stopping
2024-12-20T06:51:02-06:00 INFO [vpn] starting
2024-12-20T06:51:02-06:00 INFO [firewall] allowing VPN connection...
2024-12-20T06:51:02-06:00 ERROR [firewall] cannot remove outdated VPN connection rule: finding iptables chain rule line number: parsing chain list: parsing chain rule "14 0 0 ACCEPT 1 -- * eth0 10.42.0.0/16 10.42.0.0/16 ": parsing chain rule field: parsing protocol: unknown protocol: 1
2024-12-20T06:51:02-06:00 ERROR [firewall] cannot remove outdated VPN interface rule: finding iptables chain rule line number: parsing chain list: parsing chain rule "14 0 0 ACCEPT 1 -- * eth0 10.42.0.0/16 10.42.0.0/16 ": parsing chain rule field: parsing protocol: unknown protocol: 1
2024-12-20T06:51:02-06:00 INFO [openvpn] OpenVPN 2.6.11 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
2024-12-20T06:51:02-06:00 INFO [openvpn] library versions: OpenSSL 3.3.2 3 Sep 2024, LZO 2.10
2024-12-20T06:51:02-06:00 INFO [openvpn] TCP/UDP: Preserving recently used remote address: [AF_INET]84.17.52.7:443
2024-12-20T06:51:02-06:00 INFO [openvpn] UDPv4 link local: (not bound)
2024-12-20T06:51:02-06:00 INFO [openvpn] UDPv4 link remote: [AF_INET]84.17.52.7:443
2024-12-20T06:51:03-06:00 INFO [openvpn] [zurich-rack402.nodes.gen4.ninja] Peer Connection Initiated with [AF_INET]84.17.52.7:443
2024-12-20T06:51:03-06:00 INFO [openvpn] sitnl_send: rtnl: generic error (-101): Network unreachable
2024-12-20T06:51:03-06:00 INFO [openvpn] TUN/TAP device tun0 opened
2024-12-20T06:51:03-06:00 INFO [openvpn] /sbin/ip link set dev tun0 up mtu 1500
2024-12-20T06:51:03-06:00 INFO [openvpn] /sbin/ip link set dev tun0 up
2024-12-20T06:51:03-06:00 INFO [openvpn] /sbin/ip addr add dev tun0 10.31.4.69/24
2024-12-20T06:51:03-06:00 WARN [openvpn] OpenVPN was configured to add an IPv6 route. However, no IPv6 has been configured for tun0, therefore the route installation may fail or may not work as expected.
2024-12-20T06:51:03-06:00 INFO [openvpn] UID set to nonrootuser
2024-12-20T06:51:03-06:00 INFO [openvpn] Initialization Sequence Completed
2024-12-20T06:51:03-06:00 INFO [healthcheck] healthy!
2024-12-20T06:51:04-06:00 INFO [ip getter] Public IP address is 84.17.52.7 (Switzerland, Zurich, Zürich)
2024-12-20T06:54:23-06:00 INFO [healthcheck] healthy!
That's because of the new parsing of all the firewall rules introduced in v3.39.1 as a bugfix, and will be part of the v3.40.0 release (there is a youtube video about linked in the v3.39.1 release if you want to know more). Anyway, I assumed everyone would just need tcp and udp, and forgot about icmp. Added in e890c50 so it should work on the latest image 😉
There shouldn't be a leak really, it's just the previous vpn connection firewall rule would stay (only on vpn interface to the vpn server ip:port), so all good really except not cleaning up the rule on reconnection.
Closed issues are NOT monitored, so commenting here is likely to be not seen.
If you think this is still unresolved and have more information to bring, please create another issue.
This is an automated comment setup because @qdm12 is the sole maintainer of this project
which became too popular to monitor issues closed.
Is this urgent?
No
Host OS
Talos
CPU arch
x86_64
VPN service provider
Cyberghost
What are you using to run the container
Kubernetes
What is the version of Gluetun
Running version v3.39.1 built on 2024-09-29T18:16:23.495Z (commit 67ae5f5)
What's the problem 🤔
In order for the VPN to work with https://github.com/angelnu/pod-gateway I needed to add a post-rules.txt file with:
If the VPN connection is lost and the gluetun restarts I see this in the logs:
2024-12-20T06:51:02-06:00 ERROR [firewall] cannot remove outdated VPN connection rule: finding iptables chain rule line number: parsing chain list: parsing chain rule "14 0 0 ACCEPT 1 -- * eth0 10.42.0.0/16 10.42.0.0/16 ": parsing chain rule field: parsing protocol: unknown protocol: 1
Don't know if there is any potential leak while the VPN is down because of this but thought I'd create a bug to document it.
Also got this working a year ago or so
Share your logs (at least 10 lines)
Share your configuration
The text was updated successfully, but these errors were encountered: