Jump to content

Pieterz

Members
  • Posts

    3
  • Joined

  • Last visited

Posts posted by Pieterz

  1. Hi @Dyon, thank you so much for your help, even though I’m not using Unraid. I really appreciate it!

     

    So I checked LAN_NETWORK and it is indeed configured as 192.168.1.0/24.

    I am running the portainer on top of a OMV server, could that be a problem? (Even though the other containers are running fine?)

     

    The IP-address of my OMV goes like 192.168.1xx.xx, so 192.168.1.0/24. should cover this right?

    I’m trying to connect on that same IP-Address using port 8080.

     

    I checked my wg0.conf as well and it appears to actually have even less lines than your example.

    Could it be that something is not configured right here?

     

    [Interface]
    PrivateKey = @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
    Address = 10.10.6.5/19
    DNS = 10.10.0.1
    
    [Peer]
    PublicKey = @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
    AllowedIPs = 0.0.0.0/0
    Endpoint = se1.wg.azirevpn.net:51820

     

    Thank you again for your help!

  2. Hi everyone,

     

    Right now I’m trying to get qbittorrent with wireguard to work in portainer, but no luck so far.. If I checked the log, everything seems to be running just fine. However, I cannot access the webui when the vpn is enabled. If I disable the vpn though, I can access the webui. The vpn service that I’m using is called Azirevpn.

     

    Can anyone please help me? It would be amazing if there is a way to get this working!

     

    This is my log:

     

    2021-01-18 17:39:22.080533 [INFO] VPN_ENABLED defined as 'yes',
    2021-01-18 17:39:22.127134 [INFO] LEGACY_IPTABLES is set to '',
    2021-01-18 17:39:22.192560 [INFO] Not making any changes to iptables,
    2021-01-18 17:39:22.240643 [INFO] VPN_TYPE defined as 'wireguard',
    2021-01-18 17:39:22.287951 [INFO] WireGuard config file is found at /config/wireguard/wg0.conf,
    dos2unix: converting file /config/wireguard/wg0.conf to Unix format...,
    2021-01-18 17:39:22.323671 [INFO] VPN remote line defined as 'se1.wg.azirevpn.net:51820',
    2021-01-18 17:39:22.363273 [INFO] VPN_REMOTE defined as 'se1.wg.azirevpn.net',
    2021-01-18 17:39:22.430258 [INFO] VPN_PORT defined as '51820',
    2021-01-18 17:39:22.472754 [INFO] VPN_PROTOCOL set as 'udp', since WireGuard is always udp.,
    2021-01-18 17:39:22.509408 [INFO] VPN_DEVICE_TYPE set as 'wg0', since WireGuard will always be wg0.,
    2021-01-18 17:39:22.584396 [INFO] LAN_NETWORK defined as '192.168.1.0/24',
    2021-01-18 17:39:22.633083 [INFO] NAME_SERVERS defined as '1.1.1.1,1.0.0.1',
    2021-01-18 17:39:22.704211 [INFO] Adding 1.1.1.1 to resolv.conf,
    2021-01-18 17:39:22.757649 [INFO] Adding 1.0.0.1 to resolv.conf,
    2021-01-18 17:39:22.791761 [INFO] Starting WireGuard...,
    Warning: `/config/wireguard/wg0.conf' is world accessible,
    wg-quick: `wg0' is not a WireGuard interface,
    2021-01-18 17:39:22.882714 WireGuard is down already,
    Warning: `/config/wireguard/wg0.conf' is world accessible,
    [#] ip link add wg0 type wireguard,
    [#] wg setconf wg0 /dev/fd/63,
    [#] ip -4 address add 10.10.6.5/19 dev wg0,
    [#] ip link set mtu 1420 up dev wg0,
    [#] resolvconf -a wg0 -m 0 -x,
    [#] wg set wg0 fwmark 51820,
    [#] ip -4 route add 0.0.0.0/0 dev wg0 table 51820,
    [#] ip -4 rule add not fwmark 51820 table 51820,
    [#] ip -4 rule add table main suppress_prefixlength 0,
    [#] sysctl -q net.ipv4.conf.all.src_valid_mark=1,
    [#] iptables-restore -n,
    2021-01-18 17:39:23.735903 [INFO] Docker network defined as 172.21.0.0/16,
    2021-01-18 17:39:23.811566 [INFO] Adding 192.168.1.0/24 as route via docker eth0,
    2021-01-18 17:39:23.878440 [INFO] ip route defined as follows...,
    --------------------,
    default via 172.21.0.1 dev eth0 ,
    10.10.0.0/19 dev wg0 proto kernel scope link src 10.10.6.5 ,
    172.21.0.0/16 dev eth0 proto kernel scope link src 172.21.0.2 ,
    192.168.1.0/24 via 172.21.0.1 dev eth0 ,
    --------------------,
    2021-01-18 17:39:24.056052 [INFO] iptables defined as follows...,
    --------------------,
    -P INPUT DROP,
    -P FORWARD ACCEPT,
    -P OUTPUT DROP,
    -A INPUT -i wg0 -j ACCEPT,
    -A INPUT -s 172.21.0.0/16 -d 172.21.0.0/16 -j ACCEPT,
    -A INPUT -i eth0 -p udp -m udp --sport 51820 -j ACCEPT,
    -A INPUT -i eth0 -p tcp -m tcp --dport 8080 -j ACCEPT,
    -A INPUT -i eth0 -p tcp -m tcp --sport 8080 -j ACCEPT,
    -A INPUT -p icmp -m icmp --icmp-type 0 -j ACCEPT,
    -A INPUT -i lo -j ACCEPT,
    -A OUTPUT -o wg0 -j ACCEPT,
    -A OUTPUT -s 172.21.0.0/16 -d 172.21.0.0/16 -j ACCEPT,
    -A OUTPUT -o eth0 -p udp -m udp --dport 51820 -j ACCEPT,
    -A OUTPUT -o eth0 -p tcp -m tcp --dport 8080 -j ACCEPT,
    -A OUTPUT -o eth0 -p tcp -m tcp --sport 8080 -j ACCEPT,
    -A OUTPUT -p icmp -m icmp --icmp-type 8 -j ACCEPT,
    -A OUTPUT -o lo -j ACCEPT,
    --------------------,
    2021-01-18 17:39:24.115881 [WARNING] ENABLE_SSL is set to , SSL is not enabled. This could cause issues with logging if other apps use the same Cookie name (SID).,
    2021-01-18 17:39:24.152739 [WARNING] If you manage the SSL config yourself, you can ignore this.,
    2021-01-18 17:39:24.219540 [INFO] A group with PGID 100 already exists in /etc/group, nothing to do.,
    2021-01-18 17:39:24.268412 [INFO] An user with PUID 998 already exists in /etc/passwd, nothing to do.,
    2021-01-18 17:39:24.314918 [WARNING] UMASK not defined (via -e UMASK), defaulting to '002',
    2021-01-18 17:39:24.380596 [INFO] Starting qBittorrent daemon...,
    Logging to /config/qBittorrent/data/logs/qbittorrent.log.,
    2021-01-18 17:39:25.452738 [INFO] qBittorrent PID: 213,
    2021-01-18 17:39:25.466108 [INFO] Started qBittorrent daemon successfully...,
    2021-01-18 17:39:25.522140 [INFO] HEALTH_CHECK_HOST is not set. For now using default host one.one.one.one,
    2021-01-18 17:39:25.586384 [INFO] HEALTH_CHECK_INTERVAL is not set. For now using default interval of 300,
    2021-01-18 17:39:25.628396 [INFO] HEALTH_CHECK_SILENT is not set. Because this variable is not set, it will be supressed by default,

     

×
×
  • Create New...