Kopernikus
Members-
Posts
90 -
Joined
-
Last visited
About Kopernikus
- Birthday 04/26/1979
Converted
-
Gender
Male
-
Location
Belgium
Recent Profile Visitors
The recent visitors block is disabled and is not being shown to other users.
Kopernikus's Achievements
Apprentice (3/14)
4
Reputation
-
@binhex Hi, Would it be possible to add the variables "WEBUI_PORT_HTTPS/WEBUI_PORT_HTTP" so I can change the port when using a macvlan docker network? In you qbittorrentvpn docker this is implemented. Thx
-
Hi, I was wondering about the "NAME_SERVERS" docker variable. Are this the DNS servers to use inside the container or the DNS to resolve to the VPN provider? I'm asking because I have a rule on my router to redirect all dns queries to my P-hole. Another question, getting these errors in my log: 2023-02-07 09:32:29,593 DEBG 'start-script' stderr output: egrep: warning: egrep is obsolescent; using grep -E 2023-02-07 09:32:30,596 DEBG 'start-script' stderr output: egrep: warning: egrep is obsolescent; using grep -E 2023-02-07 09:32:30,599 DEBG 'start-script' stderr output: egrep: warning: egrep is obsolescent; using grep -E
-
Kopernikus started following Cache pool upgrade advise , [Support] binhex - SABnzbdVPN , WireGuard - VPN Tunneled Access to a commercial VPN provider and 1 other
-
WireGuard - VPN Tunneled Access to a commercial VPN provider
Kopernikus replied to ljm42's topic in Plugin Support
Thx. There's no way to make this permanent? I can imagine I'm not the only person who access his dockers from another (V)LAN then were the Unraid server resides. Personally I like to segment my network into VLAN aka "Trusted/Servers/IoT/Dockers/VM/Guests/Management etc..." Now I'm running the Wireguard connection inside the docker container and for the docker containers who don't have support I forwared them or use a proxy, but it would be better to assign them directly to the "wg?" interface. -
WireGuard - VPN Tunneled Access to a commercial VPN provider
Kopernikus replied to ljm42's topic in Plugin Support
Why can I reach my other containers from my "trusted vlan"? Only the ones assigned to wg1 are not reachable. Would I a be able to fix is with a static route? Just like I did for my wireguard tunnel (wg0) when I want to reach my network from outside my home so I can reach my dockers/vm who are on a different VLAN. -
WireGuard - VPN Tunneled Access to a commercial VPN provider
Kopernikus replied to ljm42's topic in Plugin Support
I did some more test and found the issue. So my Unraid is running on my untagged server VLAN, when I set my client to this same VLAN I am able to reach to docker, (I think) this is caused by the IP tables added in the Wireguard config, they only allow traffic from my server VLAN, but ofcourse I'm accessing the server from my trusted VLAN. For example with the docker container qbittorentvpn you can define the trusted networks so those ared added. -
WireGuard - VPN Tunneled Access to a commercial VPN provider
Kopernikus replied to ljm42's topic in Plugin Support
Hi, Upgraded to 6.10.0-rc5 to test out this new functionality. I'm using TorGuard as commercial VPN, so created config file, imported (it created wg1) and when activating it seems to connect fine (able to ping to the peer endpoint). However when I want to use this connection for a container for example firefox, I'm setting the network type to custom wg1, but as soon as the container is started I can't reach it anymore, tried it with other containers same result. Any idea? @bonienl @ljm42 To be more complete: my Unraid runs untagged on my server VLAN and my containers/VM's are running on their own VLAN. To test tried it with AirVPN same result tunnel is connecting fine however as soon as I am connected I can't connect to the docker container it uses. Could it have something to do with the iptables who are set? -
[Support] Nginx Proxy Manager (NPM) Official
Kopernikus replied to mgutt's topic in Docker Containers
@mgutt After doing some more research I've found that the problem must be inside the docker container. Link to the report I filled: https://github.com/NginxProxyManager/nginx-proxy-manager/issues/1982 -
[Support] Nginx Proxy Manager (NPM) Official
Kopernikus replied to mgutt's topic in Docker Containers
ssl_session_timeout 5m; ssl_session_cache shared:SSL:50m; # intermediate configuration. tweak to your needs. ssl_protocols TLSv1.2 TLSv1.3; ssl_ciphers 'ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA512:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA512:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305'; ssl_prefer_server_ciphers on; It's the same as the ssl-cipher.conf already in the NPM docker except unsecure ciphers are removed and ssl_prefer_server is set to on -
[Support] Nginx Proxy Manager (NPM) Official
Kopernikus replied to mgutt's topic in Docker Containers
Hi, For the headers this seems to be working, thx. However for the TLS I found the solution but don't now how to implement it. I need to edit /etc/nginx/conf.d/include/ssl-ciphers.conf with a more "thight" ssl cipher list. Ofcourse I could edit the file and save it to a new container but then I would have to do this every time the container is updated. So I thought of mounting (overwriting) the file directly into the container, so something like this: /etc/nginx/conf.d/include/ssl-ciphers.conf:/path/to/local/file/myown-custom-ssl-ciphers.conf I tried it true the mount path in unraid but that doesn't seem to work. Any idea? Ideally it would be good if we can set this as an option in /data/nginx/custom/ssl-ciphers.conf or through the UI of NPM -
[Support] Nginx Proxy Manager (NPM) Official
Kopernikus replied to mgutt's topic in Docker Containers
@mgutt Hi, Using this container for a few months now, and all working fine. However I wanted to run a public instance off the SearxNG metasearch docker. I have set this up as usual in NPM and all seem te be working. However to allow it to be placed on the public instance list (https://searx.space/#) it needs to have an A+ TLS grade and an A+ HTML grade. For nginx the config would be: https://ssl-config.mozilla.org/ and for the HTML https://github.com/searxng/searx-docker/blob/master/Caddyfile#L33-L84 Is this possible with Nginx Proxy Manager or will this require a full Nginx docker? -
[Support] xthursdayx - UNRAID Docker Templates
Kopernikus replied to xthursdayx's topic in Docker Containers
@xthursdayx Hi, Found an error in your searxng template. You have to change: Container Path: /etc/searx to Container Path: /etc/searxng otherwise "settings.yml" and "uwsg.ini" will not be created. Thx -
Hi, I'm running this docker as custom network on my vlan, all working fine. However when I change my port to 443 and enable the vpn I can't reach the webui anymore. This happens bevause in the iptables it allows only the standard ports. Can this be changed? For example I use binhex-qbittorrentvpn and here the port is set to 443 and also in the iptables. A solution would be creating a WEBUI variable. A temp fix is by adding 443 to the aditional ports, but now in the iptables the default ports are also open. Thx
-
Hi, Any plans for an nzbgetvpn version? I could ofcourse route through another containers but think fesh connection is better? Thx
-
Hi, First off all thx to Binhex for his excellent docker containers. I run most of my containers on a seperate (docker) VLAN. For example with the qbittorrent docker I have access https://qbittorrent.mydomain.com who points to ip:443 where certificates are installed for my domain However now the problem with Sabnzbd I can enable https and install the certificate however I can't seem to be able to change the port from 8090 to 443, I now I can use ngnix and I use this for my external but internally I like to have an direct connection. Also the http port can't be saved it reverts to the default 8080. Is there any variable I need to add? Or change it manually in a config file? Seems to be the same issue in the Linuxserver version of the container: https://github.com/linuxserver/docker-sabnzbd/issues/90 Thx
-
Hi, I have an Unraid server running 7 8TB HDD's + 1 8TB HDD as parity. Also I have two 1TB NVME SSD cache drives in RAID1 for my Docker/VM and two 1TB SATA SSD cache that I use for my Downloads/Shares. I use the server for automatic media management (with the arr's & hardlinks), also some VM's, backups of our pc's, and some docker containers. The problem I'm having now is that the Downloads/Share cache pool gets full to fast so I would like to upgrade, but what would be the best setup? Leave the two 1TB in NVME and RAID1 for my Dockers/VM + Replace the 1TB's SATA with 2TB SATA? or Set the two 1TB's SATA in RAID1 so I have 2TB but no redundency Alternative: leave the two RAID1 cache pools and add an extra SATA SSD or HDD just for the Downloads? Thx