Helmonder

Members
  • Posts

    2815
  • Joined

  • Last visited

1 Follower

About Helmonder

  • Birthday 03/22/1971

Converted

  • Gender
    Male
  • Location
    The Netherlands, Eindhoven

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

Helmonder's Achievements

Proficient

Proficient (10/14)

42

Reputation

1

Community Answers

  1. Cool ! I have the whole thing running now and it seems to do what it needs to ! One question though, is there any way I can "see" that the vpn is working ? Some kind of logging of sessions somewhere ? For all sense and purposes it is but it would be nice to see it..
  2. Yep, its visible in the docker log you can view from the unraid page...
  3. Think it works... I have to try and get Medusa to download something now 🙂 In the meantime the docker (openvpn-client) shootsan enormous amount of errors in the log: 2024-03-26 19:18:30 AEAD Decrypt error: bad packet ID (may be a replay): [ #5769721 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings I do not fully understand the man pages... Should I hide the warnings or is there something I should do about them ?
  4. Sorry but where do I place these settings ? In an environment variable in the docker config of the openvpn-client ?
  5. Docker RUN for the openvpn-client: docker run -d --name='OpenVPN-Client' --net='bridge' -e TZ="Europe/Berlin" -e HOST_OS="Unraid" -e HOST_HOSTNAME="Tower" -e HOST_CONTAINERNAME="OpenVPN-Client" -e 'FIREWALL'='' -l net.unraid.docker.managed=dockerman -l net.unraid.docker.icon='https://raw.githubusercontent.com/ich777/docker-templates/master/ich777/images/openvpn-client.png' -p '8080:8080/tcp' -p '8090:8090/tcp' -p '8118:8118/tcp' -v '/mnt/user/appdata/openvpn-client':'/vpn':'rw' --device='/dev/net/tun' --cap-add=NET_ADMIN --dns=8.8.8.8 --sysctl net.ipv6.conf.all.disable_ipv6=0 'ich777/openvpn-client' 7ee25b13de0ef562e64a0a3517c20cf7c44b53b6b6937b346ced81aa2b418d17 Docker RUN for SabNzbd: docker run -d --name='binhex-sabnzbdvpn' --privileged=true -e TZ="Europe/Berlin" -e HOST_OS="Unraid" -e HOST_HOSTNAME="Tower" -e HOST_CONTAINERNAME="binhex-sabnzbdvpn" -e 'VPN_ENABLED'='no' -e 'VPN_USER'='GVs/hawh1kzKuDhrCLwURo7BYYHUtrone24q/fIUcRs=' -e 'VPN_PASS'='vpn password' -e 'VPN_PROV'='custom' -e 'VPN_OPTIONS'='' -e 'STRICT_PORT_FORWARD'='no' -e 'ENABLE_PRIVOXY'='no' -e 'LAN_NETWORK'='192.168.2.0/24' -e 'NAME_SERVERS'='8.8.8.8' -e 'ADDITIONAL_PORTS'='8081' -e 'DEBUG'='false' -e 'UMASK'='000' -e 'PUID'='99' -e 'PGID'='100' -e 'VPN_CLIENT'='wireguard' -l net.unraid.docker.managed=dockerman -l net.unraid.docker.webui='http://192.168.2.5:8080]/' -l net.unraid.docker.icon='https://raw.githubusercontent.com/binhex/docker-templates/master/binhex/images/sabnzbd-icon.png' -v '/mnt/user/Download/Blackhole/Sabnzbd/':'/blackhole':'rw' -v '/mnt/user/Download/':'/downloads':'rw' -v '/mnt/user/Download/Incomplete/Sabnzbd/':'/incomplete-downloads':'rw' -v '/mnt/user/Music/':'/music':'rw' -v '/mnt/user/appdata/binhex-sabnzbdvpn':'/config':'rw' --net=container:OpenVPN-Client 'binhex/arch-sabnzbdvpn' 7ce1d902be36eb8aa9f2085a1c71318f8a00b45ae8520030952c982504bdd714 LAN is 192.168.2.* Server is 192.168.2.5 ifconfig for sabnzbd docker: sh-5.2# ifconfig eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500 inet 172.17.0.2 netmask 255.255.0.0 broadcast 172.17.255.255 inet6 fe80::42:acff:fe11:2 prefixlen 64 scopeid 0x20<link> ether 02:42:ac:11:00:02 txqueuelen 0 (Ethernet) RX packets 84 bytes 20004 (19.5 KiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 84 bytes 8803 (8.5 KiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536 inet 127.0.0.1 netmask 255.0.0.0 inet6 ::1 prefixlen 128 scopeid 0x10<host> loop txqueuelen 1000 (Local Loopback) RX packets 28 bytes 1531 (1.4 KiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 28 bytes 1531 (1.4 KiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 tun0: flags=4305<UP,POINTOPOINT,RUNNING,NOARP,MULTICAST> mtu 1500 inet 10.8.0.30 netmask 255.255.0.0 destination 10.8.0.30 inet6 fe80::81e0:21fa:7be7:6344 prefixlen 64 scopeid 0x20<link> inet6 fdda:d0d0:cafe:1194::101c prefixlen 64 scopeid 0x0<global> unspec 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 txqueuelen 500 (UNSPEC) RX packets 0 bytes 0 (0.0 B) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 4 bytes 475 (475.0 B) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
  6. Question on openvpn-client .. I am using it to route sabnzbd traffic thru a wireguard vpn. works fine. However that same sabnzbd system also needs to reach my local spotweb indexer... That it does not do... it fails to get the nzb file.. I figure that it tries to reach it over the vpn which ofcourse does not work.. Any idea?
  7. That is a true word…. However unraid has not been “free” for some time. Alternatives like truenasnor proxmox are there and are free. So there is absolutely a place for users who want a free option. Unraid already is not that place. Verzonden vanaf mijn iPhone met Tapatalk
  8. It could… I agree.. But I will defend unraid till the end of times… it has solved so many of my issues ans gave me so much fun stuff to nerd out on… So yeah…. Kind of a fanboy.. Verzonden vanaf mijn iPhone met Tapatalk
  9. I get that and I am also not a fan of subscriptions... However... I have been using unraid for years and years and years... And you cannot expect Limetech to just keep supporting for free and only make money by adding users constantly...
  10. Question: I am succesfully using binhex-Sabnzbdvpn. SAB works fine. I use wireguard for VPN. There is however one issue. I am using MEDUSA to search for shows, and host my own SPOTWEB server locally to index newsservers. MEDUSA tells spotweb to search and when something is found then shoots a link to sabnzbd with the nzb. Sabnzbd then needs to download this from my local spotweb server... This fails because sabnzbd is ofcourse using the tunnel and from the internet my local spotweb server is not reachable... Is there a way to have a specific ip address bypass the tunnel and keep that traffic local ? There is the LAN_NETWORK setting.. I could imagine addresses in that space bypassing the VPN ? If I look on console with in the docker I see there are two network interfaces: wg0 is the wireguard interface eth0 is the regular docker interface What would need to be done is some kind of routing rule that makes that the address space as configured in the LAN_NETWORK setting is routed thru eth0 and the rest thru wg0. I tried something dirty and changed the AllowedIP's directive in the wireguard config to only show the newssergers I target, but that does not seem to work (also: they change often so that is a bad route).. I need an exclusion instead of an inclusion..
  11. Everything is mounted under /mnt …. Verzonden vanaf mijn iPhone met Tapatalk
  12. Did you guys try "windowsindocker" ? amazing ! and actually very handy if you need a quick testing station..
  13. I set up a blooth proxy with an esp32... Cost me ten euro and it works immediately.. I also put another one at the other end of the house, now bluetooth range is also great..