[SUPPORT] DiamondPrecisionComputing - ALL IMAGES AND FILES


Recommended Posts

9 hours ago, SvbZ3r0 said:

This issue still exists. There no way to add a parent or sibling.

The last changes I updates I included in the container should have included that. There have only been minor changes since.

 

Can you post a screentshot of what you see when trying to add a person?

Link to comment
  • 2 weeks later...

I am getting "malformed password" in the logs, trying to use DNS-O-Matic, this is my config file:

 

{
  "settings": [
    {
      "provider": "dnsomatic",
      "domain": "updates.dnsomatic.com",
      "host": "@",
      "username": "something",
      "password": "something",
      "ip_version": "ipv4"
    }
  ]
}
 

Probably something obvious I've done wrong?

 

 

EDIT: Figured it out, checked your github code for password validation and changed password appropriately. DNS-O-Matic now uses opendns.com login creds and my password was valid for that but not your code

Edited by fireplex
Link to comment
  • 1 month later...
2 hours ago, L0rdRaiden said:

I am trying to run DDNS-updater but I get this error, any idea?

 

imagen.png.643df663e5245eb75cb6248518db0e08.png

 

This route /mnt/user/Docker/ is where I have all the folders of my docker containers. Like the default appdata

imagen.thumb.png.ecf3215fd947ae1c4e54149f759a5a6a.png

 

 

 

Assuming that you went through the documented install steps it is probably incorrect permissions on the folder/file.

 

Try running these commands from your unraid terminal:

 

chown -R 1000 /mnt/user/Docker/DDNS-updater

chmod 700 /mnt/user/Docker/DDNS-updater

chmod 400 /mnt/user/Docker/DDNS-updater/config.json

  • Thanks 1
Link to comment
  • 1 month later...
12 minutes ago, tgm said:

@biggiesize - looks like gluetun is no longer available via the apps in unraid, not sure what happened but any chance of getting it back up?

There was a report that the container had a trojan embedded in it.  It was removed from Apps a couple days ago as a precaution pending a full investigation (this weekend)

  • Confused 1
Link to comment
1 hour ago, Squid said:

There was a report that the container had a trojan embedded in it.  It was removed from Apps a couple days ago as a precaution pending a full investigation (this weekend)

Oh that's a bummer... Hopefully nothing more than a false positive. Waiting to have it back :)

Link to comment
16 minutes ago, JonathanM said:

Nobody's saying it was on purpose, and it's not even confirmed to be an accurate report.

Of course. Things like this happen more often than most realize and only a subset turn out to be legitimate concerns. Due diligence still has to be done on all of them.

 

I've never seen a Brinqa report at work that was either completely empty or filled with all legitimate vulnerabilities lol

Link to comment

Hello everyone,

 

I'm the author/maintainer of gluetun (and others). I usually don't participate here due to lack of time and got plenty to answer on github already, but I was emailed saying the docker image had a trojan built-in.

 

Just to be clear, there is no trojan or virus or any malicious code put by me. Unless Github or Docker Hub got hacked I guess, which is unlikely.

 

Also theoretically I don't think a "trojan" could do anything more in a container than standard "non-trojan" code. If I would be malicious, I would code something custom without a trojan code signature.

 

We should still be careful with such reports since gluetun runs as root and has NET_ADMIN access (no way around due to VPNs), so if a distribution like Docker Hub gets compromised (and injects a trojan in every image), some malicious code could have some effect on your system since it's not a totally isolated container running without root.

 

You could always build the image yourself (docker build -t qmcgaw/gluetun https://github.com/qdm12/gluetun.git) and then import the xml from DiamondPrecisionComputing's repository if you can't wait and want to play it safe until this is resolved.

 

  • Thanks 2
Link to comment
On 9/10/2022 at 6:25 PM, qdm12 said:

Hello everyone,

 

I'm the author/maintainer of gluetun (and others). I usually don't participate here due to lack of time and got plenty to answer on github already, but I was emailed saying the docker image had a trojan built-in.

 

Just to be clear, there is no trojan or virus or any malicious code put by me. Unless Github or Docker Hub got hacked I guess, which is unlikely.

 

Also theoretically I don't think a "trojan" could do anything more in a container than standard "non-trojan" code. If I would be malicious, I would code something custom without a trojan code signature.

 

We should still be careful with such reports since gluetun runs as root and has NET_ADMIN access (no way around due to VPNs), so if a distribution like Docker Hub gets compromised (and injects a trojan in every image), some malicious code could have some effect on your system since it's not a totally isolated container running without root.

 

You could always build the image yourself (docker build -t qmcgaw/gluetun https://github.com/qdm12/gluetun.git) and then import the xml from DiamondPrecisionComputing's repository if you can't wait and want to play it safe until this is resolved.

 

Kind of a noob when it comes to all this. How would I import the xml exactly? Thought they might have done their checks by now and the app would've been back to the store but it isn't yet and I need it so wanted to try the way mentioned above. 

 

Link to comment
6 hours ago, tgm said:

Kind of a noob when it comes to all this. How would I import the xml exactly? Thought they might have done their checks by now and the app would've been back to the store but it isn't yet and I need it so wanted to try the way mentioned above. 

 

Squid wrote up some instructions on how to use a private repository for templates a while back that should still work.

 

https://forums.unraid.net/topic/57181-docker-faq/page/2/?tab=comments#comment-807513

  • Thanks 1
Link to comment
On 9/12/2022 at 3:14 AM, biggiesize said:

Squid wrote up some instructions on how to use a private repository for templates a while back that should still work.

 

https://forums.unraid.net/topic/57181-docker-faq/page/2/?tab=comments#comment-807513

Hm no idea what I'm doing wrong here...
Went into boot/config/plugins/community.applications/private/
created a folder:
DiamondPrecisionComputing/
went into it and wget your Gluetun template (wget https://github.com/DiamondPrecisionComputing/unraid-templates/blob/master/templates/GluetunVPN.xml
Even rebooted just to be sure. 

Now I go into the apps tab and I still don't see a "private" section as mentioned in your link above. going to that folder via terminal I see the .xml file right there.. :/
 

Link to comment
6 hours ago, tgm said:

wget https://github.com/DiamondPrecisionComputing/unraid-templates/blob/master/templates/GluetunVPN.xml

Now I go into the apps tab and I still don't see a "private" section as mentioned in your link above. going to that folder via terminal I see the .xml file right there.. :/
 

You need to grab the raw file otherwise the grabbed file will be malformed.

 

wget https://raw.githubusercontent.com/DiamondPrecisionComputing/unraid-templates/master/templates/GluetunVPN.xml

 

After that it should show up here

 

image.png.fb9044e5aa28f8c44d356992d332d8fc.png

  • Like 1
Link to comment

Good day.  After the latest GluetunVPN update it will no longer start.  I use it with Windscribe and have been using it alongside Unraid 6.10.3's VPN Manager for several months without issue.  I went to sleep last night with everything working well and after auto-updates were installed last night, this morning I receive this error in the log upon trying to restart the container.  I have restarted the Unraid server and the error is the same after.  Can anyone help me to get it going again?  I would be grateful.  Several of my Docker containers rely on GluetunVPN to work properly.

 

image.thumb.png.c874ebf3ec7b5f8eb865106023192e57.png

Link to comment
2 hours ago, akguy said:

Good day.  After the latest GluetunVPN update it will no longer start.  I use it with Windscribe and have been using it alongside Unraid 6.10.3's VPN Manager for several months without issue.  I went to sleep last night with everything working well and after auto-updates were installed last night, this morning I receive this error in the log upon trying to restart the container.  I have restarted the Unraid server and the error is the same after.  Can anyone help me to get it going again?  I would be grateful.  Several of my Docker containers rely on GluetunVPN to work properly.

Can you post the entire log from the beginning?

 

If you need to you can roll back to a previous version by editing the application and in the repository replacing qmcgaw/gluetun:latest with qmcgaw/gluetun:v3.31.1 which is the latest major release.

Link to comment
27 minutes ago, biggiesize said:

Can you post the entire log from the beginning?

Thank you for the help.  Where can I find the GluetunVPN.log file?  The only file located in my appdata\gluetun folder is servers.json

 

I tried reverting to a few prior versions and receive different connection errors.  I'm starting to think this may be a problem with Windscribe changing something, but I did test and confirm that my Windscribe account is still active and functioning.  My Unraid server updates Docker containers every Friday night, but I wouldn't think that a different Docker update could impact this one since that's not how Docker is supposed to work except for containers that rely on this one, but I would expect those to fail to start since GluetunVPN is stopped.

Link to comment

root@Goliath:/var/lib/docker/containers# cat 6e*/*.log
{"log":"========================================\n","stream":"stdout","time":"2022-09-17T19:04:48.297553945Z"}
{"log":"========================================\n","stream":"stdout","time":"2022-09-17T19:04:48.297620625Z"}
{"log":"=============== gluetun ================\n","stream":"stdout","time":"2022-09-17T19:04:48.297639202Z"}
{"log":"========================================\n","stream":"stdout","time":"2022-09-17T19:04:48.297648007Z"}
{"log":"=========== Made with ❤️ by ============\n","stream":"stdout","time":"2022-09-17T19:04:48.29765605Z"}
{"log":"======= https://github.com/qdm12 =======\n","stream":"stdout","time":"2022-09-17T19:04:48.297664653Z"}
{"log":"========================================\n","stream":"stdout","time":"2022-09-17T19:04:48.297672633Z"}
{"log":"========================================\n","stream":"stdout","time":"2022-09-17T19:04:48.297680482Z"}
{"log":"\n","stream":"stdout","time":"2022-09-17T19:04:48.297688407Z"}
{"log":"Running version latest built on 2022-09-14T13:28:28.429Z (commit e5be20d)\n","stream":"stdout","time":"2022-09-17T19:04:48.297696144Z"}
{"log":"\n","stream":"stdout","time":"2022-09-17T19:04:48.297704953Z"}
{"log":"🔧 Need help? https://github.com/qdm12/gluetun/discussions/new\n","stream":"stdout","time":"2022-09-17T19:04:48.297712593Z"}
{"log":"🐛 Bug? https://github.com/qdm12/gluetun/issues/new\n","stream":"stdout","time":"2022-09-17T19:04:48.297720698Z"}
{"log":" New feature? https://github.com/qdm12/gluetun/issues/new\n","stream":"stdout","time":"2022-09-17T19:04:48.297728486Z"}
{"log":" Discussion? https://github.com/qdm12/gluetun/discussions/new\n","stream":"stdout","time":"2022-09-17T19:04:48.297736815Z"}
{"log":"💻 Email? [email protected]\n","stream":"stdout","time":"2022-09-17T19:04:48.297744639Z"}
{"log":"💰 Help me? https://www.paypal.me/qmcgaw https://github.com/sponsors/qdm12\n","stream":"stdout","time":"2022-09-17T19:04:48.297752461Z"}
{"log":"2022-09-17T11:04:48-08:00 WARN You are using the old environment variable VPNSP, please consider changing it to VPN_SERVICE_PROVIDER\n","stream":"stdout","time":"2022-09-17T19:04:48.297983456Z"}
{"log":"2022-09-17T11:04:48-08:00 WARN You are using the old environment variable REGION, please consider changing it to SERVER_REGIONS\n","stream":"stdout","time":"2022-09-17T19:04:48.298010368Z"}
{"log":"2022-09-17T11:04:48-08:00 WARN You are using the old environment variable WIREGUARD_ENDPOINT_PORT, please consider changing it to VPN_ENDPOINT_PORT\n","stream":"stdout","time":"2022-09-17T19:04:48.298019135Z"}
{"log":"2022-09-17T11:04:48-08:00 WARN You are using the old environment variable OPENVPN_INTERFACE, please consider changing it to VPN_INTERFACE\n","stream":"stdout","time":"2022-09-17T19:04:48.298043606Z"}
{"log":"2022-09-17T11:04:48-08:00 WARN You are using the old environment variable OPENVPN_ROOT, please consider changing it to OPENVPN_PROCESS_USER\n","stream":"stdout","time":"2022-09-17T19:04:48.298051321Z"}
{"log":"2022-09-17T11:04:48-08:00 WARN You are using the old environment variable WIREGUARD_INTERFACE, please consider changing it to VPN_INTERFACE\n","stream":"stdout","time":"2022-09-17T19:04:48.298058655Z"}
{"log":"2022-09-17T11:04:48-08:00 WARN You are using the old environment variable WIREGUARD_ADDRESS, please consider changing it to WIREGUARD_ADDRESSES\n","stream":"stdout","time":"2022-09-17T19:04:48.298065977Z"}
{"log":"2022-09-17T11:04:48-08:00 WARN You are using the old environment variable HEALTH_ADDRESS_TO_PING, please consider changing it to HEALTH_TARGET_ADDRESS\n","stream":"stdout","time":"2022-09-17T19:04:48.298120397Z"}
{"log":"2022-09-17T11:04:48-08:00 WARN You are using the old environment variable DNS_PLAINTEXT_ADDRESS, please consider changing it to DNS_ADDRESS\n","stream":"stdout","time":"2022-09-17T19:04:48.298177399Z"}
{"log":"2022-09-17T11:04:48-08:00 WARN DNS_PLAINTEXT_ADDRESS is set to 10.255.255.2 so the DNS over TLS (DoT) server will not be used. The default value changed to 127.0.0.1 so it uses the internal DoT serves. If the DoT server fails to start, the IPv4 address of the first plaintext DNS server corresponding to the first DoT provider chosen is used.\n","stream":"stdout","time":"2022-09-17T19:04:48.298196119Z"}
{"log":"2022-09-17T11:04:48-08:00 INFO [routing] default route found: interface eth0, gateway 172.17.0.1 and assigned IP 172.17.0.10\n","stream":"stdout","time":"2022-09-17T19:04:48.299498746Z"}
{"log":"2022-09-17T11:04:48-08:00 INFO [routing] default route found: interface eth0, gateway fd17::1 and assigned IP fd17::242:ac11:a\n","stream":"stdout","time":"2022-09-17T19:04:48.299756647Z"}
{"log":"2022-09-17T11:04:48-08:00 INFO [routing] local ethernet link found: gretap0\n","stream":"stdout","time":"2022-09-17T19:04:48.300061649Z"}
{"log":"2022-09-17T11:04:48-08:00 INFO [routing] local ethernet link found: erspan0\n","stream":"stdout","time":"2022-09-17T19:04:48.300084786Z"}
{"log":"2022-09-17T11:04:48-08:00 INFO [routing] local ethernet link found: eth0\n","stream":"stdout","time":"2022-09-17T19:04:48.300093389Z"}
{"log":"2022-09-17T11:04:48-08:00 INFO [routing] local ipnet found: 172.17.0.0/16\n","stream":"stdout","time":"2022-09-17T19:04:48.300177663Z"}
{"log":"2022-09-17T11:04:48-08:00 INFO [routing] local ipnet found: fd17::242:ac11:a/128\n","stream":"stdout","time":"2022-09-17T19:04:48.300414297Z"}
{"log":"2022-09-17T11:04:48-08:00 INFO [routing] local ipnet found: fd17::/64\n","stream":"stdout","time":"2022-09-17T19:04:48.300655516Z"}
{"log":"2022-09-17T11:04:48-08:00 INFO [routing] local ipnet found: fe80::/64\n","stream":"stdout","time":"2022-09-17T19:04:48.300860286Z"}
{"log":"2022-09-17T11:04:48-08:00 INFO [routing] local ipnet found: ff00::/8\n","stream":"stdout","time":"2022-09-17T19:04:48.301084649Z"}
{"log":"2022-09-17T11:04:48-08:00 INFO [firewall] enabling...\n","stream":"stdout","time":"2022-09-17T19:04:48.320032006Z"}
{"log":"2022-09-17T11:04:48-08:00 INFO [firewall] enabled successfully\n","stream":"stdout","time":"2022-09-17T19:04:48.369580087Z"}
{"log":"2022-09-17T11:04:48-08:00 INFO [storage] merging by most recent 11721 hardcoded servers and 11711 servers read from /gluetun/servers.json\n","stream":"stdout","time":"2022-09-17T19:04:48.88449359Z"}
{"log":"2022-09-17T11:04:48-08:00 INFO [storage] Using windscribe servers from file which are 16 days more recent\n","stream":"stdout","time":"2022-09-17T19:04:48.895834792Z"}
{"log":"2022-09-17T11:04:49-08:00 INFO Alpine version: 3.16.2\n","stream":"stdout","time":"2022-09-17T19:04:49.025359843Z"}
{"log":"2022-09-17T11:04:49-08:00 INFO OpenVPN 2.4 version: 2.4.12\n","stream":"stdout","time":"2022-09-17T19:04:49.048894769Z"}
{"log":"2022-09-17T11:04:49-08:00 INFO OpenVPN 2.5 version: 2.5.6\n","stream":"stdout","time":"2022-09-17T19:04:49.058363716Z"}
{"log":"2022-09-17T11:04:49-08:00 INFO Unbound version: 1.15.0\n","stream":"stdout","time":"2022-09-17T19:04:49.066230911Z"}
{"log":"2022-09-17T11:04:49-08:00 INFO IPtables version: v1.8.8\n","stream":"stdout","time":"2022-09-17T19:04:49.067562625Z"}
{"log":"2022-09-17T11:04:49-08:00 INFO Settings summary:\n","stream":"stdout","time":"2022-09-17T19:04:49.067919022Z"}
{"log":"├── VPN settings:\n","stream":"stdout","time":"2022-09-17T19:04:49.067947996Z"}
{"log":"|   ├── VPN provider settings:\n","stream":"stdout","time":"2022-09-17T19:04:49.06795821Z"}
{"log":"|   |   ├── Name: windscribe\n","stream":"stdout","time":"2022-09-17T19:04:49.067965761Z"}
{"log":"|   |   └── Server selection settings:\n","stream":"stdout","time":"2022-09-17T19:04:49.06797302Z"}
{"log":"|   |       ├── VPN type: wireguard\n","stream":"stdout","time":"2022-09-17T19:04:49.067980328Z"}
{"log":"|   |       ├── Regions: canada east\n","stream":"stdout","time":"2022-09-17T19:04:49.067987617Z"}
{"log":"|   |       └── Wireguard selection settings:\n","stream":"stdout","time":"2022-09-17T19:04:49.067994662Z"}
{"log":"|   |           ├── Endpoint port: 443\n","stream":"stdout","time":"2022-09-17T19:04:49.068001777Z"}
{"log":"|   |           └── Server public key: YxWQDjNmU41PJXtoobFek3Y6nhICSLgsqH+QKPO5AQ8=\n","stream":"stdout","time":"2022-09-17T19:04:49.068009069Z"}
{"log":"|   └── Wireguard settings:\n","stream":"stdout","time":"2022-09-17T19:04:49.068039683Z"}
{"log":"|       ├── Private key: CI...nM=\n","stream":"stdout","time":"2022-09-17T19:04:49.06804804Z"}
{"log":"|       ├── Pre-shared key: tl...lo=\n","stream":"stdout","time":"2022-09-17T19:04:49.068055073Z"}
{"log":"|       ├── Interface addresses:\n","stream":"stdout","time":"2022-09-17T19:04:49.068062111Z"}
{"log":"|       |   └── 100.111.141.127/32\n","stream":"stdout","time":"2022-09-17T19:04:49.068068922Z"}
{"log":"|       └── Network interface: wg10\n","stream":"stdout","time":"2022-09-17T19:04:49.06807576Z"}
{"log":"├── DNS settings:\n","stream":"stdout","time":"2022-09-17T19:04:49.06808287Z"}
{"log":"|   ├── DNS server address to use: 10.255.255.2\n","stream":"stdout","time":"2022-09-17T19:04:49.068089922Z"}
{"log":"|   ├── Keep existing nameserver(s): no\n","stream":"stdout","time":"2022-09-17T19:04:49.068096988Z"}
{"log":"|   └── DNS over TLS settings:\n","stream":"stdout","time":"2022-09-17T19:04:49.068103844Z"}
{"log":"|       ├── Enabled: yes\n","stream":"stdout","time":"2022-09-17T19:04:49.068110628Z"}
{"log":"|       ├── Update period: every 24h0m0s\n","stream":"stdout","time":"2022-09-17T19:04:49.068117602Z"}
{"log":"|       ├── Unbound settings:\n","stream":"stdout","time":"2022-09-17T19:04:49.068124454Z"}
{"log":"|       |   ├── Authoritative servers:\n","stream":"stdout","time":"2022-09-17T19:04:49.068131256Z"}
{"log":"|       |   |   └── cloudflare\n","stream":"stdout","time":"2022-09-17T19:04:49.068138087Z"}
{"log":"|       |   ├── Caching: no\n","stream":"stdout","time":"2022-09-17T19:04:49.068145077Z"}
{"log":"|       |   ├── IPv6: no\n","stream":"stdout","time":"2022-09-17T19:04:49.068151893Z"}
{"log":"|       |   ├── Verbosity level: 1\n","stream":"stdout","time":"2022-09-17T19:04:49.068158656Z"}
{"log":"|       |   ├── Verbosity details level: 0\n","stream":"stdout","time":"2022-09-17T19:04:49.06816547Z"}
{"log":"|       |   ├── Validation log level: 0\n","stream":"stdout","time":"2022-09-17T19:04:49.068172691Z"}
{"log":"|       |   ├── System user: root\n","stream":"stdout","time":"2022-09-17T19:04:49.068179524Z"}
{"log":"|       |   └── Allowed networks:\n","stream":"stdout","time":"2022-09-17T19:04:49.06818635Z"}
{"log":"|       |       ├── 0.0.0.0/0\n","stream":"stdout","time":"2022-09-17T19:04:49.068193197Z"}
{"log":"|       |       └── ::/0\n","stream":"stdout","time":"2022-09-17T19:04:49.06820019Z"}
{"log":"|       └── DNS filtering settings:\n","stream":"stdout","time":"2022-09-17T19:04:49.068207032Z"}
{"log":"|           ├── Block malicious: yes\n","stream":"stdout","time":"2022-09-17T19:04:49.068213909Z"}
{"log":"|           ├── Block ads: no\n","stream":"stdout","time":"2022-09-17T19:04:49.068220773Z"}
{"log":"|           ├── Block surveillance: yes\n","stream":"stdout","time":"2022-09-17T19:04:49.068227531Z"}
{"log":"|           └── Blocked IP networks:\n","stream":"stdout","time":"2022-09-17T19:04:49.068234328Z"}
{"log":"|               ├── 127.0.0.1/8\n","stream":"stdout","time":"2022-09-17T19:04:49.068241149Z"}
{"log":"|               ├── 10.0.0.0/8\n","stream":"stdout","time":"2022-09-17T19:04:49.068248095Z"}
{"log":"|               ├── 172.16.0.0/12\n","stream":"stdout","time":"2022-09-17T19:04:49.068254933Z"}
{"log":"|               ├── 192.168.0.0/16\n","stream":"stdout","time":"2022-09-17T19:04:49.068261751Z"}
{"log":"|               ├── 169.254.0.0/16\n","stream":"stdout","time":"2022-09-17T19:04:49.068268549Z"}
{"log":"|               ├── ::1/128\n","stream":"stdout","time":"2022-09-17T19:04:49.06827529Z"}
{"log":"|               ├── fc00::/7\n","stream":"stdout","time":"2022-09-17T19:04:49.068282057Z"}
{"log":"|               ├── fe80::/10\n","stream":"stdout","time":"2022-09-17T19:04:49.068288871Z"}
{"log":"|               ├── ::ffff:7f00:1/104\n","stream":"stdout","time":"2022-09-17T19:04:49.068295601Z"}
{"log":"|               ├── ::ffff:a00:0/104\n","stream":"stdout","time":"2022-09-17T19:04:49.06831229Z"}
{"log":"|               ├── ::ffff:a9fe:0/112\n","stream":"stdout","time":"2022-09-17T19:04:49.068321271Z"}
{"log":"|               ├── ::ffff:ac10:0/108\n","stream":"stdout","time":"2022-09-17T19:04:49.068328516Z"}
{"log":"|               └── ::ffff:c0a8:0/112\n","stream":"stdout","time":"2022-09-17T19:04:49.068335297Z"}
{"log":"├── Firewall settings:\n","stream":"stdout","time":"2022-09-17T19:04:49.068342052Z"}
{"log":"|   └── Enabled: yes\n","stream":"stdout","time":"2022-09-17T19:04:49.068348897Z"}
{"log":"├── Log settings:\n","stream":"stdout","time":"2022-09-17T19:04:49.068355697Z"}
{"log":"|   └── Log level: INFO\n","stream":"stdout","time":"2022-09-17T19:04:49.068362428Z"}
{"log":"├── Health settings:\n","stream":"stdout","time":"2022-09-17T19:04:49.06836924Z"}
{"log":"|   ├── Server listening address: 127.0.0.1:9999\n","stream":"stdout","time":"2022-09-17T19:04:49.068376113Z"}
{"log":"|   ├── Target address: github.com\n","stream":"stdout","time":"2022-09-17T19:04:49.068383009Z"}
{"log":"|   ├── Read header timeout: 100ms\n","stream":"stdout","time":"2022-09-17T19:04:49.06838988Z"}
{"log":"|   ├── Read timeout: 500ms\n","stream":"stdout","time":"2022-09-17T19:04:49.068396769Z"}
{"log":"|   └── VPN wait durations:\n","stream":"stdout","time":"2022-09-17T19:04:49.0684036Z"}
{"log":"|       ├── Initial duration: 10s\n","stream":"stdout","time":"2022-09-17T19:04:49.068410656Z"}
{"log":"|       └── Additional duration: 10s\n","stream":"stdout","time":"2022-09-17T19:04:49.06841744Z"}
{"log":"├── Shadowsocks server settings:\n","stream":"stdout","time":"2022-09-17T19:04:49.06842459Z"}
{"log":"|   ├── Enabled: yes\n","stream":"stdout","time":"2022-09-17T19:04:49.068431508Z"}
{"log":"|   ├── Listening address: :8388\n","stream":"stdout","time":"2022-09-17T19:04:49.06843828Z"}
{"log":"|   ├── Cipher: chacha20-ietf-poly1305\n","stream":"stdout","time":"2022-09-17T19:04:49.068445167Z"}
{"log":"|   ├── Password: [set]\n","stream":"stdout","time":"2022-09-17T19:04:49.068452009Z"}
{"log":"|   └── Log addresses: no\n","stream":"stdout","time":"2022-09-17T19:04:49.068458889Z"}
{"log":"├── HTTP proxy settings:\n","stream":"stdout","time":"2022-09-17T19:04:49.068466256Z"}
{"log":"|   └── Enabled: no\n","stream":"stdout","time":"2022-09-17T19:04:49.068473138Z"}
{"log":"├── Control server settings:\n","stream":"stdout","time":"2022-09-17T19:04:49.068479898Z"}
{"log":"|   ├── Listening address: :8000\n","stream":"stdout","time":"2022-09-17T19:04:49.068487451Z"}
{"log":"|   └── Logging: yes\n","stream":"stdout","time":"2022-09-17T19:04:49.068494206Z"}
{"log":"├── OS Alpine settings:\n","stream":"stdout","time":"2022-09-17T19:04:49.068501074Z"}
{"log":"|   ├── Process UID: 1000\n","stream":"stdout","time":"2022-09-17T19:04:49.068507825Z"}
{"log":"|   ├── Process GID: 1000\n","stream":"stdout","time":"2022-09-17T19:04:49.068514599Z"}
{"log":"|   └── Timezone: America/Anchorage\n","stream":"stdout","time":"2022-09-17T19:04:49.068521352Z"}
{"log":"├── Public IP settings:\n","stream":"stdout","time":"2022-09-17T19:04:49.068528286Z"}
{"log":"|   ├── Fetching: every 12h0m0s\n","stream":"stdout","time":"2022-09-17T19:04:49.068535067Z"}
{"log":"|   └── IP file path: /gluetun/ip\n","stream":"stdout","time":"2022-09-17T19:04:49.068541865Z"}
{"log":"├── Server data updater settings:\n","stream":"stdout","time":"2022-09-17T19:04:49.068548665Z"}
{"log":"|   ├── Update period: 12h0m0s\n","stream":"stdout","time":"2022-09-17T19:04:49.068555636Z"}
{"log":"|   ├── DNS address: 1.1.1.1:53\n","stream":"stdout","time":"2022-09-17T19:04:49.068562592Z"}
{"log":"|   ├── Minimum ratio: 0.8\n","stream":"stdout","time":"2022-09-17T19:04:49.068569377Z"}
{"log":"|   └── Providers to update: windscribe\n","stream":"stdout","time":"2022-09-17T19:04:49.068584064Z"}
{"log":"└── Version settings:\n","stream":"stdout","time":"2022-09-17T19:04:49.068591605Z"}
{"log":"    └── Enabled: yes\n","stream":"stdout","time":"2022-09-17T19:04:49.068598403Z"}
{"log":"2022-09-17T11:04:49-08:00 INFO IPv6 is supported\n","stream":"stdout","time":"2022-09-17T19:04:49.069033369Z"}
{"log":"2022-09-17T11:04:49-08:00 INFO [routing] default route found: interface eth0, gateway 172.17.0.1 and assigned IP 172.17.0.10\n","stream":"stdout","time":"2022-09-17T19:04:49.069478656Z"}
{"log":"2022-09-17T11:04:49-08:00 INFO [routing] default route found: interface eth0, gateway fd17::1 and assigned IP fd17::242:ac11:a\n","stream":"stdout","time":"2022-09-17T19:04:49.069734211Z"}
{"log":"2022-09-17T11:04:49-08:00 INFO [routing] default route found: interface eth0, gateway 172.17.0.1 and assigned IP 172.17.0.10\n","stream":"stdout","time":"2022-09-17T19:04:49.070399201Z"}
{"log":"2022-09-17T11:04:49-08:00 INFO [routing] default route found: interface eth0, gateway fd17::1 and assigned IP fd17::242:ac11:a\n","stream":"stdout","time":"2022-09-17T19:04:49.070619987Z"}
{"log":"2022-09-17T11:04:49-08:00 INFO [routing] deleting route for 0.0.0.0/0\n","stream":"stdout","time":"2022-09-17T19:04:49.070638425Z"}
{"log":"2022-09-17T11:04:49-08:00 ERROR [routing] cannot reverse routing changes: cannot remove routes for inbound traffic from default IP: cannot delete route: cannot delete route: for subnet 0.0.0.0/0 at interface eth0: no such process\n","stream":"stdout","time":"2022-09-17T19:04:49.070731452Z"}
{"log":"2022-09-17T11:04:49-08:00 ERROR cannot setup routing: cannot add routes for inbound traffic from default IP: cannot add rule: cannot add rule for default route interface eth0, gateway fd17::1 and assigned IP fd17::242:ac11:a: cannot add rule ip rule 100: from fd17::242:ac11:a/128 to all table 200: address family not supported by protocol\n","stream":"stdout","time":"2022-09-17T19:04:49.070752382Z"}
{"log":"2022-09-17T11:04:49-08:00 INFO Shutdown successful\n","stream":"stdout","time":"2022-09-17T19:04:49.07076129Z"}
root@Goliath:/var/lib/docker/containers#

Link to comment

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.