[Support] binhex - DelugeVPN


Recommended Posts

I am on 6.1.8 and have iptable_mangle

 

root@Tower:~# lsmod
Module                  Size  Used by
xt_CHECKSUM             1071  1 
ipt_REJECT              1193  2 
nf_reject_ipv4          2203  1 ipt_REJECT
ebtable_filter          1671  0 
ebtables               14192  1 ebtable_filter
kvm_amd                44207  3 
kvm                   251442  1 kvm_amd
vhost_net               7781  1 
vhost                  12549  1 vhost_net
macvtap                 9003  1 vhost_net
macvlan                11713  1 macvtap
iptable_mangle          1376  1 
tun                    16465  8 vhost_net
xt_nat                  1665  16 
veth                    4401  0 
ipt_MASQUERADE           981  16 
nf_nat_masquerade_ipv4     1649  1 ipt_MASQUERADE
iptable_nat             1615  1 
nf_conntrack_ipv4       5626  12 
nf_nat_ipv4             4111  1 iptable_nat
iptable_filter          1280  2 
ip_tables               9310  3 iptable_filter,iptable_mangle,iptable_nat
nf_nat                  9789  3 nf_nat_ipv4,xt_nat,nf_nat_masquerade_ipv4
md_mod                 30680  7 
it87                   23702  0 
hwmon_vid               2028  1 it87
fam15h_power            2406  0 
k10temp                 2684  0 
r8169                  57464  0 
mii                     3339  1 r8169
i2c_piix4               7688  0 
ahci                   24107  6 
mpt2sas               148914  6 
libahci                18687  1 ahci
raid_class              3116  1 mpt2sas
scsi_transport_sas     21182  1 mpt2sas
acpi_cpufreq            6074  0 

 

ok thats interesting!, so your running standard unraid yes?, not as a vmware esxi vm or custom build to include drives and firmware for dvb?

Link to comment

I am on 6.1.8 and have iptable_mangle

 

root@Tower:~# lsmod
Module                  Size  Used by
xt_CHECKSUM             1071  1 
ipt_REJECT              1193  2 
nf_reject_ipv4          2203  1 ipt_REJECT
ebtable_filter          1671  0 
ebtables               14192  1 ebtable_filter
kvm_amd                44207  3 
kvm                   251442  1 kvm_amd
vhost_net               7781  1 
vhost                  12549  1 vhost_net
macvtap                 9003  1 vhost_net
macvlan                11713  1 macvtap
iptable_mangle          1376  1 
tun                    16465  8 vhost_net
xt_nat                  1665  16 
veth                    4401  0 
ipt_MASQUERADE           981  16 
nf_nat_masquerade_ipv4     1649  1 ipt_MASQUERADE
iptable_nat             1615  1 
nf_conntrack_ipv4       5626  12 
nf_nat_ipv4             4111  1 iptable_nat
iptable_filter          1280  2 
ip_tables               9310  3 iptable_filter,iptable_mangle,iptable_nat
nf_nat                  9789  3 nf_nat_ipv4,xt_nat,nf_nat_masquerade_ipv4
md_mod                 30680  7 
it87                   23702  0 
hwmon_vid               2028  1 it87
fam15h_power            2406  0 
k10temp                 2684  0 
r8169                  57464  0 
mii                     3339  1 r8169
i2c_piix4               7688  0 
ahci                   24107  6 
mpt2sas               148914  6 
libahci                18687  1 ahci
raid_class              3116  1 mpt2sas
scsi_transport_sas     21182  1 mpt2sas
acpi_cpufreq            6074  0 

 

ok thats interesting!, so your running standard unraid yes?, not as a vmware esxi vm or custom build to include drives and firmware for dvb?

 

Yes, Standard unraid

Link to comment

If it helps, I'm having the same issue (not able to access Deluge from outside of my lan) It started after I purchased and applied an unRaid key. All was working fine before that. Today I updated unRaid from 6.1.6 to 6.1.8 and it's still showing the same error, no luck.

Link to comment

Did something change again?

I got the 03-Feb-16 built working no problems, but I went to update today, and can not get it going.

Tried a force update with no luck either (3 of your others i am using, no issues )

 

This is the only thing that jumps out at me

FATAL: Module iptable_mangle not found in directory /lib/modules/4.1.17-unRAID

 

 

This is on unRAID 6.1.8

# lsmod
Module                  Size  Used by
tun                    16465  2
xt_nat                  1665  13
veth                    4401  0
ipt_MASQUERADE           981  14
nf_nat_masquerade_ipv4     1649  1 ipt_MASQUERADE
iptable_nat             1615  1
nf_conntrack_ipv4       5626  2
nf_nat_ipv4             4111  1 iptable_nat
iptable_filter          1280  2
ip_tables               9310  2 iptable_filter,iptable_nat
nf_nat                  9789  3 nf_nat_ipv4,xt_nat,nf_nat_masquerade_ipv4
coretemp                5044  0
it87                   23702  0
hwmon_vid               2028  1 it87
md_mod                 30680  3
bonding                87645  0
ahci                   24107  5
r8169                  57464  0
i2c_i801                8917  0
libahci                18687  1 ahci
mii                     3339  1 r8169
acpi_cpufreq            6074  0
[code]

 

ok so ive spotted the issue, the thing that's changed is unraid, it looks like anything greater than unraid 6.1.6 has iptable_mangle missing from kernel modules, im not sure what i can do to fix this right now, looks like im going to have to get jonp involved in this.

 

for reference here is the output from lsmod for me (running 6.1.6), important bit is ip_tables line:-

 

Module                  Size  Used by
xt_CHECKSUM             1071  1
ipt_REJECT              1193  2
nf_reject_ipv4          2203  1 ipt_REJECT
ebtable_filter          1671  0
ebtables               14192  1 ebtable_filter
kvm_amd                44218  6
kvm                   251410  1 kvm_amd
vhost_net               7781  1
vhost                  12549  1 vhost_net
macvtap                 9035  1 vhost_net
macvlan                11713  1 macvtap
tun                    16465  6 vhost_net
iptable_mangle          1376  2
xt_nat                  1665  8
veth                    4433  0
ipt_MASQUERADE           981  22
nf_nat_masquerade_ipv4     1649  1 ipt_MASQUERADE
iptable_nat             1615  1
nf_conntrack_ipv4       5626  3
nf_nat_ipv4             4111  1 iptable_nat
iptable_filter          1280  2
ip_tables               9310  3 iptable_filter,iptable_mangle,iptable_nat
nf_nat                  9789  3 nf_nat_ipv4,xt_nat,nf_nat_masquerade_ipv4
md_mod                 30680  8
e1000e                140774  0
ptp                     8780  1 e1000e
ahci                   24107  6
mpt2sas               148914  4
raid_class              3116  1 mpt2sas
k10temp                 2684  0
fam15h_power            2406  0
pata_atiixp             4427  0
i2c_piix4               7688  0
libahci                18687  1 ahci
pps_core                5672  1 ptp
scsi_transport_sas     21182  1 mpt2sas
asus_atk0110            6874  0
acpi_cpufreq            6074  1

 

so what does this mean in practise, it means you cannot currently access the deluge webui from outside of your lan if your using unraid 6.1.7 or greater, but the tunnel is working as intended and you should be able to access the webui whilst on your lan, hopefully jonp will be able to work his magic and include this in the next release.

[/mangle

 

OK decided to bite the bullet and upgrade to 6.1.8 to see for myself what is going on. So I'm now running 6.1.8 and can confirm I do have iptable_mangle available to me. So my thoughts are that perhaps the people who don't have iptable_mangle possibly don't have a KVM VM defined, possibly the action of creating a VM causes additional modules to be loaded. This is pure speculation at this point, I will dig a bit deeper tomorrow.

Link to comment

so what does this mean in practise, it means you cannot currently access the deluge webui from outside of your lan if your using unraid 6.1.7 or greater, but the tunnel is working as intended and you should be able to access the webui whilst on your lan, hopefully jonp will be able to work his magic and include this in the next release.

 

Sitting down at my desktop now, and yep, all is good.

You really need a "buy me a beer" link in your sig as I am sure i owe you a few.

Link to comment

so what does this mean in practise, it means you cannot currently access the deluge webui from outside of your lan if your using unraid 6.1.7 or greater, but the tunnel is working as intended and you should be able to access the webui whilst on your lan, hopefully jonp will be able to work his magic and include this in the next release.

 

Sitting down at my desktop now, and yep, all is good.

You really need a "buy me a beer" link in your sig as I am sure i owe you a few.

 

That's very kind, there is already a button there, see post #1

 

edit - make the button a little bit more prominent now :-)

Link to comment

Is there any way to check for IP leaks? On my computer, I go to https://ipleak.net/ to check. Not sure how to do it on unRAID.

 

-Austin

 

You can verify you are connected, see FAQ Q3 post #2 if you want to go deeper and look at packets then let me know and I will write up some instructions.

 

I verified that I have connection to the VPN. When I'm connected on my computer, ipleak.net shows my VPN IP and also my ISP IP if I have the network lock disabled. It says there's leaking through WebRTC. When the network lock is enabled, it blocks all Internet traffic in case the VPN gets disconnected for whatever reason, and the IP leak is fixed also.

 

Is there any way to enable the network lock for AirVPN like on the Windows client or to verify my ISP IP never gets out?

 

-Austin

Link to comment

Is there any way to check for IP leaks? On my computer, I go to https://ipleak.net/ to check. Not sure how to do it on unRAID.

 

-Austin

 

You can verify you are connected, see FAQ Q3 post #2 if you want to go deeper and look at packets then let me know and I will write up some instructions.

 

I verified that I have connection to the VPN. When I'm connected on my computer, ipleak.net shows my VPN IP and also my ISP IP if I have the network lock disabled. It says there's leaking through WebRTC. When the network lock is enabled, it blocks all Internet traffic in case the VPN gets disconnected for whatever reason, and the IP leak is fixed also.

 

Is there any way to enable the network lock for AirVPN like on the Windows client or to verify my ISP IP never gets out?

 

-Austin

 

edit - ahh re-read your question a few times again :-), i think i know what your saying, ok so there is no obvious kill switch as this docker has no gui, but it is secured using low level firewall rules using iptables, this has been tested by myself and i have yet to see any sign of ip leakage, it doesnt matter if the vpn tunnel is running or not, no ip leakage of your real ip will occur.

 

Again for now there is no easy way for you to see this without getting down and dirty and capturing packets and then running a packet analyser on the capture to see the flow of data.

Link to comment

Is there any way to check for IP leaks? On my computer, I go to https://ipleak.net/ to check. Not sure how to do it on unRAID.

 

-Austin

 

You can verify you are connected, see FAQ Q3 post #2 if you want to go deeper and look at packets then let me know and I will write up some instructions.

 

I verified that I have connection to the VPN. When I'm connected on my computer, ipleak.net shows my VPN IP and also my ISP IP if I have the network lock disabled. It says there's leaking through WebRTC. When the network lock is enabled, it blocks all Internet traffic in case the VPN gets disconnected for whatever reason, and the IP leak is fixed also.

 

Is there any way to enable the network lock for AirVPN like on the Windows client or to verify my ISP IP never gets out?

 

-Austin

 

edit - ahh re-read your question a few times again :-), i think i know what your saying, ok so there is no obvious kill switch as this docker has no gui, but it is secured using low level firewall rules using iptables, this has been tested by myself and i have yet to see any sign of ip leakage, it doesnt matter if the vpn tunnel is running or not, no ip leakage of your real ip will occur.

 

Again for now there is no easy way for you to see this without getting down and dirty and capturing packets and then running a packet analyser on the capture to see the flow of data.

 

Ok. Thanks.

 

-Austin

Link to comment

Each time I stop and start, I need to go in, reapply the download directory, my seeding preferences, if I want to allow remote connections, labels, etc.  Any thoughts on what I could be doing wrong? 

 

This sounds like a classic case of the share your using not being marked a "cache only", what this means if you dont do this is the internal unraid process called mover comes along and moves all your files in that share to the array, then when you restart the docker you have no config again, and so the cycle repeats. The way to solve this is to mark the share as "cache only", this tells the mover not to touch any files/folders contained within this share, go to unraid ui/shares/click on share/select from dopdown "use cache disk" the value "only", save and your done.

 

fyi, in Couch I have tried to connect to "localIP:58846", "127.0.0.1:58846" and "localhost:58846".  I also tried changing the port number in deluge and in couch but no luck.  In the beginning of this thread in the FAQ Binhex says to "enable remote connections, then restart".  In my case, every restart resets to unchecked and I have to check again - so now I"m thinking whatever is keeping my preferences from staying might be a contributing factor.

 

ok this will depend on where couchpotato is installed and how its installed, for now im going to assume couchpotato is installed as another docker on the unraid host, if this is the case then read FAQ Q1 in post #2 of this thread and follow it carefully.

Just to add to this a little, once mover has messed with it, it seems like you need to remove the delugevpn config folder and let the container recreate it. Also, I'd set the mapping to /mnt/cache/appdata/delugevpn instead of /mnt/user/appdata/delugevpn if that's what you used.

 

Thanks for the info guys:

I have my /config folder mapped to a cache "only" share.  I have my /data folder mapped to a /download directory on my "yes" cache share.  Do I need both mapped to the cache "only"?  The reason I did this was I thought I should have the downloads actually go to the large array for space needs...not to the limited cache - but that may be my mistake. BOTH are mapped to "/mnt/user" and not /mnt/cache".

 

Couch is installed as another docker on the unraid host. I followed the instructions in the post cited above but have had no luck.  I'll work on the getting the preferences to stay first, then tackle this issue separately. Still not sure they aren't related.

 

Thanks!!

 

Just an update on this earlier post.  Since updating to the lastest version of DelugeVPN and unRaid my settings are now persistent!  I can stop or restart DelugeVPN and all the settings are there.  Not really sure why but I don't want to look a gift horse in the mouth!  Still can't get Couch to "see" DelugeVPN, but I wanted to post an update about my settings.

 

Thanks again for providing and updating this great docker!

Link to comment

Reporting in similiar to other users.

 

After upgrade to Unraid 6.1.8 I have lost GUI access to Deluge. 

Deluge - 1.3.12-20

 

My brother who runs this as well is also experiencing the same.

 

Any thoughts?

 

Module                  Size  Used by
md_mod                 30680  6
xt_nat                  1665  11
veth                    4401  0
ipt_MASQUERADE           981  12
nf_nat_masquerade_ipv4     1649  1 ipt_MASQUERADE
iptable_nat             1615  1
nf_conntrack_ipv4       5626  2
nf_nat_ipv4             4111  1 iptable_nat
iptable_filter          1280  1
ip_tables               9310  2 iptable_filter,iptable_nat
nf_nat                  9789  3 nf_nat_ipv4,xt_nat,nf_nat_masquerade_ipv4
k10temp                 2684  0
i2c_piix4               7688  0
ahci                   24107  8
r8169                  57464  0
libahci                18687  1 ahci
mii                     3339  1 r8169
acpi_cpufreq            6074  0

Link to comment

Reporting in similiar to other users.

 

After upgrade to Unraid 6.1.8 I have lost GUI access to Deluge. 

Deluge - 1.3.12-20

 

My brother who runs this as well is also experiencing the same.

 

Any thoughts?

 

Module                  Size  Used by
md_mod                 30680  6
xt_nat                  1665  11
veth                    4401  0
ipt_MASQUERADE           981  12
nf_nat_masquerade_ipv4     1649  1 ipt_MASQUERADE
iptable_nat             1615  1
nf_conntrack_ipv4       5626  2
nf_nat_ipv4             4111  1 iptable_nat
iptable_filter          1280  1
ip_tables               9310  2 iptable_filter,iptable_nat
nf_nat                  9789  3 nf_nat_ipv4,xt_nat,nf_nat_masquerade_ipv4
k10temp                 2684  0
i2c_piix4               7688  0
ahci                   24107  8
r8169                  57464  0
libahci                18687  1 ahci
mii                     3339  1 r8169
acpi_cpufreq            6074  0

 

Me too. Had it working w/the LAN NETWORK, updated ~ 20 minutes ago and can't access now. Says it's running, log won't open on my phone.

Link to comment

OK guys everybody with the issue where they cannot access deluge webui outside of the lan please post the following:-

 

-Unraid version

-Processor manu Intel/amd

-KVM VM defined yes/no

-Output from lsmod command

-Attach supervisord log

-If previously working then the version of unraid it worked OK with

 

Link to comment

Using delugeVPN docker

 

1)Unraid 6.1.8

2) Intel q9550 processor

3) no

4)

Module                  Size  Used by

xt_nat                  1665  10

veth                    4401  0

ipt_MASQUERADE          981  11

nf_nat_masquerade_ipv4    1649  1 ipt_MASQUERADE

iptable_nat            1615  1

nf_conntrack_ipv4      5626  2

nf_nat_ipv4            4111  1 iptable_nat

iptable_filter          1280  1

ip_tables              9310  2 iptable_filter,iptable_nat

nf_nat                  9789  3 nf_nat_ipv4,xt_nat,nf_nat_masquerade_ipv4

md_mod                30680  6

tun                    16465  0

hwmon_vid              2028  0

coretemp                5044  0

r8169                  57464  0

mii                    3339  1 r8169

ata_piix              24047  6

i2c_i801                8917  0

skge                  27834  0

pata_marvell            2843  0

ahci                  24107  0

sata_sil                7159  2

libahci                18687  1 ahci

asus_atk0110            6874  0

acpi_cpufreq            6074  0

 

5) - attached supervisord.log and supervisord.log.1

6) I used deluge under 6.1.7 and it worked.

 

 

After looking at supervisord.1.log, which was generated when I installed delugevpn, I saw that the openvpn folder couldn't be accessed.  I changed the owner to nobody.users (from root.root) and restarted. supervisord.log is the file generated after restarting.

 

Edit: Still no webUI access on the LAN

supervisord.1.txt

supervisord.txt

Link to comment

OK guys everybody with the issue where they cannot access deluge webui outside of the lan please post the following:-

 

-Unraid version

-Processor manu Intel/amd

-KVM VM defined yes/no

-Output from lsmod command

-Attach supervisord log

-If previously working then the version of unraid it worked OK with

 

Not sure why / how, but it's up. I'm guessing it realized I sent a couple bucks your way and started to agree :)

 

Thanks for all you've done, hopefully it works for others as well.

 

FWIW, I'm on latest unRAID (6.1.8?) and a 1245v2 Xeon.

Link to comment

OK guys everybody with the issue where they cannot access deluge webui outside of the lan please post the following:-

 

-Unraid version

-Processor manu Intel/amd

-KVM VM defined yes/no

-Output from lsmod command

-Attach supervisord log

-If previously working then the version of unraid it worked OK with

 

Not sure why / how, but it's up. I'm guessing it realized I sent a couple bucks your way and started to agree :)

 

Thanks for all you've done, hopefully it works for others as well.

 

FWIW, I'm on latest unRAID (6.1.8?) and a 1245v2 Xeon.

 

cheers for the donation :-), quick couple of questions for you, can you access deluge webui outside of your lan, for  example from a smartphone over the internet?, if the answer is yes then can you tell me if you have a vm running as well?, my current theory is that the act of creating a vm enables iptable mangle support, this could be complete BS though :-)

Link to comment

Just tried it, opened my port via DD-WRT and am not having any success. Am not running any VMs, and likely won't have an opportunity to try adding one for a while (long story shortened: house under construction, 2 1/2 year old kid w/another on the way  ;D).

 

EDIT: I will try hooking my laptop to my phone via hotspot, though - that doesn't take much time and I can probably try that this evening. My phone was giving me problems yesterday via local network, anyway - however, I had success in the past connecting that way (both local and remote).

 

Thanks again!

Link to comment

cheers for the donation :-), quick couple of questions for you, can you access deluge webui outside of your lan, for  example from a smartphone over the internet?, if the answer is yes then can you tell me if you have a vm running as well?, my current theory is that the act of creating a vm enables iptable mangle support, this could be complete BS though :-)

 

ok decided to do some real world testing on my live system, never good but i need to know whats going on. so i have a vm defied andthe vm is running, if i run lsmod then i can indeed see iptable_mangle enabled, this is running unraid 6.1.8. if i then disable auto start on the vm, then reboot unraid and once up issue a lsmod command again then boom!, no iptable_mangle, if i then start the vm, voila iptable_mangle support is magically added!. so thats the end to the mystery, now all i gotta do is talk to jonp about having it enabled all the time :-)

 

@jonp, any thoughts on the above?.

Link to comment

This must have started with 6.1.8 because I am still on 6.1.7 and do not run VM's and this is my LSMOD output (VM manager is disabled currently):

 

root@Tower:~# lsmod
Module                  Size  Used by
kvm_intel             129316  0
kvm                   251426  1 kvm_intel
tun                    16465  2
iptable_mangle          1376  2
xt_nat                  1665  7
veth                    4433  0
ipt_MASQUERADE           981  8
nf_nat_masquerade_ipv4     1649  1 ipt_MASQUERADE
iptable_nat             1615  1
nf_conntrack_ipv4       5626  2
nf_nat_ipv4             4111  1 iptable_nat
iptable_filter          1280  3
ip_tables               9310  3 iptable_filter,iptable_mangle,iptable_nat
nf_nat                  9789  3 nf_nat_ipv4,xt_nat,nf_nat_masquerade_ipv4
md_mod                 30680  3
coretemp                5044  0
i2c_i801                8917  0
e1000e                140774  0
ptp                     8780  1 e1000e
ahci                   24107  5
libahci                18687  1 ahci
pps_core                5672  1 ptp

Link to comment

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.