[Support] binhex - qBittorrentVPN


Recommended Posts

19 hours ago, binhex said:

Support for multi remote endpoints and PIA 'Next-Gen' networks now complete, see Q19 and Q20 for details:-

https://github.com/binhex/documentation/blob/master/docker/faq/vpn.md

Would it be hard to also include Wireguard support for "custom" VPN providers?

Did a test this morning with my VPN provider with OpenVPN got 250Mbps with Wireguard got 790Mbps.

So the upgrade would be great and port forwarding is also supported and working (at least with TorGuard).

 

Thx!

Link to comment
1 hour ago, Kopernikus said:

Would it be hard to also include Wireguard support for "custom" VPN providers?

Did a test this morning with my VPN provider with OpenVPN got 250Mbps with Wireguard got 790Mbps.

So the upgrade would be great and port forwarding is also supported and working (at least with TorGuard).

 

Thx!

i will be looking at wireguard support once im satisfied all current issues with next-gen openvpn are sorted.

  • Thanks 1
Link to comment
9 hours ago, Kopernikus said:

Would it be hard to also include Wireguard support for "custom" VPN providers?

Did a test this morning with my VPN provider with OpenVPN got 250Mbps with Wireguard got 790Mbps.

So the upgrade would be great and port forwarding is also supported and working (at least with TorGuard).

 

Thx!

Good comments from AirVPN providers regarding wireguard: https://airvpn.org/forums/topic/24292-wireguard/?tab=comments#comment-104315

Link to comment
On 9/29/2020 at 7:39 AM, binhex said:

Support for multi remote endpoints and PIA 'Next-Gen' networks now complete, see Q19 and Q20 for details:-

https://github.com/binhex/documentation/blob/master/docker/faq/vpn.md

Tested and confirmed.  Living in the lower Southeast US the next-gen Bahamas & Mexico port forwarding is light years faster than Berlin!

 

Thanks a lot dude.  Your work is always appreciated.

  • Like 1
Link to comment
On 10/1/2020 at 8:44 PM, dtctechs said:

Tested and confirmed.  Living in the lower Southeast US the next-gen Bahamas & Mexico port forwarding is light years faster than Berlin!

 

Thanks a lot dude.  Your work is always appreciated.

Is there a list of next-gen servers that support port forwarding? I know Bahamas & Mexico weren’t on the list for legacy servers.

Link to comment
4 hours ago, wgstarks said:

Is there a list of next-gen servers that support port forwarding? I know Bahamas & Mexico weren’t on the list for legacy servers.

Also curious about this, would be cool if a list of them in the ovpn formatting could be posted in the FAQ for an easy copy/paste.

Edited by TexasUnraid
Link to comment
9 hours ago, TexasUnraid said:

Also curious about this, would be cool if a list of them in the ovpn formatting could be posted in the FAQ for an easy copy/paste.

the list may change over time so this isnt a great solution, a better solution is as follows:-

 

1. connect to any next-gen server

2. monitor the log /config/supervisord.log and it will spit out a list of all the current pia port forward enabled endpoints

3. if you happen to of not chosen one that is in the list then stop the container, edit the file /config/openvpn/<file with a ovpn extension> and change the remote line to match the hostname of one of the servers in the list

4. restart container.

 

the list shown in the log is generated from one of pia's api's and thus should always be up to date.

 

  • Like 1
Link to comment

I checked the log after restarting with a nextgen server and it had this, seems like most of the servers now support port forwarding? Or is something wrong?

2020-10-07 09:31:55,716 DEBG 'start-script' stdout output:
[info] al.privacy.network
[info] ad.privacy.network
[info] austria.privacy.network
[info] brussels.privacy.network
[info] ba.privacy.network
[info] sofia.privacy.network
[info] czech.privacy.network
[info] denmark.privacy.network
[info] ee.privacy.network
[info] fi.privacy.network
[info] france.privacy.network
[info] de-frankfurt.privacy.network

2020-10-07 09:31:55,717 DEBG 'start-script' stdout output:
[info] de-berlin.privacy.network
[info] gr.privacy.network
[info] hungary.privacy.network
[info] is.privacy.network
[info] ireland.privacy.network
[info] man.privacy.network
[info] italy.privacy.network
[info] lv.privacy.network
[info] liechtenstein.privacy.network
[info] lt.privacy.network
[info] lu.privacy.network
[info] mk.privacy.network
[info] malta.privacy.network
[info] md.privacy.network
[info] monaco.privacy.network
[info] montenegro.privacy.network
[info] nl-amsterdam.privacy.network
[info] no.privacy.network
[info] poland.privacy.network
[info] pt.privacy.network
[info] ro.privacy.network
[info] rs.privacy.network
[info] sk.privacy.network

2020-10-07 09:31:55,717 DEBG 'start-script' stdout output:
[info] spain.privacy.network
[info] sweden.privacy.network
[info] swiss.privacy.network
[info] ua.privacy.network
[info] uk-manchester.privacy.network
[info] uk-london.privacy.network
[info] uk-southampton.privacy.network
[info] bahamas.privacy.network
[info] ca-vancouver.privacy.network
[info] ca-ontario.privacy.network
[info] ca-montreal.privacy.network
[info] ca-toronto.privacy.network
[info] greenland.privacy.network
[info] mexico.privacy.network
[info] panama.privacy.network
[info] ar.privacy.network
[info] br.privacy.network
[info] venezuela.privacy.network
[info] yerevan.privacy.network
[info] cambodia.privacy.network
[info] china.privacy.network
[info] cyprus.privacy.network
[info] georgia.privacy.network
[info] hk.privacy.network
[info] in.privacy.network
[info] iran.privacy.network
[info] israel.privacy.network

2020-10-07 09:31:55,717 DEBG 'start-script' stdout output:
[info] japan.privacy.network
[info] kazakhstan.privacy.network
[info] philippines.privacy.network
[info] qatar.privacy.network
[info] saudiarabia.privacy.network
[info] sg.privacy.network
[info] srilanka.privacy.network
[info] taiwan.privacy.network
[info] tr.privacy.network
[info] ae.privacy.network
[info] vietnam.privacy.network
[info] au-sydney.privacy.network
[info] aus-melbourne.privacy.network
[info] aus-perth.privacy.network
[info] nz.privacy.network
[info] dz.privacy.network
[info] egypt.privacy.network
[info] morocco.privacy.network
[info] za.privacy.network

I copy and edited them into this format and will paste them into the ovpn file, is this correct?

 

remote ca-montreal.privacy.network 1198
remote ca-vancouver.privacy.network 1198
remote ca-ontario.privacy.network 1198
remote ca-toronto.privacy.network 1198
remote al.privacy.network 1198
remote ad.privacy.network 1198
remote austria.privacy.network 1198
remote brussels.privacy.network 1198
remote ba.privacy.network 1198
remote sofia.privacy.network 1198
remote czech.privacy.network 1198
remote denmark.privacy.network 1198
remote ee.privacy.network 1198
remote fi.privacy.network 1198
remote france.privacy.network 1198
remote de-frankfurt.privacy.network 1198
remote de-berlin.privacy.network 1198
remote gr.privacy.network 1198
remote hungary.privacy.network 1198
remote is.privacy.network 1198
remote ireland.privacy.network 1198
remote man.privacy.network 1198
remote italy.privacy.network 1198
remote lv.privacy.network 1198
remote liechtenstein.privacy.network 1198
remote lt.privacy.network 1198
remote lu.privacy.network 1198
remote mk.privacy.network 1198
remote malta.privacy.network 1198
remote md.privacy.network 1198
remote monaco.privacy.network 1198
remote montenegro.privacy.network 1198
remote nl-amsterdam.privacy.network 1198
remote no.privacy.network 1198
remote poland.privacy.network 1198
remote pt.privacy.network 1198
remote ro.privacy.network 1198
remote rs.privacy.network 1198
remote sk.privacy.network 1198
remote spain.privacy.network 1198
remote sweden.privacy.network 1198
remote swiss.privacy.network 1198
remote ua.privacy.network 1198
remote uk-manchester.privacy.network 1198
remote uk-london.privacy.network 1198
remote uk-southampton.privacy.network 1198
remote bahamas.privacy.network 1198
remote ca-vancouver.privacy.network 1198
remote ca-ontario.privacy.network 1198
remote ca-montreal.privacy.network 1198
remote ca-toronto.privacy.network 1198
remote greenland.privacy.network 1198
remote mexico.privacy.network 1198
remote panama.privacy.network 1198
remote ar.privacy.network 1198
remote br.privacy.network 1198
remote venezuela.privacy.network 1198
remote yerevan.privacy.network 1198
remote cambodia.privacy.network 1198
remote china.privacy.network 1198
remote cyprus.privacy.network 1198
remote georgia.privacy.network 1198
remote hk.privacy.network 1198
remote in.privacy.network 1198
remote iran.privacy.network 1198
remote israel.privacy.network 1198
remote japan.privacy.network 1198
remote kazakhstan.privacy.network 1198
remote philippines.privacy.network 1198
remote qatar.privacy.network 1198
remote saudiarabia.privacy.network 1198
remote sg.privacy.network 1198
remote srilanka.privacy.network 1198
remote taiwan.privacy.network 1198
remote tr.privacy.network 1198
remote ae.privacy.network 1198
remote vietnam.privacy.network 1198
remote au-sydney.privacy.network 1198
remote aus-melbourne.privacy.network 1198
remote aus-perth.privacy.network 1198
remote nz.privacy.network 1198
remote dz.privacy.network 1198
remote egypt.privacy.network 1198
remote morocco.privacy.network 1198
remote za.privacy.network 1198

 

Link to comment
6 minutes ago, TexasUnraid said:

seems like most of the servers now support port forwarding? Or is something wrong?

nope thats the correct list, next-gen looks to support port forwarding on nearly all servers other than US based servers.

 

7 minutes ago, TexasUnraid said:

I copy and edited them into this format and will paste them into the ovpn file

dont do this unless you want an insanely long startup time as it will need to do a name lookup for each host!., pick the ones you want only.

Link to comment
1 hour ago, binhex said:

nope thats the correct list, next-gen looks to support port forwarding on nearly all servers other than US based servers.

 

dont do this unless you want an insanely long startup time as it will need to do a name lookup for each host!., pick the ones you want only.

lol, I figured that out after restarting and it seemed to hang forever.

 

Ok, cut it down to the servers I use the most and seems to be working!

 

EDIT: Well it is working, it is rotating through the servers but it is also dropping the connection every few minutes now and then having to reconnect to another server?

 

It was stable for the last week or so on the CA nextgen server before this and that is still the first server in the list.

 

It has already looped through all of the servers in the list (5 or 6 of them), it downloads great for like 10-15 mins and then drops the connection.

 

The log viewer doesn't go back far enough to see everything but this is the only thing that stands out to me, 10 tries before this:

 

2020-10-07 11:25:10,161 DEBG 'start-script' stdout output:
[warn] Unable to bind port using URL 'https://*ip here****/bindPort'
[info] 0 retries left
[info] Retrying in 10 secs...

2020-10-07 11:25:20,162 DEBG 'start-script' stdout output:
[warn] Attempting to bind port failed, kill openvpn process to force retry of incoming port

Restarting it now to see if it gets any better.

Edited by TexasUnraid
Link to comment
1 hour ago, TexasUnraid said:

lol, I figured that out after restarting and it seemed to hang forever.

 

Ok, cut it down to the servers I use the most and seems to be working!

 

EDIT: Well it is working, it is rotating through the servers but it is also dropping the connection every few minutes now and then having to reconnect to another server?

 

It was stable for the last week or so on the CA nextgen server before this and that is still the first server in the list.

 

It has already looped through all of the servers in the list (5 or 6 of them), it downloads great for like 10-15 mins and then drops the connection.

 

The log viewer doesn't go back far enough to see everything but this is the only thing that stands out to me, 10 tries before this:

 


2020-10-07 11:25:10,161 DEBG 'start-script' stdout output:
[warn] Unable to bind port using URL 'https://*ip here****/bindPort'
[info] 0 retries left
[info] Retrying in 10 secs...

2020-10-07 11:25:20,162 DEBG 'start-script' stdout output:
[warn] Attempting to bind port failed, kill openvpn process to force retry of incoming port

Restarting it now to see if it gets any better.

Mine has been doing this well

Link to comment
On 11/13/2018 at 7:10 PM, DarkKnight said:

Thanks for developing this container. I'm trying to use Privoxy, but constantly getting "Proxy is not responding" messages when testing it with Chrome. 

 

Log Below:

 


Created by...
___. .__ .__
\_ |__ |__| ____ | |__ ____ ___ ___
| __ \| |/ \| | \_/ __ \\ \/ /
| \_\ \ | | \ Y \ ___/ > <
|___ /__|___| /___| /\___ >__/\_ \
\/ \/ \/ \/ \/
https://hub.docker.com/u/binhex/

2018-11-13 21:48:00.699660 [info] System information Linux 27cb18cb1c3d 4.18.17-unRAID #1 SMP Sun Nov 4 08:16:44 PST 2018 x86_64 GNU/Linux
2018-11-13 21:48:00.749849 [info] PUID defined as '99'
2018-11-13 21:48:00.929923 [info] PGID defined as '100'
2018-11-13 21:48:01.172380 [info] UMASK defined as '000'
2018-11-13 21:48:01.218015 [info] Permissions already set for volume mappings
2018-11-13 21:48:01.268454 [info] VPN_ENABLED defined as 'yes'
2018-11-13 21:48:01.326128 [info] OpenVPN config file (ovpn extension) is located at /config/openvpn/XXXXX-XXXXXXXXXXXXX.ovpn
dos2unix: converting file /config/openvpn/XXXXX-XXXXXXXXXXXXX.ovpn to Unix format...
2018-11-13 21:48:01.400947 [info] VPN remote line defined as 'remote xxxxxxxxxxx.com 443'
2018-11-13 21:48:01.444842 [info] VPN_REMOTE defined as 'xxxxxxxxxxx.com'
2018-11-13 21:48:01.489940 [info] VPN_PORT defined as '443'
2018-11-13 21:48:01.545786 [info] VPN_PROTOCOL defined as 'udp'
2018-11-13 21:48:01.592086 [info] VPN_DEVICE_TYPE defined as 'tun0'
2018-11-13 21:48:01.640001 [info] VPN_PROV defined as 'custom'
2018-11-13 21:48:01.687777 [info] LAN_NETWORK defined as '192.168.1.0/24'
2018-11-13 21:48:01.734800 [info] NAME_SERVERS defined as '8.8.4.4'
2018-11-13 21:48:01.782309 [info] VPN_USER defined as 'XXXXXXXXXXX'
2018-11-13 21:48:01.828605 [info] VPN_PASS defined as 'XXXXXXXXXXX'
2018-11-13 21:48:01.876373 [info] VPN_OPTIONS not defined (via -e VPN_OPTIONS)
2018-11-13 21:48:01.924109 [info] ENABLE_PRIVOXY defined as 'yes'
2018-11-13 21:48:01.972317 [info] WEBUI_PORT defined as '8089'
2018-11-13 21:48:02.024303 [info] Starting Supervisor...
2018-11-13 21:48:02,574 INFO Included extra file "/etc/supervisor/conf.d/qbittorrent.conf" during parsing
2018-11-13 21:48:02,574 INFO Set uid to user 0 succeeded
2018-11-13 21:48:02,579 INFO supervisord started with pid 8
2018-11-13 21:48:03,582 INFO spawned: 'start-script' with pid 143
2018-11-13 21:48:03,585 INFO spawned: 'watchdog-script' with pid 144
2018-11-13 21:48:03,587 INFO spawned: 'privoxy-script' with pid 145
2018-11-13 21:48:03,587 INFO reaped unknown pid 9
2018-11-13 21:48:03,596 DEBG 'start-script' stdout output:
[info] VPN is enabled, beginning configuration of VPN

2018-11-13 21:48:03,597 INFO success: start-script entered RUNNING state, process has stayed up for > than 0 seconds (startsecs)
2018-11-13 21:48:03,597 INFO success: watchdog-script entered RUNNING state, process has stayed up for > than 0 seconds (startsecs)
2018-11-13 21:48:03,597 INFO success: privoxy-script entered RUNNING state, process has stayed up for > than 0 seconds (startsecs)
2018-11-13 21:48:03,598 DEBG 'watchdog-script' stdout output:
[info] qBittorrent config file already exists, skipping copy
[info] Removing session lock file (if it exists)...

2018-11-13 21:48:03,602 DEBG 'watchdog-script' stderr output:
dos2unix:
2018-11-13 21:48:03,603 DEBG 'watchdog-script' stderr output:
converting file /config/qBittorrent/config/qBittorrent.conf to Unix format...

2018-11-13 21:48:03,613 DEBG 'start-script' stdout output:
[warn] Password contains characters which could cause authentication issues, please consider changing this if possible

2018-11-13 21:48:03,713 DEBG 'start-script' stdout output:
[info] Default route for container is 172.17.0.1

2018-11-13 21:48:03,720 DEBG 'start-script' stdout output:
[info] Adding XXXXXXXXXX to /etc/resolv.conf

2018-11-13 21:48:03,725 DEBG 'start-script' stdout output:
[info] Adding XXXXXXXXXXXXX to /etc/resolv.conf

2018-11-13 21:48:03,730 DEBG 'start-script' stdout output:
[info] Adding 1.1.1.1 to /etc/resolv.conf

2018-11-13 21:48:03,735 DEBG 'start-script' stdout output:
[info] Adding 8.8.8.8 to /etc/resolv.conf

2018-11-13 21:48:03,740 DEBG 'start-script' stdout output:
[info] Adding XXXXXXXXXXXXX to /etc/resolv.conf

2018-11-13 21:48:03,745 DEBG 'start-script' stdout output:
[info] Adding XXXXXXXXXXXX to /etc/resolv.conf

2018-11-13 21:48:03,750 DEBG 'start-script' stdout output:
[info] Adding 1.0.0.1 to /etc/resolv.conf

2018-11-13 21:48:03,756 DEBG 'start-script' stdout output:
[info] Adding 8.8.4.4 to /etc/resolv.conf

2018-11-13 21:48:04,067 DEBG 'start-script' stdout output:
[info] Adding 192.168.1.0/24 as route via docker eth0

2018-11-13 21:48:04,068 DEBG 'start-script' stdout output:
[info] ip route defined as follows...
--------------------

2018-11-13 21:48:04,070 DEBG 'start-script' stdout output:
default via 172.17.0.1 dev eth0
172.17.0.0/16 dev eth0 proto kernel scope link src 172.17.0.9
192.168.1.0/24 via 172.17.0.1 dev eth0

2018-11-13 21:48:04,070 DEBG 'start-script' stdout output:
--------------------

2018-11-13 21:48:04,076 DEBG 'start-script' stdout output:
iptable_mangle 16384 1
ip_tables 24576 3 iptable_filter,iptable_nat,iptable_mangle

2018-11-13 21:48:04,077 DEBG 'start-script' stdout output:
[info] iptable_mangle support detected, adding fwmark for tables

2018-11-13 21:48:04,108 DEBG 'start-script' stdout output:
[info] Docker network defined as 172.17.0.0/16

2018-11-13 21:48:04,215 DEBG 'start-script' stdout output:
[info] iptables defined as follows...
--------------------

2018-11-13 21:48:04,219 DEBG 'start-script' stdout output:
-P INPUT DROP
-P FORWARD ACCEPT
-P OUTPUT DROP
-A INPUT -i tun0 -j ACCEPT
-A INPUT -s 172.17.0.0/16 -d 172.17.0.0/16 -j ACCEPT
-A INPUT -i eth0 -p udp -m udp --sport 443 -j ACCEPT
-A INPUT -i eth0 -p tcp -m tcp --dport 8089 -j ACCEPT
-A INPUT -i eth0 -p tcp -m tcp --sport 8089 -j ACCEPT
-A INPUT -s 192.168.1.0/24 -i eth0 -p tcp -m tcp --dport 8089 -j ACCEPT
-A INPUT -s 192.168.1.0/24 -d 172.17.0.0/16 -i eth0 -p tcp -j ACCEPT
-A INPUT -p icmp -m icmp --icmp-type 0 -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A OUTPUT -o tun0 -j ACCEPT
-A OUTPUT -s 172.17.0.0/16 -d 172.17.0.0/16 -j ACCEPT
-A OUTPUT -o eth0 -p udp -m udp --dport 443 -j ACCEPT
-A OUTPUT -o eth0 -p tcp -m tcp --dport 8089 -j ACCEPT
-A OUTPUT -o eth0 -p tcp -m tcp --sport 8089 -j ACCEPT
-A OUTPUT -d 192.168.1.0/24 -o eth0 -p tcp -m tcp --sport 8089 -j ACCEPT
-A OUTPUT -s 172.17.0.0/16 -d 192.168.1.0/24 -o eth0 -p tcp -j ACCEPT
-A OUTPUT -p icmp -m icmp --icmp-type 8 -j ACCEPT
-A OUTPUT -o lo -j ACCEPT

2018-11-13 21:48:04,219 DEBG 'start-script' stdout output:
--------------------

2018-11-13 21:48:04,220 DEBG 'start-script' stdout output:
[info] Starting OpenVPN...

2018-11-13 21:48:04,253 DEBG 'start-script' stdout output:
Tue Nov 13 21:48:04 2018 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6

Tue Nov 13 21:48:04 2018 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6


2018-11-13 21:48:04,254 DEBG 'start-script' stdout output:
Tue Nov 13 21:48:04 2018 WARNING: file 'credentials.conf' is group or others accessible

Tue Nov 13 21:48:04 2018 OpenVPN 2.4.6 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Apr 24 2018
Tue Nov 13 21:48:04 2018 library versions: OpenSSL 1.1.1 11 Sep 2018, LZO 2.10

2018-11-13 21:48:04,255 DEBG 'start-script' stdout output:
Tue Nov 13 21:48:04 2018 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
[info] OpenVPN started

2018-11-13 21:48:04,256 DEBG 'start-script' stdout output:
Tue Nov 13 21:48:04 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]xx.xx.xx.50:443
Tue Nov 13 21:48:04 2018 Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Nov 13 21:48:04 2018 UDP link local: (not bound)
Tue Nov 13 21:48:04 2018 UDP link remote: [AF_INET]xx.xx.xx.50:443

2018-11-13 21:48:04,263 DEBG 'start-script' stdout output:
Tue Nov 13 21:48:04 2018 TLS: Initial packet from [AF_INET]xx.xx.xx.50:443, sid=a6d0612f f3f8f70c

2018-11-13 21:48:04,282 DEBG 'start-script' stdout output:
Tue Nov 13 21:48:04 2018 VERIFY OK: depth=1, C=US, ST=FL, L=Location, O=XXXXX, OU=XXXXX VPN, CN=XXXXX CA, [email protected]

2018-11-13 21:48:04,283 DEBG 'start-script' stdout output:
Tue Nov 13 21:48:04 2018 VERIFY X509NAME OK: C=US, ST=FL, L=Location, O=XXXXX, OU=XXXXX VPN, CN=xxxxxxxxxxx.com, [email protected]
Tue Nov 13 21:48:04 2018 VERIFY OK: depth=0, C=US, ST=FL, L=Location, O=XXXXX, OU=XXXXX VPN, CN=xxxxxxxxxxx.com, [email protected]

2018-11-13 21:48:04,335 DEBG 'start-script' stdout output:
Tue Nov 13 21:48:04 2018 Control Channel: TLSv1.2, cipher SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Tue Nov 13 21:48:04 2018 [xxxxxxxxxxx.com] Peer Connection Initiated with [AF_INET]xx.xx.xx.50:443

2018-11-13 21:48:05,360 DEBG 'start-script' stdout output:
Tue Nov 13 21:48:05 2018 SENT CONTROL [xxxxxxxxxxx.com]: 'PUSH_REQUEST' (status=1)

2018-11-13 21:48:05,368 DEBG 'start-script' stdout output:
Tue Nov 13 21:48:05 2018 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS XXXXXXX,dhcp-option DNS XXXXXXXXXXX,rcvbuf 493216,sndbuf 493216,explicit-exit-notify 5,comp-lzo no,route-gateway xx.xx.xx.1,topology subnet,ping 20,ping-restart 40,ifconfig xx.xx.xx.55 255.255.254.0,peer-id 9,cipher AES-256-GCM'

2018-11-13 21:48:05,369 DEBG 'start-script' stdout output:
Tue Nov 13 21:48:05 2018 OPTIONS IMPORT: timers and/or timeouts modified
Tue Nov 13 21:48:05 2018 OPTIONS IMPORT: explicit notify parm(s) modified
Tue Nov 13 21:48:05 2018 OPTIONS IMPORT: compression parms modified
Tue Nov 13 21:48:05 2018 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Tue Nov 13 21:48:05 2018 Socket Buffers: R=[212992->986432] S=[212992->986432]
Tue Nov 13 21:48:05 2018 OPTIONS IMPORT: --ifconfig/up options modified
Tue Nov 13 21:48:05 2018 OPTIONS IMPORT: route options modified
Tue Nov 13 21:48:05 2018 OPTIONS IMPORT: route-related options modified
Tue Nov 13 21:48:05 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Tue Nov 13 21:48:05 2018 OPTIONS IMPORT: peer-id set
Tue Nov 13 21:48:05 2018 OPTIONS IMPORT: adjusting link_mtu to 1625
Tue Nov 13 21:48:05 2018 OPTIONS IMPORT: data channel crypto options modified
Tue Nov 13 21:48:05 2018 Data Channel: using negotiated cipher 'AES-256-GCM'
Tue Nov 13 21:48:05 2018 NCP: overriding user-set keysize with default
Tue Nov 13 21:48:05 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Nov 13 21:48:05 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Nov 13 21:48:05 2018 ROUTE_GATEWAY 172.17.0.1/255.255.0.0 IFACE=eth0 HWADDR=XXXXXXXXXXXXXXX
Tue Nov 13 21:48:05 2018 TUN/TAP device tun0 opened
Tue Nov 13 21:48:05 2018 TUN/TAP TX queue length set to 100
Tue Nov 13 21:48:05 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0

2018-11-13 21:48:05,370 DEBG 'start-script' stdout output:
Tue Nov 13 21:48:05 2018 /usr/bin/ip link set dev tun0 up mtu 1500

2018-11-13 21:48:05,371 DEBG 'start-script' stdout output:
Tue Nov 13 21:48:05 2018 /usr/bin/ip addr add dev tun0 xx.xx.xx.55/23 broadcast XXXXXXXXXX

2018-11-13 21:48:05,373 DEBG 'start-script' stdout output:
Tue Nov 13 21:48:05 2018 /root/openvpnup.sh tun0 1500 1553 xx.xx.xx.55 255.255.254.0 init

2018-11-13 21:48:05,377 DEBG 'start-script' stdout output:
Tue Nov 13 21:48:05 2018 /usr/bin/ip route add xx.xx.xx.50/32 via 172.17.0.1

2018-11-13 21:48:05,379 DEBG 'start-script' stdout output:
Tue Nov 13 21:48:05 2018 /usr/bin/ip route add 0.0.0.0/1 via xx.xx.xx.1

2018-11-13 21:48:05,381 DEBG 'start-script' stdout output:
Tue Nov 13 21:48:05 2018 /usr/bin/ip route add 128.0.0.0/1 via xx.xx.xx.1

2018-11-13 21:48:05,382 DEBG 'start-script' stdout output:
Tue Nov 13 21:48:05 2018 Initialization Sequence Completed

2018-11-13 21:48:05,471 DEBG 'privoxy-script' stdout output:
[info] Configuring Privoxy...

2018-11-13 21:48:05,475 DEBG 'watchdog-script' stdout output:
[info] qBittorrent listening interface IP 0.0.0.0 and VPN provider IP xx.xx.xx.55 different, marking for reconfigure

2018-11-13 21:48:05,481 DEBG 'watchdog-script' stdout output:
[info] qBittorrent not running

2018-11-13 21:48:05,548 DEBG 'start-script' stdout output:
[info] Successfully retrieved external IP address xx.xx.xx.50

2018-11-13 21:48:05,584 DEBG 'watchdog-script' stdout output:
[info] Removing session lock file (if it exists)...

2018-11-13 21:48:05,586 DEBG 'watchdog-script' stdout output:
[info] Attempting to start qBittorrent...

2018-11-13 21:48:05,655 DEBG 'watchdog-script' stdout output:
[info] qBittorrent process started
[info] Waiting for qBittorrent process to start listening on port 8089...

2018-11-13 21:48:07,183 DEBG 'privoxy-script' stdout output:
[info] All checks complete, starting Privoxy...

2018-11-13 21:48:07,185 DEBG 'privoxy-script' stderr output:
2018-11-13 21:48:07.185 152fa106b100 Info: Privoxy version 3.0.26

2018-11-13 21:48:07.185 152fa106b100 Info: Program name: /usr/bin/privoxy

2018-11-13 21:48:35,938 DEBG 'watchdog-script' stdout output:
[info] qBittorrent running

 

 

there is also a limit on number of remote lines in a config file, you will only be able to add like 50 or so. 

 

BinHex- is there a set a bittorrent port range with your docker instead of it being randomly assigned? I tried setting it in the qb config file but it ignores that.

 

Link to comment

Hi everyone,

Perhaps someone can help me, please. I have this container running on a NAS (Nimbustor 4). I have a gigabit connection. With VPN (PIA) turned on I can reach around 25MB max download speed. The problem I'm having is that while downloading near the top limit the upload speed drops to practically 0. If I throttle the download speed to around 10MB the upload is fine. Is this normal? Is this a hardware limitation or maybe  there's some setting I can change to improve this?

Thank you.

Link to comment
3 hours ago, TrCl said:

Hi everyone,

Perhaps someone can help me, please. I have this container running on a NAS (Nimbustor 4). I have a gigabit connection. With VPN (PIA) turned on I can reach around 25MB max download speed. The problem I'm having is that while downloading near the top limit the upload speed drops to practically 0. If I throttle the download speed to around 10MB the upload is fine. Is this normal? Is this a hardware limitation or maybe  there's some setting I can change to improve this?

Thank you.

Do you get the same results on different PIA servers? Are you using nextgen servers? Are you using servers that have port forwarding?

Link to comment
1 hour ago, ChadwickTheCrab said:

Do you get the same results on different PIA servers? Are you using nextgen servers? Are you using servers that have port forwarding?

Hi Chadwick,

 

Thanks for your reply.

 

I put 4 or 5 servers on the ovpn file. And they all seem to behave the same. I'm using next gen servers and portforwarding seems to be working. Both openvpn and wireguard produce the same result, although with wireguard I can reach higher speeds. I can reach good upload speeds, 10MB+. My problem is it seems to "choke" while downloading something above 20MB speed.

Link to comment
4 minutes ago, wgstarks said:

I had to use a custom port in place of 8080 (unifi is using that). Set it to 8088:8088 for the path and 8088 for the web variable. I thought this would allow me to select webui on the docker logo but that just takes me to the unifi docker login. Did I miss something else?

On the Docker config click advanced, then change the WebUI line

 

http://[IP]:[PORT:8888]/

  • Thanks 1
Link to comment
5 minutes ago, sdub said:

On the Docker config click advanced, then change the WebUI line

 

http://[IP]:[PORT:8888]/

Did you mean 8088?

 

10 minutes ago, wgstarks said:

Set it to 8088:8088 for the path and 8088 for the web variable

Unless you changed the listening port in qB, I think you want to map 8088 to host and 8080 to container. Assuming you are using a bridge.

Link to comment
3 minutes ago, jonathanm said:

Did you mean 8088?

 

Unless you changed the listening port in qB, I think you want to map 8088 to host and 8080 to container. Assuming you are using a bridge.

 

On 11/12/2018 at 3:04 PM, binhex said:

Yeah the secret sauce here is that not only do you need to change the host side port but you also have to change the container side port too to match. so this is a bit more tricky with the unraid web ui, as unraid rightly stops users doing this as you normally don't want to change the container port side but for this particular container we have to.

 

So in order to get around this you need to edit the container and then use the link down the bottom shown as "Add another Path, Port, Variable, Label or Device", select "config type" as "port" then put in the port number you want for both the "container port" and "host port" and then click "add".

 

So now you have added the additional port you can now remove the old port, as this will now clash on the host port if you have already altered it.

 

Remember - Make sure to set the  webui_port to the same value and then click on "apply" button to apply the changes.

 

Finally open up your favourite browser and point it at the http://<host ip address>:<port of your choice>

I changed the host and container port as well as the webui port. All set to 8088.

Link to comment

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.