binhex / arch-delugevpn

Docker build script for Arch Linux base with Deluge, Privoxy and OpenVPN
GNU General Public License v3.0
690 stars 112 forks source link

Custom VPN Provider (!=PIA) Results in No Incoming Port Assignment #336

Closed billrweber closed 1 year ago

billrweber commented 1 year ago

Using ProtonVPN as my VPN provider and getting slow up/down. I think it's because I'm leeching unintentionally.

What I'm seeing is potentially useful, maybe not. But the log suggests that since this isn't PIA that it isn't handling incoming port requests. I'm using protonvpn and the entries I've put into the openvpn folder in the config allow for incoming ports. Here is the log excerpt that I'm flagging.

2022-11-01 11:51:32,283 DEBG 'start-script' stdout output: [info] Successfully retrieved external IP address 185.159.157.45 [info] Application does not require port forwarding or VPN provider is != pia, skipping incoming port assignment

So three questions.

  1. Am I to assume that this error message indicates that the container is not taking advantage of and configuring Deluge to accept a specified incoming port?
  2. Am I to assume that such functionality is limited to PIA? If so, is there a workaround when using !=PIA as a provider?
    If so, can anyone point out that information?
  3. Is there anything else obviously wrong in this configuration that would result in reduced speed?
    I would love to be a productive partner, but this feels like I don't have the right building blocks to make that happen.

As always, your help is very much appreciated.

==========Environment========== 2.5Gb LAN Connection / 10Gb LAN Switch & FW / 2Gb WAN Internet Connection Portainer 2.15.1 / Docker 20.10.18 / Ubuntu 22.04.01 LTS / Kernel 5.15.0-48-generic AMD64

==========Container Capabilities========== NET_ADMIN: enabled

==========Container Volumes========== /data:/mnt/nas01/workarea/transport/deluge/mpc-node1 /config:/mnt/nas01/workarea/config/deluge/mpc-node1

==========Container ENV Variables========== VPN_USER= VPN_PASS= VPN_ENABLED=yes VPN_PROV=CUSTOM VPN_CLIENT=openvpn STRICT_PORT_FORWARD=yes ENABLE_PRIVOXY=yes LAN_NETWORK=10.10.0.0/16 NAME_SERVERS=84.200.69.80,37.235.1.174,1.1.1.1,37.235.1.177,84.200.70.40,1.0.0.1 DELUGE_DAEMON_LOG_LEVEL=info DELUGE_WEB_LOG_LEVEL=info DEBUG=false UMASK=000 PUID=3000 PGID=3000 PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin HOME=/home/nobody TERM=xterm LANG=en_GB.UTF-8

==========Container core.conf========== { "file": 1, "format": 1 }{ "add_paused": false, "allow_remote": true, "auto_manage_prefer_seeds": false, "auto_managed": true, "cache_expiry": 60, "cache_size": 512, "copy_torrent_file": true, "daemon_port": 58846, "del_copy_torrent_file": false, "dht": true, "dont_count_slow_torrents": true, "download_location": "/data/incomplete", "download_location_paths_list": [], "enable_incoming_tcp": false, "enable_incoming_utp": false, "enable_outgoing_utp": false, "enabled_plugins": [ "AutoAdd", "Blocklist", "Label" ], "enc_in_policy": 1, "enc_level": 2, "enc_out_policy": 1, "geoip_db_location": "/usr/share/GeoIP/GeoIP.dat", "ignore_limits_on_local_network": true, "info_sent": 0.0, "listen_interface": "10.16.0.2", "listen_ports": [ 0, 0 ], "listen_random_port": null, "listen_reuse_port": true, "listen_use_sys_port": false, "lsd": true, "max_active_downloading": 40, "max_active_limit": 80, "max_active_seeding": 40, "max_connections_global": -1, "max_connections_per_second": 20, "max_connections_per_torrent": -1, "max_download_speed": -1.0, "max_download_speed_per_torrent": -1, "max_half_open_connections": 50, "max_upload_slots_global": -1, "max_upload_slots_per_torrent": -1, "max_upload_speed": -1.0, "max_upload_speed_per_torrent": -1, "move_completed": true, "move_completed_path": "/data/complete", "move_completed_paths_list": [], "natpmp": true, "new_release_check": true, "outgoing_interface": "tun0", "outgoing_ports": [ 0, 0 ], "path_chooser_accelerator_string": "Tab", "path_chooser_auto_complete_enabled": true, "path_chooser_max_popup_rows": 20, "path_chooser_show_chooser_button_on_localhost": true, "path_chooser_show_hidden_files": false, "peer_tos": "0x00", "plugins_location": "/config/plugins", "pre_allocate_storage": false, "prioritize_first_last_pieces": true, "proxy": { "anonymous_mode": false, "force_proxy": false, "hostname": "", "password": "", "port": 8080, "proxy_hostnames": true, "proxy_peer_connections": true, "proxy_tracker_connections": true, "type": 0, "username": "" }, "queue_new_to_top": true, "random_outgoing_ports": true, "random_port": false, "rate_limit_ip_overhead": false, "remove_seed_at_ratio": true, "seed_time_limit": 5760, "seed_time_ratio_limit": 100.0, "send_info": false, "sequential_download": false, "share_ratio_limit": 3.0, "shared": false, "stop_seed_at_ratio": true, "stop_seed_ratio": 5.0, "super_seeding": false, "torrentfiles_location": "/data/torrents", "upnp": true, "utpex": true

==========Container LOG File========== ' Created by... . . . \ | || __ | | __ | | |/ | | _/ \ \/ / | _\ \ | | \ Y \ / > < | /|__| /| /_ >/_ \ \/ \/ \/ \/ \/ https://hub.docker.com/u/binhex/

2022-11-01 11:51:06.193656 [info] System information Linux 64fd47ea97ad 5.15.0-48-generic #54-Ubuntu SMP Fri Aug 26 13:26:29 UTC 2022 x86_64 GNU/Linux 2022-11-01 11:51:06.213149 [info] OS_ARCH defined as 'x86-64' 2022-11-01 11:51:06.239052 [info] PUID defined as '3000' 2022-11-01 11:51:06.259854 [info] PGID defined as '3000' 2022-11-01 11:51:06.287106 [info] UMASK defined as '000' 2022-11-01 11:51:06.309734 [info] Permissions already set for '/config' 2022-11-01 11:51:06.337144 [info] Deleting files in /tmp (non recursive)... 2022-11-01 11:51:06.360521 [info] VPN_ENABLED defined as 'yes' 2022-11-01 11:51:06.380626 [info] VPN_CLIENT defined as 'openvpn' 2022-11-01 11:51:06.404784 [info] VPN_PROV defined as 'CUSTOM' 2022-11-01 11:51:07.504730 [info] OpenVPN config file (ovpn extension) is located at /config/openvpn/node-ch-08.protonvpn.net.udp.ovpn 2022-11-01 11:51:07.627497 [info] VPN remote server(s) defined as '185.159.157.23,185.159.157.23,185.159.157.23,185.159.157.23,185.159.157.23,' 2022-11-01 11:51:07.649151 [info] VPN remote port(s) defined as '1194,51820,5060,80,4569,' 2022-11-01 11:51:07.671602 [info] VPN remote protcol(s) defined as 'udp,udp,udp,udp,udp,' 2022-11-01 11:51:07.696234 [info] VPN_DEVICE_TYPE defined as 'tun0' 2022-11-01 11:51:07.720438 [info] VPN_OPTIONS not defined (via -e VPN_OPTIONS) 2022-11-01 11:51:07.740760 [info] LAN_NETWORK defined as '10.10.0.0/16' 2022-11-01 11:51:07.764054 [info] NAME_SERVERS defined as '84.200.69.80,37.235.1.174,1.1.1.1,37.235.1.177,84.200.70.40,1.0.0.1' 2022-11-01 11:51:07.784480 [info] VPN_USER defined as '' 2022-11-01 11:51:07.804868 [info] VPN_PASS defined as '' 2022-11-01 11:51:07.825564 [info] ENABLE_PRIVOXY defined as 'yes' 2022-11-01 11:51:07.851817 [info] VPN_INPUT_PORTS not defined (via -e VPN_INPUT_PORTS), skipping allow for custom incoming ports 2022-11-01 11:51:07.872218 [info] VPN_OUTPUT_PORTS not defined (via -e VPN_OUTPUT_PORTS), skipping allow for custom outgoing ports 2022-11-01 11:51:07.892669 [info] DELUGE_DAEMON_LOG_LEVEL defined as 'info' 2022-11-01 11:51:07.913147 [info] DELUGE_WEB_LOG_LEVEL defined as 'info' 2022-11-01 11:51:08.036802 [info] Starting Supervisor... 2022-11-01 11:51:08,335 INFO Included extra file "/etc/supervisor/conf.d/delugevpn.conf" during parsing 2022-11-01 11:51:08,373 INFO Set uid to user 0 succeeded 2022-11-01 11:51:08,476 INFO supervisord started with pid 7 2022-11-01 11:51:09,730 INFO spawned: 'start-script' with pid 238 2022-11-01 11:51:09,780 INFO spawned: 'watchdog-script' with pid 239 2022-11-01 11:51:09,839 INFO reaped unknown pid 8 (exit status 0) 2022-11-01 11:51:09,881 DEBG 'start-script' stdout output: [info] VPN is enabled, beginning configuration of VPN

2022-11-01 11:51:09,936 INFO success: start-script entered RUNNING state, process has stayed up for > than 0 seconds (startsecs) 2022-11-01 11:51:10,007 INFO success: watchdog-script entered RUNNING state, process has stayed up for > than 0 seconds (startsecs) 2022-11-01 11:51:15,665 DEBG 'start-script' stdout output: [info] Adding 84.200.69.80 to /etc/resolv.conf

2022-11-01 11:51:15,708 DEBG 'start-script' stdout output: [info] Adding 37.235.1.174 to /etc/resolv.conf [info] Adding 1.1.1.1 to /etc/resolv.conf [info] Adding 37.235.1.177 to /etc/resolv.conf [info] Adding 84.200.70.40 to /etc/resolv.conf [info] Adding 1.0.0.1 to /etc/resolv.conf 185.159.157.23 185.159.157.23 185.159.157.23 185.159.157.23 185.159.157.23 [info] Attempting to load tun kernel module...

2022-11-01 11:51:15,795 DEBG 'start-script' stdout output: [warn] Unable to load tun kernel module using modprobe, trying insmod... [warn] Unable to load tun kernel module, assuming its dynamically loaded [info] Default route for container is 172.17.0.1 [info] Docker network defined as 172.17.0.0/16 [info] Adding 10.10.0.0/16 as route via docker eth0 [info] ip route defined as follows...

default via 172.17.0.1 dev eth0 10.10.0.0/16 via 172.17.0.1 dev eth0 172.17.0.0/16 dev eth0 proto kernel scope link src 172.17.0.3 local 127.0.0.0/8 dev lo table local proto kernel scope host src 127.0.0.1 local 127.0.0.1 dev lo table local proto kernel scope host src 127.0.0.1 broadcast 127.255.255.255 dev lo table local proto kernel scope link src 127.0.0.1 local 172.17.0.3 dev eth0 table local proto kernel scope host src 172.17.0.3 broadcast 172.17.255.255 dev eth0 table local proto kernel scope link src 172.17.0.3

iptable_mangle 16384 1 ip_tables 32768 4 iptable_filter,iptable_mangle x_tables 53248 10 xt_conntrack,iptable_filter,nft_compat,xt_tcpudp,xt_addrtype,xt_nat,ip_tables,xt_MASQUERADE,iptable_mangle,xt_mark [info] iptable_mangle support detected, adding fwmark for tables

2022-11-01 11:51:15,872 DEBG 'start-script' stderr output: modprobe: FATAL: Module tun not found in directory /lib/modules/5.15.0-48-generic insmod: ERROR: could not load module /lib/modules/tun.ko: No such file or directory

2022-11-01 11:51:15,914 DEBG 'start-script' stdout output: [info] iptables defined as follows...

-P INPUT DROP -P FORWARD DROP -P OUTPUT DROP -A INPUT -s 172.17.0.0/16 -d 172.17.0.0/16 -j ACCEPT -A INPUT -s 185.159.157.23/32 -i eth0 -j ACCEPT -A INPUT -s 185.159.157.23/32 -i eth0 -j ACCEPT -A INPUT -s 185.159.157.23/32 -i eth0 -j ACCEPT -A INPUT -s 185.159.157.23/32 -i eth0 -j ACCEPT -A INPUT -s 185.159.157.23/32 -i eth0 -j ACCEPT -A INPUT -i eth0 -p tcp -m tcp --dport 8112 -j ACCEPT -A INPUT -i eth0 -p udp -m udp --dport 8112 -j ACCEPT -A INPUT -s 10.10.0.0/16 -d 172.17.0.0/16 -i eth0 -p tcp -m tcp --dport 58846 -j ACCEPT -A INPUT -s 10.10.0.0/16 -d 172.17.0.0/16 -i eth0 -p tcp -m tcp --dport 8118 -j ACCEPT -A INPUT -p icmp -m icmp --icmp-type 0 -j ACCEPT -A INPUT -i lo -j ACCEPT -A INPUT -i tun0 -j ACCEPT -A OUTPUT -s 172.17.0.0/16 -d 172.17.0.0/16 -j ACCEPT -A OUTPUT -d 185.159.157.23/32 -o eth0 -j ACCEPT -A OUTPUT -d 185.159.157.23/32 -o eth0 -j ACCEPT -A OUTPUT -d 185.159.157.23/32 -o eth0 -j ACCEPT -A OUTPUT -d 185.159.157.23/32 -o eth0 -j ACCEPT -A OUTPUT -d 185.159.157.23/32 -o eth0 -j ACCEPT -A OUTPUT -o eth0 -p tcp -m tcp --sport 8112 -j ACCEPT -A OUTPUT -o eth0 -p udp -m udp --sport 8112 -j ACCEPT -A OUTPUT -s 172.17.0.0/16 -d 10.10.0.0/16 -o eth0 -p tcp -m tcp --sport 58846 -j ACCEPT -A OUTPUT -s 172.17.0.0/16 -d 10.10.0.0/16 -o eth0 -p tcp -m tcp --sport 8118 -j ACCEPT -A OUTPUT -p icmp -m icmp --icmp-type 8 -j ACCEPT -A OUTPUT -o lo -j ACCEPT -A OUTPUT -o tun0 -j ACCEPT

[info] Starting OpenVPN (non daemonised)... 2022-11-01 11:51:15 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. 2022-11-01 11:51:15 WARNING: file 'credentials.conf' is group or others accessible 2022-11-01 11:51:15 OpenVPN 2.5.7 [git:makepkg/a0f9a3e9404c8321+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 31 2022 2022-11-01 11:51:15 library versions: OpenSSL 1.1.1q 5 Jul 2022, LZO 2.10 2022-11-01 11:51:15 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts 2022-11-01 11:51:15 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication 2022-11-01 11:51:15 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication 2022-11-01 11:51:15 TCP/UDP: Preserving recently used remote address: [AF_INET]185.159.157.23:1194 2022-11-01 11:51:15 Socket Buffers: R=[212992->212992] S=[212992->212992] 2022-11-01 11:51:15 UDP link local: (not bound) 2022-11-01 11:51:15 UDP link remote: [AF_INET]185.159.157.23:1194

2022-11-01 11:51:15,974 DEBG 'start-script' stdout output: 2022-11-01 11:51:15 TLS: Initial packet from [AF_INET]185.159.157.23:1194, sid=4e20d254 cdffe151

2022-11-01 11:51:16,356 DEBG 'start-script' stdout output: 2022-11-01 11:51:16 VERIFY OK: depth=2, C=CH, O=ProtonVPN AG, CN=ProtonVPN Root CA

2022-11-01 11:51:16,418 DEBG 'start-script' stdout output: 2022-11-01 11:51:16 VERIFY OK: depth=1, C=CH, O=ProtonVPN AG, CN=ProtonVPN Intermediate CA 1 2022-11-01 11:51:16 VERIFY KU OK 2022-11-01 11:51:16 Validating certificate extended key usage 2022-11-01 11:51:16 ++ Certificate has EKU (str) 1.3.6.1.5.5.8.2.2, expects TLS Web Server Authentication 2022-11-01 11:51:16 ++ Certificate has EKU (oid) 1.3.6.1.5.5.8.2.2, expects TLS Web Server Authentication 2022-11-01 11:51:16 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication 2022-11-01 11:51:16 VERIFY EKU OK 2022-11-01 11:51:16 VERIFY OK: depth=0, CN=node-ch-08.protonvpn.net

2022-11-01 11:51:16,482 DEBG 'start-script' stdout output: 2022-11-01 11:51:16 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1634' 2022-11-01 11:51:16 WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo' 2022-11-01 11:51:16 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA256 2022-11-01 11:51:16 [node-ch-08.protonvpn.net] Peer Connection Initiated with [AF_INET]185.159.157.23:1194

2022-11-01 11:51:17,536 DEBG 'start-script' stdout output: 2022-11-01 11:51:17 SENT CONTROL [node-ch-08.protonvpn.net]: 'PUSH_REQUEST' (status=1)

2022-11-01 11:51:17,615 DEBG 'start-script' stdout output: 2022-11-01 11:51:17 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.16.0.1,sndbuf 524288,rcvbuf 524288,redirect-gateway def1,explicit-exit-notify,comp-lzo no,route-gateway 10.16.0.1,topology subnet,ping 10,ping-restart 60,socket-flags TCP_NODELAY,ifconfig 10.16.0.2 255.255.0.0,peer-id 0,cipher AES-256-GCM' 2022-11-01 11:51:17 OPTIONS IMPORT: timers and/or timeouts modified 2022-11-01 11:51:17 OPTIONS IMPORT: explicit notify parm(s) modified 2022-11-01 11:51:17 OPTIONS IMPORT: compression parms modified 2022-11-01 11:51:17 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified 2022-11-01 11:51:17 Socket Buffers: R=[212992->425984] S=[212992->425984] 2022-11-01 11:51:17 OPTIONS IMPORT: --socket-flags option modified 2022-11-01 11:51:17 NOTE: setsockopt TCP_NODELAY=1 failed 2022-11-01 11:51:17 OPTIONS IMPORT: --ifconfig/up options modified 2022-11-01 11:51:17 OPTIONS IMPORT: route options modified 2022-11-01 11:51:17 OPTIONS IMPORT: route-related options modified 2022-11-01 11:51:17 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified 2022-11-01 11:51:17 OPTIONS IMPORT: peer-id set 2022-11-01 11:51:17 OPTIONS IMPORT: adjusting link_mtu to 1656 2022-11-01 11:51:17 OPTIONS IMPORT: data channel crypto options modified 2022-11-01 11:51:17 Data Channel: using negotiated cipher 'AES-256-GCM' 2022-11-01 11:51:17 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 2022-11-01 11:51:17 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 2022-11-01 11:51:17 net_route_v4_best_gw query: dst 0.0.0.0 2022-11-01 11:51:17 net_route_v4_best_gw result: via 172.17.0.1 dev eth0 2022-11-01 11:51:17 ROUTE_GATEWAY 172.17.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:11:00:03 2022-11-01 11:51:17 TUN/TAP device tun0 opened 2022-11-01 11:51:17 net_iface_mtu_set: mtu 1500 for tun0 2022-11-01 11:51:17 net_iface_up: set tun0 up 2022-11-01 11:51:17 net_addr_v4_add: 10.16.0.2/16 dev tun0 2022-11-01 11:51:17 /root/openvpnup.sh tun0 1500 1584 10.16.0.2 255.255.0.0 init 2022-11-01 11:51:17 net_route_v4_add: 185.159.157.23/32 via 172.17.0.1 dev [NULL] table 0 metric -1 2022-11-01 11:51:17 net_route_v4_add: 0.0.0.0/1 via 10.16.0.1 dev [NULL] table 0 metric -1 2022-11-01 11:51:17 net_route_v4_add: 128.0.0.0/1 via 10.16.0.1 dev [NULL] table 0 metric -1 2022-11-01 11:51:17 Initialization Sequence Completed egrep: warning: egrep is obsolescent; using grep -E

2022-11-01 11:51:18,599 DEBG 'start-script' stdout output: egrep: warning: egrep is obsolescent; using grep -E

2022-11-01 11:51:18,634 DEBG 'start-script' stdout output: egrep: warning: egrep is obsolescent; using grep -E

2022-11-01 11:51:23,748 DEBG 'start-script' stdout output: [info] Attempting to get external IP using 'http://checkip.amazonaws.com'...

2022-11-01 11:51:32,240 DEBG 'start-script' stdout output: egrep: warning: egrep is obsolescent; using grep -E

2022-11-01 11:51:32,283 DEBG 'start-script' stdout output: [info] Successfully retrieved external IP address 185.159.157.45 [info] Application does not require port forwarding or VPN provider is != pia, skipping incoming port assignment

2022-11-01 11:51:33,780 DEBG 'watchdog-script' stdout output: [info] Deluge listening interface IP 0.0.0.0 and VPN provider IP 10.16.0.2 different, marking for reconfigure

2022-11-01 11:51:33,817 DEBG 'watchdog-script' stdout output: [info] Deluge not running [info] Deluge Web UI not running [info] Privoxy not running [info] Attempting to start Deluge... [info] Removing deluge pid file (if it exists)...

2022-11-01 11:51:34,966 DEBG 'watchdog-script' stdout output: [info] Deluge key 'listen_interface' currently has a value of '10.16.0.4' [info] Deluge key 'listen_interface' will have a new value '10.16.0.2' [info] Writing changes to Deluge config file '/config/core.conf'...

2022-11-01 11:51:35,190 DEBG 'watchdog-script' stdout output: [info] Deluge key 'outgoing_interface' currently has a value of 'tun0' [info] Deluge key 'outgoing_interface' will have a new value 'tun0' [info] Writing changes to Deluge config file '/config/core.conf'...

2022-11-01 11:51:35.2240 DEBG 'watchdog-script' stdout output: [info] Deluge key 'key value' currently has a value of 'https://youtu.be/xm3YgoEiEDc'

2022-11-01 11:51:35,415 DEBG 'watchdog-script' stdout output: [info] Deluge key 'default_daemon' currently has a value of 'f3f2d658327f46459513811bfa996daa' [info] Deluge key 'default_daemon' will have a new value 'f3f2d658327f46459513811bfa996daa' [info] Writing changes to Deluge config file '/config/web.conf'...

2022-11-01 11:51:35,912 DEBG 'watchdog-script' stdout output: [info] Deluge process started [info] Waiting for Deluge process to start listening on port 58846...

2022-11-01 11:51:36,760 DEBG 'watchdog-script' stdout output: [info] Deluge process listening on port 58846

2022-11-01 11:51:48,357 DEBG 'watchdog-script' stderr output: <Deferred at 0x7f0e28ce5b70 current result: None>

2022-11-01 11:51:48,456 DEBG 'watchdog-script' stdout output: [info] No torrents with state 'Error' found [info] Starting Deluge Web UI... [info] Deluge Web UI started [info] Attempting to start Privoxy...

2022-11-01 11:51:49,450 DEBG 'watchdog-script' stdout output: [info] Privoxy process started [info] Waiting for Privoxy process to start listening on port 8118...

2022-11-01 11:51:49,713 DEBG 'watchdog-script' stdout output: [info] Privoxy process listening on port 8118

`

binhex commented 1 year ago

Am I to assume that this error message indicates that the container is not taking advantage of and configuring Deluge to accept a specified incoming port? correct, dynamic incoming port assignment is only done for PIA.

Am I to assume that such functionality is limited to PIA? If so, is there a workaround when using !=PIA as a provider? If so, can anyone point out that information? correct PIA only, the workaround is to find out how to get yourself an incoming port from your VPN provider and then manually configure deluge to use it.

Is there anything else obviously wrong in this configuration that would result in reduced speed? speed can be affected by a number of things, see Q6 :- https://github.com/binhex/documentation/blob/master/docker/faq/vpn.md

billrweber commented 1 year ago

Thank you for the response. I appreciate that the logging details provided by the app are useful in identifying the issue. From my perspective, it is worth it to widen the support to include additional vpn providers, but I'm not entirely certain I understand the problem space.

  1. Is it the case that there is a script within the container that initiatlizes the VPN and is able to identify the port provided by PIA to push into Deluge?

  2. Is there anything specific about the PIA client that isn't present in the OpenVPN client, or is it just different. What I'm getting at here is to ask if this has been tried and it was deemed too difficult, or if it is just on some future unidentified roadmap?

binhex commented 1 year ago
  1. yes
  2. So in order to dynamically assign a incoming port for pia you need to jump through several hoops, luckily for pia users these hoops are all jumped through for you via my built in scripts - see 1.

Each vpn provider maybe (and most of the time is) different in the methods required to assign an incoming port, for example mullvad you do it through the web ui, once the port is assigned its static and its then simply a case of configuring the app to use the port.

At this time i dont have the time or inclination to try to automate incoming port assignment for every vpn provider out there (there are hundreds), so if you want an easy life then go pia, otherwise go custom and then figure out how to assign a incoming port.

Sadly looking at the ProtonVPN docs it looks like the only way to assign a incoming port is via the app, so if that is the only method then its going to be rough going :-( https://protonvpn.com/support/port-forwarding/#:~:text=Open%20the%20app%20and%20go,forwarding%20shortcut%20(see%20below).