Not familiar with docker but I attempted to mount the ovpn file locally as someone else suggested this worked for them "/home/austin/Downloads/HotspotShield_US_v4.ovpn" is where the file is on my raspberry pi.
Expected Behavior
Want it to run the transmission container correctly and not exit then restart the container over and over.
How have you tried to solve the problem?
I also tried to create a volume with "sudo docker volume create hotspotshield" which tells me "Mountpoint": "/var/lib/docker/volumes/hotspotshield/_data", which I cannot access to put the ovpn file into due to permission denied.
Log output
Starting container with revision: b33d0fe4c938259a0d4eb844e55468f387456121
Creating TUN device /dev/net/tun
Using OpenVPN provider: HOTSPOTSHIELD
Running with VPN_CONFIG_SOURCE auto
No bundled config script found for HOTSPOTSHIELD. Defaulting to external config
Downloading configs from https://github.com/haugene/vpn-configs-contrib/archive/main.zip into /tmp/tmp.PjPWww9BQr
Extracting configs to /tmp/tmp.TUbnTedtoh
Found configs for HOTSPOTSHIELD in /tmp/tmp.TUbnTedtoh/vpn-configs-contrib-main/openvpn/hotspotshield, will replace current content in /etc/openvpn/hotspotshield
Cleanup: deleting /tmp/tmp.PjPWww9BQr and /tmp/tmp.TUbnTedtoh
Starting OpenVPN using config HotspotShield_US_v4.ovpn
Modifying /etc/openvpn/hotspotshield/HotspotShield_US_v4.ovpn for best behaviour in this container
Modification: Point auth-user-pass option to the username/password file
Modification: Change ca certificate path
Modification: Change ping options
Modification: Update/set resolv-retry to 15 seconds
Modification: Change tls-crypt keyfile path
Modification: Set output verbosity to 3
Modification: Remap SIGUSR1 signal to SIGTERM, avoid OpenVPN restart loop
Modification: Updating status for config failure detection
Setting OpenVPN credentials...
adding route to local network 192.168.1.0/24 via 172.18.0.1 dev eth0
2023-01-17 09:13:33 DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
2023-01-17 09:13:33 OpenVPN 2.5.5 aarch64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 14 2022
2023-01-17 09:13:33 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10
2023-01-17 09:13:33 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2023-01-17 09:13:33 TCP/UDP: Preserving recently used remote address: [AF_INET]199.188.237.58:8041
2023-01-17 09:13:33 Socket Buffers: R=[212992->212992] S=[212992->212992]
2023-01-17 09:13:33 UDP link local: (not bound)
2023-01-17 09:13:33 UDP link remote: [AF_INET]199.188.237.58:8041
2023-01-17 09:13:33 TLS: Initial packet from [AF_INET]199.188.237.58:8041, sid=8e1db966 c942fa74
2023-01-17 09:13:33 VERIFY OK: depth=2, C=US, O=Internet Security Research Group, CN=ISRG Root X1
2023-01-17 09:13:33 VERIFY OK: depth=1, C=US, O=Let's Encrypt, CN=R3
2023-01-17 09:13:33 VERIFY KU OK
2023-01-17 09:13:33 Validating certificate extended key usage
2023-01-17 09:13:33 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2023-01-17 09:13:33 VERIFY EKU OK
2023-01-17 09:13:33 VERIFY X509NAME OK: CN=universitycalendar.us
2023-01-17 09:13:33 VERIFY OK: depth=0, CN=universitycalendar.us
2023-01-17 09:13:33 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1601', remote='link-mtu 1569'
2023-01-17 09:13:33 WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1532', remote='tun-mtu 1500'
2023-01-17 09:13:33 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2023-01-17 09:13:33 [universitycalendar.us] Peer Connection Initiated with [AF_INET]199.188.237.58:8041
2023-01-17 09:13:33 Connection reset command was pushed by server ('')
2023-01-17 09:13:33 SIGTERM[soft,server-pushed-connection-reset] received, process exiting
Starting container with revision: b33d0fe4c938259a0d4eb844e55468f387456121
Creating TUN device /dev/net/tun
Using OpenVPN provider: HOTSPOTSHIELD
Running with VPN_CONFIG_SOURCE auto
No bundled config script found for HOTSPOTSHIELD. Defaulting to external config
Downloading configs from https://github.com/haugene/vpn-configs-contrib/archive/main.zip into /tmp/tmp.Sae9JBHcUG
Extracting configs to /tmp/tmp.S7jOW4x1Dg
Found configs for HOTSPOTSHIELD in /tmp/tmp.S7jOW4x1Dg/vpn-configs-contrib-main/openvpn/hotspotshield, will replace current content in /etc/openvpn/hotspotshield
Cleanup: deleting /tmp/tmp.Sae9JBHcUG and /tmp/tmp.S7jOW4x1Dg
Starting OpenVPN using config HotspotShield_US_v4.ovpn
Modifying /etc/openvpn/hotspotshield/HotspotShield_US_v4.ovpn for best behaviour in this container
Modification: Point auth-user-pass option to the username/password file
Modification: Change ca certificate path
Modification: Change ping options
Modification: Update/set resolv-retry to 15 seconds
Modification: Change tls-crypt keyfile path
Modification: Set output verbosity to 3
Modification: Remap SIGUSR1 signal to SIGTERM, avoid OpenVPN restart loop
Modification: Updating status for config failure detection
Setting OpenVPN credentials...
adding route to local network 192.168.1.0/24 via 172.18.0.1 dev eth0
2023-01-17 09:13:52 DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
2023-01-17 09:13:52 OpenVPN 2.5.5 aarch64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 14 2022
2023-01-17 09:13:52 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10
2023-01-17 09:13:52 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2023-01-17 09:13:52 TCP/UDP: Preserving recently used remote address: [AF_INET]199.188.237.58:8041
2023-01-17 09:13:52 Socket Buffers: R=[212992->212992] S=[212992->212992]
2023-01-17 09:13:52 UDP link local: (not bound)
2023-01-17 09:13:52 UDP link remote: [AF_INET]199.188.237.58:8041
2023-01-17 09:13:52 event_wait : Interrupted system call (code=4)
2023-01-17 09:13:52 SIGTERM[hard,] received, process exiting
Please change your ovpn password immediately as you just exposed it here.. second, check that your ovpn actually is up to date, looks like provider side failure, try a different profile
Is there a pinned issue for this?
Is there an existing or similar issue for this?
Is there any comment in the documentation for this?
Is this related to the container/transmission?
Are you using the latest release?
Have you tried using the dev branch latest?
Config used
version: '2' services: transmission: image: haugene/transmission-openvpn cap_add:
- "8888:8888" # proxy support
volumes:
Current Behavior
Not familiar with docker but I attempted to mount the ovpn file locally as someone else suggested this worked for them "/home/austin/Downloads/HotspotShield_US_v4.ovpn" is where the file is on my raspberry pi.
Expected Behavior
Want it to run the transmission container correctly and not exit then restart the container over and over.
How have you tried to solve the problem?
I also tried to create a volume with "sudo docker volume create hotspotshield" which tells me "Mountpoint": "/var/lib/docker/volumes/hotspotshield/_data", which I cannot access to put the ovpn file into due to permission denied.
Log output
Starting container with revision: b33d0fe4c938259a0d4eb844e55468f387456121 Creating TUN device /dev/net/tun Using OpenVPN provider: HOTSPOTSHIELD Running with VPN_CONFIG_SOURCE auto No bundled config script found for HOTSPOTSHIELD. Defaulting to external config Downloading configs from https://github.com/haugene/vpn-configs-contrib/archive/main.zip into /tmp/tmp.PjPWww9BQr Extracting configs to /tmp/tmp.TUbnTedtoh Found configs for HOTSPOTSHIELD in /tmp/tmp.TUbnTedtoh/vpn-configs-contrib-main/openvpn/hotspotshield, will replace current content in /etc/openvpn/hotspotshield Cleanup: deleting /tmp/tmp.PjPWww9BQr and /tmp/tmp.TUbnTedtoh Starting OpenVPN using config HotspotShield_US_v4.ovpn Modifying /etc/openvpn/hotspotshield/HotspotShield_US_v4.ovpn for best behaviour in this container Modification: Point auth-user-pass option to the username/password file Modification: Change ca certificate path Modification: Change ping options Modification: Update/set resolv-retry to 15 seconds Modification: Change tls-crypt keyfile path Modification: Set output verbosity to 3 Modification: Remap SIGUSR1 signal to SIGTERM, avoid OpenVPN restart loop Modification: Updating status for config failure detection Setting OpenVPN credentials... adding route to local network 192.168.1.0/24 via 172.18.0.1 dev eth0 2023-01-17 09:13:33 DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning. 2023-01-17 09:13:33 OpenVPN 2.5.5 aarch64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 14 2022 2023-01-17 09:13:33 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 2023-01-17 09:13:33 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts 2023-01-17 09:13:33 TCP/UDP: Preserving recently used remote address: [AF_INET]199.188.237.58:8041 2023-01-17 09:13:33 Socket Buffers: R=[212992->212992] S=[212992->212992] 2023-01-17 09:13:33 UDP link local: (not bound) 2023-01-17 09:13:33 UDP link remote: [AF_INET]199.188.237.58:8041 2023-01-17 09:13:33 TLS: Initial packet from [AF_INET]199.188.237.58:8041, sid=8e1db966 c942fa74 2023-01-17 09:13:33 VERIFY OK: depth=2, C=US, O=Internet Security Research Group, CN=ISRG Root X1 2023-01-17 09:13:33 VERIFY OK: depth=1, C=US, O=Let's Encrypt, CN=R3 2023-01-17 09:13:33 VERIFY KU OK 2023-01-17 09:13:33 Validating certificate extended key usage 2023-01-17 09:13:33 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication 2023-01-17 09:13:33 VERIFY EKU OK 2023-01-17 09:13:33 VERIFY X509NAME OK: CN=universitycalendar.us 2023-01-17 09:13:33 VERIFY OK: depth=0, CN=universitycalendar.us 2023-01-17 09:13:33 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1601', remote='link-mtu 1569' 2023-01-17 09:13:33 WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1532', remote='tun-mtu 1500' 2023-01-17 09:13:33 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 2023-01-17 09:13:33 [universitycalendar.us] Peer Connection Initiated with [AF_INET]199.188.237.58:8041 2023-01-17 09:13:33 Connection reset command was pushed by server ('') 2023-01-17 09:13:33 SIGTERM[soft,server-pushed-connection-reset] received, process exiting
Starting container with revision: b33d0fe4c938259a0d4eb844e55468f387456121 Creating TUN device /dev/net/tun Using OpenVPN provider: HOTSPOTSHIELD Running with VPN_CONFIG_SOURCE auto No bundled config script found for HOTSPOTSHIELD. Defaulting to external config Downloading configs from https://github.com/haugene/vpn-configs-contrib/archive/main.zip into /tmp/tmp.Sae9JBHcUG Extracting configs to /tmp/tmp.S7jOW4x1Dg Found configs for HOTSPOTSHIELD in /tmp/tmp.S7jOW4x1Dg/vpn-configs-contrib-main/openvpn/hotspotshield, will replace current content in /etc/openvpn/hotspotshield Cleanup: deleting /tmp/tmp.Sae9JBHcUG and /tmp/tmp.S7jOW4x1Dg Starting OpenVPN using config HotspotShield_US_v4.ovpn Modifying /etc/openvpn/hotspotshield/HotspotShield_US_v4.ovpn for best behaviour in this container Modification: Point auth-user-pass option to the username/password file Modification: Change ca certificate path Modification: Change ping options Modification: Update/set resolv-retry to 15 seconds Modification: Change tls-crypt keyfile path Modification: Set output verbosity to 3 Modification: Remap SIGUSR1 signal to SIGTERM, avoid OpenVPN restart loop Modification: Updating status for config failure detection Setting OpenVPN credentials... adding route to local network 192.168.1.0/24 via 172.18.0.1 dev eth0 2023-01-17 09:13:52 DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning. 2023-01-17 09:13:52 OpenVPN 2.5.5 aarch64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 14 2022 2023-01-17 09:13:52 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 2023-01-17 09:13:52 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts 2023-01-17 09:13:52 TCP/UDP: Preserving recently used remote address: [AF_INET]199.188.237.58:8041 2023-01-17 09:13:52 Socket Buffers: R=[212992->212992] S=[212992->212992] 2023-01-17 09:13:52 UDP link local: (not bound) 2023-01-17 09:13:52 UDP link remote: [AF_INET]199.188.237.58:8041 2023-01-17 09:13:52 event_wait : Interrupted system call (code=4) 2023-01-17 09:13:52 SIGTERM[hard,] received, process exiting
Environment
Anything else?
No response