haugene / vpn-configs-contrib

A collection of configs for various VPN providers
GNU General Public License v3.0
176 stars 739 forks source link

Hotspot Shield Crashes container #181

Closed AJConnelly closed 1 year ago

AJConnelly commented 1 year ago

Is there a pinned issue for this?

Is there an existing or similar issue for this?

Is there any comment in the documentation for this?

Is this related to the container/transmission?

Are you using the latest release?

Have you tried using the dev branch latest?

Config used

version: '2' services: transmission: image: haugene/transmission-openvpn cap_add:

Current Behavior

Not familiar with docker but I attempted to mount the ovpn file locally as someone else suggested this worked for them "/home/austin/Downloads/HotspotShield_US_v4.ovpn" is where the file is on my raspberry pi.

Expected Behavior

Want it to run the transmission container correctly and not exit then restart the container over and over.

How have you tried to solve the problem?

I also tried to create a volume with "sudo docker volume create hotspotshield" which tells me "Mountpoint": "/var/lib/docker/volumes/hotspotshield/_data", which I cannot access to put the ovpn file into due to permission denied.

Log output

Starting container with revision: b33d0fe4c938259a0d4eb844e55468f387456121 Creating TUN device /dev/net/tun Using OpenVPN provider: HOTSPOTSHIELD Running with VPN_CONFIG_SOURCE auto No bundled config script found for HOTSPOTSHIELD. Defaulting to external config Downloading configs from https://github.com/haugene/vpn-configs-contrib/archive/main.zip into /tmp/tmp.PjPWww9BQr Extracting configs to /tmp/tmp.TUbnTedtoh Found configs for HOTSPOTSHIELD in /tmp/tmp.TUbnTedtoh/vpn-configs-contrib-main/openvpn/hotspotshield, will replace current content in /etc/openvpn/hotspotshield Cleanup: deleting /tmp/tmp.PjPWww9BQr and /tmp/tmp.TUbnTedtoh Starting OpenVPN using config HotspotShield_US_v4.ovpn Modifying /etc/openvpn/hotspotshield/HotspotShield_US_v4.ovpn for best behaviour in this container Modification: Point auth-user-pass option to the username/password file Modification: Change ca certificate path Modification: Change ping options Modification: Update/set resolv-retry to 15 seconds Modification: Change tls-crypt keyfile path Modification: Set output verbosity to 3 Modification: Remap SIGUSR1 signal to SIGTERM, avoid OpenVPN restart loop Modification: Updating status for config failure detection Setting OpenVPN credentials... adding route to local network 192.168.1.0/24 via 172.18.0.1 dev eth0 2023-01-17 09:13:33 DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning. 2023-01-17 09:13:33 OpenVPN 2.5.5 aarch64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 14 2022 2023-01-17 09:13:33 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 2023-01-17 09:13:33 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts 2023-01-17 09:13:33 TCP/UDP: Preserving recently used remote address: [AF_INET]199.188.237.58:8041 2023-01-17 09:13:33 Socket Buffers: R=[212992->212992] S=[212992->212992] 2023-01-17 09:13:33 UDP link local: (not bound) 2023-01-17 09:13:33 UDP link remote: [AF_INET]199.188.237.58:8041 2023-01-17 09:13:33 TLS: Initial packet from [AF_INET]199.188.237.58:8041, sid=8e1db966 c942fa74 2023-01-17 09:13:33 VERIFY OK: depth=2, C=US, O=Internet Security Research Group, CN=ISRG Root X1 2023-01-17 09:13:33 VERIFY OK: depth=1, C=US, O=Let's Encrypt, CN=R3 2023-01-17 09:13:33 VERIFY KU OK 2023-01-17 09:13:33 Validating certificate extended key usage 2023-01-17 09:13:33 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication 2023-01-17 09:13:33 VERIFY EKU OK 2023-01-17 09:13:33 VERIFY X509NAME OK: CN=universitycalendar.us 2023-01-17 09:13:33 VERIFY OK: depth=0, CN=universitycalendar.us 2023-01-17 09:13:33 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1601', remote='link-mtu 1569' 2023-01-17 09:13:33 WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1532', remote='tun-mtu 1500' 2023-01-17 09:13:33 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 2023-01-17 09:13:33 [universitycalendar.us] Peer Connection Initiated with [AF_INET]199.188.237.58:8041 2023-01-17 09:13:33 Connection reset command was pushed by server ('') 2023-01-17 09:13:33 SIGTERM[soft,server-pushed-connection-reset] received, process exiting

Starting container with revision: b33d0fe4c938259a0d4eb844e55468f387456121 Creating TUN device /dev/net/tun Using OpenVPN provider: HOTSPOTSHIELD Running with VPN_CONFIG_SOURCE auto No bundled config script found for HOTSPOTSHIELD. Defaulting to external config Downloading configs from https://github.com/haugene/vpn-configs-contrib/archive/main.zip into /tmp/tmp.Sae9JBHcUG Extracting configs to /tmp/tmp.S7jOW4x1Dg Found configs for HOTSPOTSHIELD in /tmp/tmp.S7jOW4x1Dg/vpn-configs-contrib-main/openvpn/hotspotshield, will replace current content in /etc/openvpn/hotspotshield Cleanup: deleting /tmp/tmp.Sae9JBHcUG and /tmp/tmp.S7jOW4x1Dg Starting OpenVPN using config HotspotShield_US_v4.ovpn Modifying /etc/openvpn/hotspotshield/HotspotShield_US_v4.ovpn for best behaviour in this container Modification: Point auth-user-pass option to the username/password file Modification: Change ca certificate path Modification: Change ping options Modification: Update/set resolv-retry to 15 seconds Modification: Change tls-crypt keyfile path Modification: Set output verbosity to 3 Modification: Remap SIGUSR1 signal to SIGTERM, avoid OpenVPN restart loop Modification: Updating status for config failure detection Setting OpenVPN credentials... adding route to local network 192.168.1.0/24 via 172.18.0.1 dev eth0 2023-01-17 09:13:52 DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning. 2023-01-17 09:13:52 OpenVPN 2.5.5 aarch64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 14 2022 2023-01-17 09:13:52 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 2023-01-17 09:13:52 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts 2023-01-17 09:13:52 TCP/UDP: Preserving recently used remote address: [AF_INET]199.188.237.58:8041 2023-01-17 09:13:52 Socket Buffers: R=[212992->212992] S=[212992->212992] 2023-01-17 09:13:52 UDP link local: (not bound) 2023-01-17 09:13:52 UDP link remote: [AF_INET]199.188.237.58:8041 2023-01-17 09:13:52 event_wait : Interrupted system call (code=4) 2023-01-17 09:13:52 SIGTERM[hard,] received, process exiting

Environment

- OS:Debian GNU/Linux 11 (bullseye)
- Docker:Docker version 20.10.22, build 3a2c30b

Anything else?

No response

pkishino commented 1 year ago

Please change your ovpn password immediately as you just exposed it here.. second, check that your ovpn actually is up to date, looks like provider side failure, try a different profile