haugene / vpn-configs-contrib

A collection of configs for various VPN providers
GNU General Public License v3.0
184 stars 749 forks source link

sigterm signal hotspotshield #268

Open Wellynounet opened 8 months ago

Wellynounet commented 8 months ago

Is there a pinned issue for this?

Is there an existing or similar issue/discussion for this?

Is there any comment in the documentation for this?

Is this related to a provider?

Are you using the latest release?

Have you tried using the dev branch latest?

Docker run config used

version: '3.3' services: transmission-openvpn: cap_add:

Current Behavior

the thing connect and instant disconect iam receiving a sigterm

Expected Behavior

what else

How have you tried to solve the problem?

i have tested like 10 other location

Log output

Starting container with revision: 07f5a2b9aea5028c9bb75438c1552708e91dde71 TRANSMISSION_HOME is currently set to: /config/transmission-home Creating TUN device /dev/net/tun Using OpenVPN provider: HOTSPOTSHIELD Running with VPN_CONFIG_SOURCE auto No bundled config script found for HOTSPOTSHIELD. Defaulting to external config Will get configs from https://github.com/haugene/vpn-configs-contrib.git Repository is already cloned, checking for update Already up to date. Already on 'main' Your branch is up to date with 'origin/main'. Found configs for HOTSPOTSHIELD in /config/vpn-configs-contrib/openvpn/hotspotshield, will replace current content in /etc/openvpn/hotspotshield Starting OpenVPN using config HotspotShield_FR_v4.ovpn Modifying /etc/openvpn/hotspotshield/HotspotShield_FR_v4.ovpn for best behaviour in this container Modification: Point auth-user-pass option to the username/password file Modification: Change ca certificate path Modification: Change ping options Modification: Update/set resolv-retry to 15 seconds Modification: Change tls-crypt keyfile path Modification: Set output verbosity to 3 Modification: Remap SIGUSR1 signal to SIGTERM, avoid OpenVPN restart loop Modification: Updating status for config failure detection Setting OpenVPN credentials... adding route to local network 192.168.1.0/24 via 172.21.0.1 dev eth0 2024-01-16 18:34:52 DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning. 2024-01-16 18:34:52 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 2024-01-16 18:34:52 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 2024-01-16 18:34:52 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts 2024-01-16 18:34:52 TCP/UDP: Preserving recently used remote address: [AF_INET]185.189.113.76:8041 2024-01-16 18:34:52 Socket Buffers: R=[212992->212992] S=[212992->212992] 2024-01-16 18:34:52 UDP link local: (not bound) 2024-01-16 18:34:52 UDP link remote: [AF_INET]185.189.113.76:8041 2024-01-16 18:34:52 TLS: Initial packet from [AF_INET]185.189.113.76:8041, sid=9c3c62fd 3f9630fe 2024-01-16 18:34:52 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this 2024-01-16 18:34:52 VERIFY OK: depth=2, C=US, O=Internet Security Research Group, CN=ISRG Root X1 2024-01-16 18:34:52 VERIFY OK: depth=1, C=US, O=Let's Encrypt, CN=R3 2024-01-16 18:34:52 VERIFY KU OK 2024-01-16 18:34:52 Validating certificate extended key usage 2024-01-16 18:34:52 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication 2024-01-16 18:34:52 VERIFY EKU OK 2024-01-16 18:34:52 VERIFY X509NAME OK: CN=dog-owner.us 2024-01-16 18:34:52 VERIFY OK: depth=0, CN=dog-owner.us 2024-01-16 18:34:52 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1601', remote='link-mtu 1569' 2024-01-16 18:34:52 WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1532', remote='tun-mtu 1500' 2024-01-16 18:34:52 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 2024-01-16 18:34:52 [dog-owner.us] Peer Connection Initiated with [AF_INET]185.189.113.76:8041 2024-01-16 18:34:52 Connection reset command was pushed by server ('') 2024-01-16 18:34:52 SIGTERM[soft,server-pushed-connection-reset] received, process exiting

HW/SW Environment

- OS: proxmox 
- Docker: Docker version 20.10.24+dfsg1, build 297e128

Anything else?

what else