qdm12 / gluetun

VPN client in a thin Docker container for multiple VPN providers, written in Go, and using OpenVPN or Wireguard, DNS over TLS, with a few proxy servers built-in.
https://hub.docker.com/r/qmcgaw/gluetun
MIT License
7.41k stars 349 forks source link

Deluge leaking IP on ipleak.net ? #2464

Open needsupport opened 1 week ago

needsupport commented 1 week ago

Is this urgent?

None

Host OS

Debian bookworm

CPU arch

x86_64

VPN service provider

Custom

What are you using to run the container

Portainer

What is the version of Gluetun

v3.39.0

What's the problem šŸ¤”

Deluge is leaking my real IP address. It is running with network set to container mode with gluetun : I used ipleak.net to check my IP and torrent IP leaks I did not bind to anything since gluetun should ideally not leak my VPS real IP address since all connections for deluge are through the gluetun container

Share your logs (at least 10 lines)

|       ā”œā”€ā”€ Interface addresses:
|       |   ā””ā”€ā”€ 10.13.37.22/24
|       ā”œā”€ā”€ Allowed IPs:
|       |   ā”œā”€ā”€ 0.0.0.0/0
|       |   ā””ā”€ā”€ ::/0
|       ā””ā”€ā”€ Network interface: tun0
|           ā””ā”€ā”€ MTU: 1400
ā”œā”€ā”€ DNS settings:
|   ā”œā”€ā”€ Keep existing nameserver(s): no
|   ā”œā”€ā”€ DNS server address to use: XXXX
|   ā””ā”€ā”€ DNS over TLS settings:
|       ā”œā”€ā”€ Enabled: yes
|       ā”œā”€ā”€ Update period: every 24h0m0s
|       ā”œā”€ā”€ Unbound settings:
|       |   ā”œā”€ā”€ Authoritative servers:
|       |   |   ā””ā”€ā”€ cloudflare
|       |   ā”œā”€ā”€ Caching: yes
|       |   ā”œā”€ā”€ IPv6: no
|       |   ā”œā”€ā”€ Verbosity level: 1
|       |   ā”œā”€ā”€ Verbosity details level: 0
|       |   ā”œā”€ā”€ Validation log level: 0
|       |   ā”œā”€ā”€ System user: root
|       |   ā””ā”€ā”€ Allowed networks:
|       |       ā”œā”€ā”€ 0.0.0.0/0
|       |       ā””ā”€ā”€ ::/0
|       ā””ā”€ā”€ DNS filtering settings:
|           ā”œā”€ā”€ Block malicious: yes
|           ā”œā”€ā”€ Block ads: no
|           ā”œā”€ā”€ Block surveillance: no
|           ā””ā”€ā”€ Blocked IP networks:
|               ā”œā”€ā”€ 127.0.0.1/8
|               ā”œā”€ā”€ 10.0.0.0/8
|               ā”œā”€ā”€ 172.16.0.0/12
|               ā”œā”€ā”€ 192.168.0.0/16
|               ā”œā”€ā”€ 169.254.0.0/16
|               ā”œā”€ā”€ ::1/128
|               ā”œā”€ā”€ fc00::/7
|               ā”œā”€ā”€ fe80::/10
|               ā”œā”€ā”€ ::ffff:127.0.0.1/104
|               ā”œā”€ā”€ ::ffff:10.0.0.0/104
|               ā”œā”€ā”€ ::ffff:169.254.0.0/112
|               ā”œā”€ā”€ ::ffff:172.16.0.0/108
|               ā””ā”€ā”€ ::ffff:192.168.0.0/112
ā”œā”€ā”€ Firewall settings:
|   ā”œā”€ā”€ Enabled: yes
|   ā””ā”€ā”€ VPN input ports:
|       ā””ā”€ā”€ 6881
ā”œā”€ā”€ Log settings:
|   ā””ā”€ā”€ Log level: info
ā”œā”€ā”€ Health settings:
|   ā”œā”€ā”€ Server listening address: 127.0.0.1:9999
|   ā”œā”€ā”€ Target address: cloudflare.com:443
|   ā”œā”€ā”€ Duration to wait after success: 5s
|   ā”œā”€ā”€ Read header timeout: 100ms
|   ā”œā”€ā”€ Read timeout: 500ms
|   ā””ā”€ā”€ VPN wait durations:
|       ā”œā”€ā”€ Initial duration: 6s
|       ā””ā”€ā”€ Additional duration: 5s
ā”œā”€ā”€ Shadowsocks server settings:
|   ā””ā”€ā”€ Enabled: no
ā”œā”€ā”€ HTTP proxy settings:
|   ā”œā”€ā”€ Enabled: yes
|   ā”œā”€ā”€ Listening address: :8888
|   ā”œā”€ā”€ User: 
|   ā”œā”€ā”€ Password: [not set]
|   ā”œā”€ā”€ Stealth mode: yes
|   ā”œā”€ā”€ Log: no
|   ā”œā”€ā”€ Read header timeout: 1s
|   ā””ā”€ā”€ Read timeout: 3s
ā”œā”€ā”€ Control server settings:
|   ā”œā”€ā”€ Listening address: :8000
|   ā””ā”€ā”€ Logging: yes
ā”œā”€ā”€ OS Alpine settings:
|   ā”œā”€ā”€ Process UID: 1000
|   ā””ā”€ā”€ Process GID: 1000
ā”œā”€ā”€ Public IP settings:
|   ā”œā”€ā”€ Fetching: every 12h0m0s
|   ā”œā”€ā”€ IP file path: /tmp/gluetun/ip
|   ā””ā”€ā”€ Public IP data API: ipinfo
ā””ā”€ā”€ Version settings:
    ā””ā”€ā”€ Enabled: yes
2024-09-04T06:32:22Z WARN DNS address is set to 95.215.19.53 so the DNS over TLS (DoT) server will not be used. The default value changed to 127.0.0.1 so it uses the internal DoT serves. If the DoT server fails to start, the IPv4 address of the first plaintext DNS server corresponding to the first DoT provider chosen is used.
2024-09-04T06:32:22Z INFO [routing] default route found: interface eth0, gateway 172.18.0.1, assigned IP 172.18.0.2 and family v4
2024-09-04T06:32:22Z INFO [routing] adding route for 0.0.0.0/0
2024-09-04T06:32:22Z INFO [firewall] setting allowed subnets...
2024-09-04T06:32:22Z INFO [routing] default route found: interface eth0, gateway 172.18.0.1, assigned IP 172.18.0.2 and family v4
2024-09-04T06:32:22Z INFO TUN device is not available: open /dev/net/tun: no such file or directory; creating it...
2024-09-04T06:32:22Z INFO [dns] using plaintext DNS at address XXXXX
2024-09-04T06:32:22Z INFO [http proxy] listening on :8888
2024-09-04T06:32:22Z INFO [http server] http server listening on [::]:8000
2024-09-04T06:32:22Z INFO [firewall] allowing VPN connection...
2024-09-04T06:32:22Z INFO [healthcheck] listening on 127.0.0.1:9999
2024-09-04T06:32:22Z INFO [wireguard] Using available kernelspace implementation
2024-09-04T06:32:22Z INFO [wireguard] Connecting to XXXX:51820
2024-09-04T06:32:22Z INFO [wireguard] Wireguard setup is complete. Note Wireguard is a silent protocol and it may or may not work, without giving any error message. Typically i/o timeout errors indicate the Wireguard connection is not working.
2024-09-04T06:32:22Z INFO [healthcheck] healthy!
2024-09-04T06:32:22Z INFO [firewall] setting allowed input port 6881 through interface tun0...
2024-09-04T06:32:22Z INFO [dns] downloading DNS over TLS cryptographic files
2024-09-04T06:32:24Z INFO [dns] downloading hostnames and IP block lists

Share your configuration

No response

github-actions[bot] commented 1 week ago

@qdm12 is more or less the only maintainer of this project and works on it in his free time. Please:

qdm12 commented 1 week ago

Deluge is leaking my real IP address. It is running with network set to container mode with gluetun : I used ipleak.net to check my IP and torrent IP leaks

I'm also using Deluge. Check on the bottom right of the web ui, you'll see your public IP address. Is it your VPN ip address or not? Double check at https://ipinfo.io

I also tried going to ipleak.net and using the Torrent Address detection but the torrent won't work with the errors "Error: skipping tracker announce (unreachable)" and "Error: timed out" šŸ¤·