qdm12 / gluetun

VPN client in a thin Docker container for multiple VPN providers, written in Go, and using OpenVPN or Wireguard, DNS over TLS, with a few proxy servers built-in.
https://hub.docker.com/r/qmcgaw/gluetun
MIT License
7.76k stars 363 forks source link

Bug: PureVPN zip file is outdated #2511

Open chris-0111 opened 2 weeks ago

chris-0111 commented 2 weeks ago

Is this urgent?

None

Host OS

Debian

CPU arch

None

VPN service provider

PureVPN

What are you using to run the container

docker-compose

What is the version of Gluetun

Running version latest commit 67ae5f5

What's the problem 🤔

I am running into errors fethcing the ip blocklist, I have tried UDP OVPN and I still cannot fetch the blocklist. The original endpoint was a hostname so I resolved it and used that.

Share your logs (at least 10 lines)

|   └── Authentication file path: /gluetun/auth/config.toml

├── Storage settings:

|   └── Filepath: /gluetun/servers.json

├── OS Alpine settings:

|   ├── Process UID: 1000

|   └── Process GID: 1000

├── Public IP settings:

|   ├── Fetching: every 12h0m0s

|   ├── IP file path: /tmp/gluetun/ip

|   └── Public IP data API: ipinfo

└── Version settings:

    └── Enabled: yes

2024-10-06T12:53:54Z INFO [routing] default route found: interface eth0, gateway 172.19.0.1, assigned IP 172.19.0.2 and family v4

2024-10-06T12:53:54Z DEBUG [routing] ip rule add from 172.19.0.2/32 lookup 200 pref 100

2024-10-06T12:53:54Z INFO [routing] adding route for 0.0.0.0/0

2024-10-06T12:53:54Z DEBUG [routing] ip route replace 0.0.0.0/0 via 172.19.0.1 dev eth0 table 200

2024-10-06T12:53:54Z INFO [firewall] setting allowed subnets...

2024-10-06T12:53:54Z INFO [routing] default route found: interface eth0, gateway 172.19.0.1, assigned IP 172.19.0.2 and family v4

2024-10-06T12:53:54Z DEBUG [routing] ip rule add to 172.19.0.0/16 lookup 254 pref 98

2024-10-06T12:53:54Z INFO [dns] using plaintext DNS at address 1.1.1.1

2024-10-06T12:53:54Z INFO [http server] http server listening on [::]:8000

2024-10-06T12:53:54Z DEBUG [wireguard] Wireguard server public key: ************

2024-10-06T12:53:54Z DEBUG [wireguard] Wireguard client private key: ************
2024-10-06T12:53:54Z DEBUG [wireguard] Wireguard pre-shared key: [not set]

2024-10-06T12:53:54Z INFO [firewall] allowing VPN connection...

2024-10-06T12:53:54Z DEBUG [firewall] /sbin/iptables --append OUTPUT -d 103.107.197.164 -o eth0 -p udp -m udp --dport 51820 -j ACCEPT

2024-10-06T12:53:54Z INFO [healthcheck] listening on 127.0.0.1:9999

2024-10-06T12:53:54Z DEBUG [firewall] /sbin/iptables --append OUTPUT -o tun0 -j ACCEPT

2024-10-06T12:53:54Z DEBUG [firewall] /sbin/ip6tables --append OUTPUT -o tun0 -j ACCEPT

2024-10-06T12:53:54Z INFO [wireguard] Using available kernelspace implementation

2024-10-06T12:53:54Z INFO [wireguard] Connecting to 103.107.197.164:51820

2024-10-06T12:53:54Z INFO [wireguard] Wireguard setup is complete. Note Wireguard is a silent protocol and it may or may not work, without giving any error message. Typically i/o timeout errors indicate the Wireguard connection is not working.

2024-10-06T12:53:54Z INFO [dns] downloading hostnames and IP block lists

2024-10-06T12:54:04Z WARN [dns] cannot update filter block lists: Get "https://raw.githubusercontent.com/qdm12/files/master/malicious-hostnames.updated": dial tcp: lookup raw.githubusercontent.com on 1.1.1.1:53: read udp 172.21.5.42:51678->1.1.1.1:53: i/o timeout, Get "https://raw.githubusercontent.com/qdm12/files/master/malicious-ips.updated": dial tcp: lookup raw.githubusercontent.com on 1.1.1.1:53: read udp 172.21.5.42:51678->1.1.1.1:53: i/o timeout

2024-10-06T12:54:04Z INFO [dns] attempting restart in 10s

2024-10-06T12:54:09Z INFO [healthcheck] program has been unhealthy for 6s: restarting VPN

2024-10-06T12:54:09Z INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md

2024-10-06T12:54:09Z INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION

2024-10-06T12:54:09Z INFO [vpn] stopping

2024-10-06T12:54:09Z ERROR [vpn] getting public IP address information: fetching information: Get "https://ipinfo.io/": context canceled

2024-10-06T12:54:09Z DEBUG [wireguard] closing controller client...

2024-10-06T12:54:09Z ERROR [vpn] cannot get version information: Get "https://api.github.com/repos/qdm12/gluetun/commits": context canceled

2024-10-06T12:54:09Z DEBUG [wireguard] removing IPv4 rule...

2024-10-06T12:54:09Z DEBUG [wireguard] shutting down link...

2024-10-06T12:54:09Z DEBUG [wireguard] deleting link...

2024-10-06T12:54:09Z INFO [vpn] starting

2024-10-06T12:54:09Z DEBUG [wireguard] Wireguard server public key: DfIa+FVYo4kElyX6rDVAK6LBOchZK7i7NE7d+rZ1JBY=

2024-10-06T12:54:09Z DEBUG [wireguard] Wireguard client private key: sHz...Gg=

2024-10-06T12:54:09Z DEBUG [wireguard] Wireguard pre-shared key: [not set]

2024-10-06T12:54:09Z INFO [firewall] allowing VPN connection...

2024-10-06T12:54:09Z INFO [wireguard] Using available kernelspace implementation

2024-10-06T12:54:09Z INFO [wireguard] Connecting to 103.107.197.164:51820

2024-10-06T12:54:09Z INFO [wireguard] Wireguard setup is complete. Note Wireguard is a silent protocol and it may or may not work, without giving any error message. Typically i/o timeout errors indicate the Wireguard connection is not working.

2024-10-06T12:54:14Z INFO [dns] downloading hostnames and IP block lists

2024-10-06T12:54:19Z ERROR [vpn] getting public IP address information: fetching information: Get "https://ipinfo.io/": dial tcp: lookup ipinfo.io on 1.1.1.1:53: read udp 172.21.5.42:43604->1.1.1.1:53: i/o timeout

2024-10-06T12:54:21Z INFO [healthcheck] program has been unhealthy for 11s: restarting VPN

2024-10-06T12:54:21Z INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md

2024-10-06T12:54:21Z INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION

2024-10-06T12:54:21Z INFO [vpn] stopping

2024-10-06T12:54:21Z DEBUG [wireguard] closing controller client...

2024-10-06T12:54:21Z DEBUG [wireguard] removing IPv4 rule...

2024-10-06T12:54:21Z DEBUG [wireguard] shutting down link...

2024-10-06T12:54:21Z DEBUG [wireguard] deleting link...

2024-10-06T12:54:21Z INFO [vpn] starting

2024-10-06T12:54:21Z DEBUG [wireguard] Wireguard server public key: ************

2024-10-06T12:54:21Z DEBUG [wireguard] Wireguard client private key: ************

2024-10-06T12:54:21Z DEBUG [wireguard] Wireguard pre-shared key: [not set]

2024-10-06T12:54:21Z INFO [firewall] allowing VPN connection...

2024-10-06T12:54:21Z INFO [wireguard] Using available kernelspace implementation

2024-10-06T12:54:21Z INFO [wireguard] Connecting to 103.107.197.164:51820

2024-10-06T12:54:21Z INFO [wireguard] Wireguard setup is complete. Note Wireguard is a silent protocol and it may or may not work, without giving any error message. Typically i/o timeout errors indicate the Wireguard connection is not working.

2024-10-06T12:54:24Z WARN [dns] cannot update filter block lists: Get "https://raw.githubusercontent.com/qdm12/files/master/malicious-hostnames.updated": dial tcp: lookup raw.githubusercontent.com on 1.1.1.1:53: read udp 172.21.5.42:36399->1.1.1.1:53: i/o timeout, Get "https://raw.githubusercontent.com/qdm12/files/master/malicious-ips.updated": dial tcp: lookup raw.githubusercontent.com on 1.1.1.1:53: read udp 172.21.5.42:36399->1.1.1.1:53: i/o timeout

Share your configuration

services:
  qbittorrent:
    image: lscr.io/linuxserver/qbittorrent:latest
    container_name: qbittorrent
    network_mode: "service:gluetun"
    environment:
      - PUID=1000
      - PGID=1000
      - TZ=Etc/UTC+10
      - WEBUI_PORT=8080
      - TORRENTING_PORT=6881
    volumes:
      - /home/pi/media-control/appdata:/config
    restart: unless-stopped

gluetun:
    image: qmcgaw/gluetun
    container_name: gluetun
    hostname: gluetun
    cap_add:
      - NET_ADMIN
    ports:
      - 6881:6881
      - 6881:6881/udp
      - 8085:8085 # qbittorrent
      - 8989:8989 # Sonarr
    volumes:
      - /home/pi/media-control/appdata:/config
    environment:
      - VPN_SERVICE_PROVIDER=custom
      - VPN_TYPE=wireguard
      - WIREGUARD_ENDPOINT_IP=*********
      - WIREGUARD_ENDPOINT_PORT=51820
      - WIREGUARD_PUBLIC_KEY=*******************************
      - WIREGUARD_PRIVATE_KEY=*******************************
      - WIREGUARD_ADDRESSES=172.21.5.42/32
      - LOG_LEVEL=debug
github-actions[bot] commented 2 weeks ago

@qdm12 is more or less the only maintainer of this project and works on it in his free time. Please:

chris-0111 commented 2 weeks ago

I made some changes and tried to update the PureVPN servers using the command logs displays reached the maximum number of consecutive failures: 2 failed attempts resolving.... no such host

I think the purevpn servers on the list are incorrect or outdated such as id2-auto-tcp.ptoserver.com is not correct

chris-0111 commented 2 weeks ago

Conacting Purevpn can confirm the listed servers are incorrect E.g for Australia Sydney Listed: au2-auto-tcp.ptoserver.com Corrected: ausd2-auto-tcp.ptoserver.com

qdm12 commented 2 weeks ago

Please provide another zip file for Purevpn servers then, or tell Purevpn to update their zip file at https://d11a57lttb2ffq.cloudfront.net/heartbleed/router/Recommended-CA2.zip which contains for example au2-auto-tcp.ptoserver.com in the file Recommended-CA2\New+OVPN+Files\TCP\au2-ovpn-tcp.ovpn. Can't do much if PureVPN keep outdated configuration files with outdated data in there.

chris-0111 commented 1 week ago

Ill have a look to see if I can find a new list, I also saw that I think one of binhex's repos has the same issue with PureVPN.