You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
the thing connect and instant disconect iam receiving a sigterm
Expected Behavior
what else
How have you tried to solve the problem?
i have tested like 10 other location
Log output
Starting container with revision: 07f5a2b9aea5028c9bb75438c1552708e91dde71
TRANSMISSION_HOME is currently set to: /config/transmission-home
Creating TUN device /dev/net/tun
Using OpenVPN provider: HOTSPOTSHIELD
Running with VPN_CONFIG_SOURCE auto
No bundled config script found for HOTSPOTSHIELD. Defaulting to external config
Will get configs from https://github.com/haugene/vpn-configs-contrib.git
Repository is already cloned, checking for update
Already up to date.
Already on 'main'
Your branch is up to date with 'origin/main'.
Found configs for HOTSPOTSHIELD in /config/vpn-configs-contrib/openvpn/hotspotshield, will replace current content in /etc/openvpn/hotspotshield
Starting OpenVPN using config HotspotShield_FR_v4.ovpn
Modifying /etc/openvpn/hotspotshield/HotspotShield_FR_v4.ovpn for best behaviour in this container
Modification: Point auth-user-pass option to the username/password file
Modification: Change ca certificate path
Modification: Change ping options
Modification: Update/set resolv-retry to 15 seconds
Modification: Change tls-crypt keyfile path
Modification: Set output verbosity to 3
Modification: Remap SIGUSR1 signal to SIGTERM, avoid OpenVPN restart loop
Modification: Updating status for config failure detection
Setting OpenVPN credentials...
adding route to local network 192.168.1.0/24 via 172.21.0.1 dev eth0
2024-01-16 18:34:52 DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
2024-01-16 18:34:52 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023
2024-01-16 18:34:52 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10
2024-01-16 18:34:52 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2024-01-16 18:34:52 TCP/UDP: Preserving recently used remote address: [AF_INET]185.189.113.76:8041
2024-01-16 18:34:52 Socket Buffers: R=[212992->212992] S=[212992->212992]
2024-01-16 18:34:52 UDP link local: (not bound)
2024-01-16 18:34:52 UDP link remote: [AF_INET]185.189.113.76:8041
2024-01-16 18:34:52 TLS: Initial packet from [AF_INET]185.189.113.76:8041, sid=9c3c62fd 3f9630fe
2024-01-16 18:34:52 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
2024-01-16 18:34:52 VERIFY OK: depth=2, C=US, O=Internet Security Research Group, CN=ISRG Root X1
2024-01-16 18:34:52 VERIFY OK: depth=1, C=US, O=Let's Encrypt, CN=R3
2024-01-16 18:34:52 VERIFY KU OK
2024-01-16 18:34:52 Validating certificate extended key usage
2024-01-16 18:34:52 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2024-01-16 18:34:52 VERIFY EKU OK
2024-01-16 18:34:52 VERIFY X509NAME OK: CN=dog-owner.us
2024-01-16 18:34:52 VERIFY OK: depth=0, CN=dog-owner.us
2024-01-16 18:34:52 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1601', remote='link-mtu 1569'
2024-01-16 18:34:52 WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1532', remote='tun-mtu 1500'
2024-01-16 18:34:52 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2024-01-16 18:34:52 [dog-owner.us] Peer Connection Initiated with [AF_INET]185.189.113.76:8041
2024-01-16 18:34:52 Connection reset command was pushed by server ('')
2024-01-16 18:34:52 SIGTERM[soft,server-pushed-connection-reset] received, process exiting
HW/SW Environment
- OS: proxmox
- Docker: Docker version 20.10.24+dfsg1, build 297e128
Anything else?
what else
The text was updated successfully, but these errors were encountered:
pkishino
transferred this issue from haugene/docker-transmission-openvpn
Jan 18, 2024
Is there a pinned issue for this?
Is there an existing or similar issue/discussion for this?
Is there any comment in the documentation for this?
Is this related to a provider?
Are you using the latest release?
Have you tried using the dev branch latest?
Docker run config used
version: '3.3'
services:
transmission-openvpn:
cap_add:
- NET_ADMIN
volumes:
- '/var/lib/docker/volumes/:/data'
- '/var/lib/docker/volumes/:/config'
environment:
- OPENVPN_PROVIDER=hotspotshield
- OPENVPN_CONFIG=HotspotShield_US_v4
- OPENVPN_USERNAME=myrealusernameforHSS
- OPENVPN_PASSWORD=myrealpswforHSS
- LOCAL_NETWORK=192.168.0.0/16
logging:
driver: json-file
options:
max-size: 10m
ports:
- '9091:9091'
image: haugene/transmission-openvpn
Current Behavior
the thing connect and instant disconect iam receiving a sigterm
Expected Behavior
what else
How have you tried to solve the problem?
i have tested like 10 other location
Log output
Starting container with revision: 07f5a2b9aea5028c9bb75438c1552708e91dde71
TRANSMISSION_HOME is currently set to: /config/transmission-home
Creating TUN device /dev/net/tun
Using OpenVPN provider: HOTSPOTSHIELD
Running with VPN_CONFIG_SOURCE auto
No bundled config script found for HOTSPOTSHIELD. Defaulting to external config
Will get configs from https://github.com/haugene/vpn-configs-contrib.git
Repository is already cloned, checking for update
Already up to date.
Already on 'main'
Your branch is up to date with 'origin/main'.
Found configs for HOTSPOTSHIELD in /config/vpn-configs-contrib/openvpn/hotspotshield, will replace current content in /etc/openvpn/hotspotshield
Starting OpenVPN using config HotspotShield_FR_v4.ovpn
Modifying /etc/openvpn/hotspotshield/HotspotShield_FR_v4.ovpn for best behaviour in this container
Modification: Point auth-user-pass option to the username/password file
Modification: Change ca certificate path
Modification: Change ping options
Modification: Update/set resolv-retry to 15 seconds
Modification: Change tls-crypt keyfile path
Modification: Set output verbosity to 3
Modification: Remap SIGUSR1 signal to SIGTERM, avoid OpenVPN restart loop
Modification: Updating status for config failure detection
Setting OpenVPN credentials...
adding route to local network 192.168.1.0/24 via 172.21.0.1 dev eth0
2024-01-16 18:34:52 DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
2024-01-16 18:34:52 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023
2024-01-16 18:34:52 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10
2024-01-16 18:34:52 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2024-01-16 18:34:52 TCP/UDP: Preserving recently used remote address: [AF_INET]185.189.113.76:8041
2024-01-16 18:34:52 Socket Buffers: R=[212992->212992] S=[212992->212992]
2024-01-16 18:34:52 UDP link local: (not bound)
2024-01-16 18:34:52 UDP link remote: [AF_INET]185.189.113.76:8041
2024-01-16 18:34:52 TLS: Initial packet from [AF_INET]185.189.113.76:8041, sid=9c3c62fd 3f9630fe
2024-01-16 18:34:52 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
2024-01-16 18:34:52 VERIFY OK: depth=2, C=US, O=Internet Security Research Group, CN=ISRG Root X1
2024-01-16 18:34:52 VERIFY OK: depth=1, C=US, O=Let's Encrypt, CN=R3
2024-01-16 18:34:52 VERIFY KU OK
2024-01-16 18:34:52 Validating certificate extended key usage
2024-01-16 18:34:52 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2024-01-16 18:34:52 VERIFY EKU OK
2024-01-16 18:34:52 VERIFY X509NAME OK: CN=dog-owner.us
2024-01-16 18:34:52 VERIFY OK: depth=0, CN=dog-owner.us
2024-01-16 18:34:52 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1601', remote='link-mtu 1569'
2024-01-16 18:34:52 WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1532', remote='tun-mtu 1500'
2024-01-16 18:34:52 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2024-01-16 18:34:52 [dog-owner.us] Peer Connection Initiated with [AF_INET]185.189.113.76:8041
2024-01-16 18:34:52 Connection reset command was pushed by server ('')
2024-01-16 18:34:52 SIGTERM[soft,server-pushed-connection-reset] received, process exiting
HW/SW Environment
Anything else?
what else
The text was updated successfully, but these errors were encountered: