Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bug: IP getter is using a non-dualstack supported endpoint #1838

Closed
samip5 opened this issue Sep 1, 2023 · 1 comment
Closed

Bug: IP getter is using a non-dualstack supported endpoint #1838

samip5 opened this issue Sep 1, 2023 · 1 comment

Comments

@samip5
Copy link

samip5 commented Sep 1, 2023

Is this urgent?

Yes

Host OS

Debian bookworm

CPU arch

x86_64

VPN service provider

AirVPN

What are you using to run the container

Kubernetes

What is the version of Gluetun

Running version latest built on 2023-08-24T09:09:29.123Z (commit 1ac031e)

What's the problem 🤔

ERROR [ip getter] Get "https://ipinfo.io/": context deadline exceeded (Client.Timeout exceeded while awaiting headers)

Share your logs

2023-09-01T22:31:13Z INFO [wireguard] Using available kernelspace implementation
2023-09-01T22:31:13Z INFO [wireguard] Connecting to 213.152.187.219:1637
2023-09-01T22:31:13Z INFO [wireguard] Wireguard setup is complete. Note Wireguard is a silent protocol and it may or may not work, without giving any error message. Typically i/o timeout errors indicate the Wireguard connection is not working.
2023-09-01T22:31:13Z INFO [firewall] setting allowed input port 1637 through interface wg0...
2023-09-01T22:31:13Z DEBUG [firewall] iptables --append INPUT -i wg0 -p tcp --dport 1637 -j ACCEPT
2023-09-01T22:31:13Z DEBUG [firewall] ip6tables --append INPUT -i wg0 -p tcp --dport 1637 -j ACCEPT
2023-09-01T22:31:13Z DEBUG [firewall] iptables --append INPUT -i wg0 -p udp --dport 1637 -j ACCEPT
2023-09-01T22:31:13Z DEBUG [firewall] ip6tables --append INPUT -i wg0 -p udp --dport 1637 -j ACCEPT
2023-09-01T22:31:13Z INFO [firewall] setting allowed input port 41909 through interface wg0...
2023-09-01T22:31:13Z DEBUG [firewall] iptables --append INPUT -i wg0 -p tcp --dport 41909 -j ACCEPT
2023-09-01T22:31:13Z DEBUG [firewall] ip6tables --append INPUT -i wg0 -p tcp --dport 41909 -j ACCEPT
2023-09-01T22:31:13Z DEBUG [firewall] iptables --append INPUT -i wg0 -p udp --dport 41909 -j ACCEPT
2023-09-01T22:31:13Z DEBUG [firewall] ip6tables --append INPUT -i wg0 -p udp --dport 41909 -j ACCEPT
2023-09-01T22:31:13Z INFO [firewall] setting allowed input port 57427 through interface wg0...
2023-09-01T22:31:13Z DEBUG [firewall] iptables --append INPUT -i wg0 -p tcp --dport 57427 -j ACCEPT
2023-09-01T22:31:13Z DEBUG [firewall] ip6tables --append INPUT -i wg0 -p tcp --dport 57427 -j ACCEPT
2023-09-01T22:31:13Z DEBUG [firewall] iptables --append INPUT -i wg0 -p udp --dport 57427 -j ACCEPT
2023-09-01T22:31:13Z DEBUG [firewall] ip6tables --append INPUT -i wg0 -p udp --dport 57427 -j ACCEPT
2023-09-01T22:31:20Z ERROR [ip getter] Get "https://ipinfo.io/": context deadline exceeded (Client.Timeout exceeded while awaiting headers)
2023-09-01T22:31:20Z INFO [ip getter] retrying in 5s
2023-09-01T22:31:24Z INFO [healthcheck] program has been unhealthy for 11s: restarting VPN (see https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md)
2023-09-01T22:31:24Z INFO [vpn] stopping
2023-09-01T22:31:24Z INFO [firewall] removing allowed port 1637...
2023-09-01T22:31:24Z DEBUG [firewall] iptables --delete INPUT -i wg0 -p tcp --dport 1637 -j ACCEPT
2023-09-01T22:31:24Z DEBUG [firewall] ip6tables --delete INPUT -i wg0 -p tcp --dport 1637 -j ACCEPT
2023-09-01T22:31:24Z DEBUG [firewall] iptables --delete INPUT -i wg0 -p udp --dport 1637 -j ACCEPT
2023-09-01T22:31:24Z DEBUG [firewall] ip6tables --delete INPUT -i wg0 -p udp --dport 1637 -j ACCEPT
2023-09-01T22:31:24Z INFO [firewall] removing allowed port 41909...
2023-09-01T22:31:24Z DEBUG [firewall] iptables --delete INPUT -i wg0 -p tcp --dport 41909 -j ACCEPT
2023-09-01T22:31:24Z DEBUG [firewall] ip6tables --delete INPUT -i wg0 -p tcp --dport 41909 -j ACCEPT
2023-09-01T22:31:24Z DEBUG [firewall] iptables --delete INPUT -i wg0 -p udp --dport 41909 -j ACCEPT
2023-09-01T22:31:24Z DEBUG [firewall] ip6tables --delete INPUT -i wg0 -p udp --dport 41909 -j ACCEPT
2023-09-01T22:31:24Z INFO [firewall] removing allowed port 57427...
2023-09-01T22:31:24Z DEBUG [firewall] iptables --delete INPUT -i wg0 -p tcp --dport 57427 -j ACCEPT
2023-09-01T22:31:24Z DEBUG [firewall] ip6tables --delete INPUT -i wg0 -p tcp --dport 57427 -j ACCEPT
2023-09-01T22:31:24Z DEBUG [firewall] iptables --delete INPUT -i wg0 -p udp --dport 57427 -j ACCEPT
2023-09-01T22:31:24Z DEBUG [firewall] ip6tables --delete INPUT -i wg0 -p udp --dport 57427 -j ACCEPT
2023-09-01T22:31:24Z INFO [vpn] starting
2023-09-01T22:31:24Z INFO [firewall] allowing VPN connection...
2023-09-01T22:31:24Z DEBUG [firewall] iptables --delete OUTPUT -d 213.152.187.219 -o eth0 -p udp -m udp --dport 1637 -j ACCEPT
2023-09-01T22:31:24Z DEBUG [firewall] iptables --delete OUTPUT -d 213.152.187.219 -o eth0 -p udp -m udp --dport 1637 -j ACCEPT
2023-09-01T22:31:24Z DEBUG [firewall] iptables --delete OUTPUT -o wg0 -j ACCEPT
2023-09-01T22:31:24Z DEBUG [firewall] ip6tables --delete OUTPUT -o wg0 -j ACCEPT
2023-09-01T22:31:24Z DEBUG [firewall] iptables --append OUTPUT -d 213.152.186.18 -o eth0 -p udp -m udp --dport 1637 -j ACCEPT
2023-09-01T22:31:24Z DEBUG [firewall] iptables --append OUTPUT -d 213.152.186.18 -o eth0 -p udp -m udp --dport 1637 -j ACCEPT
2023-09-01T22:31:24Z DEBUG [firewall] iptables --append OUTPUT -o wg0 -j ACCEPT
2023-09-01T22:31:24Z DEBUG [firewall] ip6tables --append OUTPUT -o wg0 -j ACCEPT
2023-09-01T22:31:24Z INFO [wireguard] Using available kernelspace implementation
2023-09-01T22:31:24Z INFO [wireguard] Connecting to 213.152.186.18:1637
2023-09-01T22:31:24Z INFO [wireguard] Wireguard setup is complete. Note Wireguard is a silent protocol and it may or may not work, without giving any error message. Typically i/o timeout errors indicate the Wireguard connection is not working.
2023-09-01T22:31:24Z INFO [firewall] setting allowed input port 1637 through interface wg0...
2023-09-01T22:31:24Z DEBUG [firewall] iptables --append INPUT -i wg0 -p tcp --dport 1637 -j ACCEPT
2023-09-01T22:31:24Z DEBUG [firewall] ip6tables --append INPUT -i wg0 -p tcp --dport 1637 -j ACCEPT
2023-09-01T22:31:24Z DEBUG [firewall] iptables --append INPUT -i wg0 -p udp --dport 1637 -j ACCEPT
2023-09-01T22:31:24Z DEBUG [firewall] ip6tables --append INPUT -i wg0 -p udp --dport 1637 -j ACCEPT
2023-09-01T22:31:24Z INFO [firewall] setting allowed input port 41909 through interface wg0...
2023-09-01T22:31:24Z DEBUG [firewall] iptables --append INPUT -i wg0 -p tcp --dport 41909 -j ACCEPT
2023-09-01T22:31:24Z DEBUG [firewall] ip6tables --append INPUT -i wg0 -p tcp --dport 41909 -j ACCEPT
2023-09-01T22:31:24Z DEBUG [firewall] iptables --append INPUT -i wg0 -p udp --dport 41909 -j ACCEPT
2023-09-01T22:31:24Z DEBUG [firewall] ip6tables --append INPUT -i wg0 -p udp --dport 41909 -j ACCEPT
2023-09-01T22:31:24Z INFO [firewall] setting allowed input port 57427 through interface wg0...
2023-09-01T22:31:24Z DEBUG [firewall] iptables --append INPUT -i wg0 -p tcp --dport 57427 -j ACCEPT
2023-09-01T22:31:24Z DEBUG [firewall] ip6tables --append INPUT -i wg0 -p tcp --dport 57427 -j ACCEPT
2023-09-01T22:31:24Z DEBUG [firewall] iptables --append INPUT -i wg0 -p udp --dport 57427 -j ACCEPT
2023-09-01T22:31:24Z DEBUG [firewall] ip6tables --append INPUT -i wg0 -p udp --dport 57427 -j ACCEPT
2023-09-01T22:31:40Z ERROR [ip getter] Get "https://ipinfo.io/": context deadline exceeded (Client.Timeout exceeded while awaiting headers)
2023-09-01T22:31:40Z INFO [ip getter] retrying in 5s
2023-09-01T22:31:40Z INFO [healthcheck] program has been unhealthy for 16s: restarting VPN (see https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md)
2023-09-01T22:31:40Z INFO [vpn] stopping

Share your configuration

sidecars:
      gluetun:
        image: ghcr.io/qdm12/gluetun:latest@sha256:8d744532dc4a2394f9b6544637b1c1312be8e38903777df6081fd1511d5d1223
        env:
          - name: VPN_TYPE
            value: wireguard
          - name: VPN_SERVICE_PROVIDER
            value: airvpn
          - name: VPN_INTERFACE
            value: wg0
          - name: FIREWALL
            value: "on"
          - name: DOT
            value: "off"
          - name: FIREWALL_VPN_INPUT_PORTS
            value: 1637,41909,57427
          - name: FIREWALL_INPUT_PORTS
            value: 80
          - name: FIREWALL_DEBUG
            value: "on"
          - name: DNS_ADDRESS
            value: 10.41.0.10 # kube coredns
          - name: WIREGUARD_MTU
            value: 1320
          # - name:  WIREGUARD_PRIVATE_KEY
          #   value: set in secret
          # - name:  WIREGUARD_ADDRESSES
          #   value: set in secret
          # - name:  SERVER_COUNTRIES
          #   value: set in secret
        envFrom:
          - secretRef:
              name: qbit-vpn-secret
        volumeMounts:
          - { name: post-iptables, mountPath: /iptables/post-rules.txt }
        securityContext:
          capabilities:
            add:
              - NET_ADMIN
@qdm12
Copy link
Owner

qdm12 commented Sep 13, 2023

Done in 3449e7a 😉

@qdm12 qdm12 closed this as completed Sep 13, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants