New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
VPN provider support: VPNSecure.me #685
Comments
vpnsecure.zip |
Wonderful. Notes to my future self:
subdomains := []string{"at2", "au2", "au3", "be1", "be2", "ca1", "ca2", "ch1", "de1", "de2", "de3", "de4", "de5", "de6", "dk3", "es1", "es2", "fr1", "fr2", "fr3", "fr4", "hk1", "id1", "ie1", "in1", "mx1", "nl1", "nl2", "nz1", "se1", "se3", "uk1", "uk2", "uk3", "uk4", "uk5", "uk6", "uk7", "us1", "us10", "us11", "us12", "us13", "us14", "us15", "us16", "us2", "us4", "us5", "us6", "us7", "us8", "us9", "ustream1", "za2"}
Ca certificate:
Encrypted private key:
Cert certificate:
|
Hey, Glad to read this. I support this feature request and will be able to test it when implemented ! Thanks |
Hello, any follow on this ? do you think you'll be able to implement it soon ? |
Thanks! It's definitely coming soon, but it's blocked by #756 which is a long lasting rework I've been doing for several weeks (to be able to plug in configurations from more sources). |
@qdm12 Just found this container. Very impressive. I tried to add it myself, using your custom config page, but it keep getting stuck at as shown here Happy to provide more info if you need/want. |
Hello, |
Sorry for the long delay, I am finally working on it. A few additional quick questions:
@Cyphon00 Probably pull latest, that might had been a bug introduced in #756. Although vpnsecure.me looks like it needs a passphrase for the encrypted private key which you can specify with a |
No problem.
|
@magicgg91 In your Openvpn configuration file, do you also have an 'encrypted private key'? Example of one:
|
Answer from VPNSecure support : |
Ugh well this is the API being called to show the public page https://www.vpnsecure.me/vpn-locations/. Anyway, I'll code something to scrap https://www.vpnsecure.me/vpn-locations/ directly then without going through their API 😕 |
Also do you have an encrypted private key in your Openvpn configuration file? |
I pushed an image Anyway feel free to try it: docker run -it --rm --cap-add=NET_ADMIN -e VPN_SERVICE_PROVIDER=vpnsecure -e OPENVPN_USER=bla -e OPENVPN_PASSWORD=bla qmcgaw/gluetun:vpnsecure It should work for you @Sea-Wolfe (or not then let me know!) |
I quickly tried the SeaWolf release, but it didn't work for me. Kept receiving the 'server unhealthy...restarting' type messages. |
Please try again with
and then run docker run -it --rm --cap-add=NET_ADMIN -v /yourhostpath/gluetun:/gluetun \
-e VPN_SERVICE_PROVIDER=vpnsecure -e OPENVPN_USER=xxx -e OPENVPN_PASSWORD=xxx \
qmcgaw/gluetun:vpnsecure |
@qdm12 Cheers.
I'm not sure if it's there's a bug or if the issue is on my end. I've copied it here in case it's of use, but happy to delete if it's an error in my setup. |
It looks like this issue: #855 (comment) |
#855 was due to a mixup in my build pipeline, I'm working on it. Thanks @frepke for linking the two that helped me figure it out 😄 👍 @Cyphon00 So yes |
Thanks for confirming. There's nothing wrong with your file naming convention, I'm simply used to DOS/Windows, where files have extensions :) After re-pulling, I no longer have that panic + crash :) I'll have to try again/look into it tomorrow though. |
I picked the wrong hostnames, I thought it was host.vpnsecure.me but it's actually host.isponeder.com. |
Can you try with image qmcgaw/gluetun:pr-848 please? |
Unfortunately, the same results: I did pull the latest 848 update first and turned off the QNAP QVPN app before trying too. Unfortuantely, there's no other error msgs that I could find. I believe we're already using verbose/full logging too. |
Hm I've been trying for some time but I couldn't even get an For example I have If yes, then can you please try with one of their configuration file and https://github.com/qdm12/gluetun/wiki/OpenVPN-configuration-file to check if it works with one of their server? Sorry I'm a bit clueless at this point. |
Yes, I do. Here are my two Open VPN files for the au2 server. I removed all the key info and replaced my username with 'USERNAME' in the filenames. |
Also, I believe there is a typo in the instructions at: https://github.com/qdm12/gluetun/wiki/OpenVPN-configuration-file |
Finally, I just tried the method you requested, but I get the exact same error 'unhealthy, restarting...' I've also tried with bogus username/password combos, but there's no difference. This suggests we aren't even getting in touch with the VPN server. |
Yes that's the same IP gluetun uses.
What is this, is it for Openvpn?
Totally, I'll fix that.
You can use
Yep, can you try with dumb native openvpn on your laptop/desktop machine with their Australia openvpn configuration file? Maybe these configuration files are just bad 🤔 If they are, complain to their support and let me know once they're fixed and what changed. |
Thanks @rkbest13 for trying it out. My bad, you need to use Also for other possible users, image is built by the CI for all architectures at |
Thanks @qdm12 , changed to 'vpn secure' and re-ran the container and got this in the logs. I used Australia /au2.isponder.com
|
@rkbest13 just don't set any filter for now, it will pick a random server. If you want to try filters (I'll document it in the wiki once the image works),
No, these are for another protocol I think. We are aiming at making it work with OpenVPN only (or Wireguard, but I don't think they support it). |
What hostserver or city or region should i test with for now. SO that we are testing the same servers for this image? |
You can use |
This is most likely because you did not remove Anyway, I spent a good amount of time today to parse the country from their website as well, so it's now part of the servers data, so you can use |
Awesome! Thanks will give it another try tonight! |
Still unhealthy but wuth new logs information to debug.
|
@rkbest13 awesome, the problem is because of that encrypted private key requiring a password to be decrypted.
|
The private key was in plain text when I opened it before moving to hostpath. The only other password is the account password that is added to env variable. |
It is but its encoded content is encrypted. From reading their website, i don't think you can download as unencrypted. However, reading https://support.vpnsecure.me/articles/getting-started-dd-wrt-routers/pfsense it looks like you might have a .keyout file in your downloaded zip file, do you have such file? How does the content of it look like, is it a single line/readable characters? Thanks! |
Can you please send me your zipped 2 folders to quentin.mcgaw@gmail.com without your credentials (just remove user and password of they are in a file, although it's usually asked interactively)? It's a bit hard to know what file is what without seeing the content and file extension. Also, your private key is useless without your username+password credentials so don't worry about sharing it either (it's also unneeded security imo, a 9+ long characters password is more than enough). Thanks! |
Just sent it! |
Thanks @rkbest13 that definitely helped. On image docker pull qmcgaw/gluetun:vpnsecure
docker run -it --rm --cap-add=NET_ADMIN -v /yourhostpath/gluetun:/gluetun \
-e VPN_SERVICE_PROVIDER="vpn secure" -e OPENVPN_USER=xxx -e OPENVPN_PASSWORD=xxx \
-e OPENVPN_KEY_PASSPHRASE=xxx qmcgaw/gluetun:vpnsecure I haven't really tested it, so it may or may not work the first time... |
Tried with au2.isponedor.com server no host_country and passphrase.
|
Please pull and try again, that bug is fixed. I tried myself and it looks like it works but I get the:
Since I am using some locally generated key not valid with vpnsecure or their certificate. |
Same on my end. wonder if my private key password is different than my account password. |
Maybe have a go with openvpn directly on one of your machines? That way you can try interactively to find which password is right for your encrypted key. Related information I found: https://support.vpnsecure.me/articles/getting-started-dd-wrt-routers/pfsense |
There is also a SSL mismatch error before the key error. What it could be? I dont think there is a error in the passphrase key I used. although i could not verify via OPENVPN steps in that page. might give it a try on pfsense in future. The content of the files are same as what i shared with you. and there is only one password for this account. |
Let's scrap all this; I pushed the image again this time using the Openvpn configuration files from your docker pull qmcgaw/gluetun:vpnsecure
docker run -it --rm --cap-add=NET_ADMIN -e VPN_SERVICE_PROVIDER="vpn secure" \
-e OPENVPN_USER=xxx -e OPENVPN_PASSWORD=xxx \
qmcgaw/gluetun:vpnsecure EDIT: @rkbest13 did you remove the |
I did not remove anything from key or cert fields. `2022-07-04T03:56:21Z INFO [vpn] stopping 2022-07-04T03:56:21Z INFO [vpn] starting 2022-07-04T03:56:21Z INFO [firewall] allowing VPN connection... 2022-07-04T03:56:21Z WARN [openvpn] Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless "allow-compression yes" is also set. 2022-07-04T03:56:21Z INFO [openvpn] OpenVPN 2.5.6 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Apr 17 2022 2022-07-04T03:56:21Z INFO [openvpn] library versions: OpenSSL 1.1.1o 3 May 2022, LZO 2.10 2022-07-04T03:56:21Z INFO [openvpn] TCP/UDP: Preserving recently used remote address: [AF_INET]45.114.118.84:1282 2022-07-04T03:56:21Z INFO [openvpn] UDP link local: (not bound) ` |
I'll subscribe and test it myself in the coming days to put an end to this 😄 I'll keep you updated. |
Maybe get from here. Often on sale for lifetime use |
Alright I finally finished this! Use image It works for me, but let me know if you encounter any issue or if it works, and I'll get this merged 👍 |
Zip file received by email
The text was updated successfully, but these errors were encountered: