Mullvad not working for me suddenly
Closed this issue · 4 comments
Is there a pinned issue for this?
- I have read the pinned issues
Is there an existing or similar issue for this?
- I have searched the existing issues
Is there any comment in the documentation for this?
- I have read the documentation, especially the FAQ and Troubleshooting parts
Is this related to the container/transmission?
- I have checked the container repo for issues
Are you using the latest release?
- I am using the latest release
Have you tried using the dev branch latest?
- I have tried using dev branch
Config used
This system was working fine, and the VPN login is working elsewhere when tried. The problem is that the system never actually starts up now, and I cannot seem to get any real information on why.
`Running with VPN_CONFIG_SOURCE auto
No bundled config script found for MULLVAD. Defaulting to external config
Downloading configs from https://github.com/haugene/vpn-configs-contrib/archive/main.zip into /tmp/tmp.uDfjg3zFPQ
Extracting configs to /tmp/tmp.UEb6b3YzZe
Found configs for MULLVAD in /tmp/tmp.UEb6b3YzZe/vpn-configs-contrib-main/openvpn/mullvad, will replace current content in /etc/openvpn/mullvad
Cleanup: deleting /tmp/tmp.uDfjg3zFPQ and /tmp/tmp.UEb6b3YzZe
Starting OpenVPN using config rs_all.ovpn
Modifying /etc/openvpn/mullvad/rs_all.ovpn for best behaviour in this container
Modification: Point auth-user-pass option to the username/password file
Modification: Change ca certificate path
Modification: Change ping options
Modification: Update/set resolv-retry to 15 seconds
Modification: Change tls-crypt keyfile path
Modification: Set output verbosity to 3
Modification: Remap SIGUSR1 signal to SIGTERM, avoid OpenVPN restart loop
Modification: Updating status for config failure detection
Setting OpenVPN credentials...
adding route to local network 192.168.1.0/24 via 172.17.0.1 dev eth0
2023-04-21 22:18:58 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
2023-04-21 22:18:58 OpenVPN 2.5.5 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 14 2022
2023-04-21 22:18:58 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10
2023-04-21 22:18:58 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2023-04-21 22:18:59 TCP/UDP: Preserving recently used remote address: [AF_INET]89.38.224.114:1197
2023-04-21 22:18:59 Socket Buffers: R=[212992->425984] S=[212992->425984]
2023-04-21 22:18:59 UDP link local: (not bound)
2023-04-21 22:18:59 UDP link remote: [AF_INET]89.38.224.114:1197
2023-04-21 22:20:00 [UNDEF] Inactivity timeout (--ping-exit), exiting
2023-04-21 22:20:00 SIGTERM[soft,ping-exit] received, process exiting
Starting container with revision: 73ec516cc246972289c7b96ffa88c81e037fe364
TRANSMISSION_HOME is currently set to: /data/transmission-home
WARNING: TRANSMISSION_HOME is not set to the default /config/transmission-home, this is not recommended.
TRANSMISSION_HOME should be set to /config/transmission-home OR another custom directory on /config/
If you would like to migrate your existing TRANSMISSION_HOME, please stop the container, add volume /config and move the transmission-home directory there.
WARNING: Deprecated. Found old default transmission-home folder at /data/transmission-home, setting this as TRANSMISSION_HOME. This might break in future versions.
We will fallback to this directory as long as the folder exists. Please consider moving it to /config/transmission-home
Creating TUN device /dev/net/tun
Using OpenVPN provider: MULLVAD
Running with VPN_CONFIG_SOURCE auto
No bundled config script found for MULLVAD. Defaulting to external config
Downloading configs from https://github.com/haugene/vpn-configs-contrib/archive/main.zip into /tmp/tmp.RRE5QqC1nt
Extracting configs to /tmp/tmp.STpHsTkshB
Found configs for MULLVAD in /tmp/tmp.STpHsTkshB/vpn-configs-contrib-main/openvpn/mullvad, will replace current content in /etc/openvpn/mullvad
Cleanup: deleting /tmp/tmp.RRE5QqC1nt and /tmp/tmp.STpHsTkshB
Starting OpenVPN using config rs_all.ovpn
Modifying /etc/openvpn/mullvad/rs_all.ovpn for best behaviour in this container
Modification: Point auth-user-pass option to the username/password file
Modification: Change ca certificate path
Modification: Change ping options
Modification: Update/set resolv-retry to 15 seconds
Modification: Change tls-crypt keyfile path
Modification: Set output verbosity to 3
Modification: Remap SIGUSR1 signal to SIGTERM, avoid OpenVPN restart loop
Modification: Updating status for config failure detection
Setting OpenVPN credentials...
adding route to local network 192.168.1.0/24 via 172.17.0.1 dev eth0
2023-04-21 22:20:04 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
2023-04-21 22:20:04 OpenVPN 2.5.5 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 14 2022
2023-04-21 22:20:04 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10
2023-04-21 22:20:04 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2023-04-21 22:20:04 TCP/UDP: Preserving recently used remote address: [AF_INET]89.38.224.114:1197
2023-04-21 22:20:04 Socket Buffers: R=[212992->425984] S=[212992->425984]
2023-04-21 22:20:04 UDP link local: (not bound)
2023-04-21 22:20:04 UDP link remote: [AF_INET]89.38.224.114:1197
2023-04-21 22:21:04 [UNDEF] Inactivity timeout (--ping-exit), exiting
2023-04-21 22:21:04 SIGTERM[soft,ping-exit] received, process exiting
Starting container with revision: 73ec516cc246972289c7b96ffa88c81e037fe364
TRANSMISSION_HOME is currently set to: /data/transmission-home
WARNING: TRANSMISSION_HOME is not set to the default /config/transmission-home, this is not recommended.
TRANSMISSION_HOME should be set to /config/transmission-home OR another custom directory on /config/
If you would like to migrate your existing TRANSMISSION_HOME, please stop the container, add volume /config and move the transmission-home directory there.
WARNING: Deprecated. Found old default transmission-home folder at /data/transmission-home, setting this as TRANSMISSION_HOME. This might break in future versions.
We will fallback to this directory as long as the folder exists. Please consider moving it to /config/transmission-home
Creating TUN device /dev/net/tun
Using OpenVPN provider: MULLVAD
Running with VPN_CONFIG_SOURCE auto
No bundled config script found for MULLVAD. Defaulting to external config
Downloading configs from https://github.com/haugene/vpn-configs-contrib/archive/main.zip into /tmp/tmp.akRYPHsWk2
Extracting configs to /tmp/tmp.skUc5DMs1p
Found configs for MULLVAD in /tmp/tmp.skUc5DMs1p/vpn-configs-contrib-main/openvpn/mullvad, will replace current content in /etc/openvpn/mullvad
Cleanup: deleting /tmp/tmp.akRYPHsWk2 and /tmp/tmp.skUc5DMs1p
Starting OpenVPN using config rs_all.ovpn
Modifying /etc/openvpn/mullvad/rs_all.ovpn for best behaviour in this container
Modification: Point auth-user-pass option to the username/password file
Modification: Change ca certificate path
Modification: Change ping options
Modification: Update/set resolv-retry to 15 seconds
Modification: Change tls-crypt keyfile path
Modification: Set output verbosity to 3
Modification: Remap SIGUSR1 signal to SIGTERM, avoid OpenVPN restart loop
Modification: Updating status for config failure detection
Setting OpenVPN credentials...
adding route to local network 192.168.1.0/24 via 172.17.0.1 dev eth0
2023-04-21 22:21:09 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
2023-04-21 22:21:09 OpenVPN 2.5.5 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 14 2022
2023-04-21 22:21:09 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10
2023-04-21 22:21:09 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2023-04-21 22:21:09 TCP/UDP: Preserving recently used remote address: [AF_INET]89.38.224.114:1197
2023-04-21 22:21:09 Socket Buffers: R=[212992->425984] S=[212992->425984]
2023-04-21 22:21:09 UDP link local: (not bound)
2023-04-21 22:21:09 UDP link remote: [AF_INET]89.38.224.114:1197
`
Current Behavior
Tries to start-up, fails.
Expected Behavior
Start-up and work?
How have you tried to solve the problem?
Tried to use dev and regular branch
did delete's and re-created with fresh downloaded containers
and several other normal troubleshooting issues
Log output
Running with VPN_CONFIG_SOURCE auto
No bundled config script found for MULLVAD. Defaulting to external config
Downloading configs from https://github.com/haugene/vpn-configs-contrib/archive/main.zip into /tmp/tmp.uDfjg3zFPQ
Extracting configs to /tmp/tmp.UEb6b3YzZe
Found configs for MULLVAD in /tmp/tmp.UEb6b3YzZe/vpn-configs-contrib-main/openvpn/mullvad, will replace current content in /etc/openvpn/mullvad
Cleanup: deleting /tmp/tmp.uDfjg3zFPQ and /tmp/tmp.UEb6b3YzZe
Starting OpenVPN using config rs_all.ovpn
Modifying /etc/openvpn/mullvad/rs_all.ovpn for best behaviour in this container
Modification: Point auth-user-pass option to the username/password file
Modification: Change ca certificate path
Modification: Change ping options
Modification: Update/set resolv-retry to 15 seconds
Modification: Change tls-crypt keyfile path
Modification: Set output verbosity to 3
Modification: Remap SIGUSR1 signal to SIGTERM, avoid OpenVPN restart loop
Modification: Updating status for config failure detection
Setting OpenVPN credentials...
adding route to local network 192.168.1.0/24 via 172.17.0.1 dev eth0
2023-04-21 22:18:58 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
2023-04-21 22:18:58 OpenVPN 2.5.5 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 14 2022
2023-04-21 22:18:58 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10
2023-04-21 22:18:58 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2023-04-21 22:18:59 TCP/UDP: Preserving recently used remote address: [AF_INET]89.38.224.114:1197
2023-04-21 22:18:59 Socket Buffers: R=[212992->425984] S=[212992->425984]
2023-04-21 22:18:59 UDP link local: (not bound)
2023-04-21 22:18:59 UDP link remote: [AF_INET]89.38.224.114:1197
2023-04-21 22:20:00 [UNDEF] Inactivity timeout (--ping-exit), exiting
2023-04-21 22:20:00 SIGTERM[soft,ping-exit] received, process exiting
Starting container with revision: 73ec516cc246972289c7b96ffa88c81e037fe364
TRANSMISSION_HOME is currently set to: /data/transmission-home
WARNING: TRANSMISSION_HOME is not set to the default /config/transmission-home, this is not recommended.
TRANSMISSION_HOME should be set to /config/transmission-home OR another custom directory on /config/
If you would like to migrate your existing TRANSMISSION_HOME, please stop the container, add volume /config and move the transmission-home directory there.
WARNING: Deprecated. Found old default transmission-home folder at /data/transmission-home, setting this as TRANSMISSION_HOME. This might break in future versions.
We will fallback to this directory as long as the folder exists. Please consider moving it to /config/transmission-home
Creating TUN device /dev/net/tun
Using OpenVPN provider: MULLVAD
Running with VPN_CONFIG_SOURCE auto
No bundled config script found for MULLVAD. Defaulting to external config
Downloading configs from https://github.com/haugene/vpn-configs-contrib/archive/main.zip into /tmp/tmp.RRE5QqC1nt
Extracting configs to /tmp/tmp.STpHsTkshB
Found configs for MULLVAD in /tmp/tmp.STpHsTkshB/vpn-configs-contrib-main/openvpn/mullvad, will replace current content in /etc/openvpn/mullvad
Cleanup: deleting /tmp/tmp.RRE5QqC1nt and /tmp/tmp.STpHsTkshB
Starting OpenVPN using config rs_all.ovpn
Modifying /etc/openvpn/mullvad/rs_all.ovpn for best behaviour in this container
Modification: Point auth-user-pass option to the username/password file
Modification: Change ca certificate path
Modification: Change ping options
Modification: Update/set resolv-retry to 15 seconds
Modification: Change tls-crypt keyfile path
Modification: Set output verbosity to 3
Modification: Remap SIGUSR1 signal to SIGTERM, avoid OpenVPN restart loop
Modification: Updating status for config failure detection
Setting OpenVPN credentials...
adding route to local network 192.168.1.0/24 via 172.17.0.1 dev eth0
2023-04-21 22:20:04 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
2023-04-21 22:20:04 OpenVPN 2.5.5 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 14 2022
2023-04-21 22:20:04 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10
2023-04-21 22:20:04 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2023-04-21 22:20:04 TCP/UDP: Preserving recently used remote address: [AF_INET]89.38.224.114:1197
2023-04-21 22:20:04 Socket Buffers: R=[212992->425984] S=[212992->425984]
2023-04-21 22:20:04 UDP link local: (not bound)
2023-04-21 22:20:04 UDP link remote: [AF_INET]89.38.224.114:1197
2023-04-21 22:21:04 [UNDEF] Inactivity timeout (--ping-exit), exiting
2023-04-21 22:21:04 SIGTERM[soft,ping-exit] received, process exiting
Starting container with revision: 73ec516cc246972289c7b96ffa88c81e037fe364
TRANSMISSION_HOME is currently set to: /data/transmission-home
WARNING: TRANSMISSION_HOME is not set to the default /config/transmission-home, this is not recommended.
TRANSMISSION_HOME should be set to /config/transmission-home OR another custom directory on /config/
If you would like to migrate your existing TRANSMISSION_HOME, please stop the container, add volume /config and move the transmission-home directory there.
WARNING: Deprecated. Found old default transmission-home folder at /data/transmission-home, setting this as TRANSMISSION_HOME. This might break in future versions.
We will fallback to this directory as long as the folder exists. Please consider moving it to /config/transmission-home
Creating TUN device /dev/net/tun
Using OpenVPN provider: MULLVAD
Running with VPN_CONFIG_SOURCE auto
No bundled config script found for MULLVAD. Defaulting to external config
Downloading configs from https://github.com/haugene/vpn-configs-contrib/archive/main.zip into /tmp/tmp.akRYPHsWk2
Extracting configs to /tmp/tmp.skUc5DMs1p
Found configs for MULLVAD in /tmp/tmp.skUc5DMs1p/vpn-configs-contrib-main/openvpn/mullvad, will replace current content in /etc/openvpn/mullvad
Cleanup: deleting /tmp/tmp.akRYPHsWk2 and /tmp/tmp.skUc5DMs1p
Starting OpenVPN using config rs_all.ovpn
Modifying /etc/openvpn/mullvad/rs_all.ovpn for best behaviour in this container
Modification: Point auth-user-pass option to the username/password file
Modification: Change ca certificate path
Modification: Change ping options
Modification: Update/set resolv-retry to 15 seconds
Modification: Change tls-crypt keyfile path
Modification: Set output verbosity to 3
Modification: Remap SIGUSR1 signal to SIGTERM, avoid OpenVPN restart loop
Modification: Updating status for config failure detection
Setting OpenVPN credentials...
adding route to local network 192.168.1.0/24 via 172.17.0.1 dev eth0
2023-04-21 22:21:09 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
2023-04-21 22:21:09 OpenVPN 2.5.5 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 14 2022
2023-04-21 22:21:09 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10
2023-04-21 22:21:09 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2023-04-21 22:21:09 TCP/UDP: Preserving recently used remote address: [AF_INET]89.38.224.114:1197
2023-04-21 22:21:09 Socket Buffers: R=[212992->425984] S=[212992->425984]
2023-04-21 22:21:09 UDP link local: (not bound)
2023-04-21 22:21:09 UDP link remote: [AF_INET]89.38.224.114:1197
Environment
- OS: Ubuntu 20.04
- Docker: Latest
Anything else?
no
The logs indicate that rs_all
is in use.
The servers are currently offline, as can be seen on the Mullvad page.
The logs indicate that
rs_all
is in use. The servers are currently offline, as can be seen on the Mullvad page.
The problem is that the docker requires you to pick "nl_all" or rs_all" and may be picking many offline servers... it wont let me pick a specific one in docker environment.
No luck getting others to work!!
While you are at it, please relocate your transmission home folder to /config mount for future compatibility..
The server issues need a reworked script imo which pings the servers in the list until it finds one it can connect to..
The problem is that the docker requires you to pick "nl_all" or rs_all" and may be picking many offline servers... it wont let me pick a specific one in docker environment.
Partly true, however when the connection fails, the container will restart and once again choose randomly from the list of servers.
You can theoretically create your own config file with a larger list of servers (I think max is 64), to reduce the chance that no servers at all are available.