Page 1 of 1

[Solved] qbittorrent stuck on being behind firewall / metadata download

Posted: Tue Aug 05, 2025 4:06 pm
by tutankhamun

Hi there, I am having issue getting gluetun to communicate with qbittorrent. this is my docker-compose.yaml.

Code: Select all

services:
  # jellyfin is used to serve your media to the client devices
  jellyfin:
    image: lscr.io/linuxserver/${MEDIA_SERVICE}
    container_name: ${MEDIA_SERVICE}
    #network_mode: host # plex
    environment:
      - PUID=${PUID}
      - PGID=${PGID}
      - VERSION=docker
    volumes:
      - /etc/localtime:/etc/localtime:ro
      - ${MEDIA_DIRECTORY}:/data
      - ${INSTALL_DIRECTORY}/config/${MEDIA_SERVICE}:/config
    ports: # plex
      - 8096:8096 # plex
    restart: unless-stopped

  # qBitorrent is used to download torrents
  qbittorrent:
    image: lscr.io/linuxserver/qbittorrent:libtorrentv1
    container_name: qbittorrent
    environment:
      - PUID=${PUID}
      - PGID=${PGID}
      - WEBUI_PORT=8081
    volumes:
      - /etc/localtime:/etc/localtime:ro
      - ${MEDIA_DIRECTORY}:/data
      - ${INSTALL_DIRECTORY}/config/qbittorrent:/config
    restart: unless-stopped
    #ports: # qbittorrent
    #  - 8081:8081 # qbittorrent
    network_mode: "service:gluetun"

  # SABnzbd is used to download from usenet
  sabnzbd:
    image: lscr.io/linuxserver/sabnzbd:latest
    container_name: sabnzbd
    environment:
      - PUID=${PUID}
      - PGID=${PGID}
      - TZ=America/Montevideo
    volumes:
      - /etc/localtime:/etc/localtime:ro
      - ${MEDIA_DIRECTORY}:/data
      - ${INSTALL_DIRECTORY}/config/sabnzbd:/config
    #ports: # sabnzbd
    #  - 8080:8080 # sabnzbd
    restart: unless-stopped
    network_mode: "service:gluetun"

  # Sonarr is used to query, add downloads to the download queue and index TV shows
  # https://sonarr.tv/
  sonarr:
    image: lscr.io/linuxserver/sonarr
    container_name: sonarr
    environment:
      - PUID=${PUID}
      - PGID=${PGID}
    volumes:
      - /etc/localtime:/etc/localtime:ro
      - ${MEDIA_DIRECTORY}:/data
      - ${INSTALL_DIRECTORY}/config/sonarr:/config
    restart: unless-stopped
    network_mode: "service:gluetun"



  # Radarr is used to query, add downloads to the download queue and index Movies
  # https://radarr.video/
  radarr:
    image: lscr.io/linuxserver/radarr
    container_name: radarr
    environment:
      - PUID=${PUID}
      - PGID=${PGID}
    volumes:
      - /etc/localtime:/etc/localtime:ro
      - ${MEDIA_DIRECTORY}:/data
      - ${INSTALL_DIRECTORY}/config/radarr:/config
    restart: unless-stopped
    network_mode: "service:gluetun"


  # Lidarr is used to query, add downloads to the download queue and index Music
  # https://lidarr.audio/
  lidarr:
    image: lscr.io/linuxserver/lidarr
    container_name: lidarr
    environment:
      - PUID=${PUID}
      - PGID=${PGID}
    volumes:
      - /etc/localtime:/etc/localtime:ro
      - ${MEDIA_DIRECTORY}:/data
      - ${INSTALL_DIRECTORY}/config/lidarr:/config
    restart: unless-stopped
    network_mode: "service:gluetun"



  # Bazarr is used to download and categorize subtitles
  # https://www.bazarr.media/
  bazarr:
    image: lscr.io/linuxserver/bazarr
    container_name: bazarr
    environment:
      - PUID=${PUID}
      - PGID=${PGID}
    volumes:
      - /etc/localtime:/etc/localtime:ro
      - ${MEDIA_DIRECTORY}:/data
      - ${INSTALL_DIRECTORY}/config/bazarr:/config
    restart: unless-stopped
    network_mode: "service:gluetun"



  # Prowlarr is our torrent indexer/searcher. Sonarr/Radarr use Prowlarr as a source
  # https://prowlarr.com/
  prowlarr:
    image: lscr.io/linuxserver/prowlarr
    container_name: prowlarr
    environment:
      - PUID=${PUID}
      - PGID=${PGID}
    volumes:
      - /etc/localtime:/etc/localtime:ro
      - ${INSTALL_DIRECTORY}/config/prowlarr:/config
    network_mode: "service:gluetun"
    restart: unless-stopped

  # Gluetun is our VPN, so you can download torrents safely
  gluetun:
    image: qmcgaw/gluetun:v3
    container_name: gluetun
    cap_add:
      - NET_ADMIN
    devices:
      - /dev/net/tun:/dev/net/tun
    ports:
      - 8888:8888/tcp  # HTTP proxy
      - 8388:8388/tcp  # Shadowsocks
      - 8388:8388/udp  # Shadowsocks
      - 8003:8000/tcp  # Gluetun admin
      #- 8080:8080/tcp  # qBittorrent WebUI (optional)
      - 8081:8081/tcp  # qBittorrent WebUI
      - 8989:8989      # Sonarr
      - 7878:7878      # Radarr
      - 8686:8686      # Lidarr
      - 6767:6767      # Bazarr
      - 9696:9696      # Prowlarr
      - 8080:8080      # SABnzbd (add this if you want web access to SABnzbd)
      - 3000:3000
      - 3001:3001
    environment:
      - FIREWALL_OUTBOUND_SUBNETS=172.60.0.0/24
      - VPN_SERVICE_PROVIDER=private internet access
      - PORT_FORWARD_ONLY=yes
      - OPENVPN_USER=xxxx
      - OPENVPN_PASSWORD=xxx_
      - SERVER_REGIONS=DE Frankfurt
    volumes:
      - /opt/gluetun:/gluetun
    restart: unless-stopped
    networks:
      yams_network:
        ipv4_address: 172.60.0.18

  # Portainer helps debugging and monitors the containers
  portainer:
    image: portainer/portainer-ce
    container_name: portainer
    ports:
      - 9000:9000
    volumes:
      - /etc/localtime:/etc/localtime:ro
      - /var/run/docker.sock:/var/run/docker.sock:ro
      - ${INSTALL_DIRECTORY}/config/portainer:/data
    restart: unless-stopped
    networks:
      yams_network:
        ipv4_address: 172.60.0.19

  # Watchtower is going to keep our instances updated
  watchtower:
    image: containrrr/watchtower
    container_name: watchtower
    environment:
      - WATCHTOWER_CLEANUP=true
    volumes:
      - /var/run/docker.sock:/var/run/docker.sock
    restart: unless-stopped
    networks:
      yams_network:
        ipv4_address: 172.60.0.20

  restarter:
    image: docker:cli
    volumes:
      - "/var/run/docker.sock:/var/run/docker.sock"
    # Restart every 20 minutes (1200 secs)
    command: ["/bin/sh", "-ex", "-c", "while true; do sleep 1200; echo restarting; docker restart qbittorrent; done"]
    restart: unless-stopped
    depends_on:
      - qbittorrent
  
networks: yams_network: name: yams_network ipam: config: - subnet: 172.60.0.0/24

my log file

Code: Select all

❯ docker logs gluetun
========================================
========================================
=============== gluetun ================
========================================
=========== Made with ❀️ by ============
======= https://github.com/qdm12 =======
========================================
========================================

Running version v3.40.0 built on 2024-12-25T22:01:25.675Z (commit e890c50)

πŸ”§ Need help? β˜• Discussion? https://github.com/qdm12/gluetun/discussions/new/choose
πŸ› Bug? ✨ New feature? https://github.com/qdm12/gluetun/issues/new/choose
πŸ’» Email? quentin.mcgaw@gmail.com
πŸ’° Help me? https://www.paypal.me/qmcgaw https://github.com/sponsors/qdm12
2025-08-05T15:58:27Z INFO [routing] default route found: interface eth0, gateway 172.60.0.1, assigned IP 172.60.0.18 and family v4
2025-08-05T15:58:27Z INFO [routing] local ethernet link found: eth0
2025-08-05T15:58:27Z INFO [routing] local ipnet found: 172.60.0.0/24
2025-08-05T15:58:27Z INFO [firewall] enabling...
2025-08-05T15:58:28Z INFO [firewall] enabled successfully
2025-08-05T15:58:32Z INFO [storage] merging by most recent 20776 hardcoded servers and 20776 servers read from /gluetun/servers.json
2025-08-05T15:58:33Z INFO Alpine version: 3.20.3
2025-08-05T15:58:33Z INFO OpenVPN 2.5 version: 2.5.10
2025-08-05T15:58:33Z INFO OpenVPN 2.6 version: 2.6.11
2025-08-05T15:58:33Z INFO IPtables version: v1.8.10
2025-08-05T15:58:33Z INFO Settings summary:
β”œβ”€β”€ VPN settings:
|   β”œβ”€β”€ VPN provider settings:
|   |   β”œβ”€β”€ Name: private internet access
|   |   └── Server selection settings:
|   |       β”œβ”€β”€ VPN type: openvpn
|   |       β”œβ”€β”€ Regions: de frankfurt
|   |       β”œβ”€β”€ Port forwarding only servers: yes
|   |       └── OpenVPN server selection settings:
|   |           β”œβ”€β”€ Protocol: UDP
|   |           └── Private Internet Access encryption preset: strong
|   └── OpenVPN settings:
|       β”œβ”€β”€ OpenVPN version: 2.6
|       β”œβ”€β”€ User: [set]
|       β”œβ”€β”€ Password: [set]
|       β”œβ”€β”€ Client crt: MII...nU=
|       β”œβ”€β”€ Client key: MII...2/Q
|       β”œβ”€β”€ Private Internet Access encryption preset: strong
|       β”œβ”€β”€ Network interface: tun0
|       β”œβ”€β”€ Run OpenVPN as: root
|       └── Verbosity level: 1
β”œβ”€β”€ DNS settings:
|   β”œβ”€β”€ Keep existing nameserver(s): no
|   β”œβ”€β”€ DNS server address to use: 127.0.0.1
|   └── DNS over TLS settings:
|       β”œβ”€β”€ Enabled: yes
|       β”œβ”€β”€ Update period: every 24h0m0s
|       β”œβ”€β”€ Upstream resolvers:
|       |   └── cloudflare
|       β”œβ”€β”€ Caching: yes
|       β”œβ”€β”€ IPv6: no
|       └── DNS filtering settings:
|           β”œβ”€β”€ Block malicious: yes
|           β”œβ”€β”€ Block ads: no
|           β”œβ”€β”€ Block surveillance: no
|           └── Blocked IP networks:
|               β”œβ”€β”€ 127.0.0.1/8
|               β”œβ”€β”€ 10.0.0.0/8
|               β”œβ”€β”€ 172.16.0.0/12
|               β”œβ”€β”€ 192.168.0.0/16
|               β”œβ”€β”€ 169.254.0.0/16
|               β”œβ”€β”€ ::1/128
|               β”œβ”€β”€ fc00::/7
|               β”œβ”€β”€ fe80::/10
|               β”œβ”€β”€ ::ffff:127.0.0.1/104
|               β”œβ”€β”€ ::ffff:10.0.0.0/104
|               β”œβ”€β”€ ::ffff:169.254.0.0/112
|               β”œβ”€β”€ ::ffff:172.16.0.0/108
|               └── ::ffff:192.168.0.0/112
β”œβ”€β”€ Firewall settings:
|   β”œβ”€β”€ Enabled: yes
|   └── Outbound subnets:
|       └── 172.60.0.0/24
β”œβ”€β”€ Log settings:
|   └── Log level: info
β”œβ”€β”€ Health settings:
|   β”œβ”€β”€ Server listening address: 127.0.0.1:9999
|   β”œβ”€β”€ Target address: cloudflare.com:443
|   β”œβ”€β”€ Duration to wait after success: 5s
|   β”œβ”€β”€ Read header timeout: 100ms
|   β”œβ”€β”€ Read timeout: 500ms
|   └── VPN wait durations:
|       β”œβ”€β”€ Initial duration: 6s
|       └── Additional duration: 5s
β”œβ”€β”€ Shadowsocks server settings:
|   └── Enabled: no
β”œβ”€β”€ HTTP proxy settings:
|   └── Enabled: no
β”œβ”€β”€ Control server settings:
|   β”œβ”€β”€ Listening address: :8000
|   β”œβ”€β”€ Logging: yes
|   └── Authentication file path: /gluetun/auth/config.toml
β”œβ”€β”€ Storage settings:
|   └── Filepath: /gluetun/servers.json
β”œβ”€β”€ OS Alpine settings:
|   β”œβ”€β”€ Process UID: 1000
|   └── Process GID: 1000
β”œβ”€β”€ Public IP settings:
|   β”œβ”€β”€ IP file path: /tmp/gluetun/ip
|   β”œβ”€β”€ Public IP data base API: ipinfo
|   └── Public IP data backup APIs:
|       β”œβ”€β”€ ifconfigco
|       β”œβ”€β”€ ip2location
|       └── cloudflare
└── Version settings:
    └── Enabled: yes
2025-08-05T15:58:33Z INFO [routing] default route found: interface eth0, gateway 172.60.0.1, assigned IP 172.60.0.18 and family v4
2025-08-05T15:58:33Z INFO [routing] adding route for 0.0.0.0/0
2025-08-05T15:58:33Z INFO [firewall] setting allowed subnets...
2025-08-05T15:58:33Z INFO [routing] default route found: interface eth0, gateway 172.60.0.1, assigned IP 172.60.0.18 and family v4
2025-08-05T15:58:33Z INFO [routing] adding route for 172.60.0.0/24
2025-08-05T15:58:33Z INFO [http server] http server listening on [::]:8000
2025-08-05T15:58:33Z INFO [firewall] allowing VPN connection...
2025-08-05T15:58:33Z INFO [dns] using plaintext DNS at address 1.1.1.1
2025-08-05T15:58:33Z INFO [healthcheck] listening on 127.0.0.1:9999
2025-08-05T15:58:33Z INFO [openvpn] OpenVPN 2.6.11 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
2025-08-05T15:58:33Z INFO [openvpn] library versions: OpenSSL 3.3.2 3 Sep 2024, LZO 2.10
2025-08-05T15:58:33Z INFO [openvpn] TCP/UDP: Preserving recently used remote address: [AF_INET]212.102.57.19:1197
2025-08-05T15:58:33Z INFO [openvpn] UDPv4 link local: (not bound)
2025-08-05T15:58:33Z INFO [openvpn] UDPv4 link remote: [AF_INET]212.102.57.19:1197
2025-08-05T15:58:33Z INFO [openvpn] [frankfurt405] Peer Connection Initiated with [AF_INET]212.102.57.19:1197
2025-08-05T15:58:34Z INFO [openvpn] TUN/TAP device tun0 opened
2025-08-05T15:58:34Z INFO [openvpn] /sbin/ip link set dev tun0 up mtu 1500
2025-08-05T15:58:34Z INFO [openvpn] /sbin/ip link set dev tun0 up
2025-08-05T15:58:34Z INFO [openvpn] /sbin/ip addr add dev tun0 10.18.110.225/24
2025-08-05T15:58:34Z INFO [openvpn] UID set to nonrootuser
2025-08-05T15:58:34Z INFO [openvpn] Initialization Sequence Completed
2025-08-05T15:58:34Z INFO [dns] downloading hostnames and IP block lists
2025-08-05T15:58:34Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:34Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:34Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280|EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:34Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280|EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:34Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:34Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:35Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:35Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:36Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:36Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:36Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:37Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:37Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:37Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:38Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:39Z INFO [healthcheck] program has been unhealthy for 6s: restarting VPN (healthcheck error: dialing: dial tcp4: lookup cloudflare.com: i/o timeout)
2025-08-05T15:58:39Z INFO [healthcheck] πŸ‘‰ See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2025-08-05T15:58:39Z INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2025-08-05T15:58:39Z INFO [vpn] stopping
2025-08-05T15:58:39Z ERROR [vpn] getting public IP address information: context canceled
2025-08-05T15:58:39Z ERROR [vpn] cannot get version information: Get "https://api.github.com/repos/qdm12/gluetun/releases": context canceled
2025-08-05T15:58:39Z INFO [vpn] starting
2025-08-05T15:58:39Z INFO [firewall] allowing VPN connection...
2025-08-05T15:58:39Z INFO [openvpn] OpenVPN 2.6.11 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
2025-08-05T15:58:39Z INFO [openvpn] library versions: OpenSSL 3.3.2 3 Sep 2024, LZO 2.10
2025-08-05T15:58:39Z INFO [openvpn] TCP/UDP: Preserving recently used remote address: [AF_INET]212.102.57.11:1197
2025-08-05T15:58:39Z INFO [openvpn] UDPv4 link local: (not bound)
2025-08-05T15:58:39Z INFO [openvpn] UDPv4 link remote: [AF_INET]212.102.57.11:1197
2025-08-05T15:58:40Z INFO [openvpn] [frankfurt405] Peer Connection Initiated with [AF_INET]212.102.57.11:1197
2025-08-05T15:58:40Z INFO [openvpn] TUN/TAP device tun0 opened
2025-08-05T15:58:40Z INFO [openvpn] /sbin/ip link set dev tun0 up mtu 1500
2025-08-05T15:58:40Z INFO [openvpn] /sbin/ip link set dev tun0 up
2025-08-05T15:58:40Z INFO [openvpn] /sbin/ip addr add dev tun0 10.10.110.221/24
2025-08-05T15:58:40Z INFO [openvpn] UID set to nonrootuser
2025-08-05T15:58:40Z INFO [openvpn] Initialization Sequence Completed
2025-08-05T15:58:40Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:40Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:40Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:40Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:40Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:40Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:40Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:40Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:40Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:40Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:40Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:40Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:40Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:41Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:41Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:41Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:41Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:41Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:41Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:41Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:41Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:42Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:42Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:42Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:42Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:42Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:42Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:42Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:43Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:43Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:43Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:43Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:43Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:44Z WARN [dns] cannot update filter block lists: Get "https://raw.githubusercontent.com/qdm12/files/master/malicious-hostnames.updated": net/http: TLS handshake timeout, Get "https://raw.githubusercontent.com/qdm12/files/master/malicious-ips.updated": net/http: TLS handshake timeout
2025-08-05T15:58:44Z INFO [dns] attempting restart in 10s
2025-08-05T15:58:44Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:45Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:45Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:47Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:47Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:47Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:47Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:48Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:49Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:49Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:49Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:50Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:50Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:50Z ERROR [vpn] getting public IP address information: fetching information: Get "https://ipinfo.io/": net/http: TLS handshake timeout
2025-08-05T15:58:50Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:50Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:50Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:50Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:50Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:50Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:50Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:50Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:50Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:50Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:51Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:51Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:51Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:51Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:53Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:53Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:53Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:53Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:54Z INFO [dns] downloading hostnames and IP block lists
2025-08-05T15:58:54Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:54Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:54Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)
2025-08-05T15:58:54Z INFO [openvpn] read UDPv4 [EMSGSIZE Path-MTU=1280]: Message too large (fd=3,code=90)

qbittorrent log

Code: Select all

docker logs qbittorrent
[migrations] started
[migrations] no migrations found
───────────────────────────────────────

  β–ˆβ–ˆβ•—     β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—
  β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β•β–ˆβ–ˆβ•—
  β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘
  β–ˆβ–ˆβ•‘     β•šβ•β•β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘
  β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•
  β•šβ•β•β•β•β•β•β•β•šβ•β•β•β•β•β•β•β•šβ•β• β•šβ•β•β•β•β•β•

   Brought to you by linuxserver.io
───────────────────────────────────────

To support LSIO projects visit:
https://www.linuxserver.io/donate/

───────────────────────────────────────
GID/UID
───────────────────────────────────────

User UID:    1000
User GID:    1000
───────────────────────────────────────
Linuxserver.io version: release-5.1.2_v1.2.20-ls87
Build-date: 2025-07-27T07:00:40+00:00
───────────────────────────────────────
    
[custom-init] No custom files found, skipping... WebUI will be started shortly after internal preparations. Please wait... ******** Information ******** To control qBittorrent, access the WebUI at: http://localhost:8081 Connection to localhost (127.0.0.1) 8081 port [tcp/tproxy] succeeded! [ls.io-init] done.

and also docker-compose.custom.yaml

Code: Select all

services:
  teddycloud:
    container_name: teddycloud
    hostname: teddycloud
    image: ghcr.io/toniebox-reverse-engineering/teddycloud:latest
    ports:
      - 443:443        # Required (for Toniebox connection)
    #  - 80:80          # Optional (Web UI HTTP)
      - 8443:8443      # Optional (Web UI HTTPS)
    volumes:
      - certs:/teddycloud/certs
      - config:/teddycloud/config
      - content:/teddycloud/data/content
      - library:/teddycloud/data/library
      - custom_img:/teddycloud/data/www/custom_img
      - firmware:/teddycloud/data/firmware
      - cache:/teddycloud/data/cache
    restart: unless-stopped


  pihole:
    container_name: pihole
    image: pihole/pihole:latest
    ports:
      # DNS Ports
      - "53:53/tcp"
      - "53:53/udp"
      # Default HTTP Port
      - "80:80/tcp"
      # Default HTTPs Port. FTL will generate a self-signed certificate
      - "9443:9443/tcp"
      # Uncomment the line below if you are using Pi-hole as your DHCP server
      #- "67:67/udp"
      # Uncomment the line below if you are using Pi-hole as your NTP server
      #- "123:123/udp"
    environment:
      # Set the appropriate timezone for your location (https://en.wikipedia.org/wiki/List_of_tz_database_time_zones), e.g:
      TZ: 'Europe/London'
      # If using Docker's default `bridge` network setting the dns listening mode should be set to 'all'
      FTLCONF_dns_listeningMode: 'all'
    # Volumes store your data between container upgrades
    volumes:
      # For persisting Pi-hole's databases and common configuration file
      - './etc-pihole:/etc/pihole'
      # Uncomment the below if you have custom dnsmasq config files that you want to persist. Not needed for most starting fresh with Pi-hole v6. If you're upgrading from v5 you and have used this directory before, you should keep it enabled for the first v6 container start to allow for a complete migration. It can be removed afterwards. Needs environment variable FTLCONF_misc_etc_dnsmasq_d: 'true'
      #- './etc-dnsmasq.d:/etc/dnsmasq.d'
    cap_add:
      # See https://github.com/pi-hole/docker-pi-hole#note-on-capabilities
      # Required if you are using Pi-hole as your DHCP server, else not needed
      - NET_ADMIN
      # Required if you are using Pi-hole as your NTP client to be able to set the host's system time
      - SYS_TIME
      # Optional, if Pi-hole should get some more processing time
      - SYS_NICE
    restart: unless-stopped

volumes:
  certs:
  config:
  content:
  library:
  custom_img:
  firmware:
  cache:

I have tried various ports and two different providers, but still being stuck behind a firewall and qbittorrent is not downloading anything, I also tried transmission and still did not work. This is trying to download a ubuntu iso. Health check is also failing....


Re: qbittorrent stuck on being behind firewall / metadata download

Posted: Tue Aug 05, 2025 4:24 pm
by rogs

Hey @tutankhamun!

Being stuck behind a firewall isn’t necessarily a dealbreaker; it just means your peer connection is more limited. To improve it, you’ll either need to open a port on your router or use a VPN that supports port forwarding.

I noticed you added restarter to your docker-compose.yml. Just curious, what’s the goal behind that? Generally, it’s not recommended to add utility containers like that directly to your base Compose file. If you're trying to restart a container periodically, a cronjob like this is a simpler and cleaner solution:

Code: Select all

*/20 * * * * /usr/bin/docker restart qbittorrent

Also, I saw in your second log that you’re using Private Internet Access (PIA) with port forwarding enabled. Just a heads-up: the documentation for Gluetun clearly states that PIA’s port forwarding isn't working right now (link). The YAMS installer even recommends reading through it, so definitely give it a look to avoid chasing ghosts πŸ˜….

Cheers!

Roger.


Re: qbittorrent stuck on being behind firewall / metadata download

Posted: Tue Aug 05, 2025 6:29 pm
by tutankhamun

thanks for the response, i updated this now with vpn unlimited (life long sub).

Code: Select all

  gluetun:
    image: qmcgaw/gluetun:v3
    container_name: gluetun
    cap_add:
      - NET_ADMIN
    devices:
      - /dev/net/tun:/dev/net/tun
    ports:
      - 8888:8888/tcp  # HTTP proxy
      - 8388:8388/tcp  # Shadowsocks
      - 8388:8388/udp  # Shadowsocks
      - 8003:8000/tcp  # Gluetun admin
      #- 8080:8080/tcp  # qBittorrent WebUI (optional)
      - 8081:8081/tcp  # qBittorrent WebUI
      - 8989:8989      # Sonarr
      - 7878:7878      # Radarr
      - 8686:8686      # Lidarr
      - 6767:6767      # Bazarr
      - 9696:9696      # Prowlarr
      - 8080:8080      # SABnzbd (add this if you want web access to SABnzbd)
      - 9091:9091  # Transmission WebUI/RPC
      - 51413:51413/tcp  # Transmission Peer Port TCP
      - 51413:51413/udp  # Transmission Peer Port UDP
      - 51413:51413
      - 3000:3000
      - 3001:3001
    environment:
      - FIREWALL_OUTBOUND_SUBNETS=172.60.0.0/24
      - VPN_SERVICE_PROVIDER=custom
      - VPN_TYPE=openvpn
      - OPENVPN_CUSTOM_CONFIG=/gluetun/custom.conf

  - VPN_PORT_FORWARDING=no
  - FIREWALL_VPN_INPUT_PORTS=51413,1194,1197
volumes:
  - /opt/gluetun:/gluetun
  - /opt/gluetun/custom.conf:/gluetun/custom.conf:ro
  - /opt/gluetun/ca.crt:/gluetun/ca.crt:ro
  - /opt/gluetun/client.crt:/gluetun/client.crt:ro
  - /opt/gluetun/client.key:/gluetun/client.key:ro
  - /opt/gluetun/auth.conf:/gluetun/auth.conf:ro
restart: unless-stopped
networks:
  yams_network:
    ipv4_address: 172.60.0.18

giving me this log.

Code: Select all

docker logs gluetun
========================================
========================================
=============== gluetun ================
========================================
=========== Made with ❀️ by ============
======= https://github.com/qdm12 =======
========================================
========================================

Running version v3.40.0 built on 2024-12-25T22:01:25.675Z (commit e890c50)

πŸ”§ Need help? β˜• Discussion? https://github.com/qdm12/gluetun/discussions/new/choose
πŸ› Bug? ✨ New feature? https://github.com/qdm12/gluetun/issues/new/choose
πŸ’» Email? quentin.mcgaw@gmail.com
πŸ’° Help me? https://www.paypal.me/qmcgaw https://github.com/sponsors/qdm12
2025-08-05T17:13:46Z INFO [routing] default route found: interface eth0, gateway 172.60.0.1, assigned IP 172.60.0.18 and family v4
2025-08-05T17:13:46Z INFO [routing] local ethernet link found: eth0
2025-08-05T17:13:46Z INFO [routing] local ipnet found: 172.60.0.0/24
2025-08-05T17:13:46Z INFO [firewall] enabling...
2025-08-05T17:13:47Z INFO [firewall] enabled successfully
2025-08-05T17:13:49Z INFO [storage] merging by most recent 20776 hardcoded servers and 20776 servers read from /gluetun/servers.json
2025-08-05T17:13:50Z INFO Alpine version: 3.20.3
2025-08-05T17:13:50Z INFO OpenVPN 2.5 version: 2.5.10
2025-08-05T17:13:50Z INFO OpenVPN 2.6 version: 2.6.11
2025-08-05T17:13:50Z INFO IPtables version: v1.8.10
2025-08-05T17:13:50Z INFO Settings summary:
β”œβ”€β”€ VPN settings:
|   β”œβ”€β”€ VPN provider settings:
|   |   β”œβ”€β”€ Name: custom
|   |   └── Server selection settings:
|   |       β”œβ”€β”€ VPN type: openvpn
|   |       └── OpenVPN server selection settings:
|   |           β”œβ”€β”€ Protocol: UDP
|   |           └── Custom configuration file: /gluetun/custom.conf
|   └── OpenVPN settings:
|       β”œβ”€β”€ OpenVPN version: 2.6
|       β”œβ”€β”€ User: [not set]
|       β”œβ”€β”€ Password: [not set]
|       β”œβ”€β”€ Custom configuration file: /gluetun/custom.conf
|       β”œβ”€β”€ Client crt: MII...nU=
|       β”œβ”€β”€ Client key: MII...2/Q
|       β”œβ”€β”€ Network interface: tun0
|       β”œβ”€β”€ Run OpenVPN as: root
|       └── Verbosity level: 1
β”œβ”€β”€ DNS settings:
|   β”œβ”€β”€ Keep existing nameserver(s): no
|   β”œβ”€β”€ DNS server address to use: 127.0.0.1
|   └── DNS over TLS settings:
|       β”œβ”€β”€ Enabled: yes
|       β”œβ”€β”€ Update period: every 24h0m0s
|       β”œβ”€β”€ Upstream resolvers:
|       |   └── cloudflare
|       β”œβ”€β”€ Caching: yes
|       β”œβ”€β”€ IPv6: no
|       └── DNS filtering settings:
|           β”œβ”€β”€ Block malicious: yes
|           β”œβ”€β”€ Block ads: no
|           β”œβ”€β”€ Block surveillance: no
|           └── Blocked IP networks:
|               β”œβ”€β”€ 127.0.0.1/8
|               β”œβ”€β”€ 10.0.0.0/8
|               β”œβ”€β”€ 172.16.0.0/12
|               β”œβ”€β”€ 192.168.0.0/16
|               β”œβ”€β”€ 169.254.0.0/16
|               β”œβ”€β”€ ::1/128
|               β”œβ”€β”€ fc00::/7
|               β”œβ”€β”€ fe80::/10
|               β”œβ”€β”€ ::ffff:127.0.0.1/104
|               β”œβ”€β”€ ::ffff:10.0.0.0/104
|               β”œβ”€β”€ ::ffff:169.254.0.0/112
|               β”œβ”€β”€ ::ffff:172.16.0.0/108
|               └── ::ffff:192.168.0.0/112
β”œβ”€β”€ Firewall settings:
|   β”œβ”€β”€ Enabled: yes
|   β”œβ”€β”€ VPN input ports:
|   |   β”œβ”€β”€ 51413
|   |   β”œβ”€β”€ 1194
|   |   └── 1197
|   └── Outbound subnets:
|       └── 172.60.0.0/24
β”œβ”€β”€ Log settings:
|   └── Log level: info
β”œβ”€β”€ Health settings:
|   β”œβ”€β”€ Server listening address: 127.0.0.1:9999
|   β”œβ”€β”€ Target address: cloudflare.com:443
|   β”œβ”€β”€ Duration to wait after success: 5s
|   β”œβ”€β”€ Read header timeout: 100ms
|   β”œβ”€β”€ Read timeout: 500ms
|   └── VPN wait durations:
|       β”œβ”€β”€ Initial duration: 6s
|       └── Additional duration: 5s
β”œβ”€β”€ Shadowsocks server settings:
|   └── Enabled: no
β”œβ”€β”€ HTTP proxy settings:
|   └── Enabled: no
β”œβ”€β”€ Control server settings:
|   β”œβ”€β”€ Listening address: :8000
|   β”œβ”€β”€ Logging: yes
|   └── Authentication file path: /gluetun/auth/config.toml
β”œβ”€β”€ Storage settings:
|   └── Filepath: /gluetun/servers.json
β”œβ”€β”€ OS Alpine settings:
|   β”œβ”€β”€ Process UID: 1000
|   └── Process GID: 1000
β”œβ”€β”€ Public IP settings:
|   β”œβ”€β”€ IP file path: /tmp/gluetun/ip
|   β”œβ”€β”€ Public IP data base API: ipinfo
|   └── Public IP data backup APIs:
|       β”œβ”€β”€ ifconfigco
|       β”œβ”€β”€ ip2location
|       └── cloudflare
└── Version settings:
    └── Enabled: yes
2025-08-05T17:13:50Z INFO [routing] default route found: interface eth0, gateway 172.60.0.1, assigned IP 172.60.0.18 and family v4
2025-08-05T17:13:50Z INFO [routing] adding route for 0.0.0.0/0
2025-08-05T17:13:50Z INFO [firewall] setting allowed subnets...
2025-08-05T17:13:50Z INFO [routing] default route found: interface eth0, gateway 172.60.0.1, assigned IP 172.60.0.18 and family v4
2025-08-05T17:13:50Z INFO [routing] adding route for 172.60.0.0/24
2025-08-05T17:13:50Z INFO [http server] http server listening on [::]:8000
2025-08-05T17:13:50Z INFO [firewall] allowing VPN connection...
2025-08-05T17:13:50Z INFO [dns] using plaintext DNS at address 1.1.1.1
2025-08-05T17:13:50Z INFO [healthcheck] listening on 127.0.0.1:9999
2025-08-05T17:13:50Z INFO [openvpn] OpenVPN 2.6.11 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
2025-08-05T17:13:50Z INFO [openvpn] library versions: OpenSSL 3.3.2 3 Sep 2024, LZO 2.10
2025-08-05T17:13:50Z INFO [openvpn] TCP/UDP: Preserving recently used remote address: [AF_INET]50.7.124.57:1194
2025-08-05T17:13:50Z INFO [openvpn] UDPv4 link local: (not bound)
2025-08-05T17:13:50Z INFO [openvpn] UDPv4 link remote: [AF_INET]50.7.124.57:1194
2025-08-05T17:13:50Z INFO [openvpn] [server.ironnodes.com] Peer Connection Initiated with [AF_INET]50.7.124.57:1194
2025-08-05T17:13:51Z INFO [openvpn] TUN/TAP device tun0 opened
2025-08-05T17:13:51Z INFO [openvpn] /sbin/ip link set dev tun0 up mtu 1500
2025-08-05T17:13:51Z INFO [openvpn] /sbin/ip link set dev tun0 up
2025-08-05T17:13:51Z INFO [openvpn] /sbin/ip addr add dev tun0 local 10.200.0.6 peer 10.200.0.5
2025-08-05T17:13:51Z INFO [openvpn] UID set to nonrootuser
2025-08-05T17:13:51Z INFO [openvpn] Initialization Sequence Completed
2025-08-05T17:13:51Z INFO [firewall] setting allowed input port 51413 through interface tun0...
2025-08-05T17:13:51Z INFO [firewall] setting allowed input port 1194 through interface tun0...
2025-08-05T17:13:51Z INFO [firewall] setting allowed input port 1197 through interface tun0...
2025-08-05T17:13:51Z INFO [dns] downloading hostnames and IP block lists
2025-08-05T17:13:55Z INFO [healthcheck] healthy!
2025-08-05T17:13:56Z INFO [dns] DNS server listening on [::]:53
2025-08-05T17:13:56Z INFO [dns] ready
2025-08-05T17:13:57Z INFO [ip getter] Public IP address is 50.7.124.57 (Germany, Hesse, Frankfurt am Main - source: ipinfo)
2025-08-05T17:13:57Z INFO [vpn] You are running the latest release v3.40.0

2025-08-05T18:00:13Z WARN Caught OS signal terminated, shutting down
2025-08-05T18:00:13Z INFO http server: terminated βœ”οΈ
2025-08-05T18:00:13Z INFO dns ticker: terminated βœ”οΈ
2025-08-05T18:00:13Z INFO updater ticker: terminated βœ”οΈ
2025-08-05T18:00:13Z INFO control: terminated βœ”οΈ
2025-08-05T18:00:13Z INFO updater: terminated βœ”οΈ
2025-08-05T18:00:13Z INFO tickers: terminated βœ”οΈ
2025-08-05T18:00:13Z INFO HTTP health server: terminated βœ”οΈ
2025-08-05T18:00:13Z INFO [firewall] removing allowed port 51413...
2025-08-05T18:00:13Z INFO [firewall] removing allowed port 1194...
2025-08-05T18:00:13Z INFO [firewall] removing allowed port 1197...
2025-08-05T18:00:13Z INFO vpn: terminated βœ”οΈ
2025-08-05T18:00:13Z INFO shadowsocks proxy: terminated βœ”οΈ
2025-08-05T18:00:13Z INFO dns: terminated βœ”οΈ
2025-08-05T18:00:13Z INFO http proxy: terminated βœ”οΈ
2025-08-05T18:00:13Z INFO other: terminated βœ”οΈ
2025-08-05T18:00:13Z INFO [routing] routing cleanup...
2025-08-05T18:00:13Z INFO [routing] default route found: interface eth0, gateway 172.60.0.1, assigned IP 172.60.0.18 and family v4
2025-08-05T18:00:13Z INFO [routing] deleting route for 0.0.0.0/0
2025-08-05T18:00:13Z INFO [routing] deleting route for 172.60.0.0/24
2025-08-05T18:00:13Z INFO Shutdown successful
========================================
========================================
=============== gluetun ================
========================================
=========== Made with ❀️ by ============
======= https://github.com/qdm12 =======
========================================
========================================

Running version v3.40.0 built on 2024-12-25T22:01:25.675Z (commit e890c50)

πŸ”§ Need help? β˜• Discussion? https://github.com/qdm12/gluetun/discussions/new/choose
πŸ› Bug? ✨ New feature? https://github.com/qdm12/gluetun/issues/new/choose
πŸ’» Email? quentin.mcgaw@gmail.com
πŸ’° Help me? https://www.paypal.me/qmcgaw https://github.com/sponsors/qdm12
2025-08-05T18:00:22Z INFO [routing] default route found: interface eth0, gateway 172.60.0.1, assigned IP 172.60.0.18 and family v4
2025-08-05T18:00:22Z INFO [routing] local ethernet link found: eth0
2025-08-05T18:00:22Z INFO [routing] local ipnet found: 172.60.0.0/24
2025-08-05T18:00:22Z INFO [firewall] enabling...
2025-08-05T18:00:22Z INFO [firewall] enabled successfully
2025-08-05T18:00:26Z INFO [storage] merging by most recent 20776 hardcoded servers and 20776 servers read from /gluetun/servers.json
2025-08-05T18:00:27Z INFO Alpine version: 3.20.3
2025-08-05T18:00:27Z INFO OpenVPN 2.5 version: 2.5.10
2025-08-05T18:00:27Z INFO OpenVPN 2.6 version: 2.6.11
2025-08-05T18:00:27Z INFO IPtables version: v1.8.10
2025-08-05T18:00:27Z INFO Settings summary:
β”œβ”€β”€ VPN settings:
|   β”œβ”€β”€ VPN provider settings:
|   |   β”œβ”€β”€ Name: custom
|   |   └── Server selection settings:
|   |       β”œβ”€β”€ VPN type: openvpn
|   |       └── OpenVPN server selection settings:
|   |           β”œβ”€β”€ Protocol: UDP
|   |           └── Custom configuration file: /gluetun/custom.conf
|   └── OpenVPN settings:
|       β”œβ”€β”€ OpenVPN version: 2.6
|       β”œβ”€β”€ User: [not set]
|       β”œβ”€β”€ Password: [not set]
|       β”œβ”€β”€ Custom configuration file: /gluetun/custom.conf
|       β”œβ”€β”€ Client crt: MII...nU=
|       β”œβ”€β”€ Client key: MII...2/Q
|       β”œβ”€β”€ Network interface: tun0
|       β”œβ”€β”€ Run OpenVPN as: root
|       └── Verbosity level: 1
β”œβ”€β”€ DNS settings:
|   β”œβ”€β”€ Keep existing nameserver(s): no
|   β”œβ”€β”€ DNS server address to use: 127.0.0.1
|   └── DNS over TLS settings:
|       β”œβ”€β”€ Enabled: yes
|       β”œβ”€β”€ Update period: every 24h0m0s
|       β”œβ”€β”€ Upstream resolvers:
|       |   └── cloudflare
|       β”œβ”€β”€ Caching: yes
|       β”œβ”€β”€ IPv6: no
|       └── DNS filtering settings:
|           β”œβ”€β”€ Block malicious: yes
|           β”œβ”€β”€ Block ads: no
|           β”œβ”€β”€ Block surveillance: no
|           └── Blocked IP networks:
|               β”œβ”€β”€ 127.0.0.1/8
|               β”œβ”€β”€ 10.0.0.0/8
|               β”œβ”€β”€ 172.16.0.0/12
|               β”œβ”€β”€ 192.168.0.0/16
|               β”œβ”€β”€ 169.254.0.0/16
|               β”œβ”€β”€ ::1/128
|               β”œβ”€β”€ fc00::/7
|               β”œβ”€β”€ fe80::/10
|               β”œβ”€β”€ ::ffff:127.0.0.1/104
|               β”œβ”€β”€ ::ffff:10.0.0.0/104
|               β”œβ”€β”€ ::ffff:169.254.0.0/112
|               β”œβ”€β”€ ::ffff:172.16.0.0/108
|               └── ::ffff:192.168.0.0/112
β”œβ”€β”€ Firewall settings:
|   β”œβ”€β”€ Enabled: yes
|   β”œβ”€β”€ VPN input ports:
|   |   β”œβ”€β”€ 51413
|   |   β”œβ”€β”€ 1194
|   |   └── 1197
|   └── Outbound subnets:
|       └── 172.60.0.0/24
β”œβ”€β”€ Log settings:
|   └── Log level: info
β”œβ”€β”€ Health settings:
|   β”œβ”€β”€ Server listening address: 127.0.0.1:9999
|   β”œβ”€β”€ Target address: cloudflare.com:443
|   β”œβ”€β”€ Duration to wait after success: 5s
|   β”œβ”€β”€ Read header timeout: 100ms
|   β”œβ”€β”€ Read timeout: 500ms
|   └── VPN wait durations:
|       β”œβ”€β”€ Initial duration: 6s
|       └── Additional duration: 5s
β”œβ”€β”€ Shadowsocks server settings:
|   └── Enabled: no
β”œβ”€β”€ HTTP proxy settings:
|   └── Enabled: no
β”œβ”€β”€ Control server settings:
|   β”œβ”€β”€ Listening address: :8000
|   β”œβ”€β”€ Logging: yes
|   └── Authentication file path: /gluetun/auth/config.toml
β”œβ”€β”€ Storage settings:
|   └── Filepath: /gluetun/servers.json
β”œβ”€β”€ OS Alpine settings:
|   β”œβ”€β”€ Process UID: 1000
|   └── Process GID: 1000
β”œβ”€β”€ Public IP settings:
|   β”œβ”€β”€ IP file path: /tmp/gluetun/ip
|   β”œβ”€β”€ Public IP data base API: ipinfo
|   └── Public IP data backup APIs:
|       β”œβ”€β”€ ifconfigco
|       β”œβ”€β”€ ip2location
|       └── cloudflare
└── Version settings:
    └── Enabled: yes
2025-08-05T18:00:27Z INFO [routing] default route found: interface eth0, gateway 172.60.0.1, assigned IP 172.60.0.18 and family v4
2025-08-05T18:00:27Z INFO [routing] adding route for 0.0.0.0/0
2025-08-05T18:00:27Z INFO [firewall] setting allowed subnets...
2025-08-05T18:00:27Z INFO [routing] default route found: interface eth0, gateway 172.60.0.1, assigned IP 172.60.0.18 and family v4
2025-08-05T18:00:27Z INFO [routing] adding route for 172.60.0.0/24
2025-08-05T18:00:27Z INFO [http server] http server listening on [::]:8000
2025-08-05T18:00:27Z INFO [firewall] allowing VPN connection...
2025-08-05T18:00:27Z INFO [dns] using plaintext DNS at address 1.1.1.1
2025-08-05T18:00:27Z INFO [healthcheck] listening on 127.0.0.1:9999
2025-08-05T18:00:27Z INFO [openvpn] OpenVPN 2.6.11 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
2025-08-05T18:00:27Z INFO [openvpn] library versions: OpenSSL 3.3.2 3 Sep 2024, LZO 2.10
2025-08-05T18:00:27Z INFO [openvpn] TCP/UDP: Preserving recently used remote address: [AF_INET]50.7.124.57:1194
2025-08-05T18:00:27Z INFO [openvpn] UDPv4 link local: (not bound)
2025-08-05T18:00:27Z INFO [openvpn] UDPv4 link remote: [AF_INET]50.7.124.57:1194
2025-08-05T18:00:27Z INFO [openvpn] [server.ironnodes.com] Peer Connection Initiated with [AF_INET]50.7.124.57:1194
2025-08-05T18:00:28Z INFO [openvpn] TUN/TAP device tun0 opened
2025-08-05T18:00:28Z INFO [openvpn] /sbin/ip link set dev tun0 up mtu 1500
2025-08-05T18:00:28Z INFO [openvpn] /sbin/ip link set dev tun0 up
2025-08-05T18:00:28Z INFO [openvpn] /sbin/ip addr add dev tun0 local 10.200.0.10 peer 10.200.0.9
2025-08-05T18:00:28Z INFO [openvpn] UID set to nonrootuser
2025-08-05T18:00:28Z INFO [openvpn] Initialization Sequence Completed
2025-08-05T18:00:28Z INFO [firewall] setting allowed input port 51413 through interface tun0...
2025-08-05T18:00:28Z INFO [firewall] setting allowed input port 1194 through interface tun0...
2025-08-05T18:00:28Z INFO [firewall] setting allowed input port 1197 through interface tun0...
2025-08-05T18:00:28Z INFO [dns] downloading hostnames and IP block lists
2025-08-05T18:00:32Z INFO [healthcheck] healthy!
2025-08-05T18:00:33Z INFO [dns] DNS server listening on [::]:53
2025-08-05T18:00:34Z INFO [dns] ready
2025-08-05T18:00:34Z INFO [ip getter] Public IP address is 50.7.124.57 (Germany, Hesse, Frankfurt am Main - source: ipinfo)
2025-08-05T18:00:35Z INFO [vpn] You are running the latest release v3.40.0

i opened port 1197 on my router. and vpn.

yams check-vpn

Code: Select all

Getting your qBittorrent IP...
qBittorrent IP: xxx
qBittorrent country is xxxxx
βœ… Success: Your IPs are different. qBittorrent is masking your IP!

however still behind firewall and ubuntu is not downloading.....


Re: qbittorrent stuck on being behind firewall / metadata download

Posted: Tue Aug 05, 2025 6:40 pm
by rogs

Again, being behind a firewall is not an issue. YAMS runs in firewalled mode by default.

However, your VPN doesn’t support port forwarding, so opening a port on your router won’t help. Gluetun creates its own isolated network, separate from your local one.

Cheers!

Roger.


Re: qbittorrent stuck on being behind firewall / metadata download

Posted: Tue Aug 05, 2025 6:41 pm
by rogs

You are also adding a lot of ports to Gluetun. Why did you do that?


Re: qbittorrent stuck on being behind firewall / metadata download

Posted: Wed Aug 06, 2025 8:18 am
by tutankhamun

I found out I had to use another server from the same provider and it is working now with vpn unlimited.