Skip to content

Bug: FIREWALL_OUTBOUND_SUBNETS does not seem to be working #2771

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
syncme-kodi opened this issue Apr 8, 2025 · 1 comment
Open

Bug: FIREWALL_OUTBOUND_SUBNETS does not seem to be working #2771

syncme-kodi opened this issue Apr 8, 2025 · 1 comment

Comments

@syncme-kodi
Copy link

Is this urgent?

No

Host OS

Mac OS

CPU arch

None

VPN service provider

Surfshark

What are you using to run the container

docker-compose

What is the version of Gluetun

13532c8

What's the problem 🤔

I have Plex as a local app on Mac, and Overseerr using the gluetun network. I have connected Plex to Overseerr using the API. However, Overseerr is not able to connect to plex on the LAN IP 192.168.1.39.

I have added the following config for firewall FIREWALL_OUTBOUND_SUBNETS=192.168.1.0/24, but it does not seem to work.

I have also tried to ping the LAN ip from the Gluetun container but it times out

Share your logs (at least 10 lines)

========================================
========================================
=============== gluetun ================
========================================
=========== Made with ❤️ by ============
======= https://github.com/qdm12 =======
========================================
========================================

Running version latest built on 2025-01-22T08:30:14.628Z (commit 13532c8)

🔧 Need help? ☕ Discussion? https://github.com/qdm12/gluetun/discussions/new/choose
🐛 Bug? ✨ New feature? https://github.com/qdm12/gluetun/issues/new/choose
💻 Email? quentin.mcgaw@gmail.com
💰 Help me? https://www.paypal.me/qmcgaw https://github.com/sponsors/qdm12
2025-04-08T10:58:04-04:00 INFO [routing] default route found: interface eth0, gateway 172.20.0.1, assigned IP 172.20.0.2 and family v4
2025-04-08T10:58:04-04:00 INFO [routing] local ethernet link found: eth0
2025-04-08T10:58:04-04:00 INFO [routing] local ipnet found: 172.20.0.0/16
2025-04-08T10:58:04-04:00 INFO [firewall] enabling...
2025-04-08T10:58:04-04:00 INFO [firewall] enabled successfully
2025-04-08T10:58:04-04:00 INFO [storage] merging by most recent 20776 hardcoded servers and 20776 servers read from /gluetun/servers.json
2025-04-08T10:58:04-04:00 INFO Alpine version: 3.20.5
2025-04-08T10:58:04-04:00 INFO OpenVPN 2.5 version: 2.5.10
2025-04-08T10:58:04-04:00 INFO OpenVPN 2.6 version: 2.6.11
2025-04-08T10:58:04-04:00 INFO IPtables version: v1.8.10
2025-04-08T10:58:04-04:00 INFO Settings summary:
├── VPN settings:
|   ├── VPN provider settings:
|   |   ├── Name: surfshark
|   |   └── Server selection settings:
|   |       ├── VPN type: wireguard
|   |       ├── Countries: [REMOVED]
|   |       ├── Cities: [REMOVED]
|   |       └── Wireguard selection settings:
|   |           ├── Endpoint IP address: [REMOVED]
|   |           └── Server public key: [REMOVED]
|   └── Wireguard settings:
|       ├── Private key: [REMOVED]
|       ├── Interface addresses:
|       |   └── 10.14.0.2/16
|       ├── Allowed IPs:
|       |   ├── 0.0.0.0/0
|       |   └── ::/0
|       └── Network interface: tun0
|           └── MTU: 1320
├── DNS settings:
|   ├── Keep existing nameserver(s): no
|   ├── DNS server address to use: 127.0.0.1
|   └── DNS over TLS settings:
|       ├── Enabled: yes
|       ├── Update period: every 24h0m0s
|       ├── Upstream resolvers:
|       |   └── cloudflare
|       ├── Caching: yes
|       ├── IPv6: no
|       └── DNS filtering settings:
|           ├── Block malicious: yes
|           ├── Block ads: yes
|           ├── Block surveillance: yes
|           └── Blocked IP networks:
|               ├── 127.0.0.1/8
|               ├── 10.0.0.0/8
|               ├── 172.16.0.0/12
|               ├── 192.168.0.0/16
|               ├── 169.254.0.0/16
|               ├── ::1/128
|               ├── fc00::/7
|               ├── fe80::/10
|               ├── ::ffff:127.0.0.1/104
|               ├── ::ffff:10.0.0.0/104
|               ├── ::ffff:169.254.0.0/112
|               ├── ::ffff:172.16.0.0/108
|               └── ::ffff:192.168.0.0/112
├── Firewall settings:
|   ├── Enabled: yes
|   └── Outbound subnets:
|       ├── 192.168.1.0/32
|       └── 192.168.1.1/32
├── Log settings:
|   └── Log level: info
├── Health settings:
|   ├── Server listening address: 127.0.0.1:9999
|   ├── Target address: cloudflare.com:443
|   ├── Duration to wait after success: 5s
|   ├── Read header timeout: 100ms
|   ├── Read timeout: 500ms
|   └── VPN wait durations:
|       ├── Initial duration: 6s
|       └── Additional duration: 5s
├── Shadowsocks server settings:
|   └── Enabled: no
├── HTTP proxy settings:
|   └── Enabled: no
├── Control server settings:
|   ├── Listening address: :8000
|   ├── Logging: yes
|   └── Authentication file path: /gluetun/auth/config.toml
├── Storage settings:
|   └── Filepath: /gluetun/servers.json
├── OS Alpine settings:
|   ├── Process UID: 501
|   ├── Process GID: 20
|   └── Timezone: america/new_york
├── Public IP settings:
|   ├── IP file path: /tmp/gluetun/ip
|   ├── Public IP data base API: ipinfo
|   └── Public IP data backup APIs:
|       ├── ifconfigco
|       ├── ip2location
|       └── cloudflare
├── Server data updater settings:
|   ├── Update period: 12h0m0s
|   ├── DNS address: 1.1.1.1:53
|   ├── Minimum ratio: 0.8
|   └── Providers to update: surfshark
└── Version settings:
    └── Enabled: yes
2025-04-08T10:58:04-04:00 INFO [routing] default route found: interface eth0, gateway 172.20.0.1, assigned IP 172.20.0.2 and family v4
2025-04-08T10:58:04-04:00 INFO [routing] adding route for 0.0.0.0/0
2025-04-08T10:58:04-04:00 INFO [firewall] setting allowed subnets...
2025-04-08T10:58:04-04:00 INFO [routing] default route found: interface eth0, gateway 172.20.0.1, assigned IP 172.20.0.2 and family v4
2025-04-08T10:58:04-04:00 INFO [routing] adding route for 192.168.1.0/32
2025-04-08T10:58:04-04:00 INFO [routing] adding route for 192.168.1.1/32
2025-04-08T10:58:04-04:00 INFO [dns] using plaintext DNS at address 1.1.1.1
2025-04-08T10:58:04-04:00 INFO [http server] http server listening on [::]:8000
2025-04-08T10:58:04-04:00 INFO [healthcheck] listening on 127.0.0.1:9999
2025-04-08T10:58:04-04:00 INFO [firewall] allowing VPN connection...
2025-04-08T10:58:04-04:00 INFO [wireguard] Using available kernelspace implementation
2025-04-08T10:58:04-04:00 INFO [wireguard] Connecting to [REMOVED]
2025-04-08T10:58:04-04:00 INFO [wireguard] Wireguard setup is complete. Note Wireguard is a silent protocol and it may or may not work, without giving any error message. Typically i/o timeout errors indicate the Wireguard connection is not working.
2025-04-08T10:58:04-04:00 INFO [healthcheck] healthy!
2025-04-08T10:58:04-04:00 INFO [dns] downloading hostnames and IP block lists
2025-04-08T10:58:06-04:00 INFO [dns] DNS server listening on [::]:53
2025-04-08T10:58:06-04:00 INFO [dns] ready
2025-04-08T10:58:07-04:00 INFO [ip getter] Public IP address is [REMOVED] ([REMOVED])

Share your configuration

Copy link
Contributor

github-actions bot commented Apr 8, 2025

@qdm12 is more or less the only maintainer of this project and works on it in his free time.
Please:

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant