Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- s6-rc: info: service fix-attrs successfully stopped
- s6-rc: info: service s6rc-oneshot-runner: stopping
- s6-rc: info: service s6rc-oneshot-runner successfully stopped
- s6-rc: info: service s6rc-oneshot-runner: starting
- s6-rc: info: service s6rc-oneshot-runner successfully started
- s6-rc: info: service fix-attrs: starting
- s6-rc: info: service fix-attrs successfully started
- s6-rc: info: service legacy-cont-init: starting
- s6-rc: info: service legacy-cont-init successfully started
- s6-rc: info: service init-perms: starting
- s6-rc: info: service init-perms successfully started
- s6-rc: info: service init-secrets: starting
- s6-rc: info: service init-secrets successfully started
- s6-rc: info: service init-setup: starting
- _ _ _
- | |__ ___ | |_(_) ___
- | '_ \ / _ \| __| |/ _ \
- | | | | (_) | |_| | (_) |
- |_| |_|\___/ \__|_|\___/
- Donate: https://hotio.dev/donate
- Documentation: https://hotio.dev/containers/qbittorrent
- Support: https://hotio.dev/discord
- Image: hotio/qbittorrent:release
- Revision: 78c8f31 (behind, by 3)
- Version: 4.6.4
- OS: Linux 6.6.28-0-virt x86_64
- ----------------------------------------------------------------------
- ENVIRONMENT BASE
- ----------------------------------------------------------------------
- PUID=1000
- PGID=1000
- UMASK=2
- TZ=Europe/London
- PRIVOXY_ENABLED=true
- UNBOUND_ENABLED=false
- VPN_ENABLED=true
- VPN_CONF=wg0
- VPN_PROVIDER=generic
- VPN_LAN_NETWORK=192.168.0.0/24
- VPN_LAN_LEAK_ENABLED=true
- VPN_EXPOSE_PORTS_ON_LAN=8080/tcp
- VPN_AUTO_PORT_FORWARD=flase
- VPN_AUTO_PORT_FORWARD_TO_PORTS=
- VPN_KEEP_LOCAL_DNS=false
- VPN_FIREWALL_TYPE=auto
- VPN_HEALTHCHECK_ENABLED=true
- VPN_PIA_USER=
- VPN_PIA_PASS=
- VPN_PIA_PREFERRED_REGION=
- VPN_PIA_DIP_TOKEN=no
- VPN_PIA_PORT_FORWARD_PERSIST=false
- ----------------------------------------------------------------------
- Executing usermod...
- usermod: no changes
- Applying permissions to /config
- s6-rc: info: service init-setup successfully started
- s6-rc: info: service init-setup-app: starting
- ----------------------------------------------------------------------
- ENVIRONMENT APP
- ----------------------------------------------------------------------
- WEBUI_PORTS=8080/tcp,8080/udp
- ----------------------------------------------------------------------
- s6-rc: info: service init-setup-app successfully started
- s6-rc: info: service init-wireguard: starting
- [INF] [2024-05-01 21:30:48] [VPN] Starting WireGuard...
- [#] ip link add wg0 type wireguard
- [#] wg setconf wg0 /dev/fd/63
- [#] ip -4 address add 10.0.0.3/32 dev wg0
- [#] ip link set mtu 1420 up dev wg0
- [#] wg set wg0 fwmark 51820
- [#] ip -4 route add 0.0.0.0/0 dev wg0 table 51820
- [#] ip -4 rule add not fwmark 51820 table 51820
- [#] ip -4 rule add table main suppress_prefixlength 0
- [#] nft -f /dev/fd/63
- [INF] [2024-05-01 21:30:48] [VPN] WireGuard is started.
- [INF] [2024-05-01 21:30:48] [VPN] No modifications will be done to resolv.conf.
- [INF] [2024-05-01 21:30:48] [VPN] resolv.conf is:
- nameserver 127.0.0.11
- options ndots:0
- [INF] [2024-05-01 21:30:48] [VPN] WireGuard [wg0] endpoint [152.67.148.165][51820].
- [INF] [2024-05-01 21:30:48] [VPN] WireGuard [wg0] allowed ips [0.0.0.0/0].
- [INF] [2024-05-01 21:30:48] [VPN] Network [default][eth0][172.20.0.9][172.20.0.0/16].
- [INF] [2024-05-01 21:30:48] [VPN] Added [192.168.0.0/24][LAN] as route via interface [eth0].
- [INF] [2024-05-01 21:30:48] [VPN] Ports opened on [eth0] are [8080/tcp,8080/udp,8080/tcp,8118/tcp,8118/udp].
- [INF] [2024-05-01 21:30:48] [VPN] Ports closed on [wg0] are [8080/tcp,8080/udp,8080/tcp,8118/tcp,8118/udp].
- [INF] [2024-05-01 21:30:48] [VPN] Ports redirected on [wg0] are [].
- [INF] [2024-05-01 21:30:48] [VPN] Routes overview:
- default via 172.20.0.1 dev eth0
- 172.20.0.0/16 dev eth0 proto kernel scope link src 172.20.0.9
- 192.168.0.0/24 via 172.20.0.1 dev eth0
- [INF] [2024-05-01 21:30:48] [VPN] Added firewall rules:
- table inet hotio {
- chain forward {
- type filter hook forward priority filter; policy drop;
- }
- chain input {
- type filter hook input priority filter; policy drop;
- iifname "eth0" tcp dport 8080 ip daddr 172.20.0.9 counter accept
- iifname "wg0" tcp dport 8080 counter drop
- iifname "eth0" udp dport 8080 ip daddr 172.20.0.9 counter accept
- iifname "wg0" udp dport 8080 counter drop
- iifname "eth0" tcp dport 8080 ip daddr 172.20.0.9 counter accept
- iifname "wg0" tcp dport 8080 counter drop
- iifname "eth0" tcp dport 8118 ip daddr 172.20.0.9 counter accept
- iifname "wg0" tcp dport 8118 counter drop
- iifname "eth0" udp dport 8118 ip daddr 172.20.0.9 counter accept
- iifname "wg0" udp dport 8118 counter drop
- iifname "eth0" ip saddr 172.20.0.0/16 ip daddr 172.20.0.9 counter accept
- iifname "eth0" ip saddr 192.168.0.0/24 ip daddr 172.20.0.9 counter accept
- iifname "wg0" counter accept
- iifname "lo" counter accept
- icmp type echo-reply counter accept
- icmpv6 type echo-reply counter accept
- iifname "eth0" ip daddr 172.20.0.9 ip saddr 152.67.148.165 udp sport 51820 counter accept
- }
- chain output {
- type filter hook output priority filter; policy drop;
- oifname "eth0" tcp sport 8080 ip saddr 172.20.0.9 counter accept
- oifname "wg0" tcp sport 8080 counter drop
- oifname "eth0" udp sport 8080 ip saddr 172.20.0.9 counter accept
- oifname "wg0" udp sport 8080 counter drop
- oifname "eth0" tcp sport 8080 ip saddr 172.20.0.9 counter accept
- oifname "wg0" tcp sport 8080 counter drop
- oifname "eth0" tcp sport 8118 ip saddr 172.20.0.9 counter accept
- oifname "wg0" tcp sport 8118 counter drop
- oifname "eth0" udp sport 8118 ip saddr 172.20.0.9 counter accept
- oifname "wg0" udp sport 8118 counter drop
- oifname "eth0" ip saddr 172.20.0.9 ip daddr 172.20.0.0/16 counter accept
- oifname "eth0" ip saddr 172.20.0.9 ip daddr 192.168.0.0/24 counter accept
- oifname "wg0" counter accept
- oifname "lo" counter accept
- icmp type echo-request counter accept
- icmpv6 type echo-request counter accept
- oifname "eth0" ip saddr 172.20.0.9 ip daddr 152.67.148.165 udp dport 51820 counter accept
- }
- chain prerouting {
- type nat hook prerouting priority dstnat; policy accept;
- }
- }
- [INF] [2024-05-01 21:30:48] [VPN] Performing internet connectivity test...
- [INF] [2024-05-01 21:30:48] [VPN] [IPV4] [PING: 15.930/18.996/30.704 ms] [Slough, ENG, United Kingdom] [Oracle Corporation] [152.67.148.165]
- s6-rc: info: service init-wireguard successfully started
- s6-rc: info: service service-qbittorrent: starting
- s6-rc: info: service service-privoxy: starting
- s6-rc: info: service service-healthcheck: starting
- s6-rc: info: service service-forwarder: starting
- s6-rc: info: service service-qbittorrent successfully started
- s6-rc: info: service service-privoxy successfully started
- s6-rc: info: service service-healthcheck successfully started
- s6-rc: info: service service-forwarder successfully started
- s6-rc: info: service legacy-services: starting
- [INF] [2024-05-01 21:30:53] [VPN] Healthcheck active.
- 2024-05-01 21:30:53.308 7f6adae35b08 Info: Privoxy version 3.0.34
- 2024-05-01 21:30:53.308 7f6adae35b08 Info: Program name: /usr/sbin/privoxy
- WebUI will be started shortly after internal preparations. Please wait...
- s6-rc: info: service legacy-services successfully started
- ******** Information ********
- To control qBittorrent, access the WebUI at: http://localhost:8080
Add Comment
Please, Sign In to add comment