Back that NAS up
Dabbler
- Joined
- Jun 27, 2022
- Messages
- 23
I mean I connect wireguard and confirmed to be connected to mullvad, but can’t use rtorrent or transmission to actually do anythingWhat do you mean by allow "plug-in" to work?
I mean I connect wireguard and confirmed to be connected to mullvad, but can’t use rtorrent or transmission to actually do anythingWhat do you mean by allow "plug-in" to work?
Here's what my 'wg show' shows...You'd have to make sure Transmission is using the wireguard interface, which is maybe configured in its web GUI options? (I only use qBittorrent.) And make sure the firewall rules (if you're using it) are correct.
Whether or not you're using port forwarding on your router shouldn't affect your torrent client's connection through the wireguard/Mullvad VPN.
If you run "wg show" in the jail, does it reveal the connection?
Even though you hid the private key, I'd still delete the screenshot.Here's what my 'wg show' shows...
@winnielinnie Hey I just wanted to thank you! I was connecting with Rtorrent (the latest app I was trying) and while the app portal worked, the settings would not save. just spun at 'saving' settings. So another clean install, this time qbittorrent. Unlike all the other apps I've used, qbittorrent asks for both a port and an interface. So I've added the port and interface and it works! Added the firewall and postdown scripts per @emk2203 in this thread, and I think I'm all good. Thanks!Even though you hid the private key, I'd still delete the screenshot.
Regardless, it appears that wireguard (Mullvad VPN) is working properly in the jail, using the interface name "wg0".
So if "wg0" is generated based on a specific city/server from Mullvad's configs, and in your Mullvad account you likewise had them assign you a port for that city/server (usually starts with a "5XXXX"), then in your bittorrent client you force it to use only the "wg0" interface and the port assigned to you (for port forwarding.)
Just make sure you keep using the same Mullvad city/server, or else port forwarding will not work. Also make sure your torrent client is not configured to pick a "random" forwarded port each time.
If you ever need to change cities, you can release the assigned port from your account and have them assign you a new port for a different city/server; then likewise use a mullvad wireguard .conf that matches the city/server in your account, so that it will be used as the new "wg0". (So let's say mullvad-se8.conf was copied to wg0.conf, but now you want to use mullvad-us15.conf. You copy mullvad-us15.conf to replace the existing wg0.conf.)
EDIT: Even still, it's probably better to just pick a city/server and stick with it indefinitely. You can check Mullvad's Server Status page to determine which server you feel is the best for long-term use, without having to worry about changing anything in the near future.
Just to let you know, starting in September 1st, 2022, qBittorrent will actively block connections through Mullvad's VPN servers.So I've added the port and interface and it works! Added the firewall and postdown scripts per @emk2203 in this thread, and I think I'm all good. Thanks!
you had me for a sec :)Just to let you know, starting in September 1st, 2022, qBittorrent will actively block connections through Mullvad's VPN servers.![]()
Yea I’m not unfamiliar as I actually built my Tautulli jail manually since the plug-in is currently outdated with old python pre-requisites. Just surprised that an update would overwrite data or apps in the jail unrelated to the app. Thanks!I've since abandoned "Plugins" on TrueNAS Core.
I manually create and maintain my own jails ("Basejails") using the "pkg" command to install, update, and remove packages, as well as clean the cache; and using iocage's "update", "fetch", and "upgrade" commands to bring the jail up to speed on the latest patch-level or OS base.
I really wish I could say why updating the "Plugin" would outright reset all your work.
I highly advise to switch over to the paradigm of manual jails, and pretend the "Plugins" menu doesn't even exist in TrueNAS's GUI.
View attachment 57329
I realize it's not as sexy or "appliance-y" to do it this way, but the direction in which TrueNAS is heading leaves us no choice.
You could try and add the IP address of where you're connecting from to the transmission settings.json file (example:I cannot connect to the webUI for transmission when WireGuard is running.
"rpc-whitelist": "127.0.0.1,::1,192.168.0.*"
).Thanks. I tried your solution and still the nothing.You could try and add the IP address of where you're connecting from to the transmission settings.json file (example:"rpc-whitelist": "127.0.0.1,::1,192.168.0.*"
).
Make sure you stop transmission before editing the settings.json file.
P.s.: I read about rpc-whitelist here: https://help.ubuntu.com/community/TransmissionHowTo
Did you create the firewall rules from post #8?I cannot connect to the webUI for transmission when WireGuard is running.
pkg delete wireguard-go
) and see if it works.I think it's possible, but I've never tried.would it be possible to install each service in a separate jail - then force "Transmission Jail" to route all traffic through "WireGuard Jail"?
Your firewall doesn't start automatically? Not sure what you mean by "before enabling the firewall".I actually lose the ability to connect to transmission BEFORE enabling the firewall. Not sure if that is a clue.
Not just to remove the wireguard-go package, but also enable the module in TrueNAS Core -> Tunables -> AddIt looks like you installed wireguard-go, which, as the error in your screenshot shows, is not needed. In fact, it might be the reason why you're having issues.
Uninstall it (pkg delete wireguard-go
) and see if it works.
kldload if_wg
#!/bin/sh
# Config
# Set rules command prefix
cmd="ipfw -q add"
vpn="wg0"
user="qbittorrent"
localLan="10.0.0.0/16"
# Flush out the list before we begin
ipfw -q -f flush
# Allow all local traffic on the loopback interface
${cmd} 00001 allow all from any to any via lo0
# Allow any connection to/from VPN interface
${cmd} 00010 allow all from any to any via ${vpn}
# Allow connection to/from LAN by User
${cmd} 00101 allow all from me to ${localLan} uid ${user}
${cmd} 00102 allow all from %{localLan} to me uid ${user}
# Deny any User connection outside LAN that does not use VPN
# ${cmd} 00103 deny all from any to any uid ${user}