Skip to content

RTNETLINK answers: File exists  #3

@strongbull1

Description

@strongbull1

Hello

I tried using this and so far couldn't get it to work.

wiresocks  | RTNETLINK answers: File exists
wiresocks  | time="2023-01-13T04:22:41Z" level=info msg="[STACK] tun://tun0 <-> socks5://<SOCKS_IP>:46202"
wireguard  | [custom-init] No custom services found, skipping...
wireguard  | [migrations] started
wireguard  | [migrations] no migrations found
wireguard  |
wireguard  | -------------------------------------
wireguard  |           _         ()
wireguard  |          | |  ___   _    __
wireguard  |          | | / __| | |  /  \
wireguard  |          | | \__ \ | | | () |
wireguard  |          |_| |___/ |_|  \__/
wireguard  |
wireguard  |
wireguard  | Brought to you by linuxserver.io
wireguard  | -------------------------------------
wireguard  |
wireguard  | To support the app dev(s) visit:
wireguard  | WireGuard: https://www.wireguard.com/donations/
wireguard  |
wireguard  | To support LSIO projects visit:
wireguard  | https://www.linuxserver.io/donate/
wireguard  | -------------------------------------
wireguard  | GID/UID
wireguard  | -------------------------------------
wireguard  |
wireguard  | User uid:    1000
wireguard  | User gid:    1000
wireguard  | -------------------------------------
wireguard  |
wireguard  | Uname info: Linux 83f6520c6441 5.4.0-105-generic #119-Ubuntu SMP Mon Mar 7 18:49:24 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux
wireguard  | **** It seems the wireguard module is already active. Skipping kernel header install and module compilation. ****
wireguard  | **** As the wireguard module is already active you can remove the SYS_MODULE capability from your container run/compose. ****
wireguard  | **** Server mode is selected ****
wireguard  | **** External server address is set to <VPS IP> ****
wireguard  | **** External server port is set to 51280. Make sure that port is properly forwarded to port 51820 inside this container ****
wireguard  | **** Internal subnet is set to 10.13.13.0 ****
wireguard  | **** AllowedIPs for peers 10.13.13.0/24,0.0.0.0/0 ****
wireguard  | **** PEERDNS var is either not set or is set to "auto", setting peer DNS to 10.13.13.1 to use wireguard docker host's DNS. ****
wireguard  | **** Server mode is selected ****
wireguard  | **** No changes to parameters. Existing configs are used. ****
wireguard  | [custom-init] No custom files found, skipping...
wireguard  | .:53
wireguard  | CoreDNS-1.10.0
wireguard  | linux/amd64, go1.19.1, 596a9f9
wireguard  | [#] ip link add wg0 type wireguard
wireguard  | [#] wg setconf wg0 /dev/fd/63
wireguard  | [#] ip -4 address add 10.13.13.1 dev wg0
wireguard  | [#] ip link set mtu 1420 up dev wg0
wireguard  | [#] ip -4 route add 10.13.13.2/32 dev wg0
wireguard  | [#] iptables -A FORWARD -i wg0 -j ACCEPT; iptables -A FORWARD -o wg0 -j ACCEPT; iptables -t nat -A POSTROUTING -o eth+ -j MASQUERADE
wireguard  | [ls.io-init] done.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions