![]() Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication Incoming Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication Outgoing Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key OPTIONS IMPORT: adjusting link_mtu to 1624 OPTIONS IMPORT: -ip-win32 and/or -dhcp-option options modified OPTIONS IMPORT: route-related options modified OPTIONS IMPORT: -ifconfig/up options modified OPTIONS IMPORT: timers and/or timeouts modified Peer Connection Initiated with xx.xx.xx.xx:1194 VERIFY OK: depth=0, C=ES, ST=XXX, L=XXX, O=XXXXX, CN=Ĭontrol Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Validating certificate extended key usage VERIFY OK: depth=1, C=ES, ST=XXX, L=XXX, O=XXXXX, CN=internal-ca ![]() WARNING: this configuration may cache passwords in memory - use the auth-nocache option to prevent this ![]() ![]() TLS: Initial packet from xx.xx.xx.xx:1194, sid=3ebc16fc 8cb6d6b1 TCP/UDP: Preserving recently used remote address: xx.xx.xx.xx:1194 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Library versions: OpenSSL 1.1.1c FIPS, LZO 2.08 This is the log I get when configuring the client with verb 3: OpenVPN 2.4.7 x86_64-redhat-linux-gnu built on Feb 20 2019 I can effectively verify there is no /dev/net/ directory when using -privileged, even if I pass the -cap-add=NET_ADMIN -device=/dev/net/tun parameters. Then instead of the permission-denied error (errno=13), I get a no-such-file-or-directory error (errno=2): ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such file or directory (errno=2) If I try with -privileged: podman run -v $(pwd):/vpn:Z -privileged -cap-add=NET_ADMIN -device=/dev/net/tun -it peque/vpn Ls: cannot access '/dev/net/tun': Permission denied I can also list /dev/net, but will get a "permission denied error": # ls -l /dev/net Then, from the container, I can: # ls -l /dev/ | grep netĭrwxr-xr-x. Running the container with: podman run -v $(pwd):/vpn:Z -cap-add=NET_ADMIN -device=/dev/net/tun -it peque/vpn Using Podman 1.4.4 (rootless) and Fedora 30 distribution with kernel 5.1.19. I get the following error: ERROR: Cannot open TUN/TAP dev /dev/net/tun: Permission denied (errno=13)Īny ideas on how could I fix this? I would not mind changing the base image if that could help (i.e.: to Alpine or anything else as long as it allows me to use openvpn for the connection). If I try to run it with (note $(pwd), where the VPN configuration and credentials are stored): podman run -v $(pwd):/vpn:Z -cap-add=NET_ADMIN -device=/dev/net/tun -it peque/vpn rwxrwx- 1 osmc osmc 22739 Nov 1 10:36 nzbget.logĭrwxrwx- 2 osmc osmc 0 Nov 1 10:36 queueĭrwxr-xr-x 2 osmc osmc 4096 Nov 1 10:36 inter rwxrwx- 1 osmc osmc 5 Nov 1 10:35 nzbget.lock Sun Nov 1 10:28:57 2020ĞRRORĜould not create file /mnt/mount_fritz/usenet_dl/inter/TEST_NZB/webui/ĭrwxrwx- 2 osmc osmc 0 Nov 1 10:36 downloadsĭrwxrwx- 2 osmc osmc 0 Nov 1 10:36 interĭrwxrwx- 2 osmc osmc 0 Nov 1 10:28 nzb_import Installed on a Raspberry 3b (Debian 10.5 based OSMC installation)Įxtract from error log - full details see below: As soon as I move the intermediate directory to a local path everything works fine even if all other directories are still on the mounted share. I am getting errors when the intermediate folder is on a mounted share.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |