this post was submitted on 07 Dec 2023
57 points (98.3% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

54476 readers
732 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 1 year ago
MODERATORS
 

I have transmission running on my server in a docker container that is supposed to go through gluetun. If I run test with ipleak and other torrent ip testers it shows my vpn's ip address. However transmission is running way faster download speeds than deluge or qbit were with the same configuration. It makes me wonder if all the traffic isn't going through the vpn somehow and I can't think of any other way to check things other than ipleak tests. I'm probably being over paranoid but a few months ago qbit leaked and I got a letter from my isp. I really don't need that happening again. Any help would be appreciated.

top 25 comments
sorted by: hot top controversial new old
[–] [email protected] 35 points 11 months ago

You'll receive a letter to remind you.

[–] [email protected] 19 points 11 months ago (1 children)

Turn your vpn off, if transmission keeps downloading it's not setup properly.

[–] [email protected] 13 points 11 months ago (1 children)

yes and there are safe files to torrent like Linux ISOs, can test with those

[–] [email protected] 6 points 11 months ago (1 children)

Isn't it only dangerous hackers who download Linux?

[–] [email protected] 2 points 11 months ago* (last edited 11 months ago) (1 children)

Only if it’s Arch… or Kali

[–] [email protected] 2 points 11 months ago (2 children)

I think that's for hormosexuerls no? No thank you.

[–] [email protected] 2 points 11 months ago

Good attitude man fuck a homerseksual

[–] [email protected] 1 points 11 months ago

I feel attacked

[–] [email protected] 14 points 11 months ago

There are sites like this (https://www.whatismyip.net/tools/torrent-ip-checker/index.php?hash=1b0ed881214381f342f844fd640a3f495c6be898) that let you download a torrent. When you run the torrent in the client the site tells you the IP of your torrent client. Based on that info you can tell if it's running through the VPN or not.

[–] [email protected] 9 points 11 months ago (1 children)

Can you just give gluetun the wrong info for you vpn server and see if transmission still works?

[–] [email protected] 7 points 11 months ago (1 children)

So this worked and I was unable to use transmission without gluetun connecting properly. Is it normal for some clients to just be faster with the same torrents? Like about was at like 1-2mib and transmission with the same torrent is running at 4-5.

[–] [email protected] 3 points 11 months ago

No idea but there are new and exciting torrent technologies being worked on all the time. Things like DHT nodes or turning off anonymous mode can affect speeds. Your other clients may have different settings enabled or disabled or may not have implemented new protocols.

[–] [email protected] 8 points 11 months ago* (last edited 11 months ago)

Use a firewall to block all outgoing packages through all interfaces but lo and tun (or wg for Wireguard). Like this for iptables:

-A FORWARD -j REJECT --reject-with icmp-port-unreachable
-A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A OUTPUT -o lo -j ACCEPT
-A OUTPUT -d 1.2.3.4/32 -p udp -j ACCEPT #replace with public IP of your VPN you try to connect
-A OUTPUT -p icmp -j ACCEPT
-A OUTPUT -o tun+ -j ACCEPT #replace with wg+ for Wireguard
-A OUTPUT -j REJECT --reject-with icmp-port-unreachable

If you are paranoid you could mess with INPUT table as well but if OUTPUT is configured properly nobody well ever know your real IP address.

Not sure how well this works with Docker and such, I use LXC containers.

The funny thing is that I am actually seeding Linux ISOs (yes, real ones). The reason I am using a VPN to seed those is because the ISP is complaining about random peers hitting (non-existing obviously) addresses in private IPv4 ranges (like 172.16.1.1) and instead if simply dropping those packages at the switch ... oh well. I guess some people have multiple peers connected to each other via private networks but external peers don't know about these connections and simply try to reach them on their private addresses over public internet.

Anyway yeah I could mess with routing table on my server and null-route those ranges but I have an active VPN contract already so why not using it?

[–] [email protected] 7 points 11 months ago

Use docker with a container which can only go online thru a vpn like transmission-vpn.

[–] [email protected] 4 points 11 months ago

You need gluetun! It supports almost all VPN providers

[–] [email protected] 4 points 11 months ago

Packet sniffing.

[–] [email protected] 2 points 11 months ago (1 children)

You could always go with an edge gateway routing policy. Set it up that the box running the torrents only has one path out to go through the tunnel.

[–] [email protected] 1 points 11 months ago (1 children)

This is the way. I use OPNsense, and maintain an alias group of all the hosts I want directed to my VPN gateway server.

[–] [email protected] 3 points 11 months ago (1 children)

I'm working on getting an opnsense client together but money is tight so this is definitely the route I'm going to go once I am able.

[–] [email protected] 1 points 11 months ago (1 children)

Yeah, I hear you. Took me a while to put a little cash together for my setup too. I ended up keeping my eyes peeled on the ex-enterprise auction sites, and picked up for cheap a couple of HP DL360s.

Yes, I now have the problem on the other side of managing my power bills, but I'm nearly ready to add a battery to my solar setup, so hopefully that's not a problem for too much longer.

[–] [email protected] 2 points 11 months ago (2 children)

Power draw can suck, my stack uses almost 1Kw, but it makes a nice white noise machine/space heater. Really if you're not getting too fancy a regular consumer router with VPN support can do the job at a fractuon of the power draw, but they lack a lot of options.

I've been tryining to switch to a virtualized firewall to take one box offline but OPn hasn't been playing nice with XCP-ng as far as not murdering the throughput and if a I'm going through the effort may as well get off pfSense at the same time.

[–] [email protected] 1 points 11 months ago

I have mine sitting in my garage (currently saving for a rack to hold everything), so noise and heat aren't a major problem.

You're right re a consumer-grade router doing the same job, but my setup wasn't only about OPNsense. I spent many years running a low power setup - RasPis, etc - but then found I was frustrated by the lack of real grunt in the compute department. Plus I wanted to play with Proxmox.

[–] [email protected] 1 points 11 months ago

That’s almost $2.50/day here and we have comparatively low electric rates.

[–] [email protected] 2 points 11 months ago

You can use your firewall to block all non-VPN traffic from a device, except for DNS. Or, if your VPN provider supports it, just use the DNS port for the VPN and allow only UDP 53 outgoing (e.g. Mullvad). Besides that, very tricky thing to check. Always rely on multiple layers of "protection".

[–] [email protected] 2 points 11 months ago

You can open a consol log for the transmission container and type "curl ifconfig.io". This will return you wanip. Compare that to what you were expecting.