This is an OpenVPN client docker container that use least loaded NordVPN servers. It makes routing containers' traffic through OpenVPN easy.
OpenVPN is an open-source software application that implements virtual private network (VPN) techniques for creating secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities. It uses a custom security protocol that utilizes SSL/TLS for key exchange. It is capable of traversing network address translators (NATs) and firewalls.
This container was designed to be started first to provide a connection to other containers (using --net=container:vpn
, see below Starting an NordVPN client instance).
NOTE: More than the basic privileges are needed for NordVPN. With docker 1.2 or newer you can use the --cap-add=NET_ADMIN
and --device /dev/net/tun
options. Earlier versions, or with fig, and you'll have to run it in privileged mode.
NOTE 2: If you need a template for using this container with docker-compose
, see the example file.
docker run -ti --cap-add=NET_ADMIN --device /dev/net/tun --name vpn \
-e [email protected] -e PASS=password \
-e RANDOM_TOP=n -e RECREATE_VPN_CRON=string \
-e COUNRTY=country1;country2 -e CATEGORY=category1;category2 \
-e PROTOCOL=protocol -d azinchen/nordvpn
Once it's up other containers can be started using it's network connection:
docker run -it --net=container:vpn -d some/docker-container
This container selects least loaded server from NordVPN pool. Server list can be filtered by setting COUNTRY
, CATEGORY
and/or PROTOCOL
environment variables. If filtered list is empty, recommended server is selected.
The environmenta variable NETWORK must be your local network that you would connect to the server running the docker containers on. Running the following on your docker host should give you the correct network: ip route | awk '!/ (docker0|br-)/ && /src/ {print $1}'
docker run -ti --cap-add=NET_ADMIN --device /dev/net/tun --name vpn \
-p 8080:80 -e NETWORK=192.168.1.0/24 \
-e [email protected] -e PASS=password -d azinchen/nordvpn
Now just create the second container without the -p
parameter, only inlcude the --net=container:vpn
, the port should be declare in the vpn container.
docker run -ti --rm --net=container:vpn -d bubuntux/riot-web
now the service provided by the second container would be available from the host machine (http://localhost:8080) or anywhere inside the local network (http://192.168.1.xxx:8080).
docker run -it --name web -p 80:80 -p 443:443 \
--link vpn:<service_name> -d dperson/nginx \
-w "http://<service_name>:<PORT>/<URI>;/<PATH>"
Which will start a Nginx web server on local ports 80 and 443, and proxy any requests under /<PATH>
to the to http://<service_name>:<PORT>/<URI>
. To use a concrete example:
docker run -it --name bit --net=container:vpn -d bubundut/nordvpn
docker run -it --name web -p 80:80 -p 443:443 --link vpn:bit \
-d dperson/nginx -w "http://bit:9091/transmission;/transmission"
For multiple services (non-existant 'foo' used as an example):
docker run -it --name bit --net=container:vpn -d dperson/transmission
docker run -it --name foo --net=container:vpn -d dperson/foo
docker run -it --name web -p 80:80 -p 443:443 --link vpn:bit \
--link vpn:foo -d dperson/nginx \
-w "http://bit:9091/transmission;/transmission" \
-w "http://foo:8000/foo;/foo"
ENVIRONMENT VARIABLES
COUNTRY
- Use servers from countries in the list (IE Australia;New Zeland). Several countries can be selected using semicolon.CATEGORY
- Use servers from specific categories (IE P2P;Anti DDoS). Several categories can be selected using semicolon. Allowed categories are:Anti DDoS
Dedicated IP servers
Double VPN
Obfuscated Servers
Onion Over VPN
P2P
Standard VPN servers
PROTOCOL
- Specify OpenVPN protocol. Only one protocol can be selected. Allowed protocols are:openvpn_udp
openvpn_tcp
RANDOM_TOP
- Place n servers from filtered list in random order. Useful withRECREATE_VPN_CRON
.RECREATE_VPN_CRON
- Set period of selecting new server in format for crontab file.USER
- User for NordVPN account.PASS
- Password for NordVPN account.NETWORK
- CIDR network (IE 192.168.1.0/24), add a route to allows replies once the VPN is up.NETWORK6
- CIDR IPv6 network (IE fe00:d34d:b33f::/64), add a route to allows replies once the VPN is up.
If you have any problems with or questions about this image, please contact me through a GitHub issue or email.