NordVpn official client in a docker. It makes routing containers' traffic through NordVpn easy.
This image use docker manifest for multi-platform awareness, simply pulling bubuntux/nordvpn
should retrieve the correct image for your arch, but you can also pull specific arch images via tags.
Architecture | Tag |
---|---|
Linux x86-64 | amd64-latest |
Linux x86/i686 | i386-latest |
ARMv8 64-bit | aarch64-latest |
ARMv7 32-bit | armv7hf-latest |
This container was designed to be started first to provide a connection to other containers (using --net=container:vpn
, see below Starting an NordVPN client instance).
NOTE: More than the basic privileges are needed for NordVPN. With docker 1.2 or newer you can use the --cap-add=NET_ADMIN
and --device /dev/net/tun
options. Earlier versions, or with fig, and you'll have to run it in privileged mode.
docker run -ti --cap-add=NET_ADMIN --device /dev/net/tun --name vpn \
-e [email protected] -e PASS='pas$word' \
-e CONNECT=country -e TECHNOLOGY=NordLynx -d bubuntux/nordvpn
Once it's up other containers can be started using it's network connection:
docker run -it --net=container:vpn -d some/docker-container
The environment variable NETWORK must be your local network that you would connect to the server running the docker containers on. Running the following on your docker host should give you the correct network: ip route | awk '!/ (docker0|br-)/ && /src/ {print $1}'
docker run -ti --cap-add=NET_ADMIN --device /dev/net/tun --name vpn \
-p 8080:80 -e NETWORK=192.168.1.0/24 \
-e [email protected] -e PASS='pas$word' -d bubuntux/nordvpn
Now just create the second container without the -p
parameter, only inlcude the --net=container:vpn
, the port should be declare in the vpn container.
docker run -ti --rm --net=container:vpn -d bubuntux/riot-web
now the service provided by the second container would be available from the host machine (http://localhost:8080) or anywhere inside the local network (http://192.168.1.xxx:8080).
version: "3"
services:
vpn:
image: bubuntux/nordvpn
network_mode: bridge
cap_add:
- net_admin
devices:
- /dev/net/tun
environment:
- [email protected]
- PASS='pas$word'
- CONNECT=United_States
- TECHNOLOGY=NordLynx
- NETWORK=192.168.1.0/24
- TZ=America/Denver
ports:
- 8080:80
restart: unless-stopped
web:
image: nginx
network_mode: service:vpn
All traffic going through the container is router to the vpn (unless whitelisted), If connection to the vpn drops your connection to the internet stays blocked until the VPN tunnel is restored. THIS IS THE DEFAULT BEHAVIOUR AND CAN NOT BE DISABLE.
USER
- User for NordVPN account.PASS
- Password for NordVPN account, surrounding the password in single quotes will prevent issues with special characters such as$
.CONNECT
- [country]/[server]/[country_code]/[city]/[group] or [country] [city], if none provide you will connect to the recommended server.- Provide a [country] argument to connect to a specific country. For example: Australia
- Provide a [server] argument to connecto to a specific server. For example: jp35
- Provide a [country_code] argument to connect to a specific country. For example: us
- Provide a [city] argument to connect to a specific city. For example: 'Hungary Budapest'
- Provide a [group] argument to connect to a specific servers group. For example: Onion_Over_VPN
- --group value, -g value Specify a server group to connect to. For example: 'us -g p2p'
TECHNOLOGY
- Specify Technology to use:- OpenVPN - Traditional connection.
- NordLynx - NordVpn wireguard implementation (3x-5x times faster).
PROTOCOL
- TCP or UDP (only valid when using OpenVPN).OBFUSCATE
- Enable or Disable. When enabled, this feature allows to bypass network traffic sensors which aim to detect usage of the protocol and log, throttle or block it (only valid when using OpenVpn).CYBER_SEC
- Enable or Disable. When enabled, the CyberSec feature will automatically block suspicious websites so that no malware or other cyber threats can infect your device. Additionally, no flashy ads will come into your sight. More information on how it works: https://nordvpn.com/features/cybersec/.DNS
- Can set up to 3 DNS servers. For example 1.1.1.1,8.8.8.8 or Disable, Setting DNS disables CyberSec.WHITELIST
- List of domains that are gonna be accessible outside vpn (IE rarbg.to,yts.am).NETWORK
- CIDR networks (IE 192.168.1.0/24), add a route to allows replies once the VPN is up.NETWORK6
- CIDR IPv6 networks (IE fe00:d34d:b33f::/64), add a route to allows replies once the VPN is up.TZ
- Set a timezone (IE EST5EDT, America/Denver, full list).GROUPID
- Set the GID for the vpn.NET_IFACE
- Network Interface to bind the vpn (Useful when combined with--network host
to protect the entire host).DEBUG
- Set to 'on' for troubleshooting (User and Pass would be log).
If you have any problems with or questions about this image, please contact me through a GitHub issue.