Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ::: Generating Debug Output
- :::: PiVPN debug ::::
- =============================================
- :::: Latest commit ::::
- commit 4a5804a24c7397c24945c0f94c2609483f008100
- Author: 4s3ti <4s3ti@protonmail.com>
- Date: Sat May 8 15:51:27 2021 +0200
- Multiple fixes and Shellcheck complaiance
- fixes for Issue #1306, qrcode now defaults to ansiutf8,
- added flag -a256 or --ansi256 if their fonts are having trouble
- Shellcheck compliance #1233 for qrcodeCONF.sh,
- LIST array is now created with mapfile instead
- quoted multiple variables.
- fixes for Issue #1307, User creation won't allow user creation with name
- starting with "-", qrcodeCONF.sh won't accept wrong options or users startin g with "-"
- and exit with error code 1
- =============================================
- :::: Installation settings ::::
- PLAT=Debian
- OSCN=buster
- USING_UFW=0
- IPv4dev=eth0
- install_user=pi
- install_home=/home/pi
- VPN=wireguard
- pivpnPORT=51820
- pivpnDNS1=8.8.8.8
- pivpnDNS2=8.8.4.4
- pivpnHOST=REDACTED
- INPUT_CHAIN_EDITED=0
- FORWARD_CHAIN_EDITED=0
- pivpnPROTO=udp
- pivpnMTU=1420
- pivpnDEV=wg0
- pivpnNET=10.6.0.0
- subnetClass=24
- ALLOWED_IPS="0.0.0.0/0, ::0/0"
- UNATTUPG=1
- INSTALLED_PACKAGES=(dnsutils iptables-persistent wireguard-tools qrencode unatte nded-upgrades)
- =============================================
- :::: Server configuration shown below ::::
- [Interface]
- PrivateKey = server_priv
- Address = 10.6.0.1/24
- PostUp = iptables -A FORWARD -i wg0 -j ACCEPT; iptables -A FORWARD -o wg0 -j ACC EPT; iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
- PostDown = iptables -D FORWARD -i wg0 -j ACCEPT; iptables -D FORWARD -o wg0 -j A CCEPT; iptables -t nat -D POSTROUTING -o eth0 -j MASQUERADE
- MTU = 1420
- ListenPort = 51820
- ### begin user ###
- [Peer]
- PublicKey = user_pub
- PresharedKey = user_psk
- AllowedIPs = 10.6.0.2/32
- ### end user ###
- =============================================
- :::: Client configuration shown below ::::
- [Interface]
- PrivateKey = user_priv
- Address = 10.6.0.2/24
- MTU = 1420
- DNS = 8.8.8.8, 8.8.4.4
- [Peer]
- PublicKey = server_pub
- PresharedKey = user_psk
- Endpoint = REDACTED:51820
- AllowedIPs = 0.0.0.0/0, ::0/0
- =============================================
- :::: Recursive list of files in ::::
- :::: /etc/wireguard shown below ::::
- /etc/wireguard:
- configs
- keys
- wg0.conf
- wg0.conf.save
- /etc/wireguard/configs:
- clients.txt
- user.conf
- /etc/wireguard/keys:
- server_priv
- server_pub
- user_priv
- user_psk
- user_pub
- =============================================
- :::: Self check ::::
- :: [OK] IP forwarding is enabled
- :: [OK] Iptables MASQUERADE rule set
- :: [OK] WireGuard is running
- :: [OK] WireGuard is enabled (it will automatically start on reboot)
- :: [OK] WireGuard is listening on port 51820/udp
- =============================================
- :::: Having trouble connecting? Take a look at the FAQ:
- :::: https://github.com/pivpn/pivpn/wiki/FAQ
- =============================================
- :::: WARNING: This script should have automatically masked sensitive ::::
- :::: information, however, still make sure that PrivateKey, PublicKey ::::
- :::: and PresharedKey are masked before reporting an issue. An example key ::::
- :::: that you should NOT see in this log looks like this: ::::
- :::: YIAoJVsdIeyvXfGGDDadHh6AxsMRymZTnnzZoAb9cxRe ::::
- =============================================
- :::: Debug complete ::::
- :::
- ::: Debug output completed above.
- ::: Copy saved to /tmp/debug.log
- :::
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement