![]() ![]() Windscribe: username and password | Signup up using my affiliate link below Private Internet Access: username and password ( sign up) Can work as a Kubernetes sidecar container, thanks A VPN account with one of the service providers:.Subprograms output streams are all merged together. ![]() Subprograms all drop root privileges once launched.Possibility of split horizon DNS by selecting multiple DNS over TLS providers.Pick the region or a multi hop region name.Compatible with amd64, i686 (32 bit), ARM 64 bit, ARM 32 bit v6 and v7 □.Built in HTTP proxy (Tinyproxy, tunnels TCP).Built in SOCKS5 proxy (Shadowsocks, tunnels TCP+UDP).Built in firewall kill switch to allow traffic only with needed the VPN servers and LAN devices.Choose the vpn network protocol, udp or tcp.DNS fine blocking of malicious/ads/surveillance hostnames and IP addresses, with live update every 24 hours.DNS over TLS baked in with service provider(s) of your choice.Supports Private Internet Access, Mullvad, Windscribe, Surfshark and Cyberghost servers.Based on Alpine 3.12 for a small Docker image of 52MB.Files and blocking lists built periodically used with Unbound (see BLOCK_MALICIOUS, BLOCK_SURVEILLANCE and BLOCK_ADS environment variables).Unbound 1.10.1 configured with Cloudflare's 1.1.1.1 DNS over TLS (configurable with 5 different providers).IPtables 1.8.4 enforces the container to communicate only through the VPN or with other containers in its virtual network (acts as a killswitch).OpenVPN 2.4.9 to tunnel to your VPN provider servers.Alpine 3.12 for a tiny image (37MB of packages, 6.7MB of Go binary and 5.6MB for Alpine).Lightweight swiss-knife-like VPN client to tunnel to Private Internet Access, Mullvad, Windscribe, Surfshark and Cyberghost VPN servers, using Go, OpenVPN, iptables, DNS over TLS, ShadowSocks and TinyproxyĪNNOUNCEMENT: Video of the Git history of Gluetun ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |