Does anyone know the best way to route traffic from transmission through Mullvad?
I have transmissionset up on my plex server which I control using tranmission remote and want to download my Linux ISOs with privacy.
I have downloaded the wireguard config and can connect to it using wg-quick, but I don’t want all traffic going through it, only transmission.
Consider moving from mullvad if you are into torrenting. Mullvad doesnt support port forwarding anymore. But no matter what provider you chose, use docker container gluetun to route traffic from any other container (like transmission). I like transmission, but most people use qbittorrent because its more advanced. You can also set up VPN in qbittorrent settings
Which affects torrentors how?
deleted by creator
I don’t torrent, as a rule, so I can’t say I’d notice any speed reduction. I had, however, noticed that no matter how long I kept seeding, I’d gotten few - or maybe no - connections. I didn’t know if this were because nobody else was leeching the thing at the time, or something else like this.
I’m very reluctant to give up Mullvad. So far, in all ways I care about they’ve demonstrated justification for brand loyalty. Plus, I’ve been with them for years and already have everything set up and configured across multiple deviiiiceeeessss.
As I said, torrenting isn’t a critical activity for me, so I’ll hang tight. I am curious to know if Mullvad has given a justification for stopping support for port forwarding. They used to, right? So it was work for them to stop.
You’ll get more connections if people can get to you; otherwise, you’re only connecting to people who are port forwarding themselves. If you’re port forwarding, you can connect to everyone.
Here is their blog post about it: https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports/
Thank you for the link! Very informative.
https://github.com/Safing/portmaster
You could use something like portmaster to route only that program to the VPN.
Probably safer to configure your program to use the mullvad proxy. That way if mullvad is offline it just won’t work.
The gold standard for what you want to do is qubes, where you would set up a VM that can only talk to a VM that’s routing to the VPN. But that’s a lot of work. You might be able to set something similar with containers.
This other post may be interesting as well https://slrpnk.net/post/2096570
I highly recommend moving that to a docker or podman setup. Gluetun is the go-to for VPN traffic. Set up a little container and you can link other containers to it to route all their traffic through.
I personally shove Transmission into Docker:
services: wireguard: image: ghcr.io/linuxserver/wireguard container_name: wireguard cap_add: - NET_ADMIN - SYS_MODULE environment: - PUID=1000 - PGID=1000 - TZ=Europe/Stockholm ports: - 9091:9091/tcp volumes: - ./config:/config - /lib/modules:/lib/modules sysctls: - net.ipv6.conf.all.disable_ipv6=0 - net.ipv4.conf.all.src_valid_mark=1 restart: unless-stopped transmission: image: ghcr.io/linuxserver/transmission container_name: transmission ulimits: nofile: 1048576 environment: - PUID=1000 - PGID=996 - TZ=Europe/Stockholm - USER=azurediamond - PASS=hunter2 volumes: - ./config:/config - /data:/data - /data/Torrents/dl:/downloads - /data/Torrents/inbox/start:/watch network_mode: "service:wireguard" depends_on: [ "wireguard" ] restart: unless-stopped
Make sure your mullvad config is called
wg0.conf
in./config
.I do this except with https://github.com/qdm12/gluetun
(which apparently also can be used as a k8s sidecar container, am gonna try this soon as well)
Oh yes, got your password :p
All I see is *******.
Really?
Password: ********