Private Internet Access docker container
forked from: https://github.com/DeltaAngle/pia-openvpn
Based on Apline Linux to be tiny!
Kudos to ColinHerbet and swmacdonald for their work
Private Internet Access VPN Service encrypts your connection and provides you with an anonymous IP to protect your privacy.
This image provides the configuration file for each region managed by PIA.
The goal is to start this container first then run other container within the PIA VPN via --net=container:pia
.
docker run --privileged --cap-add=NET_ADMIN --device=/dev/net/tun --name=pia -d \
--dns 209.222.18.222 --dns 209.222.18.218 \
-e 'REGION=US East' \
-e 'USERNAME=pia_username' \
-e 'PASSWORD=pia_password' \
conlon/pia-openvpn
Due to the nature of the VPN client, this container must be started with some additional privileges, --privileged
, --cap-add=NET_ADMIN
and --device=/dev/net/tun
make sure that the tunnel can be created from within the container.
Starting the container in privileged mode seems to be required. I was unable to get this to work with the /dev/net/tun without running in privileged mode.
docker run --rm --net=container:pia \
tutum/curl \
curl -s ifconfig.co
The IP address returned after this execution should be different from the IP address you would get without specifying --net=container:pia
.
Every parameter provided to the docker run
command is directly passed as an argument to the openvpn executable.
This will run the openvpn client with the --pull
option:
docker run ... --name=pia \
conlon/pia-openvpn \
--pull
By default this image relies on the variables USERNAME
and PASSWORD
to be set in order to successfully connect to the PIA VPN.
It is possible to use instead a pre-existing volume/file containing the credentials. (Note the :Z for SELINUX)
docker run ... --name=pia \
-e 'REGION=US East' \
-v '/hostpath/auth.conf:/etc/openvpn/auth.conf:Z' \
conlon/pia-openvpn \
--auth-user-pass auth.conf
Any container started with --net=container:...
will use the same network stack as the underlying container, therefore they will share the same local IP address.
Prior to Docker 1.9 --link=pia:mycontainer
was the recommended way to connect to a specific container.
Since Docker 1.9, it is recommended to use a non default network allowing containers to address each other by name.
docker network create pia_network
This creates a network called pia_network
in which containers can address each other by name; the /etc/hosts
is updated automatically for each container added to the network.
docker run ... --net=pia_network --name=pia conlon/pia-openvpn
In pia_network
there is now a resolvable name pia
that points to that newly created container.
This step is the same as the earlier one
# Create an HTTP service that listens on port 80
docker run ... --net=container:pia --name=myservice myservice
This container is not addressable by name in pia_network
, but given that the network stack used by myservice
is the same as the pia
container, they have the same IP address and the service running in this container will be accessible at http://pia:80
.
docker run ... --net=pia_network tutum/curl curl -s http://pia/
The container is started within the same network as pia
but is not behind the VPN.
It can access services started behind the VPN container such as the HTTP service provided by myservice
.
A service created behind the VPN container will not be accessible from a client located outside of the server on which it runs. This is because Docker runs on a different IP range than such client, and therefore the client's traffic is considered as non-local and is routed out through the VPN.
The environment variable LOCAL_NETWORK can be set to let the pia
container know the range corresponding to your local network. For instance, if your local network uses IP range 192.168.1.0/24
and the service listens on port 80 (provided that the server's firewall is set to not block port 80):
docker run ... -p 80:80 -e LOCAL_NETWORK=192.168.1.0/24 --net=pia_network --name=pia conlon/pia-openvpn
docker run ... --net=container:pia --name=myservice myservice
This is inspired by haugene/docker-transmission-openvpn.