Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

failed to connect to lokinet RPC: connection attempt timed out #2193

Open
RobertZaks opened this issue Jul 21, 2023 · 1 comment
Open

failed to connect to lokinet RPC: connection attempt timed out #2193

RobertZaks opened this issue Jul 21, 2023 · 1 comment

Comments

@RobertZaks
Copy link

$ lokinet-vpn --status
failed to connect to lokinet RPC: connection attempt timed out
$ lokinet
[2023-07-21 19:27:18] [+0.000s] [:info|daemon/lokinet.cpp:230] starting up lokinet-0.9.11-1f3895a99 Our Lord And Savior
[2023-07-21 19:27:18] [+0.000s] [:info|daemon/lokinet.cpp:236] Using config file: "/home/robert/.lokinet/lokinet.ini"
[2023-07-21 19:27:18] [+0.004s] [:info|llarp/router/router.cpp:1268] Bound RPC server to tcp://127.0.0.1:1190
[2023-07-21 19:27:18] [+0.008s] [:info|llarp/router/router.cpp:776] Loaded 3 bootstrap routers
[2023-07-21 19:27:18] [+0.008s] [:info|llarp/router/router.cpp:811] router profiling enabled
[2023-07-21 19:27:18] [+0.008s] [:info|llarp/router/router.cpp:814] no profiles file at "/home/robert/.lokinet/profiles.dat" skipping
[2023-07-21 19:27:18] [+0.008s] [:info|llarp/handlers/tun.cpp:284] endpoint:yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy.loki setting to be reachable by default
[2023-07-21 19:27:18] [+0.008s] [:info|llarp/handlers/tun.cpp:457] endpoint:yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy.loki skipping loading addr map at "/home/robert/.lokinet/addrmap.dat" as it does not currently exist
[2023-07-21 19:27:18] [+0.012s] [:info|llarp/router/router.cpp:1330] Signing rc...
[2023-07-21 19:27:18] [+0.012s] [:info|llarp/link/link_manager.cpp:137] starting 1 outbound links
[2023-07-21 19:27:18] [+0.013s] [:info|llarp/router/router.cpp:1382] starting hidden service context...
[2023-07-21 19:27:18] [+0.013s] [:info|llarp/handlers/tun.cpp:1084] Set Up networking for endpoint:6temf4johdug96njmjhcsm1ah6kz57zpaenqm47drcwuedqsymeo.loki
[2023-07-21 19:27:18] [+0.013s] [:info|llarp/handlers/tun.cpp:1000] endpoint:6temf4johdug96njmjhcsm1ah6kz57zpaenqm47drcwuedqsymeo.loki set lokitun0 to have address ::ffff:172.16.0.1
[2023-07-21 19:27:18] [+0.013s] [:info|llarp/handlers/tun.cpp:1001] endpoint:6temf4johdug96njmjhcsm1ah6kz57zpaenqm47drcwuedqsymeo.loki allocated up to ::ffff:172.16.255.255 on range 172.16.0.1/16
[2023-07-21 19:27:18] [+0.013s] [:info|llarp/handlers/tun.cpp:960] endpoint:6temf4johdug96njmjhcsm1ah6kz57zpaenqm47drcwuedqsymeo.loki map 6temf4johdug96njmjhcsm1ah6kz57zpaenqm47drcwuedqsymeo.loki to ::ffff:172.16.0.1
[2023-07-21 19:27:18] [+0.013s] [:info|llarp/handlers/tun.cpp:1017] endpoint:6temf4johdug96njmjhcsm1ah6kz57zpaenqm47drcwuedqsymeo.loki using v6 range: fd00::ffff:ac10:1/112
[2023-07-21 19:27:18] [+0.013s] [:info|llarp/handlers/tun.cpp:1023] endpoint:6temf4johdug96njmjhcsm1ah6kz57zpaenqm47drcwuedqsymeo.loki setting up network...
[2023-07-21 19:27:18] [+0.013s] [:error|llarp/handlers/tun.cpp:1031] endpoint:6temf4johdug96njmjhcsm1ah6kz57zpaenqm47drcwuedqsymeo.loki failed to set up network interface: cannot set interface name: Operation not permitted
[2023-07-21 19:27:18] [+0.013s] [:error|llarp/service/context.cpp:156] default failed to start
[2023-07-21 19:27:18] [+0.013s] [:error|llarp/router/router.cpp:1385] Failed to start hidden service context

Device and Operating system (please complete the following information):

  • OS: Devuan GNU+Linux
@RobertZaks RobertZaks added the bug Something isn't working label Jul 21, 2023
@jagerman
Copy link
Member

Lokinet requires some elevated permissions to run (to be able to set up the lokinet network tunnel device). Normally these are granted by the systemd service when lokinet runs as a service, because that is a nice clean way to provide it only to the service, but as I see you're using a systemd-protest distribution you'll need to grant those permissions differently, and probably somewhat less securely. One way is to use setcap on the binary as a sort of selective setuid, as mentioned in the documentation here.

@dr7ana dr7ana removed the bug Something isn't working label Jul 21, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants