Yep, that won’t work, it’s not connecting to the relay (it’s trying to go direct, which won’t work if the VPN is up).
tried disconnected the VPN earlier but still not working
then i put it back on and assigned a new IP:89.187.161.57
I’m beginning to think it’s never going to work right through the VPN.
Kill the VPN, restart the daemon, let’s see what it does.
Finally beginning to look normal just now:
> ipfs dht findpeer 12D3KooWK5GQfwTovUTHR8Ud2WG4fMWFx644w59g6YAoXvYA278y
/ip6/::1/tcp/4001
/ip6/::1/udp/4001/quic
/ip4/147.75.195.153/tcp/4001/p2p/QmW9m57aiBDHAkKj9nmFSEn7ZqrcF1fZS4bipsTCHburei/p2p-circuit
/ip4/127.0.0.1/tcp/4001
/ip4/127.0.0.1/udp/4001/quic
/ip4/147.75.195.153/udp/4001/quic/p2p/QmW9m57aiBDHAkKj9nmFSEn7ZqrcF1fZS4bipsTCHburei/p2p-circuit
Is the VPN off?
no, i was away for a while, the VPN is on all the time
The node is down again. I really suspect that the culprit is the VPN. I really need you to test without it for some length of time. Kill the VPN, restart the daemon, let it run that way for an hour. Let’s see how it behaves.
VPN disconnected from my Brave browser
ipfs daemon restarted
webui reloaded
It’s misbehaving as well, and I can’t explain why. I’d like to try without EnableHolePunching
, but I’m out of time tonight, it’s time for bed. We’ll resume tomorrow, when you have some time.
sure thing, thanks mate!
We’ll talk tomorrow
i left my daemon open last night, and got this message this morning.
“2022-02-26T210043.131+0800 ←[31mERROR←[0m dht go-libp2p-kad-dht@v0.15.0dht_net.go47 ignoring incoming dht message while not in server mode”
didn’t restart my daemon, just open my Brave browser without VPN connection and everything seems fine
files upload few days ago as well as yesterday’s could be viewed in new tab (even an ipns folder), new files as well
What would you think if i put my VPN on? Do i need to shut it down and wait for a day to get my data back?
The problem is that we’re back to square one, your node isn’t reachable, which means the majority of the network can’t access your content (it means you are now a consumer, not a provider).
I’ve been doing a lot of research on the subject, and I think I’m beginning to understand what may be happening (and it’s a bug, if I can confirm it, I’ll be filing a bug report).
For now, I’d like you to run it without the VPN and with Swarm.EnableHolePunching
off as a test.
While I watch what it does, I’d like you to get in touch with your ISP again, and find out if there’s a way to adjust your modem’s firewall to open port 4001 for TCP and UDP. This would solve the problem (the fact it’s blocked is what is causing the bug).
P.S. Also, there’s one thing I need clarified: is the VPN only tunneling your browser’s traffic, or ALL the traffic for your computer?
will keep VPN in a disconnected state
Swarm.EnableHolePunching = false
and i’ll try to contact my ISP provider for the 4001 port issue
Just out of curiosity, if my desktop is not plugged into the modem, and I use wifi as an internet connection, it might work?
We ran into a different problem that way, remember (the amount of traffic caused by IPFS would bring your router down and you would lose your internet connection for your whole machine on a regular basis). So, that’s not really an option, and your current setup is actually more efficient the way it is, but it’s confusing libp2p.
Can you verify that Swarm.RelayClient.Enabled
is still true? And can you post the output from “ipfs id”?
Also, you didn’t answer my question about the VPN.
Swarm.RelayClient.Enabled
is True
And can you post the output from “ipfs id”? How do you mean by this?
Also, you didn’t answer my question about the VPN. i’m sorry i’m not sure which question, there’s been so many
I would like to give you more info about the current situation:
i uploaded certain files this morning and just found out that my cell phone could download it with the provided links. Really interesting!
This one: “Also, there’s one thing I need clarified: is the VPN only tunneling your browser’s traffic, or ALL the traffic for your computer?”
Type “ipfs id” in your terminal, then post the output here, so that I can see what your node is advertising (I still can’t reach it at all, so I can’t tell from here).
i didn’t install VPN on Windows, only use it as a browser extension. So i’d presumed VPN only tunneling browser’s traffic.
C:\Users\User>ipfs id
{
“ID”: “12D3KooWK5GQfwTovUTHR8Ud2WG4fMWFx644w59g6YAoXvYA278y”,
“PublicKey”: “CAESIImKYbvCHI5S0S9S8ocWQH5CCI4nJscvR6XGg0Si9hD+”,
“Addresses”: [
“/ip4/127.0.0.1/tcp/4001/p2p/12D3KooWK5GQfwTovUTHR8Ud2WG4fMWFx644w59g6YAoXvYA278y”,
“/ip4/127.0.0.1/udp/4001/quic/p2p/12D3KooWK5GQfwTovUTHR8Ud2WG4fMWFx644w59g6YAoXvYA278y”,
“/ip4/223.16.242.253/tcp/4001/p2p/12D3KooWK5GQfwTovUTHR8Ud2WG4fMWFx644w59g6YAoXvYA278y”,
“/ip4/223.16.242.253/udp/4001/quic/p2p/12D3KooWK5GQfwTovUTHR8Ud2WG4fMWFx644w59g6YAoXvYA278y”,
“/ip6/64:ff9b::df10:f2fd/udp/4001/quic/p2p/12D3KooWK5GQfwTovUTHR8Ud2WG4fMWFx644w59g6YAoXvYA278y”,
“/ip6/::1/tcp/4001/p2p/12D3KooWK5GQfwTovUTHR8Ud2WG4fMWFx644w59g6YAoXvYA278y”,
“/ip6/::1/udp/4001/quic/p2p/12D3KooWK5GQfwTovUTHR8Ud2WG4fMWFx644w59g6YAoXvYA278y”
],
“AgentVersion”: “go-ipfs/0.11.0/”,
“ProtocolVersion”: “ipfs/0.1.0”,
“Protocols”: [
“/ipfs/bitswap”,
“/ipfs/bitswap/1.0.0”,
“/ipfs/bitswap/1.1.0”,
“/ipfs/bitswap/1.2.0”,
“/ipfs/id/1.0.0”,
“/ipfs/id/push/1.0.0”,
“/ipfs/kad/1.0.0”,
“/ipfs/lan/kad/1.0.0”,
“/ipfs/ping/1.0.0”,
“/libp2p/autonat/1.0.0”,
“/libp2p/circuit/relay/0.1.0”,
“/libp2p/circuit/relay/0.2.0/hop”,
“/libp2p/circuit/relay/0.2.0/stop”,
“/p2p/id/delta/1.0.0”,
“/x/”
]
}
Then it’s likely that it doesn’t affect your node at all. So, whether it’s up or not isn’t a factor in what we’re doing.
OK, your node is only advertising direct connections, which can’t work unless we find a way to open 4001 in your modem’s firewall. It’s no longer even trying to connect to a relay, which is why it’s unreachable. This gives me enough info to discuss this with the libp2p peeps on Discord. Either this is a bug, or they’ll have a suggestion on how to force things.
I’ll let you know as soon as I find out anything.
i’m glad to have contributed something to give you an headache
Love IPFS!!!
Looking forward to hearing some good news from you!
K, we’re pretty much in agreement over there, the only real solution is to get access to your modem’s firewall and make a hole for 4001.
However, I’m gonna try something more … daring. May not work, but we have little to lose at this stage
Make sure that both Swarm.RelayClient.Enabled
and Swarm.EnableHolePunching
are true, then remove the contents of the Addresses.Swarm
array:
"Swarm": []
Then restart the daemon and cross your fingers
Once it’s been running for a min or 2, type “ipfs id” in the terminal, and post the output here.