qBittorrent is a bittorrent client programmed in C++ / Qt that uses libtorrent (sometimes called libtorrent-rasterbar) by Arvid Norberg. It aims to be a good alternative to all other bittorrent clients out there. qBittorrent is fast, stable and provides unicode support as well as many features.
This Docker includes OpenVPN and WireGuard to ensure a secure and private connection to the Internet, including use of iptables to prevent IP leakage when the tunnel is down. It also includes Privoxy to allow unfiltered access to index sites, to use Privoxy please point your application at
Latest stable qBittorrent release from Arch Linux repo.
Latest stable Privoxy release from Arch Linux repo.
Latest stable OpenVPN release from Arch Linux repo.
Latest stable WireGuard release from Arch Linux repo.
docker run -d \ --cap-add=NET_ADMIN \ -p 6881:6881 \ -p 6881:6881/udp \ -p 8080:8080 \ -p 8118:8118 \ --name=<container name> \ -v <path for data files>:/data \ -v <path for config files>:/config \ -v /etc/localtime:/etc/localtime:ro \ -e VPN_ENABLED=<yes|no> \ -e VPN_USER=<vpn username> \ -e VPN_PASS=<vpn password> \ -e VPN_PROV=<pia|airvpn|custom> \ -e VPN_CLIENT=<openvpn|wireguard> \ -e VPN_OPTIONS=<additional openvpn cli options> \ -e STRICT_PORT_FORWARD=<yes|no> \ -e ENABLE_PRIVOXY=<yes|no> \ -e LAN_NETWORK=<lan ipv4 network>/<cidr notation> \ -e NAME_SERVERS=<name server ip(s)> \ -e VPN_INPUT_PORTS=<port number(s)> \ -e VPN_OUTPUT_PORTS=<port number(s)> \ -e DEBUG=<true|false> \ -e WEBUI_PORT=<port for web interfance> \ -e UMASK=<umask for created files> \ -e PUID=<uid for user> \ -e PGID=<gid for user> \ binhex/arch-qbittorrentvpn
Please replace all user variables in the above command defined by <> with the correct values.
Access qBittorrent (web ui)
Username:- admin Password:- adminadmin
docker run -d \ --cap-add=NET_ADMIN \ -p 6881:6881 \ -p 6881:6881/udp \ -p 8080:8080 \ -p 8118:8118 \ --name=qbittorrentvpn \ -v /root/docker/data:/data \ -v /root/docker/config:/config \ -v /etc/localtime:/etc/localtime:ro \ -e VPN_ENABLED=yes \ -e VPN_USER=myusername \ -e VPN_PASS=mypassword \ -e VPN_PROV=pia \ -e VPN_CLIENT=openvpn \ -e STRICT_PORT_FORWARD=yes \ -e ENABLE_PRIVOXY=yes \ -e LAN_NETWORK=192.168.1.0/24 \ -e NAME_SERVERS=220.127.116.11,18.104.22.168,22.214.171.124,126.96.36.199,188.8.131.52,184.108.40.206 \ -e VPN_INPUT_PORTS=1234 \ -e VPN_OUTPUT_PORTS=5678 \ -e DEBUG=false \ -e WEBUI_PORT=8080 \ -e UMASK=000 \ -e PUID=0 \ -e PGID=0 \ binhex/arch-qbittorrentvpn
AirVPN users will need to generate a unique OpenVPN configuration file by using the following link https://airvpn.org/generator/
- Please select Linux and then choose the country you want to connect to
- Save the ovpn file to somewhere safe
- Start the qbittorrentvpn docker to create the folder structure
- Stop qbittorrentvpn docker and copy the saved ovpn file to the /config/openvpn/ folder on the host
- Start qbittorrentvpn docker
- Check supervisor.log to make sure you are connected to the tunnel
AirVPN users will also need to create a port forward by using the following link https://airvpn.org/ports/ and clicking Add. This port will need to be specified in the qBittorrent configuration file located at /config/qbittorrent/config/qbittorrent.conf.
qBittorrent example config
port_range = 49400-49400 port_random = no
docker run -d \ --cap-add=NET_ADMIN \ -p 6881:6881 \ -p 6881:6881/udp \ -p 8080:8080 \ -p 8118:8118 \ --name=qbittorrentvpn \ -v /root/docker/data:/data \ -v /root/docker/config:/config \ -v /etc/localtime:/etc/localtime:ro \ -e VPN_ENABLED=yes \ -e VPN_PROV=airvpn \ -e VPN_CLIENT=openvpn \ -e ENABLE_PRIVOXY=yes \ -e LAN_NETWORK=192.168.1.0/24 \ -e NAME_SERVERS=220.127.116.11,18.104.22.168,22.214.171.124,126.96.36.199,188.8.131.52,184.108.40.206 \ -e VPN_INPUT_PORTS=1234 \ -e VPN_OUTPUT_PORTS=5678 \ -e DEBUG=false \ -e WEBUI_PORT=8080 \ -e UMASK=000 \ -e PUID=0 \ -e PGID=0 \ binhex/arch-qbittorrentvpn
Please note 'VPN_INPUT_PORTS' is NOT to define the incoming port for the VPN, this environment variable is used to define port(s) you want to allow in to the VPN network when network binding multiple containers together, configuring this incorrectly with the VPN provider assigned incoming port COULD result in IP leakage, you have been warned!.
Please note this Docker image does not include the required OpenVPN configuration file and certificates. These will typically be downloaded from your VPN providers website (look for OpenVPN configuration files), and generally are zipped.
PIA users - The URL to download the OpenVPN configuration files and certs is:-
Once you have downloaded the zip (normally a zip as they contain multiple ovpn files) then extract it to /config/openvpn/ folder (if that folder doesn't exist then start and stop the docker container to force the creation of the folder).
If there are multiple ovpn files then please delete the ones you don't want to use (normally filename follows location of the endpoint) leaving just a single ovpn file and the certificates referenced in the ovpn file (certificates will normally have a crt and/or pem extension).
If you wish to use WireGuard (defined via 'VPN_CLIENT' env var value ) then due to the enhanced security and kernel integration WireGuard will require the container to be defined with privileged permissions and sysctl support, so please ensure you change the following docker options:-
--sysctl="net.ipv4.conf.all.src_valid_mark=1" \ --privileged=true \
PIA users - The WireGuard configuration file will be auto generated and will be stored in
/config/wireguard/wg0.conf AFTER the first run, if you wish to change the endpoint you are connecting to then change the
Endpoint line in the config file (default is Netherlands).
Other users - Please download your WireGuard configuration file from your VPN provider, start and stop the container to generate the folder
/config/wireguard/ and then place your WireGuard configuration file in there.
Due to Google and OpenDNS supporting EDNS Client Subnet it is recommended NOT to use either of these NS providers. The list of default NS providers in the above example(s) is as follows:-
84.200.x.x = DNS Watch 37.235.x.x = FreeDNS 1.x.x.x = Cloudflare
User ID (PUID) and Group ID (PGID) can be found by issuing the following command for the user you want to run the container as:-
Due to issues with CSRF and port mapping, should you require to alter the port for the webui you need to change both sides of the -p 8080 switch AND set the WEBUI_PORT variable to the new port.
For example, to set the port to 8090 you need to set -p 8090:8090 and -e WEBUI_PORT=8090
If you appreciate my work, then please consider buying me a beer :D