Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

no public network Endpoints #1859

Open
gaocheng001 opened this issue Apr 7, 2024 · 3 comments
Open

no public network Endpoints #1859

gaocheng001 opened this issue Apr 7, 2024 · 3 comments
Labels
bug Something isn't working

Comments

@gaocheng001
Copy link

Bug description

no public network Endpoints
I have configured port forwarding for a Tailscale client with the IP address 10.20.1.20 on my server with the public IP address 223.22.22.1. However, when attempting to ping the Tailscale client from within the same subnet (10.20.1.0/24), the traffic is routed through the Tailscale relay server instead of using the port forwarding configuration.

Environment

  • OS: Ubuntu Ubuntu 23.10
  • Headscale version: v0.23.0-alpha5
  • Tailscale version: 1.60.1

To Reproduce

  1. Set up port forwarding for Tailscale client 10.20.1.20 on server with public IP 223.22.22.1.
  2. From another device within the same subnet (10.20.1.0/24), ping Tailscale client 10.20.1.20.

Logs and attachments

I have attached the following files:

  • ACL configuration
  • Headscale configuration

Additionally, here is the netmap dump of the Tailscale client:

tailscale debug netmap > tailscale_netmap.json

Please let me know if any further information is needed.

@gaocheng001 gaocheng001 added the bug Something isn't working label Apr 7, 2024
@gaocheng001
Copy link
Author

tailscale_netmap.json

@gaocheng001
Copy link
Author

./Tailscale ping 100.64.0.10
pong from csd-vpn-router-client (100.64.0.10) via DERP(kr) in 24ms
pong from csd-vpn-router-client (100.64.0.10) via DERP(kr) in 45ms
pong from csd-vpn-router-client (100.64.0.10) via DERP(kr) in 46ms
pong from csd-vpn-router-client (100.64.0.10) via DERP(kr) in 57ms
pong from csd-vpn-router-client (100.64.0.10) via DERP(kr) in 37ms
pong from csd-vpn-router-client (100.64.0.10) via DERP(kr) in 47ms
pong from csd-vpn-router-client (100.64.0.10) via DERP(kr) in 43ms
pong from csd-vpn-router-client (100.64.0.10) via DERP(kr) in 48ms
pong from csd-vpn-router-client (100.64.0.10) via DERP(kr) in 48ms
pong from csd-vpn-router-client (100.64.0.10) via DERP(kr) in 46ms
2024/04/07 15:12:42 direct connection not established

@ohdearaugustin
Copy link
Collaborator

This is issue is really hard to reproduce, as port-forwarding could be achieved in several different ways.

The only hint I can think out is that, somehow the connection couldn't be established directly toward the server. Therefore, it was falling back to DERP. This is probably a setup issue and not a bug in headscale.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working
Projects
None yet
Development

No branches or pull requests

2 participants