mirror of
https://github.com/juanfont/headscale.git
synced 2026-01-11 20:00:28 +01:00
acme/autocert: missing certificate #318
Closed
opened 2025-12-29 01:26:47 +01:00 by adam
·
11 comments
No Branch/Tag Specified
main
update_flake_lock_action
gh-pages
kradalby/release-v0.27.2
dependabot/go_modules/golang.org/x/crypto-0.45.0
dependabot/go_modules/github.com/opencontainers/runc-1.3.3
copilot/investigate-headscale-issue-2788
copilot/investigate-visibility-issue-2788
copilot/investigate-issue-2833
copilot/debug-issue-2846
copilot/fix-issue-2847
dependabot/go_modules/github.com/go-viper/mapstructure/v2-2.4.0
dependabot/go_modules/github.com/docker/docker-28.3.3incompatible
kradalby/cli-experiement3
doc/0.26.1
doc/0.25.1
doc/0.25.0
doc/0.24.3
doc/0.24.2
doc/0.24.1
doc/0.24.0
kradalby/build-docker-on-pr
topic/docu-versioning
topic/docker-kos
juanfont/fix-crash-node-id
juanfont/better-disclaimer
update-contributors
topic/prettier
revert-1893-add-test-stage-to-docs
add-test-stage-to-docs
remove-node-check-interval
fix-empty-prefix
fix-ephemeral-reusable
bug_report-debuginfo
autogroups
logs-to-stderr
revert-1414-topic/fix_unix_socket
rename-machine-node
port-embedded-derp-tests-v2
port-derp-tests
duplicate-word-linter
update-tailscale-1.36
warn-against-apache
ko-fi-link
more-acl-tests
fix-typo-standalone
parallel-nolint
tparallel-fix
rerouting
ssh-changelog-docs
oidc-cleanup
web-auth-flow-tests
kradalby-gh-runner
fix-proto-lint
remove-funding-links
go-1.19
enable-1.30-in-tests
0.16.x
cosmetic-changes-integration
tmp-fix-integration-docker
fix-integration-docker
configurable-update-interval
show-nodes-online
hs2021
acl-syntax-fixes
ts2021-implementation
fix-spurious-updates
unstable-integration-tests
mandatory-stun
embedded-derp
prtemplate-fix
v0.28.0-beta.1
v0.27.2-rc.1
v0.27.1
v0.27.0
v0.27.0-beta.2
v0.27.0-beta.1
v0.26.1
v0.26.0
v0.26.0-beta.2
v0.26.0-beta.1
v0.25.1
v0.25.0
v0.25.0-beta.2
v0.24.3
v0.25.0-beta.1
v0.24.2
v0.24.1
v0.24.0
v0.24.0-beta.2
v0.24.0-beta.1
v0.23.0
v0.23.0-rc.1
v0.23.0-beta.5
v0.23.0-beta.4
v0.23.0-beta3
v0.23.0-beta2
v0.23.0-beta1
v0.23.0-alpha12
v0.23.0-alpha11
v0.23.0-alpha10
v0.23.0-alpha9
v0.23.0-alpha8
v0.23.0-alpha7
v0.23.0-alpha6
v0.23.0-alpha5
v0.23.0-alpha4
v0.23.0-alpha4-docker-ko-test9
v0.23.0-alpha4-docker-ko-test8
v0.23.0-alpha4-docker-ko-test7
v0.23.0-alpha4-docker-ko-test6
v0.23.0-alpha4-docker-ko-test5
v0.23.0-alpha-docker-release-test-debug2
v0.23.0-alpha-docker-release-test-debug
v0.23.0-alpha4-docker-ko-test4
v0.23.0-alpha4-docker-ko-test3
v0.23.0-alpha4-docker-ko-test2
v0.23.0-alpha4-docker-ko-test
v0.23.0-alpha3
v0.23.0-alpha2
v0.23.0-alpha1
v0.22.3
v0.22.2
v0.23.0-alpha-docker-release-test
v0.22.1
v0.22.0
v0.22.0-alpha3
v0.22.0-alpha2
v0.22.0-alpha1
v0.22.0-nfpmtest
v0.21.0
v0.20.0
v0.19.0
v0.19.0-beta2
v0.19.0-beta1
v0.18.0
v0.18.0-beta4
v0.18.0-beta3
v0.18.0-beta2
v0.18.0-beta1
v0.17.1
v0.17.0
v0.17.0-beta5
v0.17.0-beta4
v0.17.0-beta3
v0.17.0-beta2
v0.17.0-beta1
v0.17.0-alpha4
v0.17.0-alpha3
v0.17.0-alpha2
v0.17.0-alpha1
v0.16.4
v0.16.3
v0.16.2
v0.16.1
v0.16.0
v0.16.0-beta7
v0.16.0-beta6
v0.16.0-beta5
v0.16.0-beta4
v0.16.0-beta3
v0.16.0-beta2
v0.16.0-beta1
v0.15.0
v0.15.0-beta6
v0.15.0-beta5
v0.15.0-beta4
v0.15.0-beta3
v0.15.0-beta2
v0.15.0-beta1
v0.14.0
v0.14.0-beta2
v0.14.0-beta1
v0.13.0
v0.13.0-beta3
v0.13.0-beta2
v0.13.0-beta1
upstream/v0.12.4
v0.12.4
v0.12.3
v0.12.2
v0.12.2-beta1
v0.12.1
v0.12.0-beta2
v0.12.0-beta1
v0.11.0
v0.10.8
v0.10.7
v0.10.6
v0.10.5
v0.10.4
v0.10.3
v0.10.2
v0.10.1
v0.10.0
v0.9.3
v0.9.2
v0.9.1
v0.9.0
v0.8.1
v0.8.0
v0.7.1
v0.7.0
v0.6.1
v0.6.0
v0.5.2
v0.5.1
v0.5.0
v0.4.0
v0.3.6
v0.3.5
v0.3.4
v0.3.3
v0.3.2
v0.3.1
v0.3.0
v0.2.2
v0.2.1
v0.2.0
v0.1.1
v0.1.0
Labels
Clear labels
CLI
DERP
DNS
Nix
OIDC
SSH
bug
database
documentation
duplicate
enhancement
faq
good first issue
grants
help wanted
might-come
needs design doc
needs investigation
no-stale-bot
out of scope
performance
policy 📝
pull-request
question
regression
routes
stale
tags
tailscale-feature-gap
well described ❤️
wontfix
Mirrored from GitHub Pull Request
No Label
bug
Milestone
No items
No Milestone
Projects
Clear projects
No project
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: starred/headscale#318
Reference in New Issue
Block a user
Blocking a user prevents them from interacting with repositories, such as opening or commenting on pull requests or issues. Learn more about blocking a user.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @db48x on GitHub (Sep 1, 2022).
Bug description
I am attempting to log a computer into a vpn managed by headscale, but it isn’t working. The tailscale daemon doesn’t report any errors, but the headscale server is printing numerous messages like this to the journal:
64.71.131.242 is the machine that is trying to join the vpn.
To Reproduce
I’m not entirely sure which details are relevant to reproducing this error. This is the first machine that I have tried to connect to this vpn. I am using the tailscale
--login-serverand--auth-keyoptions.Context info
Headscale is version v0.16.4.
Tailscale is version 1.28.0 built from the following commits:
tailscale commit: 80313cdee14dee22452ea2b278e7bbcfe4af1a9c
other commit: d26dd4a68f4c18686b003051acd7e44d8788a4b7
go version: go1.18.4-ts149f7d88f1
The server is running Debian 11.4 with kernel version 5.10.0-8-amd64.
@db48x commented on GitHub (Sep 1, 2022):
I have
tls_letsencrypt_hostnameset to"vpn.core.headline.com", andtls_letsencrypt_listenset to":81". Nginx is already listening on port 80, so it is configured to proxy any request withHost: vpn.core.headline.comto port 81.That appears to be working correctly, but it is still failing to pass the challenge.
If I connect to port 81 myself, the server responds with a different error:
That makes sense, given how it is configured:
When I test it via the nginx proxy:
I instead get a message which I believe indicates that it doesn’t know about this challenge. Fair enough; I copied it out of the logs from a previous run so there’s no reason for it to still be valid.
It doesn’t shed much light on what is going wrong though, and I’m still getting the “acme/autocert: missing certificate” message from headscale.
@db48x commented on GitHub (Sep 1, 2022):
Now I am more confused. I left it sitting there for a while and when I returned:
It has started working! Except the auth-key I created yesterday has expired. Creating a new key and then joining the network worked fine:
Thankfully everything appears to work fine now, so I don’t need any support at the moment. However, I leave this bug report open in the hope that someone can either fix or document the “acme/autocert: missing certificate” problem.
@juanfont commented on GitHub (Sep 4, 2022):
Hi @db48x, can you try with 0.17.0-alpha2 ?
@db48x commented on GitHub (Sep 4, 2022):
I’ll give it a go on Monday. Which of the most recent changes are most relevant? The websocket warnings? The timeout?
@juanfont commented on GitHub (Sep 4, 2022):
I think the issue is that now modern Tailscale clients try to initiate the Tailscale v2 connection over tcp/80 and do an upgrade over websockets.
Let's try if updating your server helps...
@juanfont commented on GitHub (Sep 7, 2022):
@db48x have you been able to test again?
@db48x commented on GitHub (Sep 8, 2022):
Ok, I’ve got alpha2 installed, but it isn’t working at all. It’s supposed to listen on :8080 (
listen_addr: 0.0.0.0:8080), but it isn’t. Is that #799?@juanfont commented on GitHub (Sep 20, 2022):
@db48x what do you get? Are you exposing 443?
@db48x commented on GitHub (Sep 21, 2022):
When I run it, it does not open a listening socket on the
listen_addr, so nobody can join. I believe 799 already covers it, so I reverted to the previous release. I can’t use port 443 as it is already in use by another service.@kradalby commented on GitHub (Sep 27, 2022):
Can you try alpha 4?
@kradalby commented on GitHub (Oct 28, 2022):
Closing this, reopen if it still is relevant