ACL issue: specifing CIDR from subnet doesn't work #457

Closed
opened 2025-12-29 01:29:40 +01:00 by adam · 4 comments
Owner

Originally created by @realkarmakun on GitHub (Apr 1, 2023).

Bug description
Specifiying CIDR from subnet (not tailscale networks) in ACL doesn't allow access to specified ports.

To Reproduce
Setup tailscale node as subnet router and specify ACL similar to the below one.

        "hosts": {
                "ovh-vrack": "10.0.1.0/24",
        },

        "acls": [
                {
                        "action": "accept",
                        "src":    ["group:panel"],
                        "dst":    ["ovh-vrack:80,443"],
                },

This will not allow access to 10.0.1.0/24 network from group:panel. But if we adjust this to following:

        "hosts": {
                "ovh-vrack": "10.0.1.0/24",
        },

        "acls": [
                {
                        "action": "accept",
                        "src":    ["group:panel"],
                        "dst":    ["*:80,443"],
                },

It will work. Specifying subnet CIDR in this way works with original Tailscale ACLs but not with headscale

Context info
Version of headscale used 0.21.0

Originally created by @realkarmakun on GitHub (Apr 1, 2023). **Bug description** Specifiying CIDR from subnet (not tailscale networks) in ACL doesn't allow access to specified ports. **To Reproduce** Setup tailscale node as subnet router and specify ACL similar to the below one. ```json "hosts": { "ovh-vrack": "10.0.1.0/24", }, "acls": [ { "action": "accept", "src": ["group:panel"], "dst": ["ovh-vrack:80,443"], }, ``` This will not allow access to 10.0.1.0/24 network from group:panel. But if we adjust this to following: ```json "hosts": { "ovh-vrack": "10.0.1.0/24", }, "acls": [ { "action": "accept", "src": ["group:panel"], "dst": ["*:80,443"], }, ``` It will work. Specifying subnet CIDR in this way works with original Tailscale ACLs but not with headscale **Context info** Version of headscale used 0.21.0
adam added the stalebug labels 2025-12-29 01:29:40 +01:00
adam closed this issue 2025-12-29 01:29:40 +01:00
Author
Owner

@github-actions[bot] commented on GitHub (Sep 29, 2023):

This issue is stale because it has been open for 180 days with no activity.

@github-actions[bot] commented on GitHub (Sep 29, 2023): This issue is stale because it has been open for 180 days with no activity.
Author
Owner

@github-actions[bot] commented on GitHub (Oct 13, 2023):

This issue was closed because it has been inactive for 14 days since being marked as stale.

@github-actions[bot] commented on GitHub (Oct 13, 2023): This issue was closed because it has been inactive for 14 days since being marked as stale.
Author
Owner

@realkarmakun commented on GitHub (Oct 16, 2023):

I believe this is still relevant.

@realkarmakun commented on GitHub (Oct 16, 2023): I believe this is still relevant.
Author
Owner

@Jenjen1324 commented on GitHub (Nov 2, 2023):

I'm unable to configure ACLs with non-tailnets at all. Regardless if it's a whole subnet or IP address. The only thing I found that works is if I allow everything as stated here.
Did anyone have any luck with this?

@Jenjen1324 commented on GitHub (Nov 2, 2023): I'm unable to configure ACLs with non-tailnets at all. Regardless if it's a whole subnet or IP address. The only thing I found that works is if I allow everything as stated here. Did anyone have any luck with this?
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: starred/headscale#457