mirror of
https://github.com/juanfont/headscale.git
synced 2026-01-11 20:00:28 +01:00
node in exit-node mode not forwarding traffic to same network which belongs external interface #589
Closed
opened 2025-12-29 02:20:54 +01:00 by adam
·
16 comments
No Branch/Tag Specified
main
update_flake_lock_action
gh-pages
kradalby/release-v0.27.2
dependabot/go_modules/golang.org/x/crypto-0.45.0
dependabot/go_modules/github.com/opencontainers/runc-1.3.3
copilot/investigate-headscale-issue-2788
copilot/investigate-visibility-issue-2788
copilot/investigate-issue-2833
copilot/debug-issue-2846
copilot/fix-issue-2847
dependabot/go_modules/github.com/go-viper/mapstructure/v2-2.4.0
dependabot/go_modules/github.com/docker/docker-28.3.3incompatible
kradalby/cli-experiement3
doc/0.26.1
doc/0.25.1
doc/0.25.0
doc/0.24.3
doc/0.24.2
doc/0.24.1
doc/0.24.0
kradalby/build-docker-on-pr
topic/docu-versioning
topic/docker-kos
juanfont/fix-crash-node-id
juanfont/better-disclaimer
update-contributors
topic/prettier
revert-1893-add-test-stage-to-docs
add-test-stage-to-docs
remove-node-check-interval
fix-empty-prefix
fix-ephemeral-reusable
bug_report-debuginfo
autogroups
logs-to-stderr
revert-1414-topic/fix_unix_socket
rename-machine-node
port-embedded-derp-tests-v2
port-derp-tests
duplicate-word-linter
update-tailscale-1.36
warn-against-apache
ko-fi-link
more-acl-tests
fix-typo-standalone
parallel-nolint
tparallel-fix
rerouting
ssh-changelog-docs
oidc-cleanup
web-auth-flow-tests
kradalby-gh-runner
fix-proto-lint
remove-funding-links
go-1.19
enable-1.30-in-tests
0.16.x
cosmetic-changes-integration
tmp-fix-integration-docker
fix-integration-docker
configurable-update-interval
show-nodes-online
hs2021
acl-syntax-fixes
ts2021-implementation
fix-spurious-updates
unstable-integration-tests
mandatory-stun
embedded-derp
prtemplate-fix
v0.28.0-beta.1
v0.27.2-rc.1
v0.27.1
v0.27.0
v0.27.0-beta.2
v0.27.0-beta.1
v0.26.1
v0.26.0
v0.26.0-beta.2
v0.26.0-beta.1
v0.25.1
v0.25.0
v0.25.0-beta.2
v0.24.3
v0.25.0-beta.1
v0.24.2
v0.24.1
v0.24.0
v0.24.0-beta.2
v0.24.0-beta.1
v0.23.0
v0.23.0-rc.1
v0.23.0-beta.5
v0.23.0-beta.4
v0.23.0-beta3
v0.23.0-beta2
v0.23.0-beta1
v0.23.0-alpha12
v0.23.0-alpha11
v0.23.0-alpha10
v0.23.0-alpha9
v0.23.0-alpha8
v0.23.0-alpha7
v0.23.0-alpha6
v0.23.0-alpha5
v0.23.0-alpha4
v0.23.0-alpha4-docker-ko-test9
v0.23.0-alpha4-docker-ko-test8
v0.23.0-alpha4-docker-ko-test7
v0.23.0-alpha4-docker-ko-test6
v0.23.0-alpha4-docker-ko-test5
v0.23.0-alpha-docker-release-test-debug2
v0.23.0-alpha-docker-release-test-debug
v0.23.0-alpha4-docker-ko-test4
v0.23.0-alpha4-docker-ko-test3
v0.23.0-alpha4-docker-ko-test2
v0.23.0-alpha4-docker-ko-test
v0.23.0-alpha3
v0.23.0-alpha2
v0.23.0-alpha1
v0.22.3
v0.22.2
v0.23.0-alpha-docker-release-test
v0.22.1
v0.22.0
v0.22.0-alpha3
v0.22.0-alpha2
v0.22.0-alpha1
v0.22.0-nfpmtest
v0.21.0
v0.20.0
v0.19.0
v0.19.0-beta2
v0.19.0-beta1
v0.18.0
v0.18.0-beta4
v0.18.0-beta3
v0.18.0-beta2
v0.18.0-beta1
v0.17.1
v0.17.0
v0.17.0-beta5
v0.17.0-beta4
v0.17.0-beta3
v0.17.0-beta2
v0.17.0-beta1
v0.17.0-alpha4
v0.17.0-alpha3
v0.17.0-alpha2
v0.17.0-alpha1
v0.16.4
v0.16.3
v0.16.2
v0.16.1
v0.16.0
v0.16.0-beta7
v0.16.0-beta6
v0.16.0-beta5
v0.16.0-beta4
v0.16.0-beta3
v0.16.0-beta2
v0.16.0-beta1
v0.15.0
v0.15.0-beta6
v0.15.0-beta5
v0.15.0-beta4
v0.15.0-beta3
v0.15.0-beta2
v0.15.0-beta1
v0.14.0
v0.14.0-beta2
v0.14.0-beta1
v0.13.0
v0.13.0-beta3
v0.13.0-beta2
v0.13.0-beta1
upstream/v0.12.4
v0.12.4
v0.12.3
v0.12.2
v0.12.2-beta1
v0.12.1
v0.12.0-beta2
v0.12.0-beta1
v0.11.0
v0.10.8
v0.10.7
v0.10.6
v0.10.5
v0.10.4
v0.10.3
v0.10.2
v0.10.1
v0.10.0
v0.9.3
v0.9.2
v0.9.1
v0.9.0
v0.8.1
v0.8.0
v0.7.1
v0.7.0
v0.6.1
v0.6.0
v0.5.2
v0.5.1
v0.5.0
v0.4.0
v0.3.6
v0.3.5
v0.3.4
v0.3.3
v0.3.2
v0.3.1
v0.3.0
v0.2.2
v0.2.1
v0.2.0
v0.1.1
v0.1.0
Labels
Clear labels
CLI
DERP
DNS
Nix
OIDC
SSH
bug
database
documentation
duplicate
enhancement
faq
good first issue
grants
help wanted
might-come
needs design doc
needs investigation
no-stale-bot
out of scope
performance
policy 📝
pull-request
question
regression
routes
stale
tags
tailscale-feature-gap
well described ❤️
wontfix
Mirrored from GitHub Pull Request
Milestone
No items
No Milestone
Projects
Clear projects
No project
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: starred/headscale#589
Reference in New Issue
Block a user
Blocking a user prevents them from interacting with repositories, such as opening or commenting on pull requests or issues. Learn more about blocking a user.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @winterheart on GitHub (Dec 8, 2023).
Bug description
I have two nodes in headscale/tailscale network, one of them is exit-node with external IP:
node1 (exit-node):
node2 (client)
When I try use node1 as exit-node, it works as expected except that fact I cannot access to any IP address of external subnet 88.88.88.0/24 (same network for node1):
After switch to exit-node there no any traffic on
tailscale0interface on node1 related to 88.88.88.3, but any other external traffic from node2 to the Internet goes without any problems.Environment
Exit node has
-A POSTROUTING -o tailscale0 -j MASQUERADEiptables rule in nat table.ACL related to exit-nodes (user in
adminsandexitpointsgroups, node1 hasexitpointstag):To Reproduce
Run two clients, one as exit-node with external interface. Add relevant ACL to allow using exit-node. Enable exit-node on second client and try to access to any IP from exit-node external subnet.
@kradalby commented on GitHub (Dec 10, 2023):
0.23.0-alpha2 addresses a series of issues with node synchronisation, online status and subnet routers, please test this release and report back if the issue still persist.
@winterheart commented on GitHub (Dec 13, 2023):
Hello. Cannot verify 0.23.0-alpha2 due #1604 issue. Seems subnet router feature broken on old configuration and new version.
@r1s1us commented on GitHub (Dec 25, 2023):
Hello, I have the same problem, because of which I can't use the application in the enterprise(can't get acl and exit-node to work) how to fix this problem? On 0.23.0-alpha2 the problem remains(
@kradalby commented on GitHub (Jan 3, 2024):
@winterheart am I correct to understand that this is a problem in versions prior to the new 0.23.0 alpha releases?
@winterheart commented on GitHub (Jan 3, 2024):
Yes, problem occurs in current stable 0.22.3.
@kradalby commented on GitHub (Jan 3, 2024):
@winterheart could you attempt to run this again with https://github.com/juanfont/headscale/pull/1673? It fixes the subnet router for 0.23.0.
If that does not fix it, we will move on with 0.23.0 first, as this is not a new bug (present in 0.22.3) and then fix it in future versions, not holding up 0.23.0 any longer.
@ChibangLW commented on GitHub (Feb 20, 2024):
@winterheart tailscale has the flag
--exit-node-allow-lan-accesswhich is disabled by default. Did you used that flag?Given that 10.1.0.2/24 is not in your ACL it should not be accessible to node1 via headscale. Doesn't really matter in this case as it is directly connected anyway.
@winterheart commented on GitHub (Mar 25, 2024):
I've retested with 0.23.0-alpha5 and
--exit-node-allow-lan-accesson node2 and still same problem, no access to external IP of node1.@ChibangLW commented on GitHub (Mar 25, 2024):
From my understanding to option should be used on node1, because you try to connect to the directly connected network on node1 from node2. It's an option for the exit-node.
@winterheart commented on GitHub (Mar 25, 2024):
--exit-node-allow-lan-accesscan be used only with--exit-node=<node>so I really no idea how use it on exit node but not in node that tries connect to.@ChibangLW commented on GitHub (Mar 25, 2024):
Okay never mind, I misunderstood the option.
EDIT: for clarification from the source code:
@ElyasAsmad commented on GitHub (Mar 30, 2024):
Any update on this matter? I have been tinkering around with WireGuard & OpenVPN because of this issue and by far only headscale meets my requirement
@winterheart commented on GitHub (May 14, 2024):
Retested on 0.23.0-alpha11, problem still occurs.
@github-actions[bot] commented on GitHub (Aug 13, 2024):
This issue is stale because it has been open for 90 days with no activity.
@github-actions[bot] commented on GitHub (Aug 21, 2024):
This issue was closed because it has been inactive for 14 days since being marked as stale.
@arthur-lbchn commented on GitHub (Jul 14, 2025):
Hi, I'm facing exactly the same issue as the original reporter. While connected to the exit node with a public IP address from a /27 network, I cannot reach any other hosts in this /27 network. I don't have any ACLs configured. The hosts are reachable when not connected to the exit node and are also reachable from the exit node itself.