slackhq / nebula

A scalable overlay networking tool with a focus on performance, simplicity and security

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Handshake timing out for windows nodes

cef-informatique opened this issue · comments

What version of nebula are you using?

1.7.2

What operating system are you using?

Debian 12 (lighthouses) and Windows Server 2022 Standard (node)

Describe the Bug

Hi,

I have two lighthouses (192.168.50.22 and 192.168.50.37) and multiple nodes which are a mix of Debian 12 and Windows Server 2019/2022.

All of my Debian 12 nodes can complete the handshake and work perfectly. However, none of my windows nodes are able to complete the handshake which times out.

Logs from affected hosts

Windows node :

time="2023-09-22T09:59:33+02:00" level=debug msg="Packet store" length=1 localIndex=3163322701 remoteIndex=0 stored=true vpnIp=192.168.159.255
time="2023-09-22T09:59:33+02:00" level=debug msg="Packet store" length=2 localIndex=3163322701 remoteIndex=0 stored=true vpnIp=192.168.159.255
time="2023-09-22T09:59:33+02:00" level=debug msg="Packet store" length=3 localIndex=3163322701 remoteIndex=0 stored=true vpnIp=192.168.159.255
time="2023-09-22T09:59:33+02:00" level=debug msg="Packet store" length=2 localIndex=2058341641 remoteIndex=0 stored=true vpnIp=192.168.144.1
time="2023-09-22T09:59:33+02:00" level=debug msg="Packet store" length=2 localIndex=433662509 remoteIndex=0 stored=true vpnIp=192.168.144.2
time="2023-09-22T09:59:33+02:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{192.168.144.124 224.0.0.22 8704 5125 2 false}" vpnIp=224.0.0.22
time="2023-09-22T09:59:33+02:00" level=debug msg="Error while validating outbound packet: packet is not ipv4, type: 6" packet="[96 0 0 0 0 8 58 255 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 255 2 0 0 0 0 0 0 0 0 0 0 0 0 0 2 133 0 123 184 0 0 0 0]"
time="2023-09-22T09:59:33+02:00" level=debug msg="Error while validating outbound packet: packet is not ipv4, type: 6" packet="[96 0 0 0 0 76 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 255 2 0 0 0 0 0 0 0 0 0 0 0 0 0 22 58 0 5 2 0 0 1 0 143 0 136 232 0 0 0 3 3 0 0 0 255 2 0 0 0 0 0 0 0 0 0 1 255 88 224 26 4 0 0 0 255 2 0 0 0 0 0 0 0 0 0 0 0 0 0 251 4 0 0 0 255 2 0 0 0 0 0 0 0 0 0 0 0 1 0 3]"
time="2023-09-22T09:59:39+02:00" level=debug msg="Hostmap hostInfo deleted" hostMap="map[indexNumber:3163322701 mapName:pending mapTotalSize:0 remoteIndexNumber:0 vpnIp:192.168.159.255]"
time="2023-09-22T09:59:40+02:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{192.168.144.124 224.0.0.251 5353 5353 17 false}" vpnIp=224.0.0.251
time="2023-09-22T09:59:40+02:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{192.168.144.124 224.0.0.251 5353 5353 17 false}" vpnIp=224.0.0.251
time="2023-09-22T09:59:40+02:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{192.168.144.124 239.255.255.250 49916 1900 17 false}" vpnIp=239.255.255.250
time="2023-09-22T09:59:40+02:00" level=debug msg="Error while validating outbound packet: packet is not ipv4, type: 6" packet="[96 0 0 0 0 8 58 255 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 255 2 0 0 0 0 0 0 0 0 0 0 0 0 0 2 133 0 123 184 0 0 0 0]"
time="2023-09-22T09:59:41+02:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{192.168.144.124 224.0.0.251 5353 5353 17 false}" vpnIp=224.0.0.251
time="2023-09-22T09:59:41+02:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{192.168.144.124 224.0.0.251 5353 5353 17 false}" vpnIp=224.0.0.251
time="2023-09-22T09:59:42+02:00" level=debug msg="Generated index" index=3873018504
time="2023-09-22T09:59:42+02:00" level=debug msg="Packet store" length=1 localIndex=3873018504 remoteIndex=0 stored=true vpnIp=192.168.144.1
time="2023-09-22T09:59:42+02:00" level=debug msg="Generated index" index=1292143443
time="2023-09-22T09:59:42+02:00" level=info msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=3873018504 localIndex=3873018504 remoteIndex=0 udpAddrs="[192.168.50.22:123]" vpnIp=192.168.144.1
time="2023-09-22T09:59:42+02:00" level=debug msg="Packet store" length=1 localIndex=1292143443 remoteIndex=0 stored=true vpnIp=192.168.144.2
time="2023-09-22T09:59:42+02:00" level=info msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 localIndex=1292143443 remoteIndex=0 udpAddrs="[192.168.50.37:123]" vpnIp=192.168.144.2
time="2023-09-22T09:59:42+02:00" level=debug msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=3873018504 localIndex=3873018504 remoteIndex=0 udpAddrs="[192.168.50.22:123]" vpnIp=192.168.144.1
time="2023-09-22T09:59:42+02:00" level=debug msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 localIndex=1292143443 remoteIndex=0 udpAddrs="[192.168.50.37:123]" vpnIp=192.168.144.2
time="2023-09-22T09:59:43+02:00" level=debug msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=3873018504 localIndex=3873018504 remoteIndex=0 udpAddrs="[192.168.50.22:123]" vpnIp=192.168.144.1
time="2023-09-22T09:59:43+02:00" level=debug msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 localIndex=1292143443 remoteIndex=0 udpAddrs="[192.168.50.37:123]" vpnIp=192.168.144.2
time="2023-09-22T09:59:43+02:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{192.168.144.124 224.0.0.251 5353 5353 17 false}" vpnIp=224.0.0.251
time="2023-09-22T09:59:43+02:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{192.168.144.124 224.0.0.251 5353 5353 17 false}" vpnIp=224.0.0.251
time="2023-09-22T09:59:43+02:00" level=debug msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=3873018504 localIndex=3873018504 remoteIndex=0 udpAddrs="[192.168.50.22:123]" vpnIp=192.168.144.1
time="2023-09-22T09:59:43+02:00" level=debug msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 localIndex=1292143443 remoteIndex=0 udpAddrs="[192.168.50.37:123]" vpnIp=192.168.144.2
time="2023-09-22T09:59:44+02:00" level=debug msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=3873018504 localIndex=3873018504 remoteIndex=0 udpAddrs="[192.168.50.22:123]" vpnIp=192.168.144.1
time="2023-09-22T09:59:44+02:00" level=debug msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 localIndex=1292143443 remoteIndex=0 udpAddrs="[192.168.50.37:123]" vpnIp=192.168.144.2
time="2023-09-22T09:59:44+02:00" level=debug msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=3873018504 localIndex=3873018504 remoteIndex=0 udpAddrs="[192.168.50.22:123]" vpnIp=192.168.144.1
time="2023-09-22T09:59:44+02:00" level=debug msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 localIndex=1292143443 remoteIndex=0 udpAddrs="[192.168.50.37:123]" vpnIp=192.168.144.2
time="2023-09-22T09:59:45+02:00" level=debug msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=3873018504 localIndex=3873018504 remoteIndex=0 udpAddrs="[192.168.50.22:123]" vpnIp=192.168.144.1
time="2023-09-22T09:59:45+02:00" level=debug msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 localIndex=1292143443 remoteIndex=0 udpAddrs="[192.168.50.37:123]" vpnIp=192.168.144.2
time="2023-09-22T09:59:46+02:00" level=debug msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=3873018504 localIndex=3873018504 remoteIndex=0 udpAddrs="[192.168.50.22:123]" vpnIp=192.168.144.1
time="2023-09-22T09:59:46+02:00" level=debug msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 localIndex=1292143443 remoteIndex=0 udpAddrs="[192.168.50.37:123]" vpnIp=192.168.144.2
time="2023-09-22T09:59:47+02:00" level=debug msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=3873018504 localIndex=3873018504 remoteIndex=0 udpAddrs="[192.168.50.22:123]" vpnIp=192.168.144.1
time="2023-09-22T09:59:47+02:00" level=debug msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 localIndex=1292143443 remoteIndex=0 udpAddrs="[192.168.50.37:123]" vpnIp=192.168.144.2
time="2023-09-22T09:59:48+02:00" level=debug msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=3873018504 localIndex=3873018504 remoteIndex=0 udpAddrs="[192.168.50.22:123]" vpnIp=192.168.144.1
time="2023-09-22T09:59:48+02:00" level=debug msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 localIndex=1292143443 remoteIndex=0 udpAddrs="[192.168.50.37:123]" vpnIp=192.168.144.2
time="2023-09-22T09:59:49+02:00" level=info msg="Handshake timed out" durationNs=6500742100 handshake="map[stage:1 style:ix_psk0]" initiatorIndex=3873018504 localIndex=3873018504 remoteIndex=0 udpAddrs="[192.168.50.22:123]" vpnIp=192.168.144.1
time="2023-09-22T09:59:49+02:00" level=debug msg="Hostmap hostInfo deleted" hostMap="map[indexNumber:3873018504 mapName:pending mapTotalSize:1 remoteIndexNumber:0 vpnIp:192.168.144.1]"
time="2023-09-22T09:59:49+02:00" level=info msg="Handshake timed out" durationNs=6499559700 handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 localIndex=1292143443 remoteIndex=0 udpAddrs="[192.168.50.37:123]" vpnIp=192.168.144.2
time="2023-09-22T09:59:49+02:00" level=debug msg="Hostmap hostInfo deleted" hostMap="map[indexNumber:1292143443 mapName:pending mapTotalSize:0 remoteIndexNumber:0 vpnIp:192.168.144.2]"
time="2023-09-22T09:59:51+02:00" level=info msg="Caught signal, shutting down" signal=interrupt
time="2023-09-22T09:59:51+02:00" level=debug msg="Error while validating outbound packet: packet is not ipv4, type: 6" packet="[96 0 0 0 0 36 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 255 2 0 0 0 0 0 0 0 0 0 0 0 0 0 22 58 0 5 2 0 0 1 0 143 0 110 145 0 0 0 1 3 0 0 0 255 2 0 0 0 0 0 0 0 0 0 0 0 0 0 251]"

Lighthouse :

time="2023-09-22T09:59:33+02:00" level=info msg="Handshake message received" certName=mywindowsnode.mydomain.com fingerprint=5d4693491bc947ab1ad75ba6765f8d4d2cc0c5748581204d7e9c20aaceaef8cb handshake="map[stage:1 style:ix_psk0]" initiatorIndex=433662509 issuer=65c6ab9aff010a96f13a4b2f01c403982362b0c2ed9e5b5871b8684ba5c91820 remoteIndex=0 responderIndex=0 udpAddr="192.168.50.1:4500" vpnIp=192.168.144.124
time="2023-09-22T09:59:34+02:00" level=info msg="Handshake message received" certName=mywindowsnode.mydomain.com fingerprint=5d4693491bc947ab1ad75ba6765f8d4d2cc0c5748581204d7e9c20aaceaef8cb handshake="map[stage:1 style:ix_psk0]" initiatorIndex=433662509 issuer=65c6ab9aff010a96f13a4b2f01c403982362b0c2ed9e5b5871b8684ba5c91820 remoteIndex=0 responderIndex=0 udpAddr="192.168.50.1:4500" vpnIp=192.168.144.124
time="2023-09-22T09:59:34+02:00" level=info msg="Handshake message received" certName=mywindowsnode.mydomain.com fingerprint=5d4693491bc947ab1ad75ba6765f8d4d2cc0c5748581204d7e9c20aaceaef8cb handshake="map[stage:1 style:ix_psk0]" initiatorIndex=433662509 issuer=65c6ab9aff010a96f13a4b2f01c403982362b0c2ed9e5b5871b8684ba5c91820 remoteIndex=0 responderIndex=0 udpAddr="192.168.50.1:4500" vpnIp=192.168.144.124
time="2023-09-22T09:59:35+02:00" level=info msg="Handshake message received" certName=mywindowsnode.mydomain.com fingerprint=5d4693491bc947ab1ad75ba6765f8d4d2cc0c5748581204d7e9c20aaceaef8cb handshake="map[stage:1 style:ix_psk0]" initiatorIndex=433662509 issuer=65c6ab9aff010a96f13a4b2f01c403982362b0c2ed9e5b5871b8684ba5c91820 remoteIndex=0 responderIndex=0 udpAddr="192.168.50.1:4500" vpnIp=192.168.144.124
time="2023-09-22T09:59:36+02:00" level=info msg="Handshake message received" certName=mywindowsnode.mydomain.com fingerprint=5d4693491bc947ab1ad75ba6765f8d4d2cc0c5748581204d7e9c20aaceaef8cb handshake="map[stage:1 style:ix_psk0]" initiatorIndex=433662509 issuer=65c6ab9aff010a96f13a4b2f01c403982362b0c2ed9e5b5871b8684ba5c91820 remoteIndex=0 responderIndex=0 udpAddr="192.168.50.1:4500" vpnIp=192.168.144.124
time="2023-09-22T09:59:37+02:00" level=info msg="Handshake message received" certName=mywindowsnode.mydomain.com fingerprint=5d4693491bc947ab1ad75ba6765f8d4d2cc0c5748581204d7e9c20aaceaef8cb handshake="map[stage:1 style:ix_psk0]" initiatorIndex=433662509 issuer=65c6ab9aff010a96f13a4b2f01c403982362b0c2ed9e5b5871b8684ba5c91820 remoteIndex=0 responderIndex=0 udpAddr="192.168.50.1:4500" vpnIp=192.168.144.124
time="2023-09-22T09:59:38+02:00" level=debug msg="Tunnel status" certName=mywindowsnode.mydomain.com localIndex=2758605755 remoteIndex=433662509 tunnelCheck="map[method:active state:testing]" vpnIp=192.168.144.124
time="2023-09-22T09:59:38+02:00" level=info msg="Handshake message received" certName=mywindowsnode.mydomain.com fingerprint=5d4693491bc947ab1ad75ba6765f8d4d2cc0c5748581204d7e9c20aaceaef8cb handshake="map[stage:1 style:ix_psk0]" initiatorIndex=433662509 issuer=65c6ab9aff010a96f13a4b2f01c403982362b0c2ed9e5b5871b8684ba5c91820 remoteIndex=0 responderIndex=0 udpAddr="192.168.50.1:4500" vpnIp=192.168.144.124
time="2023-09-22T09:59:42+02:00" level=info msg="Handshake message received" certName=mywindowsnode.mydomain.com fingerprint=5d4693491bc947ab1ad75ba6765f8d4d2cc0c5748581204d7e9c20aaceaef8cb handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 issuer=65c6ab9aff010a96f13a4b2f01c403982362b0c2ed9e5b5871b8684ba5c91820 remoteIndex=0 responderIndex=0 udpAddr="192.168.50.1:4500" vpnIp=192.168.144.124
time="2023-09-22T09:59:42+02:00" level=info msg="Taking new handshake" certName=mywindowsnode.mydomain.com localIndex=2758605755 remoteIndex=433662509 vpnIp=192.168.144.124
time="2023-09-22T09:59:42+02:00" level=info msg="Handshake message sent" certName=mywindowsnode.mydomain.com fingerprint=5d4693491bc947ab1ad75ba6765f8d4d2cc0c5748581204d7e9c20aaceaef8cb handshake="map[stage:2 style:ix_psk0]" initiatorIndex=1292143443 issuer=65c6ab9aff010a96f13a4b2f01c403982362b0c2ed9e5b5871b8684ba5c91820 remoteIndex=0 responderIndex=2046568585 sentCachedPackets=0 udpAddr="192.168.50.1:4500" vpnIp=192.168.144.124
time="2023-09-22T09:59:42+02:00" level=debug msg="Sending 0 stored packets" certName=mywindowsnode.mydomain.com localIndex=2046568585 remoteIndex=1292143443 vpnIp=192.168.144.124
time="2023-09-22T09:59:42+02:00" level=info msg="Handshake message received" certName=mywindowsnode.mydomain.com fingerprint=5d4693491bc947ab1ad75ba6765f8d4d2cc0c5748581204d7e9c20aaceaef8cb handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 issuer=65c6ab9aff010a96f13a4b2f01c403982362b0c2ed9e5b5871b8684ba5c91820 remoteIndex=0 responderIndex=0 udpAddr="192.168.50.1:4500" vpnIp=192.168.144.124
time="2023-09-22T09:59:43+02:00" level=info msg="Handshake message received" certName=mywindowsnode.mydomain.com fingerprint=5d4693491bc947ab1ad75ba6765f8d4d2cc0c5748581204d7e9c20aaceaef8cb handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 issuer=65c6ab9aff010a96f13a4b2f01c403982362b0c2ed9e5b5871b8684ba5c91820 remoteIndex=0 responderIndex=0 udpAddr="192.168.50.1:4500" vpnIp=192.168.144.124
time="2023-09-22T09:59:43+02:00" level=info msg="Handshake message received" certName=mywindowsnode.mydomain.com fingerprint=5d4693491bc947ab1ad75ba6765f8d4d2cc0c5748581204d7e9c20aaceaef8cb handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 issuer=65c6ab9aff010a96f13a4b2f01c403982362b0c2ed9e5b5871b8684ba5c91820 remoteIndex=0 responderIndex=0 udpAddr="192.168.50.1:4500" vpnIp=192.168.144.124
time="2023-09-22T09:59:44+02:00" level=info msg="Handshake message received" certName=mywindowsnode.mydomain.com fingerprint=5d4693491bc947ab1ad75ba6765f8d4d2cc0c5748581204d7e9c20aaceaef8cb handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 issuer=65c6ab9aff010a96f13a4b2f01c403982362b0c2ed9e5b5871b8684ba5c91820 remoteIndex=0 responderIndex=0 udpAddr="192.168.50.1:4500" vpnIp=192.168.144.124
time="2023-09-22T09:59:44+02:00" level=info msg="Handshake message received" certName=mywindowsnode.mydomain.com fingerprint=5d4693491bc947ab1ad75ba6765f8d4d2cc0c5748581204d7e9c20aaceaef8cb handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 issuer=65c6ab9aff010a96f13a4b2f01c403982362b0c2ed9e5b5871b8684ba5c91820 remoteIndex=0 responderIndex=0 udpAddr="192.168.50.1:4500" vpnIp=192.168.144.124
time="2023-09-22T09:59:45+02:00" level=info msg="Handshake message received" certName=mywindowsnode.mydomain.com fingerprint=5d4693491bc947ab1ad75ba6765f8d4d2cc0c5748581204d7e9c20aaceaef8cb handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 issuer=65c6ab9aff010a96f13a4b2f01c403982362b0c2ed9e5b5871b8684ba5c91820 remoteIndex=0 responderIndex=0 udpAddr="192.168.50.1:4500" vpnIp=192.168.144.124
time="2023-09-22T09:59:46+02:00" level=info msg="Handshake message received" certName=mywindowsnode.mydomain.com fingerprint=5d4693491bc947ab1ad75ba6765f8d4d2cc0c5748581204d7e9c20aaceaef8cb handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 issuer=65c6ab9aff010a96f13a4b2f01c403982362b0c2ed9e5b5871b8684ba5c91820 remoteIndex=0 responderIndex=0 udpAddr="192.168.50.1:4500" vpnIp=192.168.144.124
time="2023-09-22T09:59:47+02:00" level=info msg="Handshake message received" certName=mywindowsnode.mydomain.com fingerprint=5d4693491bc947ab1ad75ba6765f8d4d2cc0c5748581204d7e9c20aaceaef8cb handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 issuer=65c6ab9aff010a96f13a4b2f01c403982362b0c2ed9e5b5871b8684ba5c91820 remoteIndex=0 responderIndex=0 udpAddr="192.168.50.1:4500" vpnIp=192.168.144.124
time="2023-09-22T09:59:47+02:00" level=debug msg="Tunnel status" certName=mywindowsnode.mydomain.com localIndex=2046568585 remoteIndex=1292143443 tunnelCheck="map[method:active state:testing]" vpnIp=192.168.144.124
time="2023-09-22T09:59:48+02:00" level=info msg="Handshake message received" certName=mywindowsnode.mydomain.com fingerprint=5d4693491bc947ab1ad75ba6765f8d4d2cc0c5748581204d7e9c20aaceaef8cb handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 issuer=65c6ab9aff010a96f13a4b2f01c403982362b0c2ed9e5b5871b8684ba5c91820 remoteIndex=0 responderIndex=0 udpAddr="192.168.50.1:4500" vpnIp=192.168.144.124
time="2023-09-22T09:59:49+02:00" level=info msg="Tunnel status" certName=mywindowsnode.mydomain.com localIndex=2758605755 remoteIndex=433662509 tunnelCheck="map[method:active state:dead]" vpnIp=192.168.144.124
time="2023-09-22T09:59:58+02:00" level=info msg="Tunnel status" certName=mywindowsnode.mydomain.com localIndex=2046568585 remoteIndex=1292143443 tunnelCheck="map[method:active state:dead]" vpnIp=192.168.144.124

Config files from affected hosts

Windows node:

# PKI paths
pki:
  ca: C:\Program Files\nebula\ca.crt
  cert: C:\Program Files\nebula\host.crt
  key: C:\Program Files\nebula\host.key

static_host_map:
  #Put all of your lighthouses here
  '192.168.144.1': ['192.168.50.22:123']
  '192.168.144.2': ['192.168.50.37:123']

static_map:
  network: ip4

lighthouse:
  hosts:
    - '192.168.144.1'
    - '192.168.144.2'

listen:
  host: '0.0.0.0'
  port: 4500

tun:
  disabled: false
  dev: nebula
  drop_local_broadcast: false
  drop_multicast: false
  tx_queue: 500
  mtu: 1440

logging:
  level: debug
  format: text

firewall:
  outbound:
    - port: any
      proto: any
      host: any

  inbound:
    - port: any
      proto: icmp
      host: any

Lighthouse:

pki:
  ca: /etc/nebula/ca.crt
  cert: /etc/nebula/host.crt
  key: /etc/nebula/host.key

listen:
  host: '0.0.0.0'
  port: 123

static_host_map:

lighthouse:
  am_lighthouse: true
  serve_dns: true
  dns:
    host: '192.168.144.2'
    port: 53

relay: 
  am_relay: true

logging:
  level: debug
  format: text

firewall:
  outbound:

    - port: any
      proto: any
      host: any

  inbound:
    - port: any
      proto: icmp
      host: any

SOLVED ! I'm stupid and realized I shouldn't have set a static port in my windows node config file :

Instead of :

listen:
  host: '0.0.0.0'
  port: 4500

I should have put:

listen:
  host: '0.0.0.0'
  port: 0

Which solves the issue.