Handshake timing out for windows nodes
cef-informatique opened this issue · comments
cef-informatique commented
What version of nebula
are you using?
1.7.2
What operating system are you using?
Debian 12 (lighthouses) and Windows Server 2022 Standard (node)
Describe the Bug
Hi,
I have two lighthouses (192.168.50.22 and 192.168.50.37) and multiple nodes which are a mix of Debian 12 and Windows Server 2019/2022.
All of my Debian 12 nodes can complete the handshake and work perfectly. However, none of my windows nodes are able to complete the handshake which times out.
Logs from affected hosts
Windows node :
time="2023-09-22T09:59:33+02:00" level=debug msg="Packet store" length=1 localIndex=3163322701 remoteIndex=0 stored=true vpnIp=192.168.159.255
time="2023-09-22T09:59:33+02:00" level=debug msg="Packet store" length=2 localIndex=3163322701 remoteIndex=0 stored=true vpnIp=192.168.159.255
time="2023-09-22T09:59:33+02:00" level=debug msg="Packet store" length=3 localIndex=3163322701 remoteIndex=0 stored=true vpnIp=192.168.159.255
time="2023-09-22T09:59:33+02:00" level=debug msg="Packet store" length=2 localIndex=2058341641 remoteIndex=0 stored=true vpnIp=192.168.144.1
time="2023-09-22T09:59:33+02:00" level=debug msg="Packet store" length=2 localIndex=433662509 remoteIndex=0 stored=true vpnIp=192.168.144.2
time="2023-09-22T09:59:33+02:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{192.168.144.124 224.0.0.22 8704 5125 2 false}" vpnIp=224.0.0.22
time="2023-09-22T09:59:33+02:00" level=debug msg="Error while validating outbound packet: packet is not ipv4, type: 6" packet="[96 0 0 0 0 8 58 255 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 255 2 0 0 0 0 0 0 0 0 0 0 0 0 0 2 133 0 123 184 0 0 0 0]"
time="2023-09-22T09:59:33+02:00" level=debug msg="Error while validating outbound packet: packet is not ipv4, type: 6" packet="[96 0 0 0 0 76 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 255 2 0 0 0 0 0 0 0 0 0 0 0 0 0 22 58 0 5 2 0 0 1 0 143 0 136 232 0 0 0 3 3 0 0 0 255 2 0 0 0 0 0 0 0 0 0 1 255 88 224 26 4 0 0 0 255 2 0 0 0 0 0 0 0 0 0 0 0 0 0 251 4 0 0 0 255 2 0 0 0 0 0 0 0 0 0 0 0 1 0 3]"
time="2023-09-22T09:59:39+02:00" level=debug msg="Hostmap hostInfo deleted" hostMap="map[indexNumber:3163322701 mapName:pending mapTotalSize:0 remoteIndexNumber:0 vpnIp:192.168.159.255]"
time="2023-09-22T09:59:40+02:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{192.168.144.124 224.0.0.251 5353 5353 17 false}" vpnIp=224.0.0.251
time="2023-09-22T09:59:40+02:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{192.168.144.124 224.0.0.251 5353 5353 17 false}" vpnIp=224.0.0.251
time="2023-09-22T09:59:40+02:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{192.168.144.124 239.255.255.250 49916 1900 17 false}" vpnIp=239.255.255.250
time="2023-09-22T09:59:40+02:00" level=debug msg="Error while validating outbound packet: packet is not ipv4, type: 6" packet="[96 0 0 0 0 8 58 255 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 255 2 0 0 0 0 0 0 0 0 0 0 0 0 0 2 133 0 123 184 0 0 0 0]"
time="2023-09-22T09:59:41+02:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{192.168.144.124 224.0.0.251 5353 5353 17 false}" vpnIp=224.0.0.251
time="2023-09-22T09:59:41+02:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{192.168.144.124 224.0.0.251 5353 5353 17 false}" vpnIp=224.0.0.251
time="2023-09-22T09:59:42+02:00" level=debug msg="Generated index" index=3873018504
time="2023-09-22T09:59:42+02:00" level=debug msg="Packet store" length=1 localIndex=3873018504 remoteIndex=0 stored=true vpnIp=192.168.144.1
time="2023-09-22T09:59:42+02:00" level=debug msg="Generated index" index=1292143443
time="2023-09-22T09:59:42+02:00" level=info msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=3873018504 localIndex=3873018504 remoteIndex=0 udpAddrs="[192.168.50.22:123]" vpnIp=192.168.144.1
time="2023-09-22T09:59:42+02:00" level=debug msg="Packet store" length=1 localIndex=1292143443 remoteIndex=0 stored=true vpnIp=192.168.144.2
time="2023-09-22T09:59:42+02:00" level=info msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 localIndex=1292143443 remoteIndex=0 udpAddrs="[192.168.50.37:123]" vpnIp=192.168.144.2
time="2023-09-22T09:59:42+02:00" level=debug msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=3873018504 localIndex=3873018504 remoteIndex=0 udpAddrs="[192.168.50.22:123]" vpnIp=192.168.144.1
time="2023-09-22T09:59:42+02:00" level=debug msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 localIndex=1292143443 remoteIndex=0 udpAddrs="[192.168.50.37:123]" vpnIp=192.168.144.2
time="2023-09-22T09:59:43+02:00" level=debug msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=3873018504 localIndex=3873018504 remoteIndex=0 udpAddrs="[192.168.50.22:123]" vpnIp=192.168.144.1
time="2023-09-22T09:59:43+02:00" level=debug msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 localIndex=1292143443 remoteIndex=0 udpAddrs="[192.168.50.37:123]" vpnIp=192.168.144.2
time="2023-09-22T09:59:43+02:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{192.168.144.124 224.0.0.251 5353 5353 17 false}" vpnIp=224.0.0.251
time="2023-09-22T09:59:43+02:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{192.168.144.124 224.0.0.251 5353 5353 17 false}" vpnIp=224.0.0.251
time="2023-09-22T09:59:43+02:00" level=debug msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=3873018504 localIndex=3873018504 remoteIndex=0 udpAddrs="[192.168.50.22:123]" vpnIp=192.168.144.1
time="2023-09-22T09:59:43+02:00" level=debug msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 localIndex=1292143443 remoteIndex=0 udpAddrs="[192.168.50.37:123]" vpnIp=192.168.144.2
time="2023-09-22T09:59:44+02:00" level=debug msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=3873018504 localIndex=3873018504 remoteIndex=0 udpAddrs="[192.168.50.22:123]" vpnIp=192.168.144.1
time="2023-09-22T09:59:44+02:00" level=debug msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 localIndex=1292143443 remoteIndex=0 udpAddrs="[192.168.50.37:123]" vpnIp=192.168.144.2
time="2023-09-22T09:59:44+02:00" level=debug msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=3873018504 localIndex=3873018504 remoteIndex=0 udpAddrs="[192.168.50.22:123]" vpnIp=192.168.144.1
time="2023-09-22T09:59:44+02:00" level=debug msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 localIndex=1292143443 remoteIndex=0 udpAddrs="[192.168.50.37:123]" vpnIp=192.168.144.2
time="2023-09-22T09:59:45+02:00" level=debug msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=3873018504 localIndex=3873018504 remoteIndex=0 udpAddrs="[192.168.50.22:123]" vpnIp=192.168.144.1
time="2023-09-22T09:59:45+02:00" level=debug msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 localIndex=1292143443 remoteIndex=0 udpAddrs="[192.168.50.37:123]" vpnIp=192.168.144.2
time="2023-09-22T09:59:46+02:00" level=debug msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=3873018504 localIndex=3873018504 remoteIndex=0 udpAddrs="[192.168.50.22:123]" vpnIp=192.168.144.1
time="2023-09-22T09:59:46+02:00" level=debug msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 localIndex=1292143443 remoteIndex=0 udpAddrs="[192.168.50.37:123]" vpnIp=192.168.144.2
time="2023-09-22T09:59:47+02:00" level=debug msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=3873018504 localIndex=3873018504 remoteIndex=0 udpAddrs="[192.168.50.22:123]" vpnIp=192.168.144.1
time="2023-09-22T09:59:47+02:00" level=debug msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 localIndex=1292143443 remoteIndex=0 udpAddrs="[192.168.50.37:123]" vpnIp=192.168.144.2
time="2023-09-22T09:59:48+02:00" level=debug msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=3873018504 localIndex=3873018504 remoteIndex=0 udpAddrs="[192.168.50.22:123]" vpnIp=192.168.144.1
time="2023-09-22T09:59:48+02:00" level=debug msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 localIndex=1292143443 remoteIndex=0 udpAddrs="[192.168.50.37:123]" vpnIp=192.168.144.2
time="2023-09-22T09:59:49+02:00" level=info msg="Handshake timed out" durationNs=6500742100 handshake="map[stage:1 style:ix_psk0]" initiatorIndex=3873018504 localIndex=3873018504 remoteIndex=0 udpAddrs="[192.168.50.22:123]" vpnIp=192.168.144.1
time="2023-09-22T09:59:49+02:00" level=debug msg="Hostmap hostInfo deleted" hostMap="map[indexNumber:3873018504 mapName:pending mapTotalSize:1 remoteIndexNumber:0 vpnIp:192.168.144.1]"
time="2023-09-22T09:59:49+02:00" level=info msg="Handshake timed out" durationNs=6499559700 handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 localIndex=1292143443 remoteIndex=0 udpAddrs="[192.168.50.37:123]" vpnIp=192.168.144.2
time="2023-09-22T09:59:49+02:00" level=debug msg="Hostmap hostInfo deleted" hostMap="map[indexNumber:1292143443 mapName:pending mapTotalSize:0 remoteIndexNumber:0 vpnIp:192.168.144.2]"
time="2023-09-22T09:59:51+02:00" level=info msg="Caught signal, shutting down" signal=interrupt
time="2023-09-22T09:59:51+02:00" level=debug msg="Error while validating outbound packet: packet is not ipv4, type: 6" packet="[96 0 0 0 0 36 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 255 2 0 0 0 0 0 0 0 0 0 0 0 0 0 22 58 0 5 2 0 0 1 0 143 0 110 145 0 0 0 1 3 0 0 0 255 2 0 0 0 0 0 0 0 0 0 0 0 0 0 251]"
Lighthouse :
time="2023-09-22T09:59:33+02:00" level=info msg="Handshake message received" certName=mywindowsnode.mydomain.com fingerprint=5d4693491bc947ab1ad75ba6765f8d4d2cc0c5748581204d7e9c20aaceaef8cb handshake="map[stage:1 style:ix_psk0]" initiatorIndex=433662509 issuer=65c6ab9aff010a96f13a4b2f01c403982362b0c2ed9e5b5871b8684ba5c91820 remoteIndex=0 responderIndex=0 udpAddr="192.168.50.1:4500" vpnIp=192.168.144.124
time="2023-09-22T09:59:34+02:00" level=info msg="Handshake message received" certName=mywindowsnode.mydomain.com fingerprint=5d4693491bc947ab1ad75ba6765f8d4d2cc0c5748581204d7e9c20aaceaef8cb handshake="map[stage:1 style:ix_psk0]" initiatorIndex=433662509 issuer=65c6ab9aff010a96f13a4b2f01c403982362b0c2ed9e5b5871b8684ba5c91820 remoteIndex=0 responderIndex=0 udpAddr="192.168.50.1:4500" vpnIp=192.168.144.124
time="2023-09-22T09:59:34+02:00" level=info msg="Handshake message received" certName=mywindowsnode.mydomain.com fingerprint=5d4693491bc947ab1ad75ba6765f8d4d2cc0c5748581204d7e9c20aaceaef8cb handshake="map[stage:1 style:ix_psk0]" initiatorIndex=433662509 issuer=65c6ab9aff010a96f13a4b2f01c403982362b0c2ed9e5b5871b8684ba5c91820 remoteIndex=0 responderIndex=0 udpAddr="192.168.50.1:4500" vpnIp=192.168.144.124
time="2023-09-22T09:59:35+02:00" level=info msg="Handshake message received" certName=mywindowsnode.mydomain.com fingerprint=5d4693491bc947ab1ad75ba6765f8d4d2cc0c5748581204d7e9c20aaceaef8cb handshake="map[stage:1 style:ix_psk0]" initiatorIndex=433662509 issuer=65c6ab9aff010a96f13a4b2f01c403982362b0c2ed9e5b5871b8684ba5c91820 remoteIndex=0 responderIndex=0 udpAddr="192.168.50.1:4500" vpnIp=192.168.144.124
time="2023-09-22T09:59:36+02:00" level=info msg="Handshake message received" certName=mywindowsnode.mydomain.com fingerprint=5d4693491bc947ab1ad75ba6765f8d4d2cc0c5748581204d7e9c20aaceaef8cb handshake="map[stage:1 style:ix_psk0]" initiatorIndex=433662509 issuer=65c6ab9aff010a96f13a4b2f01c403982362b0c2ed9e5b5871b8684ba5c91820 remoteIndex=0 responderIndex=0 udpAddr="192.168.50.1:4500" vpnIp=192.168.144.124
time="2023-09-22T09:59:37+02:00" level=info msg="Handshake message received" certName=mywindowsnode.mydomain.com fingerprint=5d4693491bc947ab1ad75ba6765f8d4d2cc0c5748581204d7e9c20aaceaef8cb handshake="map[stage:1 style:ix_psk0]" initiatorIndex=433662509 issuer=65c6ab9aff010a96f13a4b2f01c403982362b0c2ed9e5b5871b8684ba5c91820 remoteIndex=0 responderIndex=0 udpAddr="192.168.50.1:4500" vpnIp=192.168.144.124
time="2023-09-22T09:59:38+02:00" level=debug msg="Tunnel status" certName=mywindowsnode.mydomain.com localIndex=2758605755 remoteIndex=433662509 tunnelCheck="map[method:active state:testing]" vpnIp=192.168.144.124
time="2023-09-22T09:59:38+02:00" level=info msg="Handshake message received" certName=mywindowsnode.mydomain.com fingerprint=5d4693491bc947ab1ad75ba6765f8d4d2cc0c5748581204d7e9c20aaceaef8cb handshake="map[stage:1 style:ix_psk0]" initiatorIndex=433662509 issuer=65c6ab9aff010a96f13a4b2f01c403982362b0c2ed9e5b5871b8684ba5c91820 remoteIndex=0 responderIndex=0 udpAddr="192.168.50.1:4500" vpnIp=192.168.144.124
time="2023-09-22T09:59:42+02:00" level=info msg="Handshake message received" certName=mywindowsnode.mydomain.com fingerprint=5d4693491bc947ab1ad75ba6765f8d4d2cc0c5748581204d7e9c20aaceaef8cb handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 issuer=65c6ab9aff010a96f13a4b2f01c403982362b0c2ed9e5b5871b8684ba5c91820 remoteIndex=0 responderIndex=0 udpAddr="192.168.50.1:4500" vpnIp=192.168.144.124
time="2023-09-22T09:59:42+02:00" level=info msg="Taking new handshake" certName=mywindowsnode.mydomain.com localIndex=2758605755 remoteIndex=433662509 vpnIp=192.168.144.124
time="2023-09-22T09:59:42+02:00" level=info msg="Handshake message sent" certName=mywindowsnode.mydomain.com fingerprint=5d4693491bc947ab1ad75ba6765f8d4d2cc0c5748581204d7e9c20aaceaef8cb handshake="map[stage:2 style:ix_psk0]" initiatorIndex=1292143443 issuer=65c6ab9aff010a96f13a4b2f01c403982362b0c2ed9e5b5871b8684ba5c91820 remoteIndex=0 responderIndex=2046568585 sentCachedPackets=0 udpAddr="192.168.50.1:4500" vpnIp=192.168.144.124
time="2023-09-22T09:59:42+02:00" level=debug msg="Sending 0 stored packets" certName=mywindowsnode.mydomain.com localIndex=2046568585 remoteIndex=1292143443 vpnIp=192.168.144.124
time="2023-09-22T09:59:42+02:00" level=info msg="Handshake message received" certName=mywindowsnode.mydomain.com fingerprint=5d4693491bc947ab1ad75ba6765f8d4d2cc0c5748581204d7e9c20aaceaef8cb handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 issuer=65c6ab9aff010a96f13a4b2f01c403982362b0c2ed9e5b5871b8684ba5c91820 remoteIndex=0 responderIndex=0 udpAddr="192.168.50.1:4500" vpnIp=192.168.144.124
time="2023-09-22T09:59:43+02:00" level=info msg="Handshake message received" certName=mywindowsnode.mydomain.com fingerprint=5d4693491bc947ab1ad75ba6765f8d4d2cc0c5748581204d7e9c20aaceaef8cb handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 issuer=65c6ab9aff010a96f13a4b2f01c403982362b0c2ed9e5b5871b8684ba5c91820 remoteIndex=0 responderIndex=0 udpAddr="192.168.50.1:4500" vpnIp=192.168.144.124
time="2023-09-22T09:59:43+02:00" level=info msg="Handshake message received" certName=mywindowsnode.mydomain.com fingerprint=5d4693491bc947ab1ad75ba6765f8d4d2cc0c5748581204d7e9c20aaceaef8cb handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 issuer=65c6ab9aff010a96f13a4b2f01c403982362b0c2ed9e5b5871b8684ba5c91820 remoteIndex=0 responderIndex=0 udpAddr="192.168.50.1:4500" vpnIp=192.168.144.124
time="2023-09-22T09:59:44+02:00" level=info msg="Handshake message received" certName=mywindowsnode.mydomain.com fingerprint=5d4693491bc947ab1ad75ba6765f8d4d2cc0c5748581204d7e9c20aaceaef8cb handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 issuer=65c6ab9aff010a96f13a4b2f01c403982362b0c2ed9e5b5871b8684ba5c91820 remoteIndex=0 responderIndex=0 udpAddr="192.168.50.1:4500" vpnIp=192.168.144.124
time="2023-09-22T09:59:44+02:00" level=info msg="Handshake message received" certName=mywindowsnode.mydomain.com fingerprint=5d4693491bc947ab1ad75ba6765f8d4d2cc0c5748581204d7e9c20aaceaef8cb handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 issuer=65c6ab9aff010a96f13a4b2f01c403982362b0c2ed9e5b5871b8684ba5c91820 remoteIndex=0 responderIndex=0 udpAddr="192.168.50.1:4500" vpnIp=192.168.144.124
time="2023-09-22T09:59:45+02:00" level=info msg="Handshake message received" certName=mywindowsnode.mydomain.com fingerprint=5d4693491bc947ab1ad75ba6765f8d4d2cc0c5748581204d7e9c20aaceaef8cb handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 issuer=65c6ab9aff010a96f13a4b2f01c403982362b0c2ed9e5b5871b8684ba5c91820 remoteIndex=0 responderIndex=0 udpAddr="192.168.50.1:4500" vpnIp=192.168.144.124
time="2023-09-22T09:59:46+02:00" level=info msg="Handshake message received" certName=mywindowsnode.mydomain.com fingerprint=5d4693491bc947ab1ad75ba6765f8d4d2cc0c5748581204d7e9c20aaceaef8cb handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 issuer=65c6ab9aff010a96f13a4b2f01c403982362b0c2ed9e5b5871b8684ba5c91820 remoteIndex=0 responderIndex=0 udpAddr="192.168.50.1:4500" vpnIp=192.168.144.124
time="2023-09-22T09:59:47+02:00" level=info msg="Handshake message received" certName=mywindowsnode.mydomain.com fingerprint=5d4693491bc947ab1ad75ba6765f8d4d2cc0c5748581204d7e9c20aaceaef8cb handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 issuer=65c6ab9aff010a96f13a4b2f01c403982362b0c2ed9e5b5871b8684ba5c91820 remoteIndex=0 responderIndex=0 udpAddr="192.168.50.1:4500" vpnIp=192.168.144.124
time="2023-09-22T09:59:47+02:00" level=debug msg="Tunnel status" certName=mywindowsnode.mydomain.com localIndex=2046568585 remoteIndex=1292143443 tunnelCheck="map[method:active state:testing]" vpnIp=192.168.144.124
time="2023-09-22T09:59:48+02:00" level=info msg="Handshake message received" certName=mywindowsnode.mydomain.com fingerprint=5d4693491bc947ab1ad75ba6765f8d4d2cc0c5748581204d7e9c20aaceaef8cb handshake="map[stage:1 style:ix_psk0]" initiatorIndex=1292143443 issuer=65c6ab9aff010a96f13a4b2f01c403982362b0c2ed9e5b5871b8684ba5c91820 remoteIndex=0 responderIndex=0 udpAddr="192.168.50.1:4500" vpnIp=192.168.144.124
time="2023-09-22T09:59:49+02:00" level=info msg="Tunnel status" certName=mywindowsnode.mydomain.com localIndex=2758605755 remoteIndex=433662509 tunnelCheck="map[method:active state:dead]" vpnIp=192.168.144.124
time="2023-09-22T09:59:58+02:00" level=info msg="Tunnel status" certName=mywindowsnode.mydomain.com localIndex=2046568585 remoteIndex=1292143443 tunnelCheck="map[method:active state:dead]" vpnIp=192.168.144.124
Config files from affected hosts
Windows node:
# PKI paths
pki:
ca: C:\Program Files\nebula\ca.crt
cert: C:\Program Files\nebula\host.crt
key: C:\Program Files\nebula\host.key
static_host_map:
#Put all of your lighthouses here
'192.168.144.1': ['192.168.50.22:123']
'192.168.144.2': ['192.168.50.37:123']
static_map:
network: ip4
lighthouse:
hosts:
- '192.168.144.1'
- '192.168.144.2'
listen:
host: '0.0.0.0'
port: 4500
tun:
disabled: false
dev: nebula
drop_local_broadcast: false
drop_multicast: false
tx_queue: 500
mtu: 1440
logging:
level: debug
format: text
firewall:
outbound:
- port: any
proto: any
host: any
inbound:
- port: any
proto: icmp
host: any
Lighthouse:
pki:
ca: /etc/nebula/ca.crt
cert: /etc/nebula/host.crt
key: /etc/nebula/host.key
listen:
host: '0.0.0.0'
port: 123
static_host_map:
lighthouse:
am_lighthouse: true
serve_dns: true
dns:
host: '192.168.144.2'
port: 53
relay:
am_relay: true
logging:
level: debug
format: text
firewall:
outbound:
- port: any
proto: any
host: any
inbound:
- port: any
proto: icmp
host: any
cef-informatique commented
SOLVED ! I'm stupid and realized I shouldn't have set a static port in my windows node config file :
Instead of :
listen:
host: '0.0.0.0'
port: 4500
I should have put:
listen:
host: '0.0.0.0'
port: 0
Which solves the issue.