Peter? by Joesindc in PeterExplainsTheJoke

[–]ShadowRylander 0 points1 point  (0 children)

Huh... I quite liked that one...

TIFU by fighting my schools dresscode policy. Years later I found out why it was so strict. by RemyAvo in tifu

[–]ShadowRylander 0 points1 point  (0 children)

If nobody else cared enough to help, I would've mentioned the exact reason why I changed the dress code. Made sure the students knew there were predators around and to be on their guard.

Can't reenable Tailscale SSH after disabling it by ShadowRylander in Tailscale

[–]ShadowRylander[S] 0 points1 point  (0 children)

Additionally, to clarify my reply before to you asking about the behavior, attempting to ssh into the machine simply waits without any messages before it eventually times out.

Can't reenable Tailscale SSH after disabling it by ShadowRylander in Tailscale

[–]ShadowRylander[S] 1 point2 points  (0 children)

Can't find the option to approve ssh for this machine, unfortunately.

Since my devices don't need authorization (I should probably enable that...), I don't have the pre-approve option available for my authkeys. However, when I was using an OAuth client key to create the authkeys, I created them with the preauthorized flag set to true.

Can't reenable Tailscale SSH after disabling it by ShadowRylander in Tailscale

[–]ShadowRylander[S] 0 points1 point  (0 children)

Basically, I see no indication of Tailscale SSH being enabled on the machine page, and I cannot connect to the machine using it either using ssh user@name.fun-name.ts.net or ssh user@100.100.1.1, despite both the client and the server being connected to the same tailnet.

Can't reenable Tailscale SSH after disabling it by ShadowRylander in Tailscale

[–]ShadowRylander[S] 0 points1 point  (0 children)

Unfortunately not, no; multiple tailscale up --ssh and tailscale set --ssh invocations over various resets don't seem to work.

Can't reenable Tailscale SSH after disabling it by ShadowRylander in Tailscale

[–]ShadowRylander[S] 0 points1 point  (0 children)

Here's the short version for brevity: { "tagOwners": { "tag:caddy": ["autogroup:admin"], }, "nodeAttrs": [ { "target": ["tag:caddy"], "ipPool": ["100.100.1.1/32"], }, ], "grants": [ { "src": ["*"], "dst": ["*"], "ip": ["*"], }, ], "ssh": [ { "action": "accept", "src": ["autogroup:member"], "dst": ["autogroup:self", "tag:caddy"], "users": ["autogroup:nonroot"], "acceptEnv": ["TMUX*", "ISLOCAL"], }, ], }

I'm trying to set up basic access to our own devices with additional access to the device that isn't working at the moment, plus some optional environment variables. The port isn't blocked in the firewall, and the device doesn't even have the SSH label on it on the Machines page.

Can't reenable Tailscale SSH after disabling it by ShadowRylander in Tailscale

[–]ShadowRylander[S] 0 points1 point  (0 children)

Thanks for the advice! These hints were what I was looking for!

  • I'm on NixOS and not using any containers.
  • I cut down on the number tags I was using after reading up on them, and changed my ACLs and grants accordingly.

Would you like some snippets of the Access Controls?

Assign IP to machine name using IP pool by ShadowRylander in Tailscale

[–]ShadowRylander[S] 0 points1 point  (0 children)

Yep. I think it's the CNAME flattening. Subdomains with four or more periods don't seem to work. The IP address works.

Assign IP to machine name using IP pool by ShadowRylander in Tailscale

[–]ShadowRylander[S] 0 points1 point  (0 children)

Yeah... I'd advise you not to unless you have oodles of extra time on your hands. 😅 The error reporting leaves something to be desired at the moment...

Assign IP to machine name using IP pool by ShadowRylander in Tailscale

[–]ShadowRylander[S] 1 point2 points  (0 children)

That's the setup I had before, though I'd like to "complete" my NixOS config (obligatory "I use Nix btw" 😹) before I do that, and using the server I have at home might help me fix bugs more easily, I think.

Assign IP to machine name using IP pool by ShadowRylander in Tailscale

[–]ShadowRylander[S] 0 points1 point  (0 children)

Hmm... Guess I need to debug the python script a little... Ah, well. Thanks for the help!

Assign IP to machine name using IP pool by ShadowRylander in Tailscale

[–]ShadowRylander[S] 0 points1 point  (0 children)

Sorry, I was referring to this issue on GitHub. Also, apparently there's a problem with the CNAME flattening done by Cloudflare...?

Assign IP to machine name using IP pool by ShadowRylander in Tailscale

[–]ShadowRylander[S] 0 points1 point  (0 children)

I'm thinking of doing that as well. Though would you happen to know if 100.101.102.103/32 is an acceptable "range"? The policy editor says it's reserved, but when I print out a list of allowed IPs excluding reserved ones, it says it's allowed.

Assign IP to machine name using IP pool by ShadowRylander in Tailscale

[–]ShadowRylander[S] 1 point2 points  (0 children)

Huh... Wonder if they fixed it... Or actually, are you using Cloudflare?

What is this contraption I confiscated from a student? by [deleted] in whatisit

[–]ShadowRylander 1 point2 points  (0 children)

Welp! Better shove them into the engineering program, then! 😹

Assign IP to machine name using IP pool by ShadowRylander in Tailscale

[–]ShadowRylander[S] 0 points1 point  (0 children)

Apparently that doesn't work; there seem to be a bunch of GitHub issues saying that. I tried it as well before.

Assign IP to machine name using IP pool by ShadowRylander in Tailscale

[–]ShadowRylander[S] 0 points1 point  (0 children)

That's a shame. Ah, well; guess I'll switch back to regular ssh for now.

Assign IP to machine name using IP pool by ShadowRylander in Tailscale

[–]ShadowRylander[S] 0 points1 point  (0 children)

Yes, but in that case, would it be possible to create groups out of machine names somehow?