Open Mic92 opened 10 months ago
Thanks for reporting this. Definitely looks like something is up and I'll look into it. In the meantime users can easily set up their own tcp relays with zerotier/pylon
I would rather recommend using https://github.com/alexander-akhmetov/zt-tcp-relay as the above provides not a VPN but a socks interface, which is a bit tedious to be configured in various applications. But because of https://github.com/zerotier/ZeroTierOne/issues/2203 one also has to force TCP connections explicitly in the configuration for nodes that have TCP-only access.
Sort of. The pylon application has two modes, one of which is a SOCKS5 proxy pylon refract
and the other is our tcp-proxy bundled for convenience as pylon reflect
.
How do you tell zerotier-one to use pylon refract
?
How do you tell zerotier-one to use
pylon refract
?
I assume you mean reflect
, because refract
is a ZT instance that multiplexes traffic to and from the ZT network and the LAN.
{
"settings": {
"forceTcpRelay": true,
"tcpFallbackRelay": "1.2.3.4/443"
}
}
Thanks. Yeah typo. Someone should put that in the reflect docs ;)
Has there been progress on this? We've recently run into what we think is this issue. On a network that blocks all UDP traffic, Zerotier on MacOS and Linux used to have no problem falling back to TCP relaying with no configuration outside of what ships default. Seems they don't anymore.
Separately, does this ticket imply that all Zerotier-provided TCP relaying has been unavailable for several months? If so, is there an outage or status page that has this info somewhere?
Anyone notice an improvement?
@laduke not seeing an improvement. Running version 1.14 on Debian and on the same network mentioned in our comment above - the zerotier-one
service still shows offline. Have rebooted the system as well just in case but no change.
Noticed the official fallback relay referenced in OneService.cpp
here appears to still be down. Per @Mic92's comment above, using nc
as below still results in no response.
nc -v 204.80.128.1 443
Is there something else we should try? Let us know, happy to help test.
nc -v 204.80.128.1 443
now returning 'Connection to 204.80.128.1 port 443 [tcp/https] succeeded!' and zerotier-cli info
is now showing 200 info <removed> 1.14.0 TUNNELED
. Looks like the official relay is back up!
@laduke not seeing an improvement. Running version 1.14 on Debian and on the same network mentioned in our comment above - the
zerotier-one
service still shows offline. Have rebooted the system as well just in case but no change.Noticed the official fallback relay referenced in
OneService.cpp
here appears to still be down. Per @Mic92's comment above, usingnc
as below still results in no response.
nc -v 204.80.128.1 443
Is there something else we should try? Let us know, happy to help test.
thanks! 204.80.128.1 is actually an anycast address. there are many tcp relay instances.
traceroute 204.80.128.1
can give you some clues on what region you're getting routed to.
Just leaving a note here about some interesting behavior we observed.
It appears that the network we're on doesn't block all UDP traffic as we previously thought. However, the zerotier-one
service goes from "OFFLINE -> TUNNELED -> ONLINE", and tcpFallbackActive
goes "false -> true -> false". It seems like the zerotier-one
service just needs to get some sort of connectivity via the fallback relay, and then is able to switch over to a direct UDP connection.
thanks! 204.80.128.1 is actually an anycast address. there are many tcp relay instances.
traceroute 204.80.128.1
can give you some clues on what region you're getting routed to.
Interesting and thanks for the tip!
It appears that the network we're on doesn't block all UDP traffic as we previously thought. However, the zerotier-one service goes from "OFFLINE -> TUNNELED -> ONLINE", and tcpFallbackActive goes "false -> true -> false". It seems like the zerotier-one service just needs to get some sort of connectivity via the fallback relay, and then is able to switch over to a direct UDP connection.
That's strange. Are are our roots
(UDP) blocked somehow?
host root.zerotier.com
zerotier-cli peers | grep PLANET
@laduke doesn't appear that zt roots are being blocked.
> host root.zerotier.com
root.zerotier.com has address 84.17.53.155
root.zerotier.com has address 103.195.103.66
root.zerotier.com has address 104.194.8.134
root.zerotier.com has address 50.7.252.138
root.zerotier.com has IPv6 address 2605:9880:400:c3:254:f2bc:a1f7:19
root.zerotier.com has IPv6 address 2a02:6ea0:d405::9993
root.zerotier.com has IPv6 address 2001:49f0:d0db:2::2
root.zerotier.com has IPv6 address 2605:9880:200:1200:30:571:e34:51
> zerotier-cli peers | grep PLANET
62f865ae71 - PLANET -1 DIRECT 6833 25252 50.7.252.138/9993
778cde7190 - PLANET -1 DIRECT 1833 25025 103.195.103.66/9993
cafe04eba9 - PLANET -1 DIRECT 6833 25387 84.17.53.155/9993
cafe9efeb9 - PLANET -1 DIRECT 6833 25439 104.194.8.134/9993
Before filing a Bug Report
This is how a successful connection looks:
The official proxy doesn't respond:
If you still want to file a Bug Report
Please let us know
connection succeeds
connection times out
see above.
see above.
Doesn't depends on the zerotier version. But any zerotier version cannot use the relay for this reason.