Replies: 4 comments 2 replies
-
Using |
Beta Was this translation helpful? Give feedback.
-
Thank you for your help! Along is my new config.json if it may help someone else:
|
Beta Was this translation helpful? Give feedback.
-
As promised in another post, here's what was wrong with my setup, which is probably a bit unique, but could maybe be useful to someone else. My general backend is as follows: OPNsense (bare metal) provides LAN on 10.0.0.1, with the DNS for this interface set to 10.0.0.100 (which is Adguard Home). Adguard Home does DNS sinkholing and has its upstream set to 10.0.0.1, back to OPNsense which then uses Unbound magic to send outbound DNS requests to Quad9 with DNS over TLS. Nginx Proxy Manager (10.0.0.105) is actually just there to handle local SSL to get rid of the self-signed alerts when accessing services from LAN. A DNS challenge certificate from Let's Encrypt was generated for *.mydomain.tld + mydomain.tld, then proxy hosts were created with the same addresses as I would use from WAN to access local services (i.e. meshcentral.mydomain.tld), and pointing to the local IPs (i.e. for Meshcentral http://10.0.0.104:443, with the LE certificate used and SSL forced). I added a "catch all" DNS rewrite in Adguard as such: *.mydomain.tld => 10.0.0.105, which meant that any local query for an FQDN would not go on the WAN side and instantly go through Nginx Proxy Manager to be delivered with SSL thanks to the LE certificate. My CloudFlare tunnel was setup as is: meshcentral.mydomain.tld to http://10.0.0.104:443 (with additional config, http host header = meshcentral.mydomain.tld) And with that, Meshcentral config.json was setup with : Meshcentral webGUI was accessible from LAN and WAN, but adding clients didn't work unless the "ignoreagenthashcheck" was added and set to true in the config. At this point maybe some of you already know what was wrong all along but for the rest of you there it is. So after finally finding out, I removed my catch all rule in Adguard and switch to single rules, not creating one for Meshcentral, and voila, it now works perfectly. Here's my config.json at the moment:
I'm not sure if WANonly and allowedOrigin are still required so you may try with and without. Many thanks to @si458 who helped me by pointing me in the curl direction, it was by using |
Beta Was this translation helpful? Give feedback.
-
Hi @Xiaoh-123 and @si458 I hope you are doing well. I just wanted to tell that I have managed to set it up. I am using Cloudflare Proxy and Cloudflare Tunnel and followed this manual: I was very close following what @si458 had advised. However, I did not remove rmm.mydomain.tld from /etc/hosts. Also had not made http headers modifications as was advised in the manual. I hope this will help someone to set up and troubleshoot. |
Beta Was this translation helpful? Give feedback.
-
Hi !
First of all I want to thank the people behind this project and in the community who have made my life way easier with Meshcentral.
Now to my issues. Being the IT guy for my family and friends, I've always dreamt of something like Meshcentral to help me centralize all the computers I had to support, while also having a tool to do so remotely, and this project is just perfect for that. However, having just two years of homelabing behind me, I'm no expert and I feel like I'm doing something bad (or at least perfectible) with my Meshcentral instance.
I used tteck's script to get Meshcentral (currently 1.1.27) running inside an LXC on Proxmox 8.2. Since I have a Cloudflare tunnel setup already for some other services, I jumped on the opportunity to use that as a way to expose Meshcentral.
First, I must mention that I struggled immensely to get Meshcentral to work, and it was only thanks the Github and Reddit that I managed to make it work. And while everything is working fine, I'm pretty sure that what I did to make it work is not good, especially from a security standpoint.
Here's my config.json file :
My setup looks like this:
What I think is wrong is that I have to use
"ignoreAgentHashCheck": true
and in the Cloudflare panel I have to turn on the No TLS verify option. Reverting any of these two settings breaks the communication between server and agents both ways.Do you think that there's a better way to set things up so that I can have it work without compromising on settings that look bad (to me)? Or are these settings actually not a risk?
I'm also unsure of what to do with tlsoffload and trustedproxy, because the former seems to break everything if turned on with any IP or domain or just yes as a parameter, and the latter seems to do nothing, but I was under the impression that they mattered.
Thanks in advance for your help, please ask for more info if needed.
Beta Was this translation helpful? Give feedback.
All reactions