Skip to content

Geo-restrictions block internal traffic from the management server#682

Open
TechHutTV wants to merge 1 commit intomainfrom
add/proxy-issue-3
Open

Geo-restrictions block internal traffic from the management server#682
TechHutTV wants to merge 1 commit intomainfrom
add/proxy-issue-3

Conversation

@TechHutTV
Copy link
Copy Markdown
Collaborator

This applies to self-hosted setups where an external identity provider (such as Authentik or PocketID) is exposed through the NetBird reverse proxy. For example, the architecture described in Self-host NetBird with Authentik. The management server (Dex) needs to reach the IdP's OIDC discovery endpoint through the reverse proxy to initialize the connector. However, traffic originating from inside the Docker network does not carry a valid geo-IP. The proxy sees an internal Docker IP instead of a public IP, which doesn't match any country, so the restriction rejects the request with a 403.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant