Cloudron makes it easy to run web apps like WordPress, Nextcloud, GitLab on your server. Find out more or install now.


Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Bookmarks
  • Search
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

Cloudron Forum

Apps | Demo | Docs | Install
  1. Cloudron Forum
  2. Matrix (Synapse/Element)
  3. Matrix Federation not working - curl works but Federation Tester doesn't

Matrix Federation not working - curl works but Federation Tester doesn't

Scheduled Pinned Locked Moved Solved Matrix (Synapse/Element)
11 Posts 3 Posters 1.4k Views 3 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • SupaikuS Offline
    SupaikuS Offline
    Supaiku
    wrote on last edited by Supaiku
    #1

    Curl -L is returning the correct response to :433 but the Federation Tester returns:

    Get "https://[serveripaddress]:8448/_matrix/key/v2/server": context deadline exceeded (Client.Timeout exceeded while awaiting headers)
    

    External rooms are "not accessible at this time"

    The matrix server locaiton is set in cloudron with :443 set explicity
    there is an app (wordpress install) on the bare domain name.

    murgeroM 1 Reply Last reply
    1
    • jdaviescoatesJ Offline
      jdaviescoatesJ Offline
      jdaviescoates
      wrote on last edited by
      #2

      had never checked previously, but same:

      Screenshot_20230102-205603_Firefox.png

      Looks like perhaps we need to add some DNS records that it isn't finding

      Here is the json report

      {
        "WellKnownResult": {
          "m.server": "",
          "result": "No .well-known found",
          "CacheExpiresAt": 0
        },
        "DNSResult": {
          "SRVSkipped": false,
          "SRVCName": "",
          "SRVRecords": null,
          "SRVError": {
            "Message": "lookup _matrix._tcp.chat.uniteddiversity.coop on 8.8.8.8:53: no such host"
          },
          "Hosts": {
            "chat.uniteddiversity.coop": {
              "CName": "chat.uniteddiversity.coop.",
              "Addrs": [
                "89.58.52.168"
              ],
              "Error": null
            }
          },
          "Addrs": [
            "89.58.52.168:8448"
          ]
        },
        "ConnectionReports": {},
        "ConnectionErrors": {
          "89.58.52.168:8448": {
            "Message": "Get \"https://89.58.52.168:8448/_matrix/key/v2/server\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)"
          }
        },
        "Version": {
          "error": "Get \"matrix://chat.uniteddiversity.coop/_matrix/federation/v1/version\": dial tcp 89.58.52.168:8448: i/o timeout"
        },
        "FederationOK": false
      }
      

      I'm on my phone but I think that gives some clues as to what needs adding.

      Hopefully @staff can update the package to automate adding the necessary entries needed to make this work.

      I use Cloudron with Gandi & Hetzner

      jdaviescoatesJ murgeroM 2 Replies Last reply
      0
      • jdaviescoatesJ jdaviescoates

        had never checked previously, but same:

        Screenshot_20230102-205603_Firefox.png

        Looks like perhaps we need to add some DNS records that it isn't finding

        Here is the json report

        {
          "WellKnownResult": {
            "m.server": "",
            "result": "No .well-known found",
            "CacheExpiresAt": 0
          },
          "DNSResult": {
            "SRVSkipped": false,
            "SRVCName": "",
            "SRVRecords": null,
            "SRVError": {
              "Message": "lookup _matrix._tcp.chat.uniteddiversity.coop on 8.8.8.8:53: no such host"
            },
            "Hosts": {
              "chat.uniteddiversity.coop": {
                "CName": "chat.uniteddiversity.coop.",
                "Addrs": [
                  "89.58.52.168"
                ],
                "Error": null
              }
            },
            "Addrs": [
              "89.58.52.168:8448"
            ]
          },
          "ConnectionReports": {},
          "ConnectionErrors": {
            "89.58.52.168:8448": {
              "Message": "Get \"https://89.58.52.168:8448/_matrix/key/v2/server\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)"
            }
          },
          "Version": {
            "error": "Get \"matrix://chat.uniteddiversity.coop/_matrix/federation/v1/version\": dial tcp 89.58.52.168:8448: i/o timeout"
          },
          "FederationOK": false
        }
        

        I'm on my phone but I think that gives some clues as to what needs adding.

        Hopefully @staff can update the package to automate adding the necessary entries needed to make this work.

        jdaviescoatesJ Offline
        jdaviescoatesJ Offline
        jdaviescoates
        wrote on last edited by
        #3

        This is what I get when testing matrix.org

        Screenshot_20230102-210309_Firefox.png

        {
          "WellKnownResult": {
            "m.server": "matrix-federation.matrix.org:443",
            "CacheExpiresAt": 1672707841
          },
          "DNSResult": {
            "SRVSkipped": true,
            "SRVCName": "",
            "SRVRecords": null,
            "SRVError": null,
            "Hosts": {
              "matrix-federation.matrix.org": {
                "CName": "matrix-federation.matrix.org.",
                "Addrs": [
                  "2606:4700:10::ac43:135a",
                  "2606:4700:10::6814:c825",
                  "2606:4700:10::6814:c925",
                  "104.20.200.37",
                  "172.67.19.90",
                  "104.20.201.37"
                ],
                "Error": null
              }
            },
            "Addrs": [
              "[2606:4700:10::ac43:135a]:443",
              "[2606:4700:10::6814:c825]:443",
              "[2606:4700:10::6814:c925]:443",
              "104.20.200.37:443",
              "172.67.19.90:443",
              "104.20.201.37:443"
            ]
          },
          "ConnectionReports": {
            "104.20.200.37:443": {
              "Certificates": [
                {
                  "SubjectCommonName": "sni.cloudflaressl.com",
                  "IssuerCommonName": "Cloudflare Inc ECC CA-3",
                  "SHA256Fingerprint": "kBX1oyhKwmIT6Tm+cwaR+UvttEmkpHypQcUTPHWrJqU",
                  "DNSNames": [
                    "matrix.org",
                    "*.matrix.org",
                    "sni.cloudflaressl.com"
                  ]
                },
                {
                  "SubjectCommonName": "Cloudflare Inc ECC CA-3",
                  "IssuerCommonName": "Baltimore CyberTrust Root",
                  "SHA256Fingerprint": "OrvmPa91bFAWtrhfUgFf2Oisvid8UIexJ6YFY6hB7Yo",
                  "DNSNames": null
                }
              ],
              "Cipher": {
                "Version": "TLS 1.3",
                "CipherSuite": "TLS_AES_128_GCM_SHA256"
              },
              "Checks": {
                "AllChecksOK": true,
                "MatchingServerName": true,
                "FutureValidUntilTS": true,
                "HasEd25519Key": true,
                "AllEd25519ChecksOK": true,
                "Ed25519Checks": {
                  "ed25519:a_RXGa": {
                    "ValidEd25519": true,
                    "MatchingSignature": true
                  }
                },
                "ValidCertificates": true
              },
              "Errors": [],
              "Ed25519VerifyKeys": {
                "ed25519:a_RXGa": "l8Hft5qXKn1vfHrg3p4+W8gELQVo8N13JkluMfmn2sQ"
              },
              "Info": {},
              "Keys": {
                "old_verify_keys": {
                  "ed25519:auto": {
                    "expired_ts": 1576767829750,
                    "key": "Noi6WqcDj0QmPxCNQqgezwTlBKrfqehY1u2FyWP9uYw"
                  }
                },
                "server_name": "matrix.org",
                "signatures": {
                  "matrix.org": {
                    "ed25519:a_RXGa": "+/oYcZdYctgxcZCCrP4wx5S3rc1+2pbdpv3sJkKBpqn/uhJd+7+NPd9hUb3HBw+CVjjGugNSznM3RUgri4kQAQ"
                  }
                },
                "valid_until_ts": 1672751664505,
                "verify_keys": {
                  "ed25519:a_RXGa": {
                    "key": "l8Hft5qXKn1vfHrg3p4+W8gELQVo8N13JkluMfmn2sQ"
                  }
                }
              }
            },
            "104.20.201.37:443": {
              "Certificates": [
                {
                  "SubjectCommonName": "sni.cloudflaressl.com",
                  "IssuerCommonName": "Cloudflare Inc ECC CA-3",
                  "SHA256Fingerprint": "kBX1oyhKwmIT6Tm+cwaR+UvttEmkpHypQcUTPHWrJqU",
                  "DNSNames": [
                    "matrix.org",
                    "*.matrix.org",
                    "sni.cloudflaressl.com"
                  ]
                },
                {
                  "SubjectCommonName": "Cloudflare Inc ECC CA-3",
                  "IssuerCommonName": "Baltimore CyberTrust Root",
                  "SHA256Fingerprint": "OrvmPa91bFAWtrhfUgFf2Oisvid8UIexJ6YFY6hB7Yo",
                  "DNSNames": null
                }
              ],
              "Cipher": {
                "Version": "TLS 1.3",
                "CipherSuite": "TLS_AES_128_GCM_SHA256"
              },
              "Checks": {
                "AllChecksOK": true,
                "MatchingServerName": true,
                "FutureValidUntilTS": true,
                "HasEd25519Key": true,
                "AllEd25519ChecksOK": true,
                "Ed25519Checks": {
                  "ed25519:a_RXGa": {
                    "ValidEd25519": true,
                    "MatchingSignature": true
                  }
                },
                "ValidCertificates": true
              },
              "Errors": [],
              "Ed25519VerifyKeys": {
                "ed25519:a_RXGa": "l8Hft5qXKn1vfHrg3p4+W8gELQVo8N13JkluMfmn2sQ"
              },
              "Info": {},
              "Keys": {
                "old_verify_keys": {
                  "ed25519:auto": {
                    "expired_ts": 1576767829750,
                    "key": "Noi6WqcDj0QmPxCNQqgezwTlBKrfqehY1u2FyWP9uYw"
                  }
                },
                "server_name": "matrix.org",
                "signatures": {
                  "matrix.org": {
                    "ed25519:a_RXGa": "+/oYcZdYctgxcZCCrP4wx5S3rc1+2pbdpv3sJkKBpqn/uhJd+7+NPd9hUb3HBw+CVjjGugNSznM3RUgri4kQAQ"
                  }
                },
                "valid_until_ts": 1672751664505,
                "verify_keys": {
                  "ed25519:a_RXGa": {
                    "key": "l8Hft5qXKn1vfHrg3p4+W8gELQVo8N13JkluMfmn2sQ"
                  }
                }
              }
            },
            "172.67.19.90:443": {
              "Certificates": [
                {
                  "SubjectCommonName": "sni.cloudflaressl.com",
                  "IssuerCommonName": "Cloudflare Inc ECC CA-3",
                  "SHA256Fingerprint": "kBX1oyhKwmIT6Tm+cwaR+UvttEmkpHypQcUTPHWrJqU",
                  "DNSNames": [
                    "matrix.org",
                    "*.matrix.org",
                    "sni.cloudflaressl.com"
                  ]
                },
                {
                  "SubjectCommonName": "Cloudflare Inc ECC CA-3",
                  "IssuerCommonName": "Baltimore CyberTrust Root",
                  "SHA256Fingerprint": "OrvmPa91bFAWtrhfUgFf2Oisvid8UIexJ6YFY6hB7Yo",
                  "DNSNames": null
                }
              ],
              "Cipher": {
                "Version": "TLS 1.3",
                "CipherSuite": "TLS_AES_128_GCM_SHA256"
              },
              "Checks": {
                "AllChecksOK": true,
                "MatchingServerName": true,
                "FutureValidUntilTS": true,
                "HasEd25519Key": true,
                "AllEd25519ChecksOK": true,
                "Ed25519Checks": {
                  "ed25519:a_RXGa": {
                    "ValidEd25519": true,
                    "MatchingSignature": true
                  }
                },
                "ValidCertificates": true
              },
              "Errors": [],
              "Ed25519VerifyKeys": {
                "ed25519:a_RXGa": "l8Hft5qXKn1vfHrg3p4+W8gELQVo8N13JkluMfmn2sQ"
              },
              "Info": {},
              "Keys": {
                "old_verify_keys": {
                  "ed25519:auto": {
                    "expired_ts": 1576767829750,
                    "key": "Noi6WqcDj0QmPxCNQqgezwTlBKrfqehY1u2FyWP9uYw"
                  }
                },
                "server_name": "matrix.org",
                "signatures": {
                  "matrix.org": {
                    "ed25519:a_RXGa": "+/oYcZdYctgxcZCCrP4wx5S3rc1+2pbdpv3sJkKBpqn/uhJd+7+NPd9hUb3HBw+CVjjGugNSznM3RUgri4kQAQ"
                  }
                },
                "valid_until_ts": 1672751664505,
                "verify_keys": {
                  "ed25519:a_RXGa": {
                    "key": "l8Hft5qXKn1vfHrg3p4+W8gELQVo8N13JkluMfmn2sQ"
                  }
                }
              }
            },
            "[2606:4700:10::6814:c825]:443": {
              "Certificates": [
                {
                  "SubjectCommonName": "sni.cloudflaressl.com",
                  "IssuerCommonName": "Cloudflare Inc ECC CA-3",
                  "SHA256Fingerprint": "kBX1oyhKwmIT6Tm+cwaR+UvttEmkpHypQcUTPHWrJqU",
                  "DNSNames": [
                    "matrix.org",
                    "*.matrix.org",
                    "sni.cloudflaressl.com"
                  ]
                },
                {
                  "SubjectCommonName": "Cloudflare Inc ECC CA-3",
                  "IssuerCommonName": "Baltimore CyberTrust Root",
                  "SHA256Fingerprint": "OrvmPa91bFAWtrhfUgFf2Oisvid8UIexJ6YFY6hB7Yo",
                  "DNSNames": null
                }
              ],
              "Cipher": {
                "Version": "TLS 1.3",
                "CipherSuite": "TLS_AES_128_GCM_SHA256"
              },
              "Checks": {
                "AllChecksOK": true,
                "MatchingServerName": true,
                "FutureValidUntilTS": true,
                "HasEd25519Key": true,
                "AllEd25519ChecksOK": true,
                "Ed25519Checks": {
                  "ed25519:a_RXGa": {
                    "ValidEd25519": true,
                    "MatchingSignature": true
                  }
                },
                "ValidCertificates": true
              },
              "Errors": [],
              "Ed25519VerifyKeys": {
                "ed25519:a_RXGa": "l8Hft5qXKn1vfHrg3p4+W8gELQVo8N13JkluMfmn2sQ"
              },
              "Info": {},
              "Keys": {
                "old_verify_keys": {
                  "ed25519:auto": {
                    "expired_ts": 1576767829750,
                    "key": "Noi6WqcDj0QmPxCNQqgezwTlBKrfqehY1u2FyWP9uYw"
                  }
                },
                "server_name": "matrix.org",
                "signatures": {
                  "matrix.org": {
                    "ed25519:a_RXGa": "+/oYcZdYctgxcZCCrP4wx5S3rc1+2pbdpv3sJkKBpqn/uhJd+7+NPd9hUb3HBw+CVjjGugNSznM3RUgri4kQAQ"
                  }
                },
                "valid_until_ts": 1672751664505,
                "verify_keys": {
                  "ed25519:a_RXGa": {
                    "key": "l8Hft5qXKn1vfHrg3p4+W8gELQVo8N13JkluMfmn2sQ"
                  }
                }
              }
            },
            "[2606:4700:10::6814:c925]:443": {
              "Certificates": [
                {
                  "SubjectCommonName": "sni.cloudflaressl.com",
                  "IssuerCommonName": "Cloudflare Inc ECC CA-3",
                  "SHA256Fingerprint": "kBX1oyhKwmIT6Tm+cwaR+UvttEmkpHypQcUTPHWrJqU",
                  "DNSNames": [
                    "matrix.org",
                    "*.matrix.org",
                    "sni.cloudflaressl.com"
                  ]
                },
                {
                  "SubjectCommonName": "Cloudflare Inc ECC CA-3",
                  "IssuerCommonName": "Baltimore CyberTrust Root",
                  "SHA256Fingerprint": "OrvmPa91bFAWtrhfUgFf2Oisvid8UIexJ6YFY6hB7Yo",
                  "DNSNames": null
                }
              ],
              "Cipher": {
                "Version": "TLS 1.3",
                "CipherSuite": "TLS_AES_128_GCM_SHA256"
              },
              "Checks": {
                "AllChecksOK": true,
                "MatchingServerName": true,
                "FutureValidUntilTS": true,
                "HasEd25519Key": true,
                "AllEd25519ChecksOK": true,
                "Ed25519Checks": {
                  "ed25519:a_RXGa": {
                    "ValidEd25519": true,
                    "MatchingSignature": true
                  }
                },
                "ValidCertificates": true
              },
              "Errors": [],
              "Ed25519VerifyKeys": {
                "ed25519:a_RXGa": "l8Hft5qXKn1vfHrg3p4+W8gELQVo8N13JkluMfmn2sQ"
              },
              "Info": {},
              "Keys": {
                "old_verify_keys": {
                  "ed25519:auto": {
                    "expired_ts": 1576767829750,
                    "key": "Noi6WqcDj0QmPxCNQqgezwTlBKrfqehY1u2FyWP9uYw"
                  }
                },
                "server_name": "matrix.org",
                "signatures": {
                  "matrix.org": {
                    "ed25519:a_RXGa": "+/oYcZdYctgxcZCCrP4wx5S3rc1+2pbdpv3sJkKBpqn/uhJd+7+NPd9hUb3HBw+CVjjGugNSznM3RUgri4kQAQ"
                  }
                },
                "valid_until_ts": 1672751664505,
                "verify_keys": {
                  "ed25519:a_RXGa": {
                    "key": "l8Hft5qXKn1vfHrg3p4+W8gELQVo8N13JkluMfmn2sQ"
                  }
                }
              }
            },
            "[2606:4700:10::ac43:135a]:443": {
              "Certificates": [
                {
                  "SubjectCommonName": "sni.cloudflaressl.com",
                  "IssuerCommonName": "Cloudflare Inc ECC CA-3",
                  "SHA256Fingerprint": "kBX1oyhKwmIT6Tm+cwaR+UvttEmkpHypQcUTPHWrJqU",
                  "DNSNames": [
                    "matrix.org",
                    "*.matrix.org",
                    "sni.cloudflaressl.com"
                  ]
                },
                {
                  "SubjectCommonName": "Cloudflare Inc ECC CA-3",
                  "IssuerCommonName": "Baltimore CyberTrust Root",
                  "SHA256Fingerprint": "OrvmPa91bFAWtrhfUgFf2Oisvid8UIexJ6YFY6hB7Yo",
                  "DNSNames": null
                }
              ],
              "Cipher": {
                "Version": "TLS 1.3",
                "CipherSuite": "TLS_AES_128_GCM_SHA256"
              },
              "Checks": {
                "AllChecksOK": true,
                "MatchingServerName": true,
                "FutureValidUntilTS": true,
                "HasEd25519Key": true,
                "AllEd25519ChecksOK": true,
                "Ed25519Checks": {
                  "ed25519:a_RXGa": {
                    "ValidEd25519": true,
                    "MatchingSignature": true
                  }
                },
                "ValidCertificates": true
              },
              "Errors": [],
              "Ed25519VerifyKeys": {
                "ed25519:a_RXGa": "l8Hft5qXKn1vfHrg3p4+W8gELQVo8N13JkluMfmn2sQ"
              },
              "Info": {},
              "Keys": {
                "old_verify_keys": {
                  "ed25519:auto": {
                    "expired_ts": 1576767829750,
                    "key": "Noi6WqcDj0QmPxCNQqgezwTlBKrfqehY1u2FyWP9uYw"
                  }
                },
                "server_name": "matrix.org",
                "signatures": {
                  "matrix.org": {
                    "ed25519:a_RXGa": "+/oYcZdYctgxcZCCrP4wx5S3rc1+2pbdpv3sJkKBpqn/uhJd+7+NPd9hUb3HBw+CVjjGugNSznM3RUgri4kQAQ"
                  }
                },
                "valid_until_ts": 1672751664505,
                "verify_keys": {
                  "ed25519:a_RXGa": {
                    "key": "l8Hft5qXKn1vfHrg3p4+W8gELQVo8N13JkluMfmn2sQ"
                  }
                }
              }
            }
          },
          "ConnectionErrors": {},
          "Version": {
            "name": "Synapse",
            "version": "1.74.0 (b=matrix-org-hotfixes,5a1b56b9b0)"
          },
          "FederationOK": true
        }
        

        I use Cloudron with Gandi & Hetzner

        1 Reply Last reply
        0
        • jdaviescoatesJ Offline
          jdaviescoatesJ Offline
          jdaviescoates
          wrote on last edited by
          #4

          Seems for some reason on Cloudron it's not picking up the well known and port. Odd

          I use Cloudron with Gandi & Hetzner

          1 Reply Last reply
          0
          • SupaikuS Supaiku

            Curl -L is returning the correct response to :433 but the Federation Tester returns:

            Get "https://[serveripaddress]:8448/_matrix/key/v2/server": context deadline exceeded (Client.Timeout exceeded while awaiting headers)
            

            External rooms are "not accessible at this time"

            The matrix server locaiton is set in cloudron with :443 set explicity
            there is an app (wordpress install) on the bare domain name.

            murgeroM Offline
            murgeroM Offline
            murgero
            App Dev
            wrote on last edited by murgero
            #5

            @Supaiku You have to use the matrix federated domain NOT the app domain (unless these are both the same, by default on cloudron they are NOT)

            Example, my matrix server is matrix.urgero.org with urgero.org being the user's domain for federation.

            Testing matrix.urgero.org actually fails with that tool - but urgero.org does not.

            Hope this helps.

            Edit: @jdaviescoates

            --
            https://urgero.org
            ~ Professional Nerd. Freelance Programmer. ~

            SupaikuS 1 Reply Last reply
            1
            • jdaviescoatesJ jdaviescoates

              had never checked previously, but same:

              Screenshot_20230102-205603_Firefox.png

              Looks like perhaps we need to add some DNS records that it isn't finding

              Here is the json report

              {
                "WellKnownResult": {
                  "m.server": "",
                  "result": "No .well-known found",
                  "CacheExpiresAt": 0
                },
                "DNSResult": {
                  "SRVSkipped": false,
                  "SRVCName": "",
                  "SRVRecords": null,
                  "SRVError": {
                    "Message": "lookup _matrix._tcp.chat.uniteddiversity.coop on 8.8.8.8:53: no such host"
                  },
                  "Hosts": {
                    "chat.uniteddiversity.coop": {
                      "CName": "chat.uniteddiversity.coop.",
                      "Addrs": [
                        "89.58.52.168"
                      ],
                      "Error": null
                    }
                  },
                  "Addrs": [
                    "89.58.52.168:8448"
                  ]
                },
                "ConnectionReports": {},
                "ConnectionErrors": {
                  "89.58.52.168:8448": {
                    "Message": "Get \"https://89.58.52.168:8448/_matrix/key/v2/server\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)"
                  }
                },
                "Version": {
                  "error": "Get \"matrix://chat.uniteddiversity.coop/_matrix/federation/v1/version\": dial tcp 89.58.52.168:8448: i/o timeout"
                },
                "FederationOK": false
              }
              

              I'm on my phone but I think that gives some clues as to what needs adding.

              Hopefully @staff can update the package to automate adding the necessary entries needed to make this work.

              murgeroM Offline
              murgeroM Offline
              murgero
              App Dev
              wrote on last edited by
              #6

              @jdaviescoates said in Matrix Federation not working - curl works but Federation Tester doesn't:

              uniteddiversity.coop

              103849e3-f86a-4251-ac43-f338e73c75ca-image.png

              --
              https://urgero.org
              ~ Professional Nerd. Freelance Programmer. ~

              jdaviescoatesJ 1 Reply Last reply
              2
              • murgeroM murgero

                @jdaviescoates said in Matrix Federation not working - curl works but Federation Tester doesn't:

                uniteddiversity.coop

                103849e3-f86a-4251-ac43-f338e73c75ca-image.png

                jdaviescoatesJ Offline
                jdaviescoatesJ Offline
                jdaviescoates
                wrote on last edited by jdaviescoates
                #7

                @murgero thanks! 🙂

                So looks like everything is actually working fine 😃👍

                I use Cloudron with Gandi & Hetzner

                murgeroM 1 Reply Last reply
                1
                • jdaviescoatesJ jdaviescoates

                  @murgero thanks! 🙂

                  So looks like everything is actually working fine 😃👍

                  murgeroM Offline
                  murgeroM Offline
                  murgero
                  App Dev
                  wrote on last edited by
                  #8

                  @jdaviescoates The tool says your matrix install is working perfectly lol

                  --
                  https://urgero.org
                  ~ Professional Nerd. Freelance Programmer. ~

                  jdaviescoatesJ 1 Reply Last reply
                  1
                  • murgeroM murgero

                    @jdaviescoates The tool says your matrix install is working perfectly lol

                    jdaviescoatesJ Offline
                    jdaviescoatesJ Offline
                    jdaviescoates
                    wrote on last edited by
                    #9

                    @murgero yep! presumably the same for OP @Supaiku domain too?

                    I use Cloudron with Gandi & Hetzner

                    murgeroM 1 Reply Last reply
                    0
                    • jdaviescoatesJ jdaviescoates

                      @murgero yep! presumably the same for OP @Supaiku domain too?

                      murgeroM Offline
                      murgeroM Offline
                      murgero
                      App Dev
                      wrote on last edited by
                      #10

                      @jdaviescoates I'd imagine it would be so.

                      --
                      https://urgero.org
                      ~ Professional Nerd. Freelance Programmer. ~

                      1 Reply Last reply
                      1
                      • murgeroM murgero

                        @Supaiku You have to use the matrix federated domain NOT the app domain (unless these are both the same, by default on cloudron they are NOT)

                        Example, my matrix server is matrix.urgero.org with urgero.org being the user's domain for federation.

                        Testing matrix.urgero.org actually fails with that tool - but urgero.org does not.

                        Hope this helps.

                        Edit: @jdaviescoates

                        SupaikuS Offline
                        SupaikuS Offline
                        Supaiku
                        wrote on last edited by
                        #11

                        @murgero ah yes... this does seem to be the trick.

                        I just found the line in the docs that says:

                        Step 3. Federation
                        
                        Federation setup is automatic. Use the Federation Tester to verify that everything is setup properly. Note you must enter the server_name (like example.com) in the form field in the website and NOT the location of your home server (despite what the form says).
                        
                        1 Reply Last reply
                        2
                        • nebulonN nebulon marked this topic as a question on
                        • nebulonN nebulon has marked this topic as solved on
                        Reply
                        • Reply as topic
                        Log in to reply
                        • Oldest to Newest
                        • Newest to Oldest
                        • Most Votes


                        • Login

                        • Don't have an account? Register

                        • Login or register to search.
                        • First post
                          Last post
                        0
                        • Categories
                        • Recent
                        • Tags
                        • Popular
                        • Bookmarks
                        • Search