Cloudron makes it easy to run web apps like WordPress, Nextcloud, GitLab on your server. Find out more or install now.


Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Bookmarks
  • Search
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

Cloudron Forum

Apps | Demo | Docs | Install
  1. Cloudron Forum
  2. Matrix (Synapse/Element)
  3. Matrix Federation not working - curl works but Federation Tester doesn't

Matrix Federation not working - curl works but Federation Tester doesn't

Scheduled Pinned Locked Moved Solved Matrix (Synapse/Element)
11 Posts 3 Posters 1.4k Views 3 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • jdaviescoatesJ Offline
    jdaviescoatesJ Offline
    jdaviescoates
    wrote on last edited by
    #2

    had never checked previously, but same:

    Screenshot_20230102-205603_Firefox.png

    Looks like perhaps we need to add some DNS records that it isn't finding

    Here is the json report

    {
      "WellKnownResult": {
        "m.server": "",
        "result": "No .well-known found",
        "CacheExpiresAt": 0
      },
      "DNSResult": {
        "SRVSkipped": false,
        "SRVCName": "",
        "SRVRecords": null,
        "SRVError": {
          "Message": "lookup _matrix._tcp.chat.uniteddiversity.coop on 8.8.8.8:53: no such host"
        },
        "Hosts": {
          "chat.uniteddiversity.coop": {
            "CName": "chat.uniteddiversity.coop.",
            "Addrs": [
              "89.58.52.168"
            ],
            "Error": null
          }
        },
        "Addrs": [
          "89.58.52.168:8448"
        ]
      },
      "ConnectionReports": {},
      "ConnectionErrors": {
        "89.58.52.168:8448": {
          "Message": "Get \"https://89.58.52.168:8448/_matrix/key/v2/server\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)"
        }
      },
      "Version": {
        "error": "Get \"matrix://chat.uniteddiversity.coop/_matrix/federation/v1/version\": dial tcp 89.58.52.168:8448: i/o timeout"
      },
      "FederationOK": false
    }
    

    I'm on my phone but I think that gives some clues as to what needs adding.

    Hopefully @staff can update the package to automate adding the necessary entries needed to make this work.

    I use Cloudron with Gandi & Hetzner

    jdaviescoatesJ murgeroM 2 Replies Last reply
    0
    • jdaviescoatesJ jdaviescoates

      had never checked previously, but same:

      Screenshot_20230102-205603_Firefox.png

      Looks like perhaps we need to add some DNS records that it isn't finding

      Here is the json report

      {
        "WellKnownResult": {
          "m.server": "",
          "result": "No .well-known found",
          "CacheExpiresAt": 0
        },
        "DNSResult": {
          "SRVSkipped": false,
          "SRVCName": "",
          "SRVRecords": null,
          "SRVError": {
            "Message": "lookup _matrix._tcp.chat.uniteddiversity.coop on 8.8.8.8:53: no such host"
          },
          "Hosts": {
            "chat.uniteddiversity.coop": {
              "CName": "chat.uniteddiversity.coop.",
              "Addrs": [
                "89.58.52.168"
              ],
              "Error": null
            }
          },
          "Addrs": [
            "89.58.52.168:8448"
          ]
        },
        "ConnectionReports": {},
        "ConnectionErrors": {
          "89.58.52.168:8448": {
            "Message": "Get \"https://89.58.52.168:8448/_matrix/key/v2/server\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)"
          }
        },
        "Version": {
          "error": "Get \"matrix://chat.uniteddiversity.coop/_matrix/federation/v1/version\": dial tcp 89.58.52.168:8448: i/o timeout"
        },
        "FederationOK": false
      }
      

      I'm on my phone but I think that gives some clues as to what needs adding.

      Hopefully @staff can update the package to automate adding the necessary entries needed to make this work.

      jdaviescoatesJ Offline
      jdaviescoatesJ Offline
      jdaviescoates
      wrote on last edited by
      #3

      This is what I get when testing matrix.org

      Screenshot_20230102-210309_Firefox.png

      {
        "WellKnownResult": {
          "m.server": "matrix-federation.matrix.org:443",
          "CacheExpiresAt": 1672707841
        },
        "DNSResult": {
          "SRVSkipped": true,
          "SRVCName": "",
          "SRVRecords": null,
          "SRVError": null,
          "Hosts": {
            "matrix-federation.matrix.org": {
              "CName": "matrix-federation.matrix.org.",
              "Addrs": [
                "2606:4700:10::ac43:135a",
                "2606:4700:10::6814:c825",
                "2606:4700:10::6814:c925",
                "104.20.200.37",
                "172.67.19.90",
                "104.20.201.37"
              ],
              "Error": null
            }
          },
          "Addrs": [
            "[2606:4700:10::ac43:135a]:443",
            "[2606:4700:10::6814:c825]:443",
            "[2606:4700:10::6814:c925]:443",
            "104.20.200.37:443",
            "172.67.19.90:443",
            "104.20.201.37:443"
          ]
        },
        "ConnectionReports": {
          "104.20.200.37:443": {
            "Certificates": [
              {
                "SubjectCommonName": "sni.cloudflaressl.com",
                "IssuerCommonName": "Cloudflare Inc ECC CA-3",
                "SHA256Fingerprint": "kBX1oyhKwmIT6Tm+cwaR+UvttEmkpHypQcUTPHWrJqU",
                "DNSNames": [
                  "matrix.org",
                  "*.matrix.org",
                  "sni.cloudflaressl.com"
                ]
              },
              {
                "SubjectCommonName": "Cloudflare Inc ECC CA-3",
                "IssuerCommonName": "Baltimore CyberTrust Root",
                "SHA256Fingerprint": "OrvmPa91bFAWtrhfUgFf2Oisvid8UIexJ6YFY6hB7Yo",
                "DNSNames": null
              }
            ],
            "Cipher": {
              "Version": "TLS 1.3",
              "CipherSuite": "TLS_AES_128_GCM_SHA256"
            },
            "Checks": {
              "AllChecksOK": true,
              "MatchingServerName": true,
              "FutureValidUntilTS": true,
              "HasEd25519Key": true,
              "AllEd25519ChecksOK": true,
              "Ed25519Checks": {
                "ed25519:a_RXGa": {
                  "ValidEd25519": true,
                  "MatchingSignature": true
                }
              },
              "ValidCertificates": true
            },
            "Errors": [],
            "Ed25519VerifyKeys": {
              "ed25519:a_RXGa": "l8Hft5qXKn1vfHrg3p4+W8gELQVo8N13JkluMfmn2sQ"
            },
            "Info": {},
            "Keys": {
              "old_verify_keys": {
                "ed25519:auto": {
                  "expired_ts": 1576767829750,
                  "key": "Noi6WqcDj0QmPxCNQqgezwTlBKrfqehY1u2FyWP9uYw"
                }
              },
              "server_name": "matrix.org",
              "signatures": {
                "matrix.org": {
                  "ed25519:a_RXGa": "+/oYcZdYctgxcZCCrP4wx5S3rc1+2pbdpv3sJkKBpqn/uhJd+7+NPd9hUb3HBw+CVjjGugNSznM3RUgri4kQAQ"
                }
              },
              "valid_until_ts": 1672751664505,
              "verify_keys": {
                "ed25519:a_RXGa": {
                  "key": "l8Hft5qXKn1vfHrg3p4+W8gELQVo8N13JkluMfmn2sQ"
                }
              }
            }
          },
          "104.20.201.37:443": {
            "Certificates": [
              {
                "SubjectCommonName": "sni.cloudflaressl.com",
                "IssuerCommonName": "Cloudflare Inc ECC CA-3",
                "SHA256Fingerprint": "kBX1oyhKwmIT6Tm+cwaR+UvttEmkpHypQcUTPHWrJqU",
                "DNSNames": [
                  "matrix.org",
                  "*.matrix.org",
                  "sni.cloudflaressl.com"
                ]
              },
              {
                "SubjectCommonName": "Cloudflare Inc ECC CA-3",
                "IssuerCommonName": "Baltimore CyberTrust Root",
                "SHA256Fingerprint": "OrvmPa91bFAWtrhfUgFf2Oisvid8UIexJ6YFY6hB7Yo",
                "DNSNames": null
              }
            ],
            "Cipher": {
              "Version": "TLS 1.3",
              "CipherSuite": "TLS_AES_128_GCM_SHA256"
            },
            "Checks": {
              "AllChecksOK": true,
              "MatchingServerName": true,
              "FutureValidUntilTS": true,
              "HasEd25519Key": true,
              "AllEd25519ChecksOK": true,
              "Ed25519Checks": {
                "ed25519:a_RXGa": {
                  "ValidEd25519": true,
                  "MatchingSignature": true
                }
              },
              "ValidCertificates": true
            },
            "Errors": [],
            "Ed25519VerifyKeys": {
              "ed25519:a_RXGa": "l8Hft5qXKn1vfHrg3p4+W8gELQVo8N13JkluMfmn2sQ"
            },
            "Info": {},
            "Keys": {
              "old_verify_keys": {
                "ed25519:auto": {
                  "expired_ts": 1576767829750,
                  "key": "Noi6WqcDj0QmPxCNQqgezwTlBKrfqehY1u2FyWP9uYw"
                }
              },
              "server_name": "matrix.org",
              "signatures": {
                "matrix.org": {
                  "ed25519:a_RXGa": "+/oYcZdYctgxcZCCrP4wx5S3rc1+2pbdpv3sJkKBpqn/uhJd+7+NPd9hUb3HBw+CVjjGugNSznM3RUgri4kQAQ"
                }
              },
              "valid_until_ts": 1672751664505,
              "verify_keys": {
                "ed25519:a_RXGa": {
                  "key": "l8Hft5qXKn1vfHrg3p4+W8gELQVo8N13JkluMfmn2sQ"
                }
              }
            }
          },
          "172.67.19.90:443": {
            "Certificates": [
              {
                "SubjectCommonName": "sni.cloudflaressl.com",
                "IssuerCommonName": "Cloudflare Inc ECC CA-3",
                "SHA256Fingerprint": "kBX1oyhKwmIT6Tm+cwaR+UvttEmkpHypQcUTPHWrJqU",
                "DNSNames": [
                  "matrix.org",
                  "*.matrix.org",
                  "sni.cloudflaressl.com"
                ]
              },
              {
                "SubjectCommonName": "Cloudflare Inc ECC CA-3",
                "IssuerCommonName": "Baltimore CyberTrust Root",
                "SHA256Fingerprint": "OrvmPa91bFAWtrhfUgFf2Oisvid8UIexJ6YFY6hB7Yo",
                "DNSNames": null
              }
            ],
            "Cipher": {
              "Version": "TLS 1.3",
              "CipherSuite": "TLS_AES_128_GCM_SHA256"
            },
            "Checks": {
              "AllChecksOK": true,
              "MatchingServerName": true,
              "FutureValidUntilTS": true,
              "HasEd25519Key": true,
              "AllEd25519ChecksOK": true,
              "Ed25519Checks": {
                "ed25519:a_RXGa": {
                  "ValidEd25519": true,
                  "MatchingSignature": true
                }
              },
              "ValidCertificates": true
            },
            "Errors": [],
            "Ed25519VerifyKeys": {
              "ed25519:a_RXGa": "l8Hft5qXKn1vfHrg3p4+W8gELQVo8N13JkluMfmn2sQ"
            },
            "Info": {},
            "Keys": {
              "old_verify_keys": {
                "ed25519:auto": {
                  "expired_ts": 1576767829750,
                  "key": "Noi6WqcDj0QmPxCNQqgezwTlBKrfqehY1u2FyWP9uYw"
                }
              },
              "server_name": "matrix.org",
              "signatures": {
                "matrix.org": {
                  "ed25519:a_RXGa": "+/oYcZdYctgxcZCCrP4wx5S3rc1+2pbdpv3sJkKBpqn/uhJd+7+NPd9hUb3HBw+CVjjGugNSznM3RUgri4kQAQ"
                }
              },
              "valid_until_ts": 1672751664505,
              "verify_keys": {
                "ed25519:a_RXGa": {
                  "key": "l8Hft5qXKn1vfHrg3p4+W8gELQVo8N13JkluMfmn2sQ"
                }
              }
            }
          },
          "[2606:4700:10::6814:c825]:443": {
            "Certificates": [
              {
                "SubjectCommonName": "sni.cloudflaressl.com",
                "IssuerCommonName": "Cloudflare Inc ECC CA-3",
                "SHA256Fingerprint": "kBX1oyhKwmIT6Tm+cwaR+UvttEmkpHypQcUTPHWrJqU",
                "DNSNames": [
                  "matrix.org",
                  "*.matrix.org",
                  "sni.cloudflaressl.com"
                ]
              },
              {
                "SubjectCommonName": "Cloudflare Inc ECC CA-3",
                "IssuerCommonName": "Baltimore CyberTrust Root",
                "SHA256Fingerprint": "OrvmPa91bFAWtrhfUgFf2Oisvid8UIexJ6YFY6hB7Yo",
                "DNSNames": null
              }
            ],
            "Cipher": {
              "Version": "TLS 1.3",
              "CipherSuite": "TLS_AES_128_GCM_SHA256"
            },
            "Checks": {
              "AllChecksOK": true,
              "MatchingServerName": true,
              "FutureValidUntilTS": true,
              "HasEd25519Key": true,
              "AllEd25519ChecksOK": true,
              "Ed25519Checks": {
                "ed25519:a_RXGa": {
                  "ValidEd25519": true,
                  "MatchingSignature": true
                }
              },
              "ValidCertificates": true
            },
            "Errors": [],
            "Ed25519VerifyKeys": {
              "ed25519:a_RXGa": "l8Hft5qXKn1vfHrg3p4+W8gELQVo8N13JkluMfmn2sQ"
            },
            "Info": {},
            "Keys": {
              "old_verify_keys": {
                "ed25519:auto": {
                  "expired_ts": 1576767829750,
                  "key": "Noi6WqcDj0QmPxCNQqgezwTlBKrfqehY1u2FyWP9uYw"
                }
              },
              "server_name": "matrix.org",
              "signatures": {
                "matrix.org": {
                  "ed25519:a_RXGa": "+/oYcZdYctgxcZCCrP4wx5S3rc1+2pbdpv3sJkKBpqn/uhJd+7+NPd9hUb3HBw+CVjjGugNSznM3RUgri4kQAQ"
                }
              },
              "valid_until_ts": 1672751664505,
              "verify_keys": {
                "ed25519:a_RXGa": {
                  "key": "l8Hft5qXKn1vfHrg3p4+W8gELQVo8N13JkluMfmn2sQ"
                }
              }
            }
          },
          "[2606:4700:10::6814:c925]:443": {
            "Certificates": [
              {
                "SubjectCommonName": "sni.cloudflaressl.com",
                "IssuerCommonName": "Cloudflare Inc ECC CA-3",
                "SHA256Fingerprint": "kBX1oyhKwmIT6Tm+cwaR+UvttEmkpHypQcUTPHWrJqU",
                "DNSNames": [
                  "matrix.org",
                  "*.matrix.org",
                  "sni.cloudflaressl.com"
                ]
              },
              {
                "SubjectCommonName": "Cloudflare Inc ECC CA-3",
                "IssuerCommonName": "Baltimore CyberTrust Root",
                "SHA256Fingerprint": "OrvmPa91bFAWtrhfUgFf2Oisvid8UIexJ6YFY6hB7Yo",
                "DNSNames": null
              }
            ],
            "Cipher": {
              "Version": "TLS 1.3",
              "CipherSuite": "TLS_AES_128_GCM_SHA256"
            },
            "Checks": {
              "AllChecksOK": true,
              "MatchingServerName": true,
              "FutureValidUntilTS": true,
              "HasEd25519Key": true,
              "AllEd25519ChecksOK": true,
              "Ed25519Checks": {
                "ed25519:a_RXGa": {
                  "ValidEd25519": true,
                  "MatchingSignature": true
                }
              },
              "ValidCertificates": true
            },
            "Errors": [],
            "Ed25519VerifyKeys": {
              "ed25519:a_RXGa": "l8Hft5qXKn1vfHrg3p4+W8gELQVo8N13JkluMfmn2sQ"
            },
            "Info": {},
            "Keys": {
              "old_verify_keys": {
                "ed25519:auto": {
                  "expired_ts": 1576767829750,
                  "key": "Noi6WqcDj0QmPxCNQqgezwTlBKrfqehY1u2FyWP9uYw"
                }
              },
              "server_name": "matrix.org",
              "signatures": {
                "matrix.org": {
                  "ed25519:a_RXGa": "+/oYcZdYctgxcZCCrP4wx5S3rc1+2pbdpv3sJkKBpqn/uhJd+7+NPd9hUb3HBw+CVjjGugNSznM3RUgri4kQAQ"
                }
              },
              "valid_until_ts": 1672751664505,
              "verify_keys": {
                "ed25519:a_RXGa": {
                  "key": "l8Hft5qXKn1vfHrg3p4+W8gELQVo8N13JkluMfmn2sQ"
                }
              }
            }
          },
          "[2606:4700:10::ac43:135a]:443": {
            "Certificates": [
              {
                "SubjectCommonName": "sni.cloudflaressl.com",
                "IssuerCommonName": "Cloudflare Inc ECC CA-3",
                "SHA256Fingerprint": "kBX1oyhKwmIT6Tm+cwaR+UvttEmkpHypQcUTPHWrJqU",
                "DNSNames": [
                  "matrix.org",
                  "*.matrix.org",
                  "sni.cloudflaressl.com"
                ]
              },
              {
                "SubjectCommonName": "Cloudflare Inc ECC CA-3",
                "IssuerCommonName": "Baltimore CyberTrust Root",
                "SHA256Fingerprint": "OrvmPa91bFAWtrhfUgFf2Oisvid8UIexJ6YFY6hB7Yo",
                "DNSNames": null
              }
            ],
            "Cipher": {
              "Version": "TLS 1.3",
              "CipherSuite": "TLS_AES_128_GCM_SHA256"
            },
            "Checks": {
              "AllChecksOK": true,
              "MatchingServerName": true,
              "FutureValidUntilTS": true,
              "HasEd25519Key": true,
              "AllEd25519ChecksOK": true,
              "Ed25519Checks": {
                "ed25519:a_RXGa": {
                  "ValidEd25519": true,
                  "MatchingSignature": true
                }
              },
              "ValidCertificates": true
            },
            "Errors": [],
            "Ed25519VerifyKeys": {
              "ed25519:a_RXGa": "l8Hft5qXKn1vfHrg3p4+W8gELQVo8N13JkluMfmn2sQ"
            },
            "Info": {},
            "Keys": {
              "old_verify_keys": {
                "ed25519:auto": {
                  "expired_ts": 1576767829750,
                  "key": "Noi6WqcDj0QmPxCNQqgezwTlBKrfqehY1u2FyWP9uYw"
                }
              },
              "server_name": "matrix.org",
              "signatures": {
                "matrix.org": {
                  "ed25519:a_RXGa": "+/oYcZdYctgxcZCCrP4wx5S3rc1+2pbdpv3sJkKBpqn/uhJd+7+NPd9hUb3HBw+CVjjGugNSznM3RUgri4kQAQ"
                }
              },
              "valid_until_ts": 1672751664505,
              "verify_keys": {
                "ed25519:a_RXGa": {
                  "key": "l8Hft5qXKn1vfHrg3p4+W8gELQVo8N13JkluMfmn2sQ"
                }
              }
            }
          }
        },
        "ConnectionErrors": {},
        "Version": {
          "name": "Synapse",
          "version": "1.74.0 (b=matrix-org-hotfixes,5a1b56b9b0)"
        },
        "FederationOK": true
      }
      

      I use Cloudron with Gandi & Hetzner

      1 Reply Last reply
      0
      • jdaviescoatesJ Offline
        jdaviescoatesJ Offline
        jdaviescoates
        wrote on last edited by
        #4

        Seems for some reason on Cloudron it's not picking up the well known and port. Odd

        I use Cloudron with Gandi & Hetzner

        1 Reply Last reply
        0
        • SupaikuS Supaiku

          Curl -L is returning the correct response to :433 but the Federation Tester returns:

          Get "https://[serveripaddress]:8448/_matrix/key/v2/server": context deadline exceeded (Client.Timeout exceeded while awaiting headers)
          

          External rooms are "not accessible at this time"

          The matrix server locaiton is set in cloudron with :443 set explicity
          there is an app (wordpress install) on the bare domain name.

          murgeroM Offline
          murgeroM Offline
          murgero
          App Dev
          wrote on last edited by murgero
          #5

          @Supaiku You have to use the matrix federated domain NOT the app domain (unless these are both the same, by default on cloudron they are NOT)

          Example, my matrix server is matrix.urgero.org with urgero.org being the user's domain for federation.

          Testing matrix.urgero.org actually fails with that tool - but urgero.org does not.

          Hope this helps.

          Edit: @jdaviescoates

          --
          https://urgero.org
          ~ Professional Nerd. Freelance Programmer. ~

          SupaikuS 1 Reply Last reply
          1
          • jdaviescoatesJ jdaviescoates

            had never checked previously, but same:

            Screenshot_20230102-205603_Firefox.png

            Looks like perhaps we need to add some DNS records that it isn't finding

            Here is the json report

            {
              "WellKnownResult": {
                "m.server": "",
                "result": "No .well-known found",
                "CacheExpiresAt": 0
              },
              "DNSResult": {
                "SRVSkipped": false,
                "SRVCName": "",
                "SRVRecords": null,
                "SRVError": {
                  "Message": "lookup _matrix._tcp.chat.uniteddiversity.coop on 8.8.8.8:53: no such host"
                },
                "Hosts": {
                  "chat.uniteddiversity.coop": {
                    "CName": "chat.uniteddiversity.coop.",
                    "Addrs": [
                      "89.58.52.168"
                    ],
                    "Error": null
                  }
                },
                "Addrs": [
                  "89.58.52.168:8448"
                ]
              },
              "ConnectionReports": {},
              "ConnectionErrors": {
                "89.58.52.168:8448": {
                  "Message": "Get \"https://89.58.52.168:8448/_matrix/key/v2/server\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)"
                }
              },
              "Version": {
                "error": "Get \"matrix://chat.uniteddiversity.coop/_matrix/federation/v1/version\": dial tcp 89.58.52.168:8448: i/o timeout"
              },
              "FederationOK": false
            }
            

            I'm on my phone but I think that gives some clues as to what needs adding.

            Hopefully @staff can update the package to automate adding the necessary entries needed to make this work.

            murgeroM Offline
            murgeroM Offline
            murgero
            App Dev
            wrote on last edited by
            #6

            @jdaviescoates said in Matrix Federation not working - curl works but Federation Tester doesn't:

            uniteddiversity.coop

            103849e3-f86a-4251-ac43-f338e73c75ca-image.png

            --
            https://urgero.org
            ~ Professional Nerd. Freelance Programmer. ~

            jdaviescoatesJ 1 Reply Last reply
            2
            • murgeroM murgero

              @jdaviescoates said in Matrix Federation not working - curl works but Federation Tester doesn't:

              uniteddiversity.coop

              103849e3-f86a-4251-ac43-f338e73c75ca-image.png

              jdaviescoatesJ Offline
              jdaviescoatesJ Offline
              jdaviescoates
              wrote on last edited by jdaviescoates
              #7

              @murgero thanks! 🙂

              So looks like everything is actually working fine 😃👍

              I use Cloudron with Gandi & Hetzner

              murgeroM 1 Reply Last reply
              1
              • jdaviescoatesJ jdaviescoates

                @murgero thanks! 🙂

                So looks like everything is actually working fine 😃👍

                murgeroM Offline
                murgeroM Offline
                murgero
                App Dev
                wrote on last edited by
                #8

                @jdaviescoates The tool says your matrix install is working perfectly lol

                --
                https://urgero.org
                ~ Professional Nerd. Freelance Programmer. ~

                jdaviescoatesJ 1 Reply Last reply
                1
                • murgeroM murgero

                  @jdaviescoates The tool says your matrix install is working perfectly lol

                  jdaviescoatesJ Offline
                  jdaviescoatesJ Offline
                  jdaviescoates
                  wrote on last edited by
                  #9

                  @murgero yep! presumably the same for OP @Supaiku domain too?

                  I use Cloudron with Gandi & Hetzner

                  murgeroM 1 Reply Last reply
                  0
                  • jdaviescoatesJ jdaviescoates

                    @murgero yep! presumably the same for OP @Supaiku domain too?

                    murgeroM Offline
                    murgeroM Offline
                    murgero
                    App Dev
                    wrote on last edited by
                    #10

                    @jdaviescoates I'd imagine it would be so.

                    --
                    https://urgero.org
                    ~ Professional Nerd. Freelance Programmer. ~

                    1 Reply Last reply
                    1
                    • murgeroM murgero

                      @Supaiku You have to use the matrix federated domain NOT the app domain (unless these are both the same, by default on cloudron they are NOT)

                      Example, my matrix server is matrix.urgero.org with urgero.org being the user's domain for federation.

                      Testing matrix.urgero.org actually fails with that tool - but urgero.org does not.

                      Hope this helps.

                      Edit: @jdaviescoates

                      SupaikuS Offline
                      SupaikuS Offline
                      Supaiku
                      wrote on last edited by
                      #11

                      @murgero ah yes... this does seem to be the trick.

                      I just found the line in the docs that says:

                      Step 3. Federation
                      
                      Federation setup is automatic. Use the Federation Tester to verify that everything is setup properly. Note you must enter the server_name (like example.com) in the form field in the website and NOT the location of your home server (despite what the form says).
                      
                      1 Reply Last reply
                      2
                      • nebulonN nebulon marked this topic as a question on
                      • nebulonN nebulon has marked this topic as solved on
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Don't have an account? Register

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • Bookmarks
                      • Search