I am experiencing an "INVALID_AUTH" issue with one of my Edge Tunnelers after a machine reboot. The tunneler was functioning correctly before the reboot, but now it appears to have lost its authentication.
I would appreciate assistance in resolving this issue without needing to reissue a JWT. Any guidance on how to address this would be greatly appreciated.
sudo /opt/openziti/bin/debug.bash https://user:zjzHHcaZ2f1VGu@go02vfkuwsbk.share.zrok.io
(estimated runtime 60s) [...................................................]
INFO: debug bundle created at /tmp/ziti-edge-tunnel-1.1.4-2024-09-26T14:17Z.tgz from files in /tmp/tmp.w92FsMTqlw
INFO: uploading debug bundle to https://user:zjzHHcaZ2f1VGu@go02vfkuwsbk.share.zrok.io
It looks like a clear, active rejection by the controller when the identity is asking for an API session, so I suspect that the current controller configuration is unexpected. This does rule out problems like an unreachable controller because a different error would be logged like "CONTROLLER UNAVAILABLE".
We can look closer at the state of the Linux tunneler's identity by increasing the log level.
ziti-edge-tunnel set_log_level --loglevel DEBUG
Still, the most likely cause is the controller no longer recognizes this identity. Can you verify the identity still exists in the controller and is enrolled? If so, we can verify the identity's enrollment is valid.
I can actually reset enrollment and try , but i need to understand why this occurs suddenly? this device is R&D one so its with me, but the production one's are in client localtion, if ziti is not up then i cant do SSH to the device remotely.
when i run ziti ops unrap of my identity json
ziti ops unwrap aly-rd-gateway-1.json
error writing certificate to file [aly-rd-gateway-1.cert]: missing pem prefix, type is unsupported
error writing private key to file [aly-rd-gateway-1.key]: missing pem prefix, type is unsupported
error writing CAs to file [aly-rd-gateway-1.key]: missing pem prefix, type is unsupported
Interesting. Can you inspect the cert in the JSON to see the type? I expected it would be inline, escaped PEM if produced by running ziti-edge-tunnel add --identity aly-rd-gateway-1.jwt or ziti-edge-tunnel enroll --jwt aly-rd-gateway-1.jwt --identity aly-rd-gateway-1.json.
I assume MFA was not previously enabled for this identity.
Does the Linux tunneler's DEBUG log reveal any new clues?
Does the controller log record anything interesting at the same moment the tunneler fails to authenticate?
It may be necessary to add --verbose to the controller run args. You are running an older controller version 0.34.1 from chart 0.9.1, I believe, and so you must append it to the Helm input image.args and delete the pod to restart the controller.
Ah my bad, i found out the mistake, i think i was exploring IDP and added that to the authentication policy to identity, whcih was blocking, i think it got resolved after i removed the policy.
Sorry for trouble.