I'm getting the following error while connected to a Cisco Secure Client VPN:
[ERROR]: error creating topTunnel backend (error listening: failed to listen: no apisession, authentication attempt failed: Post "https://ziti.share.0101.party:1280/edge/client/v1/authenticate?method=cert": context deadline exceeded (Client.Timeout exceeded while awaiting headers))
This issue only occurs with my self hosted instance. I was able to open tunnels and use them with free tier api.zrok.io endpoint.
I have noticed that VPN is blocking connections to https://ziti.share.0101.party:1280 but not to https://ziti.share.0101.party. I'm assuming both are one and the same.
or, can this URL be customized before building docker containers? is there a way to avoid https://domain:PORT/xyz syntax in my setup configuration.
It sounds like the VPN may block destination ports other than 443. While connect to the VPN, are you able to open a connection with OpenZiti controller's 1280/tcp?
Even if you get an error, you can still confirm the port is "open" while connected to the VPN by visiting the controller's URL in a web browser: https://ziti.share.0101.party:1280
You should see a certificate error if it's working correctly (zrok brokers cert trust through OpenZiti, not through the OS or browser's CA trust store).
I suspect it's because the VPN is blocking outgoing ports other than 443. You can verify your zrok environment is using port 443/tcp for the official zrok.io instance by parsing the OpenZiti controller URL from the environment's configuration file.
jq .ztAPI ~/.zrok/identities/environment.json
You're self-hosting zrok in Docker and using Caddy to manage zrok's certs, right?