• Login
  • Register
  • Login Register
    Login
    Username/Email:
    Password:
    Or login with a social network below
  • Forum
  • Website
  • GitHub
  • Status
  • Translation
  • Features
  • Team
  • Rules
  • Help
  • Feeds
User Links
  • Login
  • Register
  • Login Register
    Login
    Username/Email:
    Password:
    Or login with a social network below

    Useful Links Forum Website GitHub Status Translation Features Team Rules Help Feeds
    Jellyfin Forum Support Troubleshooting Networking & Access SOLVED: Accessing the web server

    Pages (3): « Previous 1 2 3

     
    • 0 Vote(s) - 0 Average

    SOLVED: Accessing the web server

    WireGuard remote setup: cannot connect to the web server
    ArbitraryRenaissance
    Offline

    Junior Member

    Posts: 14
    Threads: 1
    Joined: 2025 Mar
    Reputation: 0
    Country:United States
    #21
    2025-03-19, 07:21 PM
    It's the same thing. I think this confirms that the responses aren't there. Something is perhaps misconfigured on my end, and it's causing the jellyfin server to completely ignore connection requests coming from anywhere besides the host itself.
    ArbitraryRenaissance
    Offline

    Junior Member

    Posts: 14
    Threads: 1
    Joined: 2025 Mar
    Reputation: 0
    Country:United States
    #22
    2025-03-20, 04:32 PM (This post was last modified: 2025-03-20, 04:34 PM by ArbitraryRenaissance. Edited 1 time in total.)
    I have solved the problem. It turns out my nftables were misconfigured. I ran sudo nft list ruleset and the first entry was the inet filter:

    Code:
    table inet filter {
        chain input {
            type filter hook input priority filter; policy drop;
            ct state invalid drop comment "early drop of invalid connections"
            ct state { established, related } accept comment "allow tracked connections"
            iif "lo" accept comment "allow from loopback"
            ip protocol icmp accept comment "allow icmp"
            meta l4proto ipv6-icmp accept comment "allow icmp v6"
            tcp dport 22 accept comment "allow sshd"
            meta pkttype host limit rate 5/second burst 5 packets counter packets 346 bytes 59136 reject with icmpx admin-prohibited
            counter packets 1154 bytes 235090
            tcp dport 8096 accept
        }

        chain forward {
            type filter hook forward priority filter; policy drop;
        }
    }
    The rule tcp dport 8096 accept comes at the very end of the list, after a rate limiting rule. This rule was intercepting my connection attempts, leaving me unable to reach the server remotely. (It didn't block the localhost connections because of the "allow from loopback" rule earlier in the stack.) To fix this, I just moved the 8096 accept rule higher up. This can either be done by editing the table directly in /etc/nftables.conf, or by lazily copying the rule to the top of the list with sudo nft insert rule inet filter input tcp dport 8096 accept (though this latter option won't be persistent).
    Pages (3): « Previous 1 2 3

    « Next Oldest | Next Newest »

    Users browsing this thread: 1 Guest(s)


    • View a Printable Version
    • Subscribe to this thread
    Forum Jump:

    Home · Team · Help · Contact
    © Designed by D&D - Powered by MyBB
    L


    Jellyfin

    The Free Software Media System

    Linear Mode
    Threaded Mode