The Basics
Nextcloud Server version (e.g., 29.x.x):
Nextcloud Hub 10 (31.0.9)
Operating system and version (e.g., Ubuntu 24.04):
Debian 12 (host system)
Web server and version (e.g, Apache 2.4.25):
Nextcloud AIO integrated web server (uses Apache in container)
Reverse proxy and version (e.g. nginx 1.27.2):
Nginx Proxy Manager v2.12.6 (intern nginx version: openresty/1.27.1.2)
PHP version (e.g, 8.3):
PHP 8.3.25 (in Nextcloud AIO container)
Is this the first time you’ve seen this error? (Yes / No):
Yes
When did this problem seem to first start?
After initial setup of Nextcloud Talk behind Nginx Proxy Manager
Installation method (e.g. AlO, NCP, Bare Metal/Archive, etc.):
AIO (All-in-One Docker)
Are you using Cloudflare, mod_security, or similar? (Yes / No):
No
Summary of the issue you are facing:
Nextcloud Talk signaling server (/standalone-signaling/spreed
) is not reachable from outside when running behind Nginx Proxy Manager.
Custom location blocks in Nginx Proxy Manager cause the proxy host to be marked as offline.
Without custom blocks, WebSocket upgrades for /standalone-signaling/spreed
are not forwarded correctly.
The signaling server runs in the nextcloud-aio-talk
container on port 8081, but this port cannot be configured directly in Proxy Manager.
Steps to replicate it (hint: details matter!):
- Install Nextcloud AIO on Debian 12 as Docker Image
- Set up Nginx Proxy Manager as reverse proxy, forwarding to Nextcloud AIO on port 11000.
- Enable “Websockets Support” in Nginx Proxy Manager.
- Try to use Nextcloud Talk from outside.
- Optionally, add a custom location block for
/standalone-signaling/spreed
in Nginx Proxy Manager (host will be marked offline). - Without custom block, WebSocket connections to
/standalone-signaling/spreed
fail.
Log entries
Nextcloud
No relevant errors related to signaling server in Nextcloud logs.
Web Browser
WebSocket connection to /standalone-signaling/spreed
fails (can provide browser console/network output if needed).
Web server / Reverse Proxy
No relevant errors in Nginx Proxy Manager logs. Can provide logs if needed.
Additionally:
My main concern is to ensure true end-to-end encryption (E2EE) for Nextcloud Talk.
Currently, all communication appears to be only transport-encrypted, and there is no indication in the Talk client, desktop app, or web interface that 1:1 chats and calls are protected by more than just transport encryption.
I would like to resolve this issue or at least understand why, despite having encryption enabled in the admin panel and all headers configured correctly, I do not have real E2EE.
If there are any additional steps required to activate or verify end-to-end encryption for 1:1 chats and calls in Nextcloud Talk, or if there are known limitations in the current setup (AIO behind Nginx Proxy Manager), I would appreciate any guidance or clarification.
Thank you!