node-connect
Original:🇺🇸 English
Translated
Diagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps. Use when QR/setup code/manual connect fails, local Wi-Fi works but VPS/tailnet does not, or errors mention pairing required, unauthorized, bootstrap token invalid or expired, gateway.bind, gateway.remote.url, Tailscale, or plugins.entries.device-pair.config.publicUrl.
2installs
Sourcesteipete/clawdis
Added on
NPX Install
npx skill4agent add steipete/clawdis node-connectTags
Translated version includes tags in frontmatterSKILL.md Content
View Translation Comparison →Node Connect
Goal: find the one real route from node -> gateway, verify OpenClaw is advertising that route, then fix pairing/auth.
Topology first
Decide which case you are in before proposing fixes:
- same machine / emulator / USB tunnel
- same LAN / local Wi-Fi
- same Tailscale tailnet
- public URL / reverse proxy
Do not mix them.
- Local Wi-Fi problem: do not switch to Tailscale unless remote access is actually needed.
- VPS / remote gateway problem: do not keep debugging or LAN IPs.
localhost
If ambiguous, ask first
If the setup is unclear or the failure report is vague, ask short clarifying questions before diagnosing.
Ask for:
- which route they intend: same machine, same LAN, Tailscale tailnet, or public URL
- whether they used QR/setup code or manual host/port
- the exact app text/status/error, quoted exactly if possible
- whether shows a pending pairing request
openclaw devices list
Do not guess from .
can't connectCanonical checks
Prefer . It uses the same setup-code payload Android scans.
openclaw qr --jsonbash
openclaw config get gateway.mode
openclaw config get gateway.bind
openclaw config get gateway.tailscale.mode
openclaw config get gateway.remote.url
openclaw config get gateway.auth.mode
openclaw config get gateway.auth.allowTailscale
openclaw config get plugins.entries.device-pair.config.publicUrl
openclaw qr --json
openclaw devices list
openclaw nodes statusIf this OpenClaw instance is pointed at a remote gateway, also run:
bash
openclaw qr --remote --jsonIf Tailscale is part of the story:
bash
tailscale status --jsonRead the result, not guesses
openclaw qr --json- : this is the actual endpoint the app should use.
gatewayUrl - : this tells you which config path won.
urlSource
Common good sources:
- : same Wi-Fi / LAN only
gateway.bind=lan - : direct tailnet access
gateway.bind=tailnet - or
gateway.tailscale.mode=serve: Tailscale routegateway.tailscale.mode=funnel - : explicit public/reverse-proxy route
plugins.entries.device-pair.config.publicUrl - : remote gateway route
gateway.remote.url
Root-cause map
If says :
openclaw qr --jsonGateway is only bound to loopback- remote node cannot connect yet
- fix the route, then generate a fresh setup code
- is not enough if the effective QR route is still loopback
gateway.bind=auto - same LAN: use
gateway.bind=lan - same tailnet: prefer or use
gateway.tailscale.mode=servegateway.bind=tailnet - public internet: set a real or
plugins.entries.device-pair.config.publicUrlgateway.remote.url
If :
gateway.bind=tailnet set, but no tailnet IP was found- gateway host is not actually on Tailscale
If :
qr --remote requires gateway.remote.url- remote-mode config is incomplete
If the app says :
pairing required- network route and auth worked
- approve the pending device
bash
openclaw devices list
openclaw devices approve --latestIf the app says :
bootstrap token invalid or expired- old setup code
- generate a fresh one and rescan
- do this after any URL/auth fix too
If the app says :
unauthorized- wrong token/password, or wrong Tailscale expectation
- for Tailscale Serve, must match the intended flow
gateway.auth.allowTailscale - otherwise use explicit token/password
Fast heuristics
- Same Wi-Fi setup + gateway advertises ,
127.0.0.1, or loopback-only config: wrong.localhost - Remote setup + setup/manual uses private LAN IP: wrong.
- Tailnet setup + gateway advertises LAN IP instead of MagicDNS / tailnet route: wrong.
- Public URL set but QR still advertises something else: inspect ; config is not what you think.
urlSource - shows pending requests: stop changing network config and approve first.
openclaw devices list
Fix style
Reply with one concrete diagnosis and one route.
If there is not enough signal yet, ask for setup + exact app text instead of guessing.
Good:
The gateway is still loopback-only, so a node on another network can never reach it. Enable Tailscale Serve, restart the gateway, run openclaw qr again, rescan, then approve the pending device pairing.
Bad:
Maybe LAN, maybe Tailscale, maybe port forwarding, maybe public URL.