#tailscale

Gerard Braadgbraad
2025-06-18

Not sure why people think Windows 10 + open shell is better. I ran win11 and only opened

- windows terminal
- WSL with my image
- sessions to server(s)
-
-
-
- dopus
- my own clock widget

And they were started from pinned icons on the taskbar.

I hated the experience on Windows because of the frequent reboots it performs to keep you up to date.

2025-06-17

I'm co-hosting Tailscale's 1st L.A Community Meetup in L.A this July. Please stop by if you are interested in Tailscale, meeting new friends and or just wanted to talk Tech! We are also looking for speakers tailscale.com/events-webinars/ #tailscale #networking

2025-06-17

I'm calling it now: #tailscale funnels as a replacement for skids using ngrok and random ddns services coming to an XWorm incident near you!

hachyderm.io/@tailscale/114699

#infosec #threatintel

2025-06-17

Tailscale Funnel = share local services with the world, on your terms. 🌍👨‍💻 Working on a web app on your laptop and want to show a friend? Instead of deploying, just enable Funnel and give them a URL. Secure, no config nightmares.
tailscale.com/kb/1223/funnel
#Tailscale #Funnel #dev

2025-06-16

@tailscale lets you securely access services from *any* device – iPhone, iPad, android, laptop! 📱💻 #Tailscale #security #crossdevice youtu.be/byr434VBeFk

2025-06-15

I can't be the only #tailscale user in the world who wants to automatically provision tailnet machines via cloud-init without having to manually create an auth key for each one, can I? That feels wildly improbable. I'm surprised there's no documented way to do this with some kind of OIDC

This is, like, *almost* there. tailscale.com/kb/1293/cloud-in

2025-06-15

#Tailscale can hide your location on the web by using an exit node, but it doesn't do so by default. When you configure an exit node, your internet traffic appears to originate from the exit node's location, effectively masking your true IP address.

2025-06-14

I'm travelling and my #tailscale connected #jetkvm has gone offline after about a week. The microcomputer it's connected to is still online on Tailscale and I can connect to it via ash. Any ideas?

Alejandro Baezzeab@fosstodon.org
2025-06-14

I have definitely used session expiration to force relogin. 🫠 When delaying with legacy systems, it's the best we can get for token exposure scandals. 🙃

Excellent article from #tailscale on what could be better ways for auth.
tailscale.com/blog/frequent-re

GripNewsGripNews
2025-06-13

🌕 頻繁重新驗證並不能提升您的安全性
➤ 告別無效的登入提示,擁抱更智慧的安全解決方案。
tailscale.com/blog/frequent-re
本文探討了頻繁要求使用者重新驗證身份的安全性措施是否真的有效。作者指出,頻繁登入不僅會打斷工作流程、讓使用者感到沮喪,反而可能降低安全性。文章認為,更智能、即時的存取管理方式,例如設備狀態檢查和基於SCIM的存取控制,能在不造成使用者困擾的前提下,提供更強大的安全保障。
+ 我一直覺得頻繁登入很困擾,沒想到這竟然會降低安全性,真是出乎意料!
+ 這篇文章分析得很透徹,讓我對網路安全有了更深入的瞭解,也讓我更欣賞Tailscale的設計理念。

I'm currently playing around with #tailscale , to be more specific with #subnet #routers. It's quite fun actually. I've #OpenWRT installed on a #RaspberryPi 4B and on that I installed Tailscale. Then I set up the interface and a firewall rule. Over an SSH connection I started Tailscale and enabled alle the cool stuffz, e.g. subnet routes, exit node, etc.
Now I can ping stuff in my tailnet from devices without tailscale and in the opposite direction!

#homelab

An image of my networking setup. All the gear lays on my wooden desk. The Raspberry Pi is turned on its side. A USB-Wifi-Adapter is connected to it (offering an access point). It is powered over Ethernet. The HAT for PoE+ is installed in a way it is barely visible on the image. The Pi is connected to a Switch, which is connected to power. It is a 5 Port 2.5GbE PoE+ switch. The cable connecting the Pi is blue. Another cable is connected to the switch and a USB-Dock. This cable is orange and longer.
2025-06-12

Dazu dann das ganze direkt an den neuen #JetKVM angeschlossen, der gestern auch eingetrudelt ist. Super kleines und ebenfalls günstiges Teil wenn man kein IPMI o.ä. hat! Wird per USB-C mittels Y-Kabel mit Strom und USB am zu steuernden Rechner verbunden, Mini-HDMI auf HDMI anschließen und zack hat man kompletten Durchgriff. Dazu wird das Ding OSS entwickelt und bekommt noch neue Funktionen. Wenns fertig konfiguriert ist, kommt noch #tailscale drauf für Remote Wartung und dann ab dafür.

Denis Evsyukov 🃏denis@evsyukov.org
2025-06-12

The access restoration experiment was successful.

Since the #Cloudflare #Tunnel stopped working from the home network, I simply created #Tailscale serve in my Tailnet. And then on a foreign server launched Cloudflare Tunnel, which is terminated for a domain in Tailnet.

Yes, an extra link appears. But the main thing is that it was possible to restore the work of the Gotosocial server on owl capacities.

2025-06-12

Subnet routers · #Tailscale Docs
"Devices like printers often lack the capability to run Tailscale, and in large environments such as AWS VPCs or legacy networks undergoing gradual modernization, installing clients on every endpoint becomes impractical.

Subnet routers bridge this gap by functioning as gateways that relay traffic between your tailnet and conventional subnet-based networks. They maintain Tailscale's security model by respecting access control policies while extending connectivity to non-Tailscale devices. This approach offers a practical balance between security and connectivity requirements"
tailscale.com/kb/1019/subnets#

Hi it's Kylie 🫀Kylieeee
2025-06-11

Anybody know how long it takes Tailscale enterprise sales team to respond? I would have thought they wanted to make money but silence.

IDaridar
2025-06-11

@jws right, everything is working great, as usually (1st incident in ¿2 years using it?)

MediaTechMergelab
2025-06-11

🚀 Just dropped a new video!

🔐 Learn how to securely access your devices using RustDesk over Tailscale — no public relays, just fast, encrypted point-to-point connections.
🎥 Watch here: youtu.be/30BVmEWrA0k?si=KsHROD
👨‍💻 Perfect for remote workers, IT pros, and homelab enthusiasts.

Matthias :veritrek_red:Mpwg@hachyderm.io
2025-06-11

@tailscale When i Click "Sign in with apple" on tailscale.com, i get this error:
Error 500
no auth service found
Other Auth services work
#Tailscale

2025-06-11

Dropserver Progress update for May 2025:

olivierforget.net/blog/2025/dr

I fiddle with Headscale and Ionscale, the open source alternative backplanes to #Tailscale to see if there is anything preventing them from working with Dropserver. A bit of a rough road there.

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst