March 5th, 2025

Tailscale is pretty useful

Fatih Altinok discusses using Tailscale for remote access to his Raspberry Pi, highlighting its VPN capabilities, features like Taildrop, and privacy partnership with Mullvad, while mentioning an open-source alternative, Headscale.

Read original articleLink Icon
CuriosityAppreciationSkepticism
Tailscale is pretty useful

Fatih Altinok shares his experience with Tailscale, a tool he recently started using to access his Raspberry Pi server remotely. Previously reliant on Dynamic DNS, he faced challenges due to Carrier-grade NAT, which made port forwarding impossible. Tailscale creates a virtual private network (VPN) that allows users to connect to their devices from anywhere using simple domain names. Although his Raspberry Pi struggled to run Tailscale, he found it effective for remote access. He highlights additional features such as exposing ports for web application testing, file transfer through Taildrop, and the ability to set up exit nodes for VPN-like functionality. Tailscale's partnership with Mullvad offers enhanced privacy, allowing users to exit through various countries without compromising anonymity. While he has only used Tailscale for personal projects on the free tier, he notes that enterprise plans are available. He encourages others to share their use cases and mentions an open-source alternative, Headscale, for those who prefer not to use Tailscale.

- Tailscale allows remote access to devices via a virtual private network.

- It offers features like Taildrop for file transfers and exit nodes for VPN functionality.

- The service has a partnership with Mullvad for enhanced privacy.

- Users can start with a free tier, with enterprise options available.

- An open-source alternative called Headscale is available for those who prefer it.

AI: What people are saying
The comments on the article about Tailscale reveal a mix of experiences and opinions regarding its use and functionality.
  • Many users appreciate Tailscale for its ease of setup and ability to bypass complex network configurations like CGNAT.
  • Concerns about security and trust in Tailscale's infrastructure are prevalent, with some users questioning the implications of relying on a non-self-hosted service.
  • Several users compare Tailscale to alternatives like WireGuard and ZeroTier, discussing their respective advantages and limitations.
  • Performance issues, particularly related to file transfer speeds and mobile device reliability, are noted by multiple commenters.
  • Users share various practical use cases, from remote access to home networks to facilitating work across distributed teams.
Link Icon 81 comments
By @apitman - 30 days
Tailscale is one of my favorite companies. They're clearly on to something. Here's a great post by their CTO explaining a lot of the motivation and vision behind it: https://crawshaw.io/blog/remembering-the-lan

IMO the main outstanding questions/concerns are:

* Is the VPN model really the way to go? If someone gets their hands on one of your Tailscale nodes, they can access every service on your tailnet, which are likely running with reduced security since that's a huge part of the appeal. This is exactly the situation BeyondCorps/Zero Trust was created to avoid. Tunneling services[0] are more of a Zero Trust approach, but they can't match the seamlessness of Tailscale once a node is connected to the tailnet.

* Can it expand into the layman market? I wonder if the average person will ever be willing to install a VPN app on all their devices. On the flipside, I could see TS partnering with someone like Google to integrate TS tightly with Android and set up a private network between all your Google-signed-in devices.

* The relay system - DERP is nice, but it's primarily intended for signaling/fallback. It feels like CGNAT adoption is growing faster than IPv6 is, and I wouldn't be surprised if fewer and fewer p2p connections succeed over time[1]. DERP forces everything over a single TCP connection (HOL blocking), and I'm not sure it even has any flow control.

* Use in web browsers - They got a demo of this working, but it's pretty involved. You have to compile the entire Tailscale Golang library to WebAssembly which is a large artifact, and it's DERP-exclusive.

* Portability in general - Depending on WireGuard, as awesome as it is, is fairly limiting. You either need admin privileges to create the TUN device, or you need to run an entire TCP stack in userspace alongside your own WireGuard implementation. I'd be interested to see something like Tailscale implemented on top of WebTransport.

[0]: https://github.com/anderspitman/awesome-tunneling

[1]: https://tailscale.com/blog/how-nat-traversal-works

By @iamdamian - 30 days
I'm curious to hear well-informed reasons from this crowd for why we can trust Tailscale given the non-self-hosted part of the architecture? Does it come down to Tailnet locks [1], not worrying that Tailscale will be compromised, not worrying that your home network is worth compromising, or something else?

[1]: https://tailscale.com/kb/1226/tailnet-lock

By @tsujamin - 30 days
The tailscale.com/tsnet package in Go [1] is really useful if you've not looked at it before: you can make single binary HTTP or whatever servers that are only exposed inside your tailnet.

Their golink project [2] is a good example (and useful itself), but I've used it to build "peer to peer" comms for one application, and to host an API and Svelte SPA to control some other things in a tailnet.

[1] https://pkg.go.dev/tailscale.com/tsnet

[2] https://github.com/tailscale/golink

By @Trumpi - 30 days
I was once in South Africa and needed to look up my prescriptions in the CVS app. I had lost my pills and needed to show a local pharmacist what I needed. CVS geoblocked me. Luckily I had a TailScale exit node running at home, which solved the problem.
By @EVa5I7bHFq9mnYK - 30 days
I remember Hamachi did the same as Tailscale in the 90s, we used it to play virtual LAN DOOM. Greed killed it.
By @simonw - 30 days
I used Tailscale the other week to solve a problem where a government website was blocking me from scraping it from GitHub Actions... so I ran an exit node on an Apple TV on my homework and configure the GitHub Actions worker to use that instead. Worked great! https://til.simonwillison.net/tailscale/tailscale-github-act...
By @aborsy - 30 days
Tailscale is not just a wrapper around Wireguard, as some people imply in the comments. The codebase is far bigger, and it does far more. They are different products.

What Tailscale does is difficult to do with Wireguard: Easy VPN, SSO with MFA, key distribution, static private IP for each node, peer to peer direct connectivity, split tunneling, fine grained access control rules down to per port and application, Wireguard over TCP, NAT transversal for devices behind firewall, central management, sharing nodes with others, DNS, file sending, routing rules (with exit nodes, subnet routers, “via”), key rotation, …

Wireguard connects peer A to peer B, and its simplicity stops there.

I found Tailscale to be a very good tool, that I extensively use.

My only concern is: what happens if their infrastructure is compromised at some point, like Okta’s? Assuming I have tail lock enabled.

By @9dev - 30 days
We’re using Tailscale for our internal network, and it’s amazing. We’re a team distributed across multiple countries, and with Tailscale, it’s like we’re sitting in a single office, connected to the same router. And on top of that, we get centrally managed ACLs for everyone, TLS certificates, and SSO with Microsoft accounts. Amazing stuff!

My main gripe, though, is DNS. It’s great to be able to reach prod-db-1, prod-db-2, and prod-db-3, tag them as „db“ and create a rule to allow TCP on db:5432. however, it’s annoying that all of this is supported, but not the obvious extension - DNS records for the tags, so I can point apps to a group of servers belonging to the same tag.

By @stego-tech - 30 days
I've harped on some Tailscale implementations before for what I perceived to be nonsensical or bad approaches, but this one is an excellent example of its capabilities. In no particular order:

* It's not reliant on port forwarding at your firewall

* It can get around bad ISP habits, like CGNAT or a lack of IPv6 (or IPv4)

* As the OP points out, it's broadly compatible with various forms of exit nodes

Straightforward and to-the-point. Great writeup.

By @erulabs - 30 days
Tailscale also allows you to issue valid TLS certificates (`tailscale cert`), which is crazy useful for certain local development tasks, EG developing SSO for a mobile application where the SSO provider mandates TLS and the mobile devices dont easily allow you to bypass self-signed certificates. They keep piling on awesome features, big fan.

The Tailscale k8s operator is also great.

By @smackeyacky - 30 days
My favourite use of tailscale:

I have a bluetooth gateway (Cassia X1000) in my workshop where I normally develop. I was at home doing some Android work at one point rather than at the workshop and needed to test some new Cassia functionality.

Tailscale exit node in the workshop.

Tailscale client on my linux dev laptop at home.

Started up the android emulator via Android Studio, connected to the Cassia via the app being debugged, debugged what I needed to, shipped it.

At the time it seemed like actual magic had happened.

By @jaxtracks - 30 days
The features here seem to be fairly standard with most the WireGuard based VPNs these days. For example, I use Nord for my use-case which is very similar to the author's. This allows me to rsync my home directory between my laptop, tablet, phone's Termux env, and desktop (all running Linux) to maintain configuration parity and file locality regardless of where I turn these devices on, so long as they have internet.

Does Tailscale have features that set it apart now that other VPNs have gotten the private mesh thing down pretty well?

By @andix - 30 days
And it's Canadian. Cool. We have a policy now that doesn't allow us to bring in new services from US companies.
By @finnjohnsen2 - 30 days
Tailscale is Canadian from what I can see, and not american. Which is a plus these days.
By @elevation - 30 days
Tailscale is becoming less useful as network providers become hostile to it.

Last week I noticed McDonalds guest wifi is blocking new connections over the tailscale control ports. It will pass wireguard mesh traffic for established sessions, but their firewall rules prevent you from establishing new ones.

By @DictumMortuum - 29 days
Also check out zerotier. I've been using it because it has a lot more features that tailscale (although it's been 4-5 years that I have the zerotier network set up).

Pretty damn useful to connect to services in my internal network wherever I go. I have it set up on my router, so I don't need to install it on every single server in the house :D

By @textlapse - 30 days
Also, their building up on top of a 'platform' is wonderful: funnel, exit nodes, sharing, ssh, drive etc.

I wonder if they can figure out a way to distribute compute eventually via their network (not just clunky ssh): 'my' storage is already shared with 'my' nodes, why not 'my' compute? :)

Seems like a great company/business.

By @globular-toast - 30 days
Is Tailscale useful if you don't have CGNAT? I solve the problem in the article using Wireguard on my router and a dyndns client.

In a way I think all these solutions just keep enabling IPv4 to continue and that sucks. Does Tailscale offer anything in an IPv6 world? Are they another company with an interest in stopping IPv6 progress?

By @bb88 - 30 days
I think for simple cases, it's great. If you have remote boxes somewhere that needs administration, it's awesome.

If you have more complex cases, the IPTables/Netfilter rules make it vastly more difficult to manage, particularly if you're running docker-compose (or anything using IPTables rules) on the same box and trying to troubleshoot the packets coming out of docker and going into tailscale.

And then trying to figure out what tailscale is doing with your packets is not great as well. They've also broken features I relied upon with a minor release.

Their nat traversal doesn't always work, as sometimes I get connected to a DERP server, so that limits the network speeds across the internet.

I blame CG-NAT quite a bit -- it's really why we can't have nice things these days -- and I get tailscale is trying to fix a bunch of that. But the reality is, I just want an interface just like eth0 or wl0, not an IT infrastructure to move my packets across.

By @buybackoff - 30 days
I used to expose my workstation RDP directly but with a non-standard port. Then I became a "homelabber", and paranoid, and added a mix of nginx with basic auth in front of Guacamole. The UX in browser is so abysmal that I used it to configure direct RDP when I really needed to work remotely when traveling. Then I learned Tailscale and it is really liberating. Just direct RDP with negligible (for me) risks. I run OneDrive, JetBrains Toolbox, Podman just visible in the tray and what else as services, such as OpenVPN, etc. I keep Tailscale running only when I travel. I think paranoia should stop at some point, yet I still read the top comment about security/trust very attentively.
By @p4bl0 - 29 days
When reading about this kind o use cases, I'm always really glad my ISP gets me static and dedicated IPv4 and IPv6 addresses along with a good fiber connection to the internet for less than 30€/mo.
By @smy20011 - 30 days
I use tailscale to build my personal podcast that include local weather and stocks I interested in. Running the whole pipeline on a steamdeck and use tailscale to securely delivery the generated podcast to my phone.
By @jd3 - 30 days
I tried using tailscale to share my hdhomerun prime tuners over the internet, but sadly, it doesn't seem to work due to Tailscale's lack of support for mDNS lookups[0][1]. You can't just forward the port b/c the hdhr device packets have a ttl of 1 hop (and, while you could change the ttl through iptables, that seems like a lot of trouble).

I can open a stream manually through http://192.168.1.189:5004/auto/v600 while connected to tailscale (w/ my apple tv in-home as an exit node) on my laptop outside of the house, but when I open the HDHR/Channels apps, they can't detect the HDHR tuner itself.

Apparently this "just works" with openvpn, so I've been thinking about just switching back to that.

[0]: https://github.com/tailscale/tailscale/issues/1013

[1]: https://old.reddit.com/r/HDHR/comments/z8byns/watching_remot...

By @gerdesj - 30 days
VPNs are complicated and its rarely a case of one is better than another.

Tools for the job, should be our watchword ... phrase 8)

IPSEC is somewhat old school but very solid - if you can do opportunistic IPSEC via DNS etc it can be rather nifty. You can also use FRRRRRRRRRRRR to do it routed. IPSEC with BINAT can be used to avoid issues involving duplicate network addressing.

I default to IPSEC for site to site links.

OpenVPN is more TCP/IP related compared to IPSEC - that's very simplified. You can easily set an IP address for a client and other niceties.

OpenVPN is superb for massive client deployment. If you have a central CA and can deploy certs on all devices eg via MS AD CA then you can use a single config file for all clients, which is a doddle to deploy via GPO.

Tailscale is the new kid on the block. As with all new kids you need to examine what works for you and you could be one person or an entire multi national.

The real world is rather messy. For example your home/office/corp network will almost certainly have a MTU of 1500 bytes. When you hit the internets it gets really messy. Some British Telecom links (for example) will support mini jumbo frames and some won't and the real world continues to get more and more complicated.

By @pierluc-works - 30 days
Does anyone have some insight why installing security/tailscale on freebsd is installing security/ca_root_nss which contains a very scary message?

https://github.com/freebsd/freebsd-ports/blob/ec981e26cd3128...

By @KronisLV - 30 days
I previously used WireGuard and for a bit tried just having an SSH tunnel with autossh, but in the end just settled on using Tailscale, because it doesn’t ask me to manually manage the keys and also doesn’t drop around every 30 minutes for a bit and doesn’t need weird hacks to expose ports for my Docked network traffic.

That said, what messed with me greatly was the fact that Tailscale seems to have an MTU of 1280 whereas Docker by default had 1500 which lead to inexplicably dropped overlay traffic with nonsensical log messages in my reverse proxy web server.

Basically, I had to delete docker_gwbridge and recreate it with some specific options: https://docs.docker.com/engine/swarm/networking/#customize-t...

It was quite the mess. I have no idea why Docker couldn’t just figure out that it needs the smaller MTU by itself, cause it listens for the Swarm on an interface that’s related to Tailscale and it can see what MTU that has.

Still, Tailscale in of itself is pretty nice.

By @etc-hosts - 30 days
I selfhost tailscale with headscale, I used a helm chart in a k8s cluster, works great.

I ran into a corporate network recently that blocked the Tailscale DERP servers.

By @sneak - 30 days
You can do all of this stuff with Nebula (from slack oss), without some centralized service. I use it on all my computers and it works great.
By @freetime2 - 30 days
I'm thinking about exposing some services outside of my LAN, and wondering whether it would be better to go with Tailscale or Cloudflare Tunnel. [1]. At a high-level both solutions seems pretty similar, with a client service running on the machine you want to share.

My sense is that tailscale makes sense for a more locked-down service that is not accessible to the general public (although they do have a way to open up access to the world [4], it felt like more of a temporary thing than a permanent solution when I was looking into it).

And Cloudflare is more for exposing a service to the world, with support for a custom domain name, DDoS protection and other IP blocking feaures, etc. Cloudflare does have a "Zero Trust Network Access" product that I think might offer similar functionality to Tailscale, but honestly pretty hard to tell what it does from their website or how hard it would be to set up.

They both have free tiers that are pretty generous for "homelab" use cases. [2][3]

Does that sound pretty much correct? Are Tailscale and Cloudflare competitors with a lot of overlapping functionality? Or are they mostly distinct products serving different use cases/markets?

[1] https://developers.cloudflare.com/cloudflare-one/connections...

[2] https://tailscale.com/pricing

[3] https://www.cloudflare.com/plans/

[4] https://tailscale.com/kb/1223/funnel

By @LinAGKar - 29 days
Tailscale is also crazy unreliable in my experience, at least on Android. It had to be force quit and restarted every day, and even outside of that apps would randomly get connection errors. And they don't seem to care about bug reports. I ended up switching to regular Wireguard, which has since been perfectly reliable.
By @sixothree - 30 days
I have nothing but performance issues with tailscale. On both my iPhone and my iPad it _destroys_ my battery. It uses some 40+ hours of background time in just a few days. On my PC whenever I come back home and tailscale was running, everything is out of memory and not running correctly.

That's my experience. I wish it was better.

By @raaron773 - 30 days
Tailscale is great but one thing i dont like about it is that i cannot re-use ip addresses. This feature is offered by ZeroTier it can be very useful if for some reason you have to format and re-install os and everything.. Unfortunately, i cannot use zerotier because the speed i get over it is terrible
By @porridgeraisin - 30 days
I use it extensively as well.

- My home PC, my laptop, and my phone are the participants.

- My home PC is connected to a GPU, and runs a colab runtime, SSHD, as well as a simple http file server in $HOME (actually, C:/Users/username, its windows)

- My laptop doesn't have an NVIDIA GPU, so it just runs SSHD and a file server.

- My phone serves nothing, but has an SSH client, and a http client obviously.

There is simple hostname based DNS setup by tailscale automatically, so I can just go to http://laptop:8000 to access all my files, or just ssh to username@computer

Accessing everything from everywhere is absolutely great. And this is all on their free tier.

Unrelated to tailscale, I use parsec for a similar solution for remote desktop, their "machine level user" feature allows me to initiate remote desktop from certain client devices directly.

Too smooth.

By @yegle - 30 days
CGNAT _can_ make it easier to access your server.

If your Internet provider and your mobile provider is the same company, they could put all your connected devices in the same IP block within the CGNAT IP range.

Now, not only you can access your device at home while away using your cellphone, you can also connect to your partner's phone with the same IP address at (or away from) home.

Some Internet providers in China very recently started providing this service, e.g. https://www.chiphell.com/thread-2666772-1-1.html (in Chinese). In addition to the convenience of accessing your home server while on the go, they also make the traffic within the CGNAT free.

By @MasterYoda - 30 days
Is there any simple FOSS alternative to tailscale that you can self-host?

The only thing I need is to simply connect to the home network and I dont want to need to open and forward ports etc in routers and firewalls for it to work, just something simple plug and play and is secure.

By @valcron1000 - 30 days
I have to point out that their online videos are amazing to leaen how to quickly set up certain features like SSH. In less than 5 minutes I had VSCode on a Macbook Air connected to my desktop machine running Linux on a completely different network.
By @boldlybold - 30 days
Tailscale is great. I put my whole company on it shortly after joining (we had some servers with RDP exposed to the internet...). It has had ~0 problems in the last year, and non-technical people are able to use it with ease.
By @CharlesW - 30 days
Networking SmartFriends: Is port forwarding intrinsically a bad idea (as compared to using Tailscale Funnel) from a security perspective if I want to expose, say, a Plex server running on my NAS to the outside world?
By @sunshine-o - 29 days
The main advantage of Tailscale for most is it allows to avoid having a fixed IP address/DNS, and keep all ports closed.

As long as you trust them this really give you a lot of security at a very low cost.

By @_jsdp - 29 days
- Install & authenticate on all your machines

- Boom, everything works

- Internet? feels like local-net

This is just brilliant tech. Thank you so much for building this guys and the amazing effort that goes behind it everyday

By @ziofill - 29 days
I love tailscale! I am now on vacation and all my devices can still use pihole running on a raspberry pi at home on the other side of the world. And it was trivial to set up!
By @thomastjeffery - 30 days
In other words (they do get to this point right away), port forwarding is pretty useful, and most of us don't have it anymore.

I'm sick and tired of the way ISPs treat us. It's literally written into my lease what company I will pay for internet, and how much I will pay them. It is not, however, written in my lease how fast the connection will be. Not only am I unable to forward ports, I can't even change my own WiFi password! Sure, I could make a fuss and probably obtain access to my router, but it isn't worth the hassle.

But why is there a hassle to begin with? How in the hell is it in anyone's interest to keep me from configuring my own router? I can come up with plenty of authoritative bullshit answers to this question, but they are all authoritative bullshit. I think that's the real answer: we have systemically built our society to operate on authoritative bullshit. sigh

Tailscale is a usable workaround, but it shouldn't exist. It shouldn't need to exit. I just want to be able to host a server. Is that really so much to ask?

By @forty - 30 days
Does it have "entry nodes" ? For exemple if I wanted to receive emails on my server while my home connection does not have an open port 25.
By @cmstoken - 29 days
Site looks down. Archive link: https://archive.is/OtRtF
By @jpgvm - 29 days
We recently did a pretty big rollout of Tailscale and tbh I am presently surprised with how well it works. Between subnet routing to our bare metal stuff and the Kubernetes operator, especially the ability to expose services to the Tailnet has been a big win.

I was a doubter a bit as to how it would work at a bigger org but so far rock solid, easy to setup and great user experience.

By @scottfits - 30 days
super useful, at airgarage we have a network of license plate readers deployed around the country and tailscale is a game changer for remote access and debugging. https://www.airgarage.com/capabilities/license-plate-recogni...
By @jFriedensreich - 29 days
I really love tailscales offering but the performance was just significantly worse compared to cloudflare.one to the level of switching back and biting the bitter pill of fully depending on orange cloud for everything as well as having sub par usability compared to tailscale or even the rest of cloudflare.
By @aristidesfl - 23 days
Open source alternative: https://netbird.io/
By @pkulak - 29 days
I set up a Wireguard tunnel into my home network years ago, before Tailscale was really a thing, and I always wonder if I should switch, but I can never make the effort worth it in my head. If I was starting all over, I'd go Tailscale for sure, but a single tunnel really gets me 99% of the way there.
By @sotix - 30 days
I don’t understand why one would use Tailscale over WireGuard. Is it because it’s easier to setup sort of like how Dropbox was? I’m primarily wary of the rug being pulled out and Tailscale suddenly costing me a lot of money whereas my WireGuard setup seems more stable in the long term.

Or is there more to it that I’m missing?

By @ctm92 - 30 days
Tailscale is super awesome, I was amazed when I first set it up that it just worked out of the box. It can be set up by everyone without having to expose ports on the router (something that is often not even possible anymore due to CGNAT), so you get a lot of convenience without giving up security
By @etra0 - 30 days
I work +1000km away from home, and I work by shifts, tailscale has helped me a lot on running stuff back at home.

I was even able to stream my games through the tunnel with a (decent enough) latency of 27ms with variance of 2ms.

Admittedly, I could buy a gaming laptop, but I don't want to carry a heavy laptop 4 times a month :P

By @jerryoftheyear - 30 days
I absolutely love Tailscale, it's been a game changer for accessing my home gear from anywhere.
By @Nemo_bis - 29 days
> I know its local IP address and can ssh into it easily when I’m home, but when I’m outside, that’s not possible as it’s not exposed to the internet.

I never understood this problem. I just create a Tor hidden service when I want to ssh into a machine behind a firewall.

By @sheepscreek - 30 days
Been using it since the early days and it has become a core tool in my arsenal. Tailscale along with 5G and RDP or Parsec means I have access to my powerful home server and primary dev machine no matter where I am. Can even access it on my iPhone (only RDP).
By @juped - 30 days
I kind of have a mental block around Tailscale even though it would be useful in some cases for me, because the name "Tailscale" instantly trips all my snake oil trauma responses. Can't they call it "Weyergourd" or something?
By @ezekg - 30 days
> I have used Tailscale only for personal reasons so far, using the free tier; they have enterprise plans for enterprise use cases that I have no idea about.

Does anybody know of any good materials on the enterprise use cases and configs? e.g. blogs, screencasts, etc.

By @laidoffamazon - 30 days
I love tailscale, but the performance overhead on file transfer (my primary use case for it) is very real.

Samba transfers take a 15 megabyte per second hit over tailscale even with a fairly fast CPU on both ends (Ryzen 3600 and Ryzen 7900X3D) on my local network

By @datadeft - 30 days
It is one of the tools I use as well and I pay for it. It makes life so much easier. At work we have to test a lot of country dependent settings and with TS and Mullvad is is very simple. I can also access my home network easily.
By @drio - 28 days
For those using WireGuard directly: What techniques do you use to establish connections when behind network infrastructure that blocks all UDP traffic?
By @melson - 29 days
We can also try to selfhost this https://github.com/openp2p-cn/openp2p
By @yamrzou - 30 days
Is there an alternative to Tailscale with a lower memory footprint? I wanted to run Tailscale on a small router, but it failed due to out-of-memory (OOM) issues.
By @ydnaclementine - 30 days
> it’s no longer possible thanks to a cursed thing called CGNAT

as someone who does publicly expose services that have auth, why does CGNAT make exposing ports publicly bad?

By @stpedgwdgfhgdd - 29 days
By @ur-whale - 29 days
I am curious: what does tailscale offer that wireguard doesn't in the first place?
By @xyst - 30 days
I like tailscale as a replacement for the dogshit enterprise VPNs I have had to use in the past (looking at you, ZScaler). But for personal/single home use it’s overkill.

I used to run a WireGuard server on a raspberry pi with ddns to update dns record on an as needed basis.

Eventually replaced it with my gateways built in WireGuard server which also has ddns enabled

The use cases described by the author are taken care of with a simple wg server. Sure you don’t get the distributed peer network of tailscale but I can live without that.

By @ronef - 30 days
To add on to this, more than just useful, incredible team building it!
By @unixpickle - 30 days
This should just be called "why VPNs are useful", i think?
By @kortilla - 30 days
> But my old Raspberry Pi was too weak to run it, so I ended up uninstalling it, and unrelatedly my pet project grew out and has its place in the cloud now.

It’s incredible how shitty modern software is that a raspberry pi couldn’t run a basic VPN.

If any tailscale devs see this you should try to reproduce this issue and use it as an opportunity to clean up a bunch of dumb assumptions that likely hurt real users as well, just through less direct means like battery consumption and slower overall performance.

By @ramses0 - 30 days
See also Nebula:

https://nebula.defined.net/docs/

https://nebula.defined.net/docs/guides/quick-start/

...I believe 100% open source. You can basically hub between different devices (including iOS/Android) that are identified via certs. Recommended to have one or more public "lighthouses" so anything that can reach a lighthouse can reach any of your other servers (maybe kindof "syncthing for vpn/overlay-network?").

I've dorked around with it a little bit, but it's rare enough that I need access to my home network while out that I haven't doubled down on proper cert, key management, rotation, etc.

By @high_byte - 30 days
tailscale to expose a port is such overkill. just use ngrok for that.