←back to thread

319 points SpaghettiX | 1 comments | | HN request time: 0s | source
Show context
mmettler ◴[] No.30284777[source]
If you like this, you’re gonna love Tailscale https://tailscale.com/
replies(1): >>30285090 #
beckler ◴[] No.30285090[source]
I love Tailscale, but it’s not really designed for public tunnels. You can do it, but you typically need to provision some kind of proxy with a static IP (most likely cloud based) to handle your public stuff.
replies(1): >>30285351 #
jatone ◴[] No.30285351[source]
what do you mean by public channels? if I was trying to ssh into my machines it works wonderfully for dns resolution.
replies(3): >>30285701 #>>30290509 #>>30290724 #
password4321 ◴[] No.30285701[source]
Cloudflare tunnels expose ports publicly.

Tailscale must be properly configured on your client machine to access machines/ports on their respective private Tailscale network(s), setup of which typically requires administrative intervention. Without bridging to a public network, services exposed to the Tailscale network are not accessible publicly.

Tailscale does offer user-mode clients so it can be used similarly to SSH by those allowed to connect (I don't know how difficult user-mode Tailscale is without admin setup on various operating systems).

replies(1): >>30288044 #
jatone ◴[] No.30288044[source]
not sure where you're getting the idea you need admin intervention for tailscale. I've never needed to do anything beyond authenticate the machine with my account. tailscale has NAT traversal built into it.

If your network firewall is preventing the tunneling process, then that's on you. and if its not on you and its a company decision then its VERY unlikely they'd be okay with cloudflare's publicly exposed ports.

replies(2): >>30290687 #>>30291733 #
pmarreck ◴[] No.30290687{4}[source]
tailscale user here.

the tailscale devices you see are only accessible by other devices on the same tailscale network.

S/he's talking about accessing those machines from OUTSIDE that network. That's what would require admin intervention. So for example if I have a webserver on my home LAN that has Tailscale installed and authenticated, then sure, I can access that webserver from any of my other Tailscale devices from anywhere. But if I want a friend to be able to access that webserver without first being authenticated to the Tailscale network... Do you see the problem, yet?

replies(1): >>30290996 #
1. jatone ◴[] No.30290996{5}[source]
I clearly understand that problem. but I'm just going to assert its not what you actually want. nor is it related to accessing ssh where you most definitely don't want to expose the port.

for starters, what you're describing is a load balancer. those already exist and are trivial to setup.