Most active commenters
  • jaywalk(10)
  • (10)
  • ncmncm(9)
  • ignoramous(9)
  • anderspitman(8)
  • rhuber(8)
  • nickysielicki(8)
  • depingus(7)
  • RobertRoberts(7)
  • PLG88(6)

Tailscale raises $100M

(tailscale.com)
854 points gmemstr | 465 comments | | HN request time: 4.463s | source | bottom
1. mywaifuismeta ◴[] No.31260118[source]
Nice charts without axes. I use those all the time. Especially in pitch decks.
replies(1): >>31260160 #
2. RobertRoberts ◴[] No.31260159[source]
This sounds just creepy that they are suggesting no more anonymity on the internet... as a "fix".
replies(1): >>31260216 #
3. nix23 ◴[] No.31260160[source]
I use them in benchmarks too!
4. joshbaptiste ◴[] No.31260172[source]
"To paraphrase Larry Wall, Tailscale makes easy things easy" .. Indeed, I run multiple devices via two regionally separated homes and two cheap VPS's .. RaspberryPi, Linux, MacOS and an iPhone all able to communicate effortlessly thanks to TS
replies(1): >>31267812 #
5. jaywalk ◴[] No.31260216[source]
What a strange and utterly incorrect way to interpret Tailscale's mission.
replies(2): >>31260321 #>>31260346 #
6. newhouseb ◴[] No.31260241[source]
Tailscale is my favorite (product) discovery of 2022. I initially set it up to use as a VPN to get around a misbehaving corporate firewall and accidentally realized it solved a whole bunch of other problems I didn't realize I had. Usually a new product doesn't even live up to the intended use case and so TS is really anomalous IMHO in how good it is.

- SSH'ing into a raspberry pi I have at home that does random IoT stuff.

- Accessing servers on my local dev machine from other devices for testing (i.e. a Windows box or phone)

- Giving access to production bastion devices without publicly exposing anything to the internet.

And best of all I don't have to fiddle with the usual networking stuff. It just works. Kudos on the raise!

Non-disclaimer: I have no relation to anyone on the team. Tailscale is just a delight to use.

replies(7): >>31260474 #>>31260520 #>>31260544 #>>31262926 #>>31263894 #>>31264845 #>>31265249 #
7. HWR_14 ◴[] No.31260248[source]
I know it was supposed to be a funny throwaway line, but I am irked by the "with $100 million you could interrupt the Super Bowl for 7 full minutes." That's not how sports advertising runs works. You are bidding on a limited amount of space determined by the game. I think there is also a non-linear cost.
replies(1): >>31260345 #
8. pilif ◴[] No.31260250[source]
With such a huge investment comes the obligation to eventually pay it back. Is this another one of my favourite tools going the way of Dropbox, 1Password and all other companies that were formed around what should be a platform feature, which took on way too large investment sums and were eventually forced to become the everything, losing sight of their core values?

I sincerely hope not, but there's so much bad precedent.

replies(6): >>31260318 #>>31260351 #>>31260537 #>>31260737 #>>31261295 #>>31264059 #
9. eadmund ◴[] No.31260261[source]
> For people who believe there’s a catch — and most still do — then I don’t know how to write a blog post or hire a marketing or sales team to change their minds.

I think the catch is that (at least at the free level) one must trust an identity providers. For many companies that's probably fair enough, but for high-security companies and private individuals one absolutely cannot trust anything running outside of one's physical control. Service providers can be suborned, either legally by corrupt regimes or illegally by employees. There is no way that I would permit Google, Microsoft or GitHub (their three supported options) to gate access to my private devices.

I think that one must also trust Tailscale themselves, although I could be wrong about that.

replies(3): >>31260411 #>>31260441 #>>31260476 #
10. tosh ◴[] No.31260267[source]
Great product. One of the very few that "just works" and "gets better all the time".
replies(1): >>31260370 #
11. boesboes ◴[] No.31260274[source]
For anyone else who wonders wtf tailscale is:

> Tailscale is a VPN service that makes the devices and applications you own accessible anywhere in the world, securely and effortlessly. It enables encrypted point-to-point connections using the open source WireGuard protocol, which means only devices on your private network can communicate with each other.

It seems to take care of key distribution, nat-traversal, authentication etc etc

Neat! No sure how that is 'fixing internet' exactly, but really cool anyway

replies(8): >>31260403 #>>31260446 #>>31260650 #>>31260654 #>>31260970 #>>31261908 #>>31268396 #>>31268813 #
12. capableweb ◴[] No.31260291[source]
> We’re here to fix the Internet

That's such a broad "mission statement" that I wonder if it's effective at all. I mean, what SaaS wouldn't say that they fix something with the internet? That's to whole reason for online businesses solving one or another problem.

How could that statement help them guide their implementations of various solutions?

replies(3): >>31260340 #>>31260525 #>>31261113 #
13. bambax ◴[] No.31260304[source]
I read almost all of TFA (started to jump paragraphs near the end) and still couldn't figure out what it was or did, even after being told, repeatedly, that they "make easy things easy".

Apparently, it's a VPN.

replies(2): >>31260497 #>>31261386 #
14. RL_Quine ◴[] No.31260309[source]
Unfortunately despite claiming that they would, they've never allowed their iOS application to allow configuration of the control server (every other client they have released does). Maybe some more funding will allow them to focus on the client quality.
replies(2): >>31260425 #>>31261502 #
15. gowld ◴[] No.31260318[source]
> should be a platform feature

OK, but it's not. Now what? Do we just live without until the platform overlords provide it, or does someone build it on top of the platform?

What even is the "platform", when my Android phone is connecting to my iPad and my Windows laptop and Linux desktop and Amazon cloud server?

$100M = ~$0.20 / computer user in US and western Europe (wealthy countries in connected software markets)

16. Lightbody ◴[] No.31260320[source]
We love Tailscale. Everyone employee has it, and we use it to provide access to dev, staging, and prod environments as well.

Fun little thing we did with it: nobody can access the prod network without requesting access via a Slack bot (powered by https://indent.com/). So somebody requests access, another authorized person approves it, and the Tailscale ACLs are updated for X minutes and then reset.

Access to secure environments is super low friction but more secure (with fantastic audit trails) than ever.

replies(2): >>31260539 #>>31265499 #
17. orangepurple ◴[] No.31260321{3}[source]
From the website:

What if we all just had a static IP address, and a DNS name? …and the address migrated around the world with you? …and you could connect to any of your devices no matter where they were?

Does this not promote the destruction of anonymity on the Internet?

replies(2): >>31260381 #>>31260387 #
18. lvh ◴[] No.31260340[source]
I think the best way to get a feel for what that means is Remembering the LAN[0] and then just trying it out (really, it's easy) and deciding for yourself if they're living up to it. Or grep Twitter for "tailscale" -- all these nerds aren't astroturfing :)

(Disclosure: I'm a (small) investor via Latacora's sibling fund, Lagomorphic.)

[0]: https://tailscale.com/blog/remembering-the-lan/

19. jaywalk ◴[] No.31260345[source]
Of course the NFL would never allow a 7 minute commercial break, although I do believe that the cost is linear. A 60 second commercial's cost is simply 2x 30 second commercials. There's no reason to do anything differently, since in the end it doesn't matter if that 60 seconds are filled by one or two commercials (aside from making the ad sales team's job slightly easier by having one less spot to fill).
replies(1): >>31260568 #
20. RobertRoberts ◴[] No.31260346{3}[source]
It's not their "mission" but it is their system. If you have a static IP address where "...the address migrated around the world with you..." how do you think that will work for people that _NEED_ anonymity?

Will they be left out of this new internet?

replies(1): >>31260390 #
21. atonse ◴[] No.31260350[source]
As I’ve said in a past thread for another product (oxide), I LOVE Tailscale and am really happy for the team for their well earned growth and success.

However this is the path that could move them towards being pressured to add a bunch of bloat, followed by acquisition pressure and a big payout that will likely eventually cause the product to stagnate after the founding team leaves and the buyers don't care.

I really hope they’re all already rich enough that they aren’t tempted by that. :-)

Update: altered content to add more speculative version.

22. Lightbody ◴[] No.31260351[source]
I haven't really felt like 1Password's product materially strayed from the original mission. If anything, I'm even more delighted with the team functionality, shared vaults, quick keyboard access in 1Password 8, etc.

I wouldn't put them in the Dropbox bucket.

Also, I think the value Tailscale provides is fairly unique and far from obviously a platform feature like file storage and perhaps even password management.

replies(6): >>31260433 #>>31260530 #>>31260675 #>>31262463 #>>31263786 #>>31267931 #
23. sk8terboi ◴[] No.31260362[source]
So it's a way around any firewall and security? Interesting.
replies(1): >>31260630 #
24. contravariant ◴[] No.31260370[source]
I hope they don't eventually sacrifice the former in favour of the latter like so many other companies did.
25. throwaway92394 ◴[] No.31260376[source]
Am I the only one that has an issue with a VPN that I can't self host? Presumably if Tailscale get's PWN'd or subpoenaed then your network is breached no?
replies(7): >>31260409 #>>31260514 #>>31260521 #>>31260540 #>>31260615 #>>31260804 #>>31261420 #
26. jaywalk ◴[] No.31260381{4}[source]
I think you've got a fundamental misunderstanding of what Tailscale does. It's all about accessing your own devices. You don't need or want anonymity in that case. They are not a general purpose VPN service, and can't even be used as one.
replies(2): >>31260674 #>>31260910 #
27. lvh ◴[] No.31260387{4}[source]
No? The fact that some machines (notably: all your _own devices_) need to be able to reliably talk to each other does nothing to impact anonymity on the Internet. Sure, you can route everything out of your own IP using Tailscale also, and that might be desirable if you're on a crappy connection, but it's still completely orthogonal to privacy-preserving techniques like Tor (and may in fact make those easier to deploy).

Tailscale doesn't make privacy worse any more than the fact that to a first approximation, no residential Internet provider in the US has rotated an IP in recent memory.

(Disclosure: I'm a (small) investor via Latacora's sibling fund, Lagomorphic.)

28. jaywalk ◴[] No.31260390{4}[source]
Tailscale is for accessing your own devices, it's not a general purpose VPN service. Anonymity is not a factor.
replies(1): >>31260642 #
29. hu3 ◴[] No.31260395[source]
They are open source too: https://github.com/tailscale/tailscale

edit: Only the client is open source. See clarification below.

replies(2): >>31260459 #>>31260490 #
30. l30n4da5 ◴[] No.31260400[source]
Ive been using Tailscale for my local machines for a month or so now. don't really have any complaints about them.
31. gowld ◴[] No.31260403[source]
"Fixing the internet" == you can comunicate with computers that want to comunicate with you, and not with others.
replies(1): >>31260484 #
32. lvh ◴[] No.31260409[source]
Depends on the kind of breach. Tailscale is extremely carefully designed to minimize that risk. Notably: Tailscale doesn't get your keys. (Granted: a compromised agent would still be a problem. It's a thing I have some plans for :-))

(Disclosure: I'm a (small) investor via Latacora's sibling fund, Lagomorphic.)

33. lmeyerov ◴[] No.31260411[source]
Yep we had it rejected w an enterprise we work with as the org needed to own the full control plane so we couldn't bring it in, and not on the schedule for the org's security team for them to bring it in. Making a smarter, easier, and less creepily managed VPN more palatable to enterprises would be awesome, so the marketing value of their fundraise is real.
replies(2): >>31260477 #>>31265111 #
34. pilif ◴[] No.31260425[source]
also, their iOS client still has abysmal background battery usage even when not connected. It has been more than a year now, so, yes, seeing them improve in such areas would be cool.

But given the huge amount of money invested, pressure will go into other directions. I'm afraid my (aside of the iOS issues) beloved Tailscale is on a path to expensive enterprisey bloat, losing what made it so good (the JSON based ACLs, the external authentication provider reliance, etc - GitHub Auth is a killer-feature for me for example)

35. lajamerr ◴[] No.31260432[source]
I remember reading a previous HN post about Tailscale and a certain commenter said that Tailscale is ideologically driven, small-scale operation and they prefer an alternative like NetMaker which has more backing.

$100M seems more than a small-scale operation or is $100M in tech actually small scale?

replies(1): >>31260506 #
36. xyzzy_plugh ◴[] No.31260433{3}[source]
Indeed, 1Password is practically a utility at this point, as far as I'm concerned. I really like the direction they're heading and they're solving some pretty tricky problems without compromising on security, predominantly in the enterprise domain. The experience is the same regardless of whether you're an enterprise user or a personal or family user. It's polished enough that my grandma can use it.
replies(3): >>31260486 #>>31260559 #>>31260711 #
37. lvh ◴[] No.31260441[source]
Tailscale will let you use any SAML or OIDC provider you like in the Enterprise plan (presumably because of the cost of supporting the long tail of nonsense IdPs will produce).

(Disclosure: I'm a (small) investor via Latacora's sibling fund, Lagomorphic.)

replies(3): >>31260700 #>>31262196 #>>31262919 #
38. yrro ◴[] No.31260446[source]
Tailscale is one of the ways you can restore the end-to-end connectivity principle that IP introduced and that NAT destroyed.
replies(2): >>31260512 #>>31261439 #
39. bfm ◴[] No.31260459[source]
The control server is not open source. Thankfully headspace https://github.com/juanfont/headscale is filling that gap
40. api ◴[] No.31260465[source]
As the founder of what some say is a competitor (ZeroTier) I'd like to congratulate the Tailscale team. We don't really see Tailscale as the competition. We see the competition as:

(1) The old school castle and moat IT model that dominates at 99% of companies. If we can disrupt this then TS, ZT, and four other upstarts could all become billion dollar companies. Right now 1-2% of this market has been disrupted at most.

(2) The put everything in the cloud and everyone gets a thin client model. If that wins then all of us lose because there is no market for endpoint connectivity. We also lose all privacy, all data ownership, and all ability to experiment or innovate without paying for it by the instance-hour with TOS-enforcement bots looking over our shoulder.

replies(2): >>31260794 #>>31261029 #
41. ◴[] No.31260469[source]
42. cogogo ◴[] No.31260474[source]
I've been using it since last summer to SSH to my pi too. Huge relief in terms of securing it. Easy to install and it just works. I'm not particularly savvy either.

My only complaint is that if you use it on your phone (iphone 11) and forget to turn it off it drains the battery like crazy.

replies(1): >>31260687 #
43. ◴[] No.31260476[source]
44. RL_Quine ◴[] No.31260477{3}[source]
There's a kind of WIP control server implementation, it's not production ready in my opinion but it's definitely usable.

https://github.com/juanfont/headscale

replies(1): >>31260763 #
45. jonfw ◴[] No.31260479[source]
There is another interesting company in this space- Netmaker[0]. It's been getting a lot of traction in the homelab space- namely because it takes advantage of kernel wireguard, which is more performant than the userspace wireguard that tailscale uses.

[0] - https://www.netmaker.org/

replies(1): >>31267751 #
46. ◴[] No.31260480[source]
47. contravariant ◴[] No.31260484{3}[source]
"Fixing the internet" == you can communicate with computers that you want to communicate with, and not with others.
replies(2): >>31260639 #>>31264675 #
48. alberth ◴[] No.31260486{4}[source]
> I really like the direction [1Password] is heading

I thought customers were complainingly loudly against their new direction of making 1Password an Electron app. Is that not the case?

Note: I'm not a 1Password customer.

replies(8): >>31260579 #>>31260772 #>>31260840 #>>31261642 #>>31262108 #>>31264572 #>>31266473 #>>31268413 #
49. cassianoleal ◴[] No.31260490[source]
The clients are. The control server, which is the bit that Tailscale host, is not.

There is an open source alternative called headscale [0]. The main downside is that you'll need to run it.

The closed source centralised control server has other potential issues though, and it ends up being up to the user to decide what's the right balance of security vs convenience.

[0] https://github.com/juanfont/headscale

replies(2): >>31260505 #>>31260939 #
50. gowld ◴[] No.31260497[source]
The blog post is poor. It has TailScale's "house style" of folksy reminiscence and Avery's stream-of-consciousness writing stylewrapped around an announcement. It only says two things, one at the top, and one at the bottom: "We raised a $100m for our war chest; we don't have any plans for how to use it besides extending runway for our current operations". The middle is left trying to justify why that is a good thing, despite not having a reason beyond "we know a lot of rich people who know we are wicked smart and talented, so they want a piece of equity in us".

The home page is a pretty clear exposition of what TailScale is: https://tailscale.com/

replies(1): >>31261045 #
51. aaronax ◴[] No.31260498[source]
I have heard of but never really looked in to Tailscale until today. I'm not impressed.

"Fixing the Internet" is not done by layering more private network garbage on top of it.

Their claim[0] that after you install Tailscale on all your devices: "This final configuration is called 'zero trust networking',” is pretty interesting. It seems this would be more like having a trusted internal network (sure it is overlaid on an untrusted network). A true zero-trust network would mean all of your clients and servers are secure in a manner that they can operate on the public Internet...like O365, Salesforce, etc. To say that you run a zero-trust network because you implement a fancy VPN is C-suite dreaming at its finest.

"get around a misbehaving corporate firewall" like newhouseb sings praises for is exactly the sort of thing that should be happening less, and the opposite of "fixing the Internet". Follow the policies of the network you are being allowed to use, or lobby for them the be fixed. Don't like ISPs messing with DNS traffic? Get rules/laws implemented that prohibit that, instead of garbage like hiding your DNS in DNS over HTTPS. (DNS over TLS seems more acceptable to me.)

[0] https://tailscale.com/blog/how-tailscale-works/

replies(3): >>31260551 #>>31260560 #>>31260730 #
52. user3939382 ◴[] No.31260499[source]
Every time I've looked at setting up distributed VPN I've wanted layer 2, I haven't used WireGuard yet but apparently it's layer 3. I would love to be able to connect remotely and have my newly connected machine act like just another machine on the LAN. That in turn makes all kinds of other network-related operations simpler and homogeneous, in that the remote property of the connected machine(s) is abstracted away.
replies(1): >>31260699 #
53. jollybean ◴[] No.31260500[source]
" What if we all just had a static IP address, and a DNS name? …and the address migrated around the world with you? …and you could connect to any of your devices no matter where they were? …and it was always encrypted? …and there was always a correctly configured firewall? …and you never had to worry about certificates? …and every device in your organization was tied to a user identity and SSO and MFA? …and all this just happened automatically? "

So why do people care about that?

Those all seem like positive things but they are in and of themselves, not value creating.

From this article and even their landing page ... I think they might need an explanation that makes more sense than IT/Networking Admin.

Even as a developer, I don't quite see the obvious benefit.

Instead of taking about 'what if you could have this tech that does ABC' - instead, talk about it in terms of problems 'what if you didn't have this problem or that one'. etc..

replies(1): >>31261125 #
54. jonfw ◴[] No.31260506[source]
Tailscale has been much larger than Netmaker for as long as Netmaker has existed
55. gowld ◴[] No.31260505{3}[source]
To be clear, headscale is an alternative to the control server, compatible with Tailscale clients.
replies(1): >>31260950 #
56. legalcorrection ◴[] No.31260512{3}[source]
This is kind of overstated. Even if everyone went IPv6 and gave every device a public IP address, pretty much every network would have a firewall that behaved just like NAT.
replies(4): >>31260541 #>>31260693 #>>31260790 #>>31262162 #
57. moloch ◴[] No.31260514[source]
No, they don't have access to the Wireguard keys and everything is point-to-point. They'd have to push a backdoored software update to gain access (and this is a threat with any vendor product).
replies(1): >>31263189 #
58. chrisweekly ◴[] No.31260520[source]
Similar experience. It's profoundly good UX atop a fundamentally strong stack.
59. bfm ◴[] No.31260521[source]
A self hosted alternative we've been using for our infrastructure is innernet, which was discussed on https://news.ycombinator.com/item?id=26628285 last year
60. gowld ◴[] No.31260525[source]
The internet, at its essence, means connecting machines aross (intra)networks. Not everything those machines do. That's what Tailscale (+wireguard) is for.
61. nikanj ◴[] No.31260530{3}[source]
It's been [0] days since the last time 1Password randomly bombarded me with a "Upgrade to 1Password subscription today" dialog. Not talking about the banner in the corner of the app. this was a dialog that had to specifically be dismissed
62. YPPH ◴[] No.31260537[source]
How has 1Password lost sight of its core values?

Perhaps you refer to loss of local vaults? If so, they were never really a viable option for me - I needed the app syncing across multiple devices, including mobile, and doing so with a third party sync solution wasn't suitable.

replies(2): >>31261102 #>>31261681 #
63. fwip ◴[] No.31260539[source]
That's gonna be exciting next time Slack is down.
replies(2): >>31260580 #>>31263940 #
64. cassianoleal ◴[] No.31260540[source]
You're certainly not the only one. There is headscale [0] if you're worried about that though.

[0] https://github.com/juanfont/headscale

65. Spivak ◴[] No.31260541{4}[source]
Yeah, no one is going to allow unsolicited inbound connections even without NAT so you still have to have something to hook up the two ends in a P2P setting.
replies(1): >>31260919 #
66. jclardy ◴[] No.31260544[source]
Same here - I've found a ton of uses, for one I can now access my Home Assistant instance without actually exposing it to the internet. Same for the linux VMs I run via ESXi on the same Intel NUC. I can also access my QNAP NAS without exposing that to the internet which is huge given how many vulnerabilities have been found with it.

It actually allows me to turn my iPad Pro into a proper development machine as long as I have access to the internet since I can write code locally via Textastic, push to my git repo and test via the VM connected to Tailscale. Of course this was possible with a box on DigitalOcean but I prefer not to pay monthly for a machine just for noodling around.

67. rcfox ◴[] No.31260551[source]
"Don't like entities abusing their power over you? Just change the laws that allow them to do that!" What.
replies(1): >>31261711 #
68. throwaway894345 ◴[] No.31260559{4}[source]
Fully agree. I'm a very happy 1Password customer, and I rarely praise software.
69. Thaxll ◴[] No.31260560[source]
> Get rules/laws implemented that prohibit that

You know this does not work in the real world right?

replies(1): >>31263217 #
70. HWR_14 ◴[] No.31260568{3}[source]
I think there are reasons why cost would be nonlinear. First, there's simply demand. The people who want to do 60s clearly have a reason that 30s won't work, so they may be willing to pay more (certainly they won't pay less). It's a different segmented market. There is a reason companies with lots of commercials tend to also be official sponsors of the Super Bowl. Second, practically it costs more. Ads are reshuffled around in real-time and the number of times you can be sure you can broadcast a 60 second spot are less than you being able to broadcast a 30 second spot, since the action may resume at an indeterminate time. Third, the Super Bowl specifically sells itself on the quality of the ads. It could do long term damage to the Super Bowl of the ads one year were just one company and not the funny celebrity heavy spots people expect.
replies(1): >>31260849 #
71. ◴[] No.31260575[source]
72. throwaway894345 ◴[] No.31260579{5}[source]
I heard some people complaining a bit for a moment when they made the transition, but that happens anytime anyone changes anything and doubly so when that change is Electron. But that faded quickly.
replies(1): >>31261253 #
73. dx034 ◴[] No.31260580{3}[source]
I'd assume they have a fallback option to provide access.
replies(2): >>31260789 #>>31261471 #
74. tmikaeld ◴[] No.31260592[source]
I guess their biggest competitor will be Cloudflare Tunnels with Access, which does the same thing and more, for free.
75. cpuguy83 ◴[] No.31260615[source]
Tailscale's data plane is [1] mostly p2p except for some cases where it doesn't work and it goes through an encrypted relay. So your data does not run through Tailscale servers.

There is an oss [2]coordination server that does let you totally self-host.

[1] https://tailscale.com/blog/how-nat-traversal-works/

[2] https://github.com/juanfont/headscale

replies(1): >>31268145 #
76. cpuguy83 ◴[] No.31260630[source]
An phenomenal read on how it works: https://tailscale.com/blog/how-nat-traversal-works/
77. philipov ◴[] No.31260639{4}[source]
"Fixing the internet" == computers that mutually consent to communicating with each other are able to communicate with each other
replies(1): >>31260941 #
78. RobertRoberts ◴[] No.31260642{5}[source]
The title of the article from Tailscale is "...to fix the Internet"... if it was "only" about "your own devices" then you are assuming they are thinking small.
replies(1): >>31260874 #
79. ◴[] No.31260650[source]
80. ncmncm ◴[] No.31260654[source]
I thought that Tailscale was pretty interesting.

Avery Pennarun, its CTO, is somebody whose judgment I am used to trusting.

Then I learned that to use it, I would be dependent on authenticating using a login on one of the unaccountable internet behemoths who could take away my account for any random reason or no expressed reason at all.

No, thank you.

replies(10): >>31260714 #>>31260778 #>>31261024 #>>31261405 #>>31261904 #>>31262913 #>>31263886 #>>31268402 #>>31272508 #>>31275084 #
81. RobertRoberts ◴[] No.31260674{5}[source]
No, I think you misunderstand that companies like this have huge visions, not tiny one like "just your own devices".

They are claiming they are on the road to "fix the internet", their own words.

82. _ktx2 ◴[] No.31260675{3}[source]
1Password went from being buy once upgrade forever to SaaS. A lot of folks bought back when that was the package (and business model) so it's viewed relatively negatively here from some folks. I don't blame them, but also, I think 1Password is a success. I just don't think they'd have been viable under their original business model.
replies(2): >>31264717 #>>31266360 #
83. natrys ◴[] No.31260687{3}[source]
When I tried Tailscale it seemed to have high CPU problem in general under reasonable load. I don't remember the numbers, but it made me uncomfortable to use it in my low powered servers. I wonder if this is the consequence of being a userspace program unlike wireguard kernel module.
84. syntaxing ◴[] No.31260692[source]
Tailscale is absolutely amazing for accessing local first platforms (like home assistant and jellyfin). Sure, I can set up wireguard, but Tailscale is plug in play. Biggest gripe is that it messes with my DNS like nextDNS on iOS.
85. zinekeller ◴[] No.31260693{4}[source]
This fact must be bundled everywhere someone mentioned "IPv6 will allow direct connectivity again". While NAT isn't a fully-functional firewall, it did do things that a firewall in a router would do. What equipment have proper IPv6 firewalls? Routers, that's who.
86. Meleagris ◴[] No.31260699[source]
Check out ZeroTier. I believe it fills the same needs as Tailscale, but with layer 2.
87. typical182 ◴[] No.31260700{3}[source]
Semi-related question: did Latacora or @tqbf ever open source their Go-based SAML IDP: https://twitter.com/tqbf/status/938501701526487040

(That tweet I think was a teaser saying it was coming. I subsequently looked for it a few times and never found it, but maybe plans changed, or maybe I just failed to find it).

replies(1): >>31261529 #
88. anuvrat1 ◴[] No.31260705[source]
There exists ZeroTier too, which can be self-hosted.

[1]: https://www.zerotier.com/

89. MrStonedOne ◴[] No.31260711{4}[source]
1password took away the ability to have offline vaults, so i don't know how you can say they didn't compromised on security, since they cut off the most secure way you can store your vault chasing the solving of the tricky problem of monetizing a key value store.
90. rrdharan ◴[] No.31260714{3}[source]
I agree, GitHub is awful.
91. newhouseb ◴[] No.31260730[source]
To be fair, my "misbehaving corporate firewall" is actually my apartment that has building-managed internet wherein everyone is NAT'ed to the same fiber connection.

For whatever reason, SYN flooding detection triggers when you do more than a few TCP connections per second which makes most TCP-based things super frustrating and their IT is clueless as to how to fix it.

92. ineedasername ◴[] No.31260731[source]
It sounds similar to what hamachi could have been if it was really invested in product management & enterprise features.
replies(1): >>31262730 #
93. oicU00 ◴[] No.31260737[source]
It’s a basic web UX over a built in Linux kernel feature

There are Docker containerized apps that manage Wireguard too

Maybe contribute to one and fret less about behavior of VC funded business and wondering if they’re actually respecting your privacy to accomplish finance goals

replies(2): >>31261433 #>>31265555 #
94. lmeyerov ◴[] No.31260763{4}[source]
Super cool, and a lot of contributors!

Can this work the rest of the wireguard ecosystem (agents, UIs, ...) for a full VPN soln without involving the VC-tied company?

replies(2): >>31261426 #>>31262133 #
95. dimgl ◴[] No.31260772{5}[source]
I didn't even notice... 1Password is great. There are some minor issues here and there but it always feels like they very quickly patch it up.
96. __float ◴[] No.31260778{3}[source]
If you use an identity provider like Okta or OneLogin, then you're not tied to any "contentful" services like GitHub or a Google account that "historically" seem to have more problems of this type.

As far as threat models go, I can't really say I understand this one too much.

replies(3): >>31261608 #>>31262055 #>>31265188 #
97. VWWHFSfQ ◴[] No.31260789{4}[source]
I wouldn't assume anything
98. throw0101a ◴[] No.31260790{4}[source]
> Even if everyone went IPv6 and gave every device a public IP address, pretty much every network would have a firewall that behaved just like NAT.

No, they do not behave just like NAT. With NAT you have two problems:

* figuring out your address

* firewall hole punching

With IPv6 you already know your address and just give it to the peer you are communicating with. You then tell your firewall to allow connections from the address(:port) that the peer tells you. No STUN, no TURN, no ICE.

* https://en.wikipedia.org/wiki/Hole_punching_(networking)

* https://en.wikipedia.org/wiki/Port_Control_Protocol

* https://en.wikipedia.org/wiki/Universal_Plug_and_Play

* http://www.upnp.org/resources/documents/AnnexA-IPv6_000.pdf

This helps immensely for residential connections since people (generally) control their gateways, and with more and more higher speed (fibre) connections being done, it could help in more self-hosted and peer-to-peer services.

What one is allowed to do at the office would be dictated by the policy(s) of your employer: they could allow PCP/uPNP opening via authenticated requests for example.

replies(2): >>31261032 #>>31263531 #
99. ryanar ◴[] No.31260794[source]
I am guessing two of the other startups are strongDM and Teleport. Wonder what others are in this space and have gone to Series B+
100. aborsy ◴[] No.31260804[source]
Yes, Tailscale distributes public keys, and can add arbitrary nodes to anyone’s network.

Not that they do it, but the possibility is there, and one has to account for risks.

101. jchw ◴[] No.31260840{5}[source]
Modern 1password using Electron is sad in some respects, but hardly surprising. Even people who use Electron hate Electron. The real differentiating factor is those who understand why.
102. jaywalk ◴[] No.31260849{4}[source]
> the action may resume at an indeterminate time.

This is not true. The commercial breaks in all US pro sports have a pre-determined length, and the game action will not resume until the broadcast has rejoined (outside of a mistake somewhere along the line). In the NFL, they have a countdown timer on the stadium scoreboard indicating how much time is left in the commercial break, and even a dedicated guy who stands on the field next to a referee, talking to the TV truck to confirm when the broadcast has rejoined.

103. jaywalk ◴[] No.31260874{6}[source]
You're assuming that they're thinking something completely outside of anything they've ever said, and something that nobody actually wants. Your assumption is the one that's out of left field, not mine.
replies(1): >>31263376 #
104. cassianoleal ◴[] No.31260910{5}[source]
> They are not a general purpose VPN service, and can't even be used as one.

I'm not sure what you mean by this, but this sounds like exactly what they are, with some functionality on top. It's what I use to VPN into my LAN from outside, and it's pretty general purpose from where I stand.

replies(1): >>31261055 #
105. throw0101a ◴[] No.31260919{5}[source]
> Yeah, no one is going to allow unsolicited inbound connections even without NAT so you still have to have something to hook up the two ends in a P2P setting.

Sure they are. All home routers that I'm aware of allow for port forwarding so folks can self-host a service: perhaps a game server (e.g., Minecraft), web, e-mail, etc.

It's just going forward you can set up a separate subnet to put your gear in (especially if you get multiple /64 subnets from your ISP). You can have a DMZ, and use either the router- and/or host-level firewall to dictate which connections are allowed.

replies(2): >>31261261 #>>31263755 #
106. brightball ◴[] No.31260923[source]
How does it work for something like a security DVR where you can’t access the system itself? Is there an equivalent way to just access the network like a VPN?
replies(2): >>31261503 #>>31264720 #
107. hu3 ◴[] No.31260939{3}[source]
Thanks for clarifying. I did not know that.
108. xeyownt ◴[] No.31260941{5}[source]
"Fixing the internet" == computers whose _owners_mutually consent to communicating with each other are able to communicate with each other
109. cassianoleal ◴[] No.31260950{4}[source]
Yes, sorry if my phrasing was confusing. Thanks for clarifying.
110. nickysielicki ◴[] No.31260955[source]
Tailscale has a fantastic product, I’ve been extremely happy from day one. If you’re waiting for a weekend to have a few hours to try out Tailscale, don’t, it takes 15 minutes to get every device you own up and running and talking. This is the lowest friction personal VPN to ever exist, and once you see how easy it is for your own devices, you’ll wish you had it at work.

The biggest risk that this company has is that Cloudflare (in all reality) should just buy them or reimplement it. It’s the type of product cloudflare would make, that’s for sure. Being based on open source wireguard, and being just a STUN/TURN server at its core… I’m sure that Tailscale will be the first but maybe not the best.

I’ve been dreaming lately of a tor-like network that’s based loosely on the idea of tailnets. Rather than blockchain bullshit, you’d have a direct ring of trust with friends, and then you could set up access policies to forward packets for people you don’t trust, but who know someone you do trust.

Web3 happens when people can host stuff on their phones, and Tailscale is something that lets you host things on your phone.

replies(16): >>31261040 #>>31261078 #>>31261130 #>>31261312 #>>31261392 #>>31261800 #>>31261878 #>>31264974 #>>31265274 #>>31265636 #>>31265787 #>>31267524 #>>31267632 #>>31267917 #>>31267947 #>>31272295 #
111. flemhans ◴[] No.31260966[source]
What's the state of affairs when it comes to self-hosting?

I'm waiting to deploy either Nebula, ZeroTier, or Tailscale, but we don't want to rely on third parties for auth or coordination.

replies(1): >>31270167 #
112. IanCal ◴[] No.31260970[source]
I'm about to go away but having local access will be very useful.

I've just setup tailscale in a few minutes, very smoothly. I'm impressed it scales down to this kind of simple use case nicely, and it seems it has nice features as my use cases might scale up.

113. Dave3of5 ◴[] No.31260978[source]
Crazy how people can raise these sums of money, it's all about who you know.

I also notice they have a careers page so I had a gander. A 6 stage interview process! Good lord tech companies really have gone down the shitter

114. naikrovek ◴[] No.31261024{3}[source]
Google does that, Microsoft doesn't. Microsoft will ban you from a particular service if you egregiously violate the terms of service for a particular application of theirs, but never the whole account.

Google will throw you on your ass in the blink of an eye.

replies(1): >>31262300 #
115. hwpky ◴[] No.31261029[source]
Agree with this Adam.

Avery and the team at Tailscale are building a fantastic product and totally deserve the round and recognition, huge congratulations - we're super happy for them.

In many ways they're also an ice-breaker for the zero trust overlay network architecture, which means they've got the most work to do. As the current top comment on this thread correctly notes, with huge investment comes the obligation to eventually pay it back.

The market hasn't even come close yet to crossing the chasm and seeped into mainstream conscience to become the accepted norm - yet.

That said, we believe fiercely that networks should be simple to reason about, easy to use and safe to operate. That private connectivity should “just work”, and just work in exactly the same way, everywhere too. Flexible to change, simple to automate and only available to the right things at the right times.

When you think about it, building private networks is actually pretty complex right now and can be pretty insecure too. It's some unholy combination of spell casting meets a yak shaving contest to wrangle firewalls, VPNs, MTUs, and manage IPs, subnets, ACLs, NSGs, VPCs, NAT, routing, VLANs, certificates & secret keys, then hoping a zero-day doesn't show up that drops someone straight into the network via the VPN server, who then starts poking around the squishy centre.

Once you've used products like Enclave, Tailscale or ZeroTier and seen how simple private networks really can be - at a certain point you almost stop and ask the question, why would you not do it like this.

There will always be nay-sayers and people for whom this approach just isn't a fit, and that's fine - but I personally find it hard to imagine that this genie can be put back in the bottle.

- Founder @ https://enclave.io

replies(1): >>31261430 #
116. zinekeller ◴[] No.31261032{5}[source]
No, no, no, no. You haven't really experienced the quality of IPv6 routers at home. The only thing that I can (probably) say with confidence is you will not need TURN, and even that assumption can be broken with even more restrictive firewalls that block nearly all UDP traffic or even not know your real public address because IPv6 NAT does exist (https://blogs.infoblox.com/ipv6-coe/you-thought-there-was-no..., https://datatracker.ietf.org/doc/html/rfc6296), but fortunately this is usually found in enterprise stuff. NAT-PMP or router UPnP is probably the wildest: majority don't (remember that I'm focusing on ISP routers since that most people don't bother to switch to actual routers...*), some only on IPv4 (which is even more frustrating), and only few supports it correctly. Worse, those same broken garbage-level routers have NAT-like firewalls: at least you know what address and port you will contact the other computer, but you will still need UDP (TCP handshake will be very problematic) and you will still need keepalives (or otherwise your firewall will just close the port).

* ... and most that do get another router (usually because they have seen that their Wi-Fi on the "modem" is bad) don't turn on** bridge mode which will be a definite headache on both IPv4 (double NAT) and IPv6 (address conflict, especially if you're using an ISP like Comcast that would only allocate a /64 and no more.

** ... because you need to call up the ISP or even outright refused to bridge it (either because they're stupid but you don't have another ISP to switch or the equipment manufacturer of their garbage special router didn't program one).

replies(1): >>31262619 #
117. MatthiasPortzel ◴[] No.31261045{3}[source]
I thought the post was remarkably well written. I had a vague idea what Tailscale did going into it, but this post did a good job of describing the company's values and vision. I'm not sure what the intended audience of the announcement was, but for me it was interesting.
118. tomc1985 ◴[] No.31261052[source]
Another day, another overly hyperbolic press rele.... er, blog post

Le sigh...

Let's make tech boring and demure again!

119. jaywalk ◴[] No.31261055{6}[source]
I'm talking about services like NordVPN, Mullvad, etc. They do not funnel your Internet connection through their servers.
replies(1): >>31261141 #
120. mnkmnk ◴[] No.31261078[source]
Cloudflare already has a competing product https://www.cloudflare.com/en-in/lp/ppc/cloudflare-for-teams...
replies(1): >>31261223 #
121. lettergram ◴[] No.31261092[source]
“To fix the internet”

I really wish we could get some clear copy on what that means in a title.

122. arsome ◴[] No.31261100[source]
I was going to try TailScale but then it seemed the only option to do so as an individual was to login with a 3rd party cloud provider, which I in no way want tied into my networks.

I gave up and just setup wireguard directly instead, I don't trust Tailscale either if that's their attitude towards privacy, it's permanently marred my vision of their product.

replies(10): >>31261128 #>>31261230 #>>31261250 #>>31261558 #>>31261667 #>>31261807 #>>31261815 #>>31261981 #>>31262022 #>>31262899 #
123. criddell ◴[] No.31261102{3}[source]
For me, it was their switch to an Electron app. "High security" and "built from dozens of third party libraries and running on a browser" don't belong together.
replies(2): >>31261528 #>>31264784 #
124. MatthiasPortzel ◴[] No.31261113[source]
My understanding/hope is that the author uses "internet" to mean the technology. Colloquially we use "internet" to also refer to every technology that runs on top of the internet (like the web), but 'connect devices together' is a meaningful statement and the internet is the technology that we currently use to do that.
125. MobiusHorizons ◴[] No.31261125[source]
Have you ever tried running a server or sshing to things that weren’t in a cloud provider? Have you ever run something you want access over the internet without wanting that thing on the open internet getting attacked? Tailscale provides a solution to the problems you run into in those situations. It gives you a way to access (or selectively give specific people access to) these devices from anywhere on the internet while still having those assets behind a firewall.
126. jbverschoor ◴[] No.31261126[source]
Congrats1 solid productg, good interface, great positioning towards the enterpise
127. Saris ◴[] No.31261128[source]
Yeah that's the biggest hangup I have, it just seems strange to rely on a third party login to be able to access something as important as a VPN. If my google account or whatever gets shut off for any reason I'd be pretty hosed.
replies(1): >>31261470 #
128. siavosh ◴[] No.31261130[source]
I’m pretty ignorant on this topic, but what are the benefits of having a personal VPN?
replies(7): >>31261258 #>>31261313 #>>31261391 #>>31261507 #>>31261763 #>>31264204 #>>31267904 #
129. cassianoleal ◴[] No.31261141{7}[source]
Ah, fair enough.

Those are not general purpose VPNs though.

In fact, they are not even VPNs in the first place. They merely use the same technology to provide a private tunnel to the public Internet (and use the name in marketing material because by now people are familiar with it).

What they are not is general purpose private networks.

replies(1): >>31261356 #
130. wackget ◴[] No.31261213[source]
> Gets $100M investment

> Still produces graphs without axis labels

131. nickysielicki ◴[] No.31261223{3}[source]
It’s not really a competing product until they relaunch it with a heavy consumer focus and with some of the properties that Tailscale has, ie: avoiding going through the cloudflare CDN. But more to my point, cloudflare is definitely in a position to outcompete Tailscale, it’s just a couple tweaks and a marketing shift.
replies(1): >>31261535 #
132. aftbit ◴[] No.31261230[source]
Same, I abandoned Tailscale sign up for this reason as well. Perhaps consider https://github.com/juanfont/headscale ?
133. JeremyNT ◴[] No.31261250[source]
Indeed, this is why I won't use it either. I settled on Slack's Nebula [0] instead of wireguard because it handles direct p2p communication between nodes automatically.

There also exists an open source implementation of the tailscale control server [1] that you could self host.

[0] https://github.com/slackhq/nebula

[1] https://github.com/juanfont/headscale

replies(2): >>31261607 #>>31261688 #
134. mmcclure ◴[] No.31261253{6}[source]
I...don't think it's faded. I could totally be wrong here, but I don't think they'd actually made a transition yet; the complaining you're talking about was over the 1Password 8 beta. That actually just went GA this week, and people were still upset.

I get why they're doing it (or, at least, think I do), and I'm not angry enough to go get angry on Twitter, but I am going to avoid the upgrade for as long as I can. That's kind of a bummer to get there with a product you've historically really liked.

replies(1): >>31261423 #
135. gzer0 ◴[] No.31261258{3}[source]
I am able to route traffic on my mobile device through my home network via the use of their "exit node" option. It allows one of my home devices to act as an exit node for my entire personal tailscale network.

This serves multiple benefits: the main one being that I receive pi-hole filtered ad-free traffic on my mobile device via a Wireguard VPN with my home IP 24/7/365

replies(5): >>31261546 #>>31262837 #>>31264416 #>>31265604 #>>31271256 #
136. zinekeller ◴[] No.31261261{6}[source]
... if your definition of "home routers" excludes ISP-provided ones, then I'll agree. Unfortunately, I'm pretty sure that either you are on an ISP that actually cared and found a good supplier or didn't check out what are the capabilities of ISP-provided routers.
replies(2): >>31262101 #>>31264973 #
137. ramraj07 ◴[] No.31261295[source]
Dropbox has been fine ish? Like not stellar but it’s still something I use as one of my core tools and pay for.
replies(1): >>31262186 #
138. tepitoperrito ◴[] No.31261312[source]
Like a hybrid NNCP-GO and nebula sdn. Neat!
139. newaccount74 ◴[] No.31261313{3}[source]
I use it so I can connect to my work machine (dynamic IP on office wifi) from my laptop (dynamic IP, home Wifi).

It's also great to be able to just ssh into your laptop at home when you're at work and you forgot to push whatever you were working on last night.

It's not necessary, but Tailscale makes a lot of things just easier.

replies(1): >>31262486 #
140. woopwoop24 ◴[] No.31261332[source]
i wanted to to use tailscale really bad, but since you cannot login without the given choices they provide, i am not sure any security minded person would mind using it.

i rolled my own with a simple vps, a haproxy and ansible.

141. jaywalk ◴[] No.31261356{8}[source]
They are absolutely VPNs. If you don't like my term "general purpose" that's fine, but they 100% fit the definition of VPN.
replies(1): >>31261713 #
142. isthisnametaken ◴[] No.31261386[source]
I got bored long before then. It's a terrible piece of self-backslapping drivel
143. shepherdjerred ◴[] No.31261391{3}[source]
I have a server at home with file syncing, personal media, and home automation. I want to be able to access it remotely, but I’d rather some of those things not be publicly accessible for security. I could always do HTTP auth with an nginx reverse proxy, but it’s not a very smooth workflow and it relies on me being able to configure my server/services correctly.

Instead I can bind my services to Tailscales network interface and access it anywhere that I’m connected to my Tailscale network. It’s like authentication for free.

As a side note I know this is an anti pattern since one intruder can access all of my services, but that’s not a vector I’m really concerned about since I’m not exactly a high value target.

replies(1): >>31264665 #
144. lazzlazzlazz ◴[] No.31261392[source]
> a direct ring of trust with friends

The vision you outlined is great, except it doesn't work. The trust assumptions are too high, and even a great product like Tailscale seems to rely completely on centralized identity providers (you have to choose Google, Microsoft, or Github on sign-in).

Ultimately, if you want to maintain full control of your online identity and network, you'll probably need some of the decentralized (but economically aware) resources you seem to have issues with — or at the very least a means of transitioning authentication to private key methods with DIDs.

replies(4): >>31261964 #>>31262573 #>>31262748 #>>31267311 #
145. boesboes ◴[] No.31261405{3}[source]
Oh, that is a shame. I can see why they do it like this for businesses, but for personal accounts I refuse to use SSO. Been bitten by that a few times too many.

I _could_ use my github account, but I don't trust them at all anymore. And I'm not going to setup an account with some other service just to use this. So that is a hard pass for personal use.

For a company it makes sense to have to use whatever sso provider you are already using i guess

146. atsmyles ◴[] No.31261420[source]
Just install wireguard yourself. With Bullseye on the RPi, it is easier than ever. There is a learning curve, but it is worth it.
147. throwaway894345 ◴[] No.31261423{7}[source]
Honestly I haven't noticed and I use 1Password on all of my devices every day. I heard some grumblings about 1Password changing to electron months ago and just assumed that they already made the transition. In whatever case, I haven't heard a peep until this thread. I don't like electron in theory and the industry should collectively come up with a solution that incentivizes app developers away from electron rather than hoping they swim against the current of incentive.
replies(1): >>31262019 #
148. RL_Quine ◴[] No.31261426{5}[source]
Yes, it's usable with every tailscale client (except for iOS). You provide an argument to make headscale your controller, and then it works much the same as the hosted Tailscale service, with some only minor differences in configuration.
149. api ◴[] No.31261430{3}[source]
What will happen over time is that as we disrupt old-school IT and re-introduce the idea that you can own your own compute (disrupting the everything-cloud model) the various participants in this new area will find niches in which their specific strengths and features shine the most. This always happens. Look at databases. There are like 10 decent sized database vendors for a reason, not to mention several paradigms: SQL, NoSQL, NewSQL, GraphQL, etc.

But if we don't succeed in disrupting the actual competition everyone fails.

At least that's how I look at this market.

Of course I'm also a mostly-follower of the "ignore your market peers, focus on the customer" philosophy. Your greatest competition is always your own shortcomings.

150. shepherdjerred ◴[] No.31261433{3}[source]
It handles a lot more than that, right? It does all of the key distribution and rotation which is a pain.
replies(1): >>31261583 #
151. boesboes ◴[] No.31261439{3}[source]
Ah yeah, that makes sense.
152. ignoramous ◴[] No.31261470{3}[source]
Avery, co-founder at Tailscale, has some strong opinions about why SSO is sufficient for their product.

They wrote a bit about their thought process: Factors in authentication (2019), https://apenwarr.ca/log/20190114

> It seems to me that the above successful enrollment patterns all use one or more of the following techniques:

> A human authenticates you and issues you a token (usually in person).

> A short-distance, physical link (proximity-based authentication) like a biometric sensor, or USB or bluetooth connection.

> Delegation to an existing authenticator [SSO]...

> What people tend to miss... is that enrollment is necessary whether or not you send a push notification to the phone during login. The push notification is only secure if this specific browser instance is enrolled; but if this browser is enrolled, then the push notification adds no extra security... The enrollment was the security.

Fully expect them to ship u2f authenticators or sell them at tsCare shops!

153. Lightbody ◴[] No.31261471{4}[source]
It's a very safe assumption: we're just automating Tailscale ACLs. Tailscale admins (3 of us) can still come in and manually change them.
replies(1): >>31263828 #
154. bradfitz ◴[] No.31261502[source]
(Tailscale engineer here)

That's https://github.com/tailscale/tailscale/issues/1572 which we haven't given up on. It's just not done. We did it for macOS and we thought the same thing would've worked for iOS (they share ton of the same code) but it apparently didn't work.

The mobile apps have been a low priority thus far. We just recently hired some people to work on them, though.

The highest priority for them currently is fixing battery life (we do some dumb things when LTE + wifi are both available, and when using exit nodes, and some unnecessary heart beating that sucks on mobile) and then there's also a mobile app redesign (or just "design" coming).

We like Headscale and we're super glad that it exists. (they saved us some work by doing it first, as our control server wasn't in a releasable state) We keep Juan et al updated when there's protocol changes or things they can do. (e.g. recent https://github.com/juanfont/headscale/issues/552)

replies(3): >>31261879 #>>31261907 #>>31269097 #
155. smackeyacky ◴[] No.31261503[source]
Yes, you can set up one node as a gateway to the network, then access everything on that local network.

I use it this way to access devices that can't run the tailscale software.

156. stanmancan ◴[] No.31261507{3}[source]
You can access your home network and any machines on it without exposing anything to the public internet. It's much safer to connect to my home network over a VPN than to expose all of the services to the public internet and hope they're all secure.
replies(1): >>31265482 #
157. YPPH ◴[] No.31261528{4}[source]
The choice of tech stack for a desktop application seems like an interesting basis to claim a company has lost touch with its core values.
replies(2): >>31261866 #>>31262119 #
158. lvh ◴[] No.31261529{4}[source]
Nope. It was pretty much just Thomas and Erin working on it, and I don't think it's operational. Sorry :(
159. ThePhysicist ◴[] No.31261535{4}[source]
I don't think Tailscale will focus on the consumer market, I'd be very surprised at least if they did. I think they built a developer-friendly product to get mindshare and early adoptors, but eventually the real market for such such products is in the B2B space, i.e. implementing the "BeyondCorp" model of zero-trust networking. There's also a market for building cloud mesh services but I'm not sure if Tailscale is well positioned for that as there are good open-source solutions available for that already.
replies(3): >>31261602 #>>31263341 #>>31265635 #
160. karlshea ◴[] No.31261546{4}[source]
I can do that without Tailscale though by just using the WireGuard app. What is Tailscale adding to this?
replies(4): >>31261559 #>>31262577 #>>31262741 #>>31267601 #
161. Pr0ject217 ◴[] No.31261558[source]
Interesting. That's a non-starter for me as well.
162. nickysielicki ◴[] No.31261559{5}[source]
NAT breaking, I can have a wireguard network with Tailscale where every device only has an RFC1918 address and a default route.
replies(3): >>31261726 #>>31265016 #>>31266547 #
163. oicU00 ◴[] No.31261583{4}[source]
If they can do it it’s not impossible (they’re just people after all).

With an open source implementation out there, anyone can do it merely pulling a Docker container, and without paying Tailscale.

Regardless I manage a dozen users with no issue using Embarks container; once they’re setup I touch nothing.

Paying people is not working with people; it’s working with a specific group. Open source is working with people.

replies(3): >>31262932 #>>31264792 #>>31264813 #
164. nickysielicki ◴[] No.31261602{5}[source]
It costs them so little to provide their free consumer service (iirc: they fall-back to providing transit, but it’s very rare and only occurs when UDP is completely blocked) that it benefits them to keep their focus on consumers because if everyone is using Tailscale, the business customers are inevitable.
165. rhuber ◴[] No.31261607{3}[source]
(Nebula coauthor here)

People sometimes ask me to describe the differences between Nebula and Tailscale. One of the most important relates to performance and scale. Nebula can handle the amount of internal network traffic and scalability of nodes (100k+ nodes, constant churn) required on a large network like Slack's, but Tailscale cannot. Tailscale's performance is fine for many situations, but not suitable for infrastructure. It is just a fundamentally different set of goals.

Nebula was created and open sourced before Tailscale was offering their product, but their architecture is similar to older offerings in the market, and is something we purposely avoided when creating Nebula.

Fwiw, I even recommend Tailscale to friends who want to do things like connect to their Plex server or Synology or [other thing] at home remotely. It simplifies this kind of thing greatly and doesn't require you to set up any infrastructure you control directly, which can be a headache for folks who just want to reach a handful of computers/devices.

replies(6): >>31261776 #>>31261960 #>>31262150 #>>31262492 #>>31263218 #>>31264233 #
166. margalabargala ◴[] No.31261608{4}[source]
As an example: shortly after Russia invaded Ukraine, Namecheap cancelled all accounts of all of its customers who were located in Russia. This was done regardless of what content if any was hosted by the account, whether or not the person in question supported the war, or whether the person in question was actively fleeing Russia and may have been relying on technical infrastructure they had previously set up to help them do so.

Just because a service you sign up for is not contentful, does not mean that they won't choose to boot you off for some reason completely unrelated to anything you control or anything you chose to do.

replies(1): >>31264710 #
167. sleepybrett ◴[] No.31261642{5}[source]
Removing the ability to use it in a non-saas (local vaults, vaults shared by other syncing solutions) capacity is what drove the final nail into the 1password coffin for me. I can't trust that they don't hold master keys to all the vaults on their saas offerings.

The swap from native to electron on macos was hugely disappointing but something I could have probably lived with if they hadn't gone full saas no alternative.

replies(2): >>31265678 #>>31298817 #
168. nsm ◴[] No.31261667[source]
I’m curious. Why not create a new google account that is not used for anything but Tailscale and use that?
169. sleepybrett ◴[] No.31261681{3}[source]
> ... and doing so with a third party sync solution wasn't suitable.

why not?

More importantly why was it necessary to remove the local vaults feature (I don't need it to integrate with any particular 3rd party syncing solution, I can handle that myself without any features from them) entirely?

170. depingus ◴[] No.31261688{3}[source]
Absolutely love nebula and really wanted it to win when I did my overlay network shootout (for personal use). But device on-boarding and management was overly complex for a lay person (I have a couple users that would require access).

I settled on ZeroTier for now. Unfortunately, I don't think ZeroTier is my long term solution. Their self-hosted option comes with a plethora of caveats that make it basically unusable. And I'm always scared companies that offer free versions of their paid product will eventually neuter the free tier.

I'll be keeping an eye on headscale. Hopefully they get their mobile client situation in order.

replies(1): >>31264257 #
171. gkbrk ◴[] No.31261711{3}[source]
This is how people fix things caused by commercial entities being abusive. It's done quite a bit, most of the critical things people rely on are regulated.

Do you live in a place that doesn't regulate things?

replies(1): >>31262961 #
172. cassianoleal ◴[] No.31261713{9}[source]
A VPN is a Virtual Private Network. Those services you mentioned merely provide a secure tunnel to the same public Internet you'd have access without them, avoiding eavesdropping by your ISP or other intermediaries, whilst handing over that capability to the "VPN" provider. There is no private network anywhere in this case.

An actual VPN provides you with a private network that just happens to workover of the public Internet, usually encrypted, but is inaccessible from it.

    A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. The benefits of a VPN include increases in functionality, security, and management of the private network. It provides access to resources that are inaccessible on the public network and is typically used for remote workers. Encryption is common, although not an inherent part of a VPN connection.
* https://en.wikipedia.org/wiki/Virtual_private_network
replies(1): >>31261984 #
173. karlshea ◴[] No.31261726{6}[source]
Ahhh that is slick
174. ziftface ◴[] No.31261763{3}[source]
Some of my friends used it to play older lan games
175. stavros ◴[] No.31261776{4}[source]
Does Nebula have anything like Tailscale's rules engine? I am absolutely in love with being able to configure all my connections by just specifying a JSON file somewhere. No need to have firewalls, the configuration specifies which service or user can talk to which.

That having been said, I also am wary of using Tailscale for the same reasons as above, I have to trust Tailscale and Github? I can maybe justify trusting Tailscale, but trusting GH/Microsoft/other SSO provider is a bridge too far.

replies(1): >>31261821 #
176. systemvoltage ◴[] No.31261800[source]
Well put, there is no moat. Corporate customers really don’t want yet another network infra if they have Cloudflare + ZTN offerings.

Cloudflare, please make a box I can buy and stick it in the closet with a WAN connection. Routers suck, it’s time to reinvent them. Also please don’t make them look like goddamn spaceships.

replies(1): >>31261873 #
177. aborsy ◴[] No.31261807[source]
I don’t understand why these mesh VPN companies don’t take themselves out of the trust loop? For example, by supporting Wireguard preshared keys (if that makes sense).

In light of the recent incidence at Okta, the risk of the VPN company or the identity provider getting compromised, or provided with a gag order by the government, should be accounted for.

replies(1): >>31272536 #
178. web007 ◴[] No.31261815[source]
Your personal dislike of cloud SSO is not the same as "their attitude towards privacy". Before you do anything "permanently" you should read their reasoning behind that decision:

https://tailscale.com/kb/1013/sso-providers/

> Tailscale works on top of the SSO/IDP/IAM identity provider you or your company already use.

> We don’t support sign-up with email addresses. By design, Tailscale is not an identity provider: there are no Tailscale passwords.

> Using an identity provider is not only more secure than email and password, but it allow us to automatically rotate connection encryption keys, follow security policies set by your team (e.g., 2FA), and more.

You can BYO SAML provider if you like, you'll just have to pay for it: https://tailscale.com/kb/1119/sso-saml-oidc

replies(4): >>31264754 #>>31265776 #>>31270974 #>>31277498 #
179. rhuber ◴[] No.31261821{5}[source]
It does! In fact replacing AWS security groups and making them cross region and cross platform was probably the first goal of the project. My coauthor, Nate, wrote Nebula's internal firewall code before we wrote a single line of the actual protocol, because he wanted to ensure it was performant enough for massive scale.
replies(1): >>31262134 #
180. smilespray ◴[] No.31261866{5}[source]
Moving from a native app to an Electron-based one has a definitive impact on usability. Calling it a tech stack choice is a bit dismissive.

They used to have a kick-ass Mac app. That appealed to a considerable amount of their users. Then they ditched the native app for Electron, and those same users were disappointed.

replies(1): >>31264024 #
181. jgrahamc ◴[] No.31261873{3}[source]
What's this box going to do?
replies(1): >>31261997 #
182. depingus ◴[] No.31261878[source]
> I’ve been dreaming lately of a tor-like network that’s based loosely on the idea of tailnets. Rather than blockchain bullshit, you’d have a direct ring of trust with friends, and then you could set up access policies to forward packets for people you don’t trust, but who know someone you do trust.

Might want to check out Yggdrasil. It lets you can create a real mesh routed, E2E encrypted network. You can keep your network private, or connect it to the greater network and route others. There's no ring-of-trust (I can't imagine that as a viable solution at scale). But the config file has an AllowedPublicKeys section if you want to specify who can route through your node.

https://github.com/yggdrasil-network/yggdrasil-go

replies(1): >>31264166 #
183. pilif ◴[] No.31261879{3}[source]
About the battery usage: what I can’t explain is that there’s a lot of background energy usage on iOS when Tailscale is running even when it’s not connected.

If this was about heart beating, I would expect that to only happen when the client is connected.

Also, in the battery stats, the background usage is there and tailscale is listed, but with - % of battery usage.

However, when I force quit tailscale, all of the background energy usage goes away.

replies(1): >>31261930 #
184. systemvoltage ◴[] No.31261904{3}[source]
Yes. If they can’t build basic auth and make sure it’s secure, it sends quite the message.

Super annoying and borderline unacceptable.

replies(1): >>31265757 #
185. RL_Quine ◴[] No.31261907{3}[source]
Thanks for the response. I had misinterpreted the communication from Tailscale to be adversarial rather than just that it wasn't something that had engineering focus. It's good to hear that there will be some progress towards making the mobile app better.
186. zepearl ◴[] No.31261908[source]
So basically Wireguard with automated key setup/distribution/identity management?

(btw. I love Wireguard - currenly using it to route traffic between my servers + transfer media between my home and my mother's mediacenter with both PCs being behind their own router - she loves it too as so far there were no problems hehe)

replies(1): >>31263842 #
187. rvz ◴[] No.31261909[source]
I bet they will get acquired by Cloudflare. If they reject their offer then Cloudflare will kill them.

Sorry.

188. abetlen ◴[] No.31261913[source]
If you run a Kubernetes cluster for self-hosting software or development I highly recommend setting up a Tailscale subnet router [1]. This will allow you to access any IP (pods or services) in your cluster from any of your Tailscale-connected computers. You can even configure Tailscale DNS to point to the DNS server in your cluster to connect using the service names directly ie. http://my-service.namespace.svc.cluster.local

[1] https://tailscale.com/kb/1185/kubernetes/#subnet-router

189. adtac ◴[] No.31261922[source]
>To put the market in perspective, there are VPNs that only work if [...] UDP isn’t blocked

isn't that true with WireGuard/Tailscale too?

replies(1): >>31262670 #
190. bradfitz ◴[] No.31261930{4}[source]
A lot of it was because we were using the cell radio when wifi was available.

Have you tried 1.24.2 that's just as of yesterday on the App Store? It fixes one of the worst of the offenders (but not all yet).

In any case, we understand a lot of the problems now and plan to work on it soon.

replies(1): >>31268868 #
191. chimen ◴[] No.31261944[source]
Funding scares me. It bring sharks onboard who do not share the same vision. They will demand revenue and ROI above all else. I like Tailscale but I hate this business model down to the core (Netlify as an example). Tailscale was doing fine as it was, capable people there already. It quickly became an "exit type of business", too quickly.

These companies usually bring something really easy to use, let people onboard and modify their network/DNS/etc to hell until they get vendor stuck and then they squeeze every possible dollar out of their pockets. Once you're in, after days or weeks of fine tuning, after you managed to pollute your codebase with their configs and IP addresses, it's hard to get out.

I suspect those "free slots" will change soon ,but we won't see those types of graphs anywhere soon and be prepared to get charged for bandwidth and everything else possible.

replies(3): >>31262069 #>>31262958 #>>31266947 #
192. JeremyNT ◴[] No.31261960{4}[source]
> Fwiw, I even recommend Tailscale to friends who want to do things like connect to their Plex server or Synology or [other thing] at home remotely. It simplifies this kind of thing greatly and doesn't require you to set up any infrastructure you control directly, which can be a headache for folks who just want to reach a handful of computers/devices.

First thanks for working on Nebula! It's great.

Nebula seems to be about 95% there. The functionality it actually does provide once set up is really great. It's just missing the 5% that is arguably the most important for a huge number of people: a simple way to do the configuration management bits such as device enrollment, revocations, key rotations, that sort of thing.

If you are a home user, with a small network, the overhead of doing things manually is low, but you need to be patient and technical enough to read the docs and do it right initially. If you're a big enough organization I guess you can write your own tooling. But for any small shop or any non-technical home user this is not going to fly and you will bounce off it.

I don't know if the plan is to create a commercial offering for this side of the house (it would make sense...) but as far as I'm concerned, this is the only reason that Tailscale is so successful and Nebula is lesser known (despite Nebula's advantages in other ways that may be more relevant to technical users).

replies(1): >>31262675 #
193. nickysielicki ◴[] No.31261964{3}[source]
I feel like people are so concerned about infinite scaling that nobody ever tries to scale to 5 anymore.

I have a big collection of movies, and I’d like my mom-technical blue collar friends to be able to watch them. I trust them, and I have trusted communication channels with them. We exchange keys somehow.

With the sort of routing I’m describing, they could watch my movies and I wouldn’t have to have a public IP address. And I wouldn’t mind if their friends (that aren’t my friends) watch my movies, either, by forwarding through my friends. What’s the catch? This could work for that. How could I do this today?

I don’t have any ideological or moral problem with blockchains, I just think they suck at solving problems where the requirements for trust are low or met elsewhere.

edit: mom-technical was a typo of non-technical but I’m leaving it because it’s more accurate.

replies(2): >>31262480 #>>31265104 #
194. paxys ◴[] No.31261981[source]
Not sure why everyone is hung up on this. You don't have to use a third party provider for auth. They support SAML and OIDC, and it is pretty easy to set up your own auth server. There are enough open source implementations out there you can use.
replies(1): >>31264146 #
195. jaywalk ◴[] No.31261984{10}[source]
Sticking with Wikipedia: https://en.wikipedia.org/wiki/VPN_service

Saying that these services are "not VPNs" is unnecessary pedantry. Definitions evolve over time, and these services meet the common definition of a VPN.

replies(1): >>31263439 #
196. systemvoltage ◴[] No.31261997{4}[source]
I was thinking a router that’s connected to Cloudflare network. Every device that connects to it is automatically on Cloudflare tunnels or Tailscale like VPN. And generally do the routing stuff better than ubiquity products (can manage your home router through their control panel from anywhere).

Remote devices would need a client installed on it to access the VPN, of course.

replies(1): >>31263195 #
197. skoskie ◴[] No.31262019{8}[source]
You might double check which version you’re on. Might still be on v7.

> the industry should collectively come up with a solution that incentivizes app developers away from electron rather than hoping they swim against the current of incentive.

They have the financial resources to build it in ~Rust but still chose electron. It’s a mind boggling decision.

replies(1): >>31262610 #
198. jupp0r ◴[] No.31262022[source]
What’s your concern, specifically? To me it sounds like understanding in detail how oauth works would make you feel much better about this.
199. DarylZero ◴[] No.31262055{4}[source]
Okta and OneLogin are both private corporations that have each existed for 13 years. Does your threat model include an estimate for how long they will stay in business? What if one of them puts the other out of business? Does your threat model choose a winner in that fight?

As far as paid services the possibility also is there that someday _you_ run out of money and have to stop paying them. They tend to shut down your access when that happens. Another financial threat you have to model.

These things don't happen when you use public key authentication.

200. jnsaff2 ◴[] No.31262069[source]
> They will demand revenue and ROI above all else.

I don't think this is true. They mostly demand growth over all else.

replies(1): >>31266802 #
201. dsr_ ◴[] No.31262101{7}[source]
Of the three ISPs in my area that I have used, all of them allowed inbound traffic and either had useful controls in their routers or didn't supply a router, just an ethernet handoff. RCN, Comcast, Verizon.

All of them filtered out the SMB/CIFS ports.

Two of them filtered outbound port 25; one of them was willing to open it with the additional cost of a static IP.

replies(1): >>31262158 #
202. davidwparker ◴[] No.31262108{5}[source]
Maybe technical customers who knew it were Electron. I knew, and don't really care. My wife doesn't even know what Electron is- everything is just another app to her.
203. skoskie ◴[] No.31262119{5}[source]
I’m fully in the camp who believes critical, top-level security should not co-exist with npm pulling dozens of 3rd party libraries which each pull even more 4th party code.

Is there anyone here with a counter argument? Has a security review been performed on each dependency? Any reason to think my fear is unfounded?

replies(1): >>31263976 #
204. madjam002 ◴[] No.31262133{5}[source]
Yes it works with all of the Tailscale clients except for iOS. No it does not work with clients from the broader Wireguard ecosystem (e.g the Wireguard iOS app).
205. stavros ◴[] No.31262134{6}[source]
Well that is great, thank you! I will play with it today.
replies(1): >>31264527 #
206. crawshaw ◴[] No.31262150{4}[source]
Tailscalar here. Tailscale can handle 100k+ nodes with lots of churn just fine.
replies(1): >>31262350 #
207. zinekeller ◴[] No.31262158{8}[source]
Yeah, it's inconsistent to be honest. I've found that Hitron to not have any sort of firewalls (except for IPv4 NAT if you consider it as a firewall), while Huawei routers (which is not used in the US for reasons hopefully known to you) do have an IPv6 firewall that is only an off or on switch, stupidly their enterprise stuff do have advanced controls, Alcatel/Nokia-branded ones are inconsistent to say the least and the same can be said for Zyxel. I'm actually interested in checking out other routers used by ISPs, but those are the ones I've actually seen.
208. dave_universetf ◴[] No.31262162{4}[source]
Our epic treatise on how NAT traversal works (in general, not specific to Tailscale) mentions this. IPv6 greatly reduces the amount of pain for p2p connections, but does not eliminate some of the fundamentals (stateful firewall traversal) if you want it to be zero-config: https://tailscale.com/blog/how-nat-traversal-works/

But until deployment hits 100%, and until ISPs start caring about IPv6 reliability the way they do about IPv4, "just use IPv6" can't be your answer. It's lovely when it works, but you need to do something other than "give up" when it doesn't. (also, as long as the internet is dual-stacked, doing IPv6 right also implies figuring out if NAT64 is in play, and wielding it correctly; so arguably IPv6 adds more complexity to the overall story, for now :) )

replies(1): >>31271734 #
209. skoskie ◴[] No.31262186{3}[source]
Ditto, but the fact that they still can’t handle more than ~300k files is a long-standing problem they have yet to solve. I have close to a million syncing files and startup time for the app takes about 20 minutes on a brand new MBP, and CPU and overall energy usage is ridiculously high. All while they keep pushing me to backup more files.

I pay over $700/ yr for their business plan and would like to have better performance for it.

replies(1): >>31266737 #
210. eadmund ◴[] No.31262196{3}[source]
That only addresses half the problem, though, right? Can't Tailscale still add any nodes they want to one's network?

Also, it doesn't address the individual case, but that's fair enough: Tailscale isn't a charity.

211. madjam002 ◴[] No.31262223[source]
Things I’m really looking forward to seeing from Tailscale / projects I’d like to tinker with:

- Better iOS battery life, there have been many improvements but it’s still too much to leave running 24/7, I understand they’re making improvements here

- Their in built SSH server which seems to be in development

- Using Tailscale ACLs to control access to Kubernetes ingress resources, they recently released an nginx auth plugin so I imagine this is now possible if you attach a Tailscale sidecar to the nginx ingress controller

- Arbitrary ACLs which also seem to be in progress, it would be awesome to define in ACLs who has access to different parts of e.g a backoffice application

- Official support for DNS extra records, already using this with the Headscale self hosted control plane for personal projects but it would be great to use it on Tailscale too

- Kernel Wireguard for the data plane, I think this is on the roadmap?

Overall a fantastic piece of software which I use for both personal and professional projects.

212. mengibar10 ◴[] No.31262240[source]
Excuse my ignorance but this is something I have been longing to ask for. Do these services compromise security? Wouldn't you put too much trust on these services, like 1Password. If that service is compromised in someway aren't you exposed? Is these a good article debate on this topic. Thanks.
213. skoskie ◴[] No.31262300{4}[source]
Is there anything in there TOS that states it or has this just been their practice so far?
replies(1): >>31262875 #
214. rhuber ◴[] No.31262350{5}[source]
Fair enough. I am sure the key distribution is fast and all that, but not needing peer key distribution at all was a goal and the overhead associated is less scalable than just not doing it at all. Regardless, very cool that you can handle that many nodes, which is a hard problem. I assume you do just-in-time key distribution or something, because (n-1) distribution of peer keys would be ... less than ideal.

Anywho, the more important bit is my point about performance. Nebula is significantly faster than userspace Wireguard, and plain userspace Wireguard is (last I checked) a bit faster than Tailscale, due to the additional code needed for things like your ACLs. At gigabit type scale it is probably fine and not noticeable, but at Slack, we needed to scale to 10G+ on links, while ensuring we didn't take a significant hit on CPU resources.

Again, I think Tailscale is very good for its target use case as a VPN replacement, and congrats on raising these funds!

replies(1): >>31264794 #
215. nitsky ◴[] No.31262432[source]
I'm a huge fan of Tailscale and the team I work with uses it daily, for free, to connect to our servers and each other's computers. Thanks!
216. knur ◴[] No.31262441[source]
I love tailscale.

Lately I have been migrating all my self-hosted stuff into a raspberry pi (instead of running a public instance in the cloud). It gives me a bit of piece of mind knowing that it adds an extra layer of security (to hit any of my endpoints/apps you would need to infiltrate my VPN). And it will save me a lot of money on hosting.

I don't need to expose my computers publicly or enable upnp or anything. It just works.

217. prepend ◴[] No.31262463{3}[source]
I think they changed from their mission to make password management easy and secure to extracting service fees forever.

I don’t necessarily blame them but think their decision was pushed along by the need for big money.

For example, I think they’d still be able to do the pay once model if they abstracted they storage to work with Dropbox/icloud/OneDrive/whatever.

There’s really no value add as a user for a monthly fee. Although lots of people don’t mind. I’d rather not pay for something as essential and simple as a synchronized, encrypted data blob. I literally replaced it with a Google doc and cutting and pasting more. A filter over Google docs does not require a monthly fee.

I have this problem with lots of SaaS products that could be software if they didn’t want or need lots of money.

replies(1): >>31267882 #
218. depingus ◴[] No.31262480{4}[source]
> And I wouldn’t mind if their friends (that aren’t my friends) watch my movies, either, by forwarding through my friends.

This is the part that doesn't scale. Hell, this is extremely risky even at a small scale. You don't know who your friends' friends are, you will have friends that abuse this, and you will end up with a much larger network than you anticipated.

How many of your friends and family are "friends" with bots on Facebook?

219. yeswecatan ◴[] No.31262486{4}[source]
> It's also great to be able to just ssh into your laptop at home when you're at work and you forgot to push whatever you were working on last night.

What's the difference between using Tailscale for this and just opening the port on your router?

replies(3): >>31262863 #>>31263184 #>>31264890 #
220. vgel ◴[] No.31262492{4}[source]
> People sometimes ask me to describe the differences between Nebula and Tailscale. One of the most important relates to performance and scale. Nebula can handle the amount of internal network traffic and scalability of nodes (100k+ nodes, constant churn) required on a large network like Slack's, but Tailscale cannot. Tailscale's performance is fine for many situations, but not suitable for infrastructure. It is just a fundamentally different set of goals.

Making broad claims like this without a source or links to benchmarks feels like FUD to me. For example Tailscale's comparison page on performance (https://tailscale.com/kb/1148/tailscale-vs-nebula/#performan...) doesn't mention a meaningful performance difference, so if you're claiming they're not telling the truth (by omission), I'd hope to see more to that than just a straight assertion, even just "We tried Tailscale in Slack's network and it wasn't able to keep up with our usage patterns".

replies(1): >>31262546 #
221. rhuber ◴[] No.31262546{5}[source]
Another fair criticism. We will publish the benchmarks and make them repeatable (which most existing ones I've found don't bother to do). We hadn't done so because Tailscale isn't really seen as a direct competitor to what the Nebula project is doing, but if people want numbers, that's a thing we are happy to provide.
replies(2): >>31265922 #>>31266998 #
222. zanny ◴[] No.31262573{3}[source]
I self host headscale as my control node of my tailscale vpn so no sign ins required, I just give keys out to anyone I want in my vpn.

My problem is the client doesn't support multiple servers, so I can't have a work vpn and a home vpn, not even with an easy toggle - you have to run tailscale with different conf options for both. Changing namespaces also isn't easy, so having friends and family segregated even on one server is also a pain point.

replies(2): >>31264189 #>>31270198 #
223. rrix2 ◴[] No.31262577{5}[source]
not having to generate, manage, and distribute wireguard secrets and configurations was good enough reason for me to switch.

Tailscale also provides a "magic DNS" service which lets you resolve your Tailscale device names without setting up unbound etc, and which can relay other requests through to your pi-hole or unbound or whatever, which can then listen only on the tailscale IP address, so no need to run an open resolver or deal with source IP filtering.

e: also, you can share devices between tailscale users without generating, managing, distributing wireguard secrets. You send your pal/partner/kid a link and they can access your fileserver or raspberry pi webserver or pihole server for themselves wherever they are.

224. throwaway894345 ◴[] No.31262610{9}[source]
> They have the financial resources to build it in ~Rust but still chose electron. It’s a mind boggling decision.

Respectfully, I think you may misunderstand the company’s mission.

225. throw0101a ◴[] No.31262619{6}[source]
> No, no, no, no. You haven't really experienced the quality of IPv6 routers at home.

I've been running IPv6 at home >2 years. You're telling me that my own experience is invalid?

replies(1): >>31262711 #
226. xena ◴[] No.31262670[source]
Tailscale employee here. Tailscale has a fallback that does connections to a relay server called DERP. DERP works over HTTPS, so if you can't access the outside world via HTTPS then you have much bigger problems than Tailscale not working.
replies(1): >>31266447 #
227. rhuber ◴[] No.31262675{5}[source]
The Nebula CA we built at Slack was very specific to Slack's internal devops, and just wasn't generalizable. It is highly automated there, and is custom tooling, just as you describe. The open source version is somewhat bare bones (a command line tool for CA vs something like vault).

I will say that the OSS tooling of Nebula is everything someone needs to stand up an entire working network on every common platform (linux/mac/windows/ios/android), but there is a definite gap in simplification that we need to address to make it easier for smaller scale use cases.

We actually have a managed enterprise Nebula offering at my current gig, but that's rather a different market than Tailscale, so I'm avoiding talking as that company as opposed to a Nebula OSS project lead. The commercial offering is targeted at large enterprises, because that's the market where Nebula has unique advantages. It also means we don't currently have a freemium or smb type offering, and are not prioritizing creating one at all. I don't want to give people false hope that we will, and would prefer to see the OSS project improve to address the small-medium use cases.

228. zinekeller ◴[] No.31262711{7}[source]
No, not necessarily, but if you're using an aftermarket router rather than an ISP-supplied router, then this rather long list is not applicable to you.
replies(1): >>31270941 #
229. orliesaurus ◴[] No.31262730[source]
interesting, that's the first thing I also thought of! (in fact I grep'd "hamachi" on this thread) I totally agree - it's a shame hamachi just gave up
230. ReverseCold ◴[] No.31262741{5}[source]
> For a Linux user, you can already build such a system yourself quite trivially by getting an FTP account, mounting it locally with curlftpfs, and then using SVN or CVS on the mounted filesystem. From Windows or Mac, this FTP account could be accessed through built-in software.
231. cma ◴[] No.31262748{3}[source]
What are DIDs: Device IDs?
replies(1): >>31264106 #
232. apeace ◴[] No.31262799[source]
Tailscale's CEO has been tweeting a series of "rejected headlines" for their fundraising announcement. They're pretty funny. I thought the HN crowd would like this one:

> Tailscale raises $100M to do what any Hacker News reader could have done in a weekend [0]

[0] https://twitter.com/apenwarr/status/1521873453921583105?cxt=...

replies(2): >>31263190 #>>31266308 #
233. ◴[] No.31262837{4}[source]
234. colordrops ◴[] No.31262863{5}[source]
Someone answered above - it works even if you have no router you can configure, using NAT busting. I do what you suggest though, just setting up wireguard directly on my OPNSense router. I don't want to get any private company involved in my VPN setup.
235. ncmncm ◴[] No.31262875{5}[source]
Does it matter? Whether they say they will do it, or just do it without saying they will, the experience is the same.

What matters most is if they can. Then, if they ever have done. What I want is that they can't.

replies(1): >>31265442 #
236. colordrops ◴[] No.31262899[source]
Agreed, if you have no need to bust a NAT, just set up wireguard directly yourself, and avoid closed source products from corporations managing your most secure and private data.
237. ibejoeb ◴[] No.31262913{3}[source]
Is that generally true? A third-party authentication servive is needed just to get it going, or is that needed for specific use cases?
replies(1): >>31263532 #
238. colordrops ◴[] No.31262919{3}[source]
Don't you have to also trust Tailscales closed source coordinator node?
replies(1): >>31263663 #
239. bovermyer ◴[] No.31262926[source]
So how do you use this for personal stuff? I know you mentioned the Pi, but what else do you use it for?
240. shepherdjerred ◴[] No.31262932{5}[source]
I haven't payed them a penny despite using their product for a while. And now that I've realized this, I've signed up for their personal pro plan.
241. josephruscio ◴[] No.31262958[source]
Tailscale investor here. I can assure you we share the same vision with the founders.
replies(6): >>31263103 #>>31263309 #>>31264729 #>>31265322 #>>31266524 #>>31269777 #
242. rcfox ◴[] No.31262961{4}[source]
You could spend time to learn about the process, deal with months or years of lobbying, deal with counter-lobbying, and eventually win your position or maybe not. Or you could use this technical workaround.

And maybe we're all worse-off for it, but now you're done dealing with that issue.

replies(1): >>31264434 #
243. ncmncm ◴[] No.31263103{3}[source]
You cannot do that. You might personally share a vision with somebody identifiable. But the vision you say you share is anyway not implemented.

Make the service usable without depending on some internet behemoth who might yank my authentication credentials anytime without notice, and we can talk.

replies(1): >>31263164 #
244. ◴[] No.31263156[source]
245. josephruscio ◴[] No.31263164{4}[source]
vision: (noun) the ability to think about or plan the future with imagination or wisdom. (verb) imagine
replies(1): >>31263926 #
246. pimeys ◴[] No.31263184{5}[source]
Easier. And you don't open the port to a public network.
247. soraminazuki ◴[] No.31263189{3}[source]
IIUC Tailscale controls key distribution, so you'd still have to trust them. However, it might still be possible to eliminate that need for trust by verifying peer connections out of band.
248. jrockway ◴[] No.31263190[source]
There are already comments where people are showing their simple 400 step procedure that can get you 1% of Tailscale.

Never forget https://news.ycombinator.com/item?id=8863

249. babelfish ◴[] No.31263195{5}[source]
https://blog.cloudflare.com/cloudflare-for-offices/
250. ncmncm ◴[] No.31263218{4}[source]
See, I have seen promotions of Tailscale and Zerotier before, but this is the first I have heard of Nebula. If with Nebula I am not beholden to some internet behemoth who may cancel my authentication without notice, I am motivated to try it.
251. ayewo ◴[] No.31263309{3}[source]
> Tailscale investor here. I can assure you we share the same vision.

Outside of say, Garry Tan and Leo Polovets, who could be considered regulars, it’s rare that an investor shows up in the HN comments. Hi!

Your comment is reassuring, but the reality is that other investors will look at their portfolio companies, review the competitive landscape, then decide that they no longer share the vision, in the not too distant future.

252. windexh8er ◴[] No.31263341{5}[source]
They already (sort of) do [0] as they have a "Personal Pro" plan that's not too obvious - personally, I hope they expand to make it more cloud-native via a la carte pricing for those users as I'd pay an extra $x/month for an additional subnet router or three. And, IMO, it's a smart approach - those who are the targeted "Prosumer" might leverage this for their homelab and carry it over with them into the enterprise. I say that it's a smart approach because in my time at a vendor that was slinging security middle boxes - we used to give away our small form factor product to those homelab'ers for free. They'd take them home and see how much the solution could provide, they got comfortable with the UI, and they learned it for their own use cases. And then the path into an enterprise conversation held much less friction.

[0] https://tailscale.com/pricing/

replies(2): >>31265233 #>>31265559 #
253. RobertRoberts ◴[] No.31263376{7}[source]
You haven't proved me wrong, you just said I am wrong.
replies(1): >>31264621 #
254. RobertRoberts ◴[] No.31263439{11}[source]
If they start off as VPN but morph into something more (like Cloudflare, Google, etc...) then it really doesn't matter how you define them "today" if their goal as a company is to become something more/different.
255. Ansil849 ◴[] No.31263458[source]
I couldn't readily find any mention of any third-party security audits.

Compare that to the numerous audits a VPN like Mullvad has had - https://mullvad.net/en/blog/tag/audits/.

256. irq-1 ◴[] No.31263531{5}[source]
> With IPv6 you already know your address and just give it to the peer you are communicating with. You then tell your firewall to allow connections from the address(:port) that the peer tells you. No STUN, no TURN, no ICE.

What about phone networks? (in the US providers block all incoming traffic.) Or other ISPs that block incoming traffic?

NAT has been used to address a fundamental problem of what traffic can be trusted. That's what Tailscale fixes.

replies(1): >>31264905 #
257. ncmncm ◴[] No.31263532{4}[source]
Apparently the third-party authentication service is needed just to get it going. If you get an "enterprise license" you can choose among more authentication services, but not yourself.

Some people suggest trying Nebula instead.

258. tomputer ◴[] No.31263601[source]
For almost a decade I have worked with IPsec and OpenVPN solutions for both client and site-to-site VPN tunnels. On enterprise hardware, community/proprietary software and at public cloud providers. I still work with these because today many vendors only support IPsec.

A few years ago I discovered WireGuard and I was really amazed how easy it was to setup a tunnel. Especially if you've dealt with IPsec before. It felt as easy as creating an SSH tunnel between two servers, with only 4 or 5 lines of code in a config on both sides.

Then last year I discovered Tailscale and I was blown away! How did this even work[1] without opening ports in the firewall? And how cool is it that I no longer have overlapping addresses[2] from other networks. Within 15 minutes I had my own mesh network between my Mac, iPhone, Raspberry Pi and other servers. Fantastic!

I'm on the Personal/Free plan but if this would no longer be free, I would be happy to pay for this service (shut up and take my money).

[1] https://tailscale.com/blog/how-tailscale-works/

[2] https://tailscale.com/kb/1015/100.x-addresses/

replies(1): >>31270222 #
259. wmf ◴[] No.31263663{4}[source]
Which also applies to Tailscale's SD-WAN and cloud VPN competitors.
replies(1): >>31263969 #
260. legalcorrection ◴[] No.31263755{6}[source]
The point is for the user to not have to go configure their firewall.
replies(1): >>31264872 #
261. biohax2015 ◴[] No.31263786{3}[source]
1Password is a phenomenal product. Idk what HN's obsession with ragging on it is about.
262. fwip ◴[] No.31263828{5}[source]
That's reassuring, the phrasing of "nobody can access prod without a Slack bot" was worrying.
263. zellyn ◴[] No.31263842{3}[source]
That, plus fanatically good NAT Traversal: https://tailscale.com/blog/how-nat-traversal-works/
replies(2): >>31265916 #>>31271594 #
264. kyawzazaw ◴[] No.31263886{3}[source]
Avery Pennarun is CEO.

David Crawshaw is CTO.

replies(1): >>31263956 #
265. planb ◴[] No.31263894[source]
SSH'ing to a raspberry pi in my parent's basement where my beer is fermenting has been the killer use case for me. Their crappy IPS router does not allow port forwarding, but with Tailscale I can directly access the sensors. Only today I learned that I can even use Tailscale as an exit node (to the internet or the local network) and therefore use it like a normal VPN.
266. ncmncm ◴[] No.31263926{5}[source]
Vision is one thing, shared vision entirely another.
267. tomhallett ◴[] No.31263934[source]
I'm trying to connect Tailscale's product with their goal "The internal dashboard and CI system that will never need to be public-facing. The HR database that will always have far less than a thousand queries per second. The dozens or hundreds of devs that ssh or RDP into servers, not the millions of users being served."

Does this mean - instead of deploying a dashboard/ci to aws, I should host it "locally" on a single computer (macbook, raspberry pi) and then internal employees can access that site via Tailscale's network layer?

268. obogobo ◴[] No.31263940{3}[source]
it was down for many folks about 2 hours after you posted this lol
269. ncmncm ◴[] No.31263956{4}[source]
I am corrected.
270. colordrops ◴[] No.31263969{5}[source]
But doesn't apply to my wireguard setup on my OPNSense installation at home.
replies(1): >>31264423 #
271. dcow ◴[] No.31263976{6}[source]
And what should replace it? Rust? Cargo? Oops. (I believe 1Password uses Rust for security-sensitive parts too, btw.) I'd genuinely like to know what the correct tech stack for a password manager is today because using the right one is important to my current endeavor.

Regardless at Uno we're working on a password manager with a native app and rust core. It's geared more towards everyday consumers than power HN users, but you might find it interesting. The rust core including api server is open source right now because that's one point where we diverge from 1P. Whatever tech stack you choose, it needs to be openly auditable so that the community can collectively ensure it remains secure. https://github.com/withuno/identity

272. dcow ◴[] No.31264024{6}[source]
Which functionality was removed by switch stacks? What is the actual usability impact? I currently use 1Password7 and haven't updated to 8 so I'd like to know before updating.
273. IceWreck ◴[] No.31264059[source]
Even if it does go away, youre not loosing anything. Its functionality can be replicated with a USD 5 VPS using Slack's nebula (not wireguard based) or any wireguard based tool like headscale, innernet, netmaker or plain old wireguard.
274. lazzlazzlazz ◴[] No.31264106{4}[source]
Decentralized Identifiers: https://www.w3.org/TR/did-core/
replies(1): >>31267720 #
275. ptomato ◴[] No.31264146{3}[source]
only with an enterprise subscription.
276. _abox ◴[] No.31264166{3}[source]
Thanks, I thought I knew all the major mesh VPN options (tinc, nebula, tailscale, zero tier, hamachi) and yet I never heard of yggdrasil.

This is the kind of comment I love HN for!

replies(3): >>31265825 #>>31270944 #>>31275314 #
277. GekkePrutser ◴[] No.31264189{4}[source]
Thanks the main objection I have with tailscale is that you can't self-host (and you need external identity providers). I had no idea there was a self host option. I'll investigate. I assume it's an unsupported community option?
replies(1): >>31265304 #
278. GekkePrutser ◴[] No.31264204{3}[source]
For me: direct routing between endpoints, thus reducing the lag and spec restrictions you get from routing through a single VPN server.

Other things are seamless transition to local networks, and you can even have local network encryption.

279. FL410 ◴[] No.31264233{4}[source]
Nebula rocks!
280. AndyNemmity ◴[] No.31264254[source]
Tailscale is one of the products I most love. It does what I want it to do. I don't have to think about it after that.

If all tools were this reasonable, I'd be very happy.

281. FL410 ◴[] No.31264257{4}[source]
I am curious what you found complex - was it the PKI? I was able to get Nebula up and running WAY faster than any of the others. It's two (well really only one) binaries and a config file - the simplicity is awesome.
replies(2): >>31264889 #>>31264992 #
282. Sohcahtoa82 ◴[] No.31264416{4}[source]
What other benefits are there? I use a PiHole to block ads on my phone already, but I do it via a PiHole installed on an EC2 instance that I also use as an IRC bouncer and other things.
replies(2): >>31264883 #>>31265929 #
283. wmf ◴[] No.31264423{6}[source]
This is the HN disconnect: people commenting here have completely different concerns than Tailscale's actual customers.
replies(1): >>31265253 #
284. aaronax ◴[] No.31264434{5}[source]
Yes, so I think it is reasonable that someone who stumbles upon $100,000,000 and wants to "fix the Internet" aim a little higher than making it as easy as possible to do the technical workarounds that leave us all worse-off.
285. stavros ◴[] No.31264527{7}[source]
Ah, it looks like the firewall rules need to be copied to each host separately. That's not a dealbreaker, but not as easy to deploy as having them managed centrally (by the lighthouse, I guess?).
286. st3fan ◴[] No.31264572{5}[source]
> I thought customers were complainingly loudly against ...

No, you confuse "customers" with a vocal minority.

287. jaywalk ◴[] No.31264621{8}[source]
I don't have to prove you wrong, I'm not making an assertion. It's on you to prove that your assertion is correct, and you have nothing more than your opinion backing you up.
replies(1): >>31266172 #
288. klazutin ◴[] No.31264647[source]
I've tried Tailscale recently after reading all the raving reviews here on HN. The service is very easy to install and the apps are nice to use, everything is just very well done.

However, I just don't see much difference from my vanilla Wireguard setup. Granted, my use case is very simple, just connect a few devices at home and in the cloud into a single network and use one of them as an exit node, but I'm still not sure what would make me prefer Tailscale over Wireguard.

So far the biggest difference has been that it makes me use an external identity provider instead of having to manually exchange keys between devices, and I'm not sure I'm very comfortable with that.

replies(2): >>31264706 #>>31268227 #
289. jjeaff ◴[] No.31264665{4}[source]
I don't think that is an anti-pattern. One well secured point of access is better than various http access points with varying levels of security and maintenance levels, all requiring frequent manual update to stay secure.
replies(1): >>31265838 #
290. lupire ◴[] No.31264675{4}[source]
You can do some things that you don't want to do.

If someone uses a rubber hose, you might be forced to communicate against your will, using the fixed Internet.

291. lupire ◴[] No.31264706[source]
The answer here depends on a side by side pair of walkthroughs for setting up and maintaining Tailscale vs plain Wireguard.
292. woodruffw ◴[] No.31264710{5}[source]
This is a strange example to pick given that (1) it's a war, and (2) a significant percentage (majority?) of Namecheap's employees and offices are in Ukraine.

If we (the US) decided to invade Canada tomorrow, you can be certain that the maple syrup would stop flowing.

Edit: According to their website[1], the overwhelming majority of their employees are in Ukraine. Two of the three cities they have offices in are on the current combat front.

[1]: https://www.namecheap.com/careers/ukraine

replies(1): >>31268264 #
293. jjeaff ◴[] No.31264717{4}[source]
But is "buy once, upgrade forever" really a viable long term business model?
replies(2): >>31264757 #>>31271758 #
294. bruckie ◴[] No.31264720[source]
Yes. Tailscale subnet router. https://tailscale.com/kb/1019/subnets/
295. lupire ◴[] No.31264729{3}[source]
I have no reason to mistrust your vision or current intent, but I also have no reason to believe that you are stronger than the weight of $100M dollars.
296. lupire ◴[] No.31264754{3}[source]
I can't afford Enterprise "contact us" pricing for personal use or small team.

They don't even give the option to try to debug my own identity provider.

aka the BYO SAML feature does not exist for personal or small team/business users.

But maybe that's the point? TailScale's product is actually an identity integration layer for Wireguard? If you don't need an identity provider, Tailscale doesn't add value over Wireguard?

297. samhw ◴[] No.31264757{5}[source]
I dunno, but you ought to figure it out (for your business) before you make that offer!
replies(1): >>31266444 #
298. danenania ◴[] No.31264784{4}[source]
Electron actually offers some of the best dependency-isolation capabilities of any language/platform given that you can set a content-security policy and leverage Chrome's extremely robust sandboxing to prevent front-end dependencies from accessing the file system, making network calls to untrusted domains, making system calls, calling 'eval', etc.

A fully native app will offer you no such protection. If a dependency used for styling or animations or whatever is compromised, it will have total access to the system and be able to exfiltrate at will to any location. In Electron, the equivalent dependencies can instead run inside the CSP sandbox, preventing them from doing any serious harm.

Supply chain vulnerabilities also aren't unique to npm. Any project that uses dependencies (in any language) has the same issue.

replies(1): >>31267960 #
299. ◴[] No.31264792{5}[source]
300. lupire ◴[] No.31264794{6}[source]
> the overhead associated is less scalable than just not doing it at all

That's only true if you can actually articulate a reason why it won't scale to some matbitut that some user might actually need today or at some point in the future.

For example, Go may be "not as scalable at C" (or vice versa! Or both!), but what matters is the scale to which it is actually desired to be deployed.

replies(1): >>31265394 #
301. fullstackchris ◴[] No.31264810[source]
Crap... is this literally the product I've been MVPing the past few weeks? (https://kurynt.com) - or do I still have a chance?

Full disclosure - there is little to no functionality yet, but the homepage is enough

replies(1): >>31264830 #
302. samhw ◴[] No.31264813{5}[source]
If the open source implementation is equally good, I'm sure people will use that instead of Tailscale. That Tailscale exists makes me suspect that the open source implementation - as is usually the case with these "just use curlftpfs!" comments – is not equally good.

The reality is that making software, like any other human endeavour, takes time and energy. Paying one another money is a rather well-established mechanism of rewarding and incentivising that time and energy (since not everyone wants to work free of charge to make and maintain software for you, out of the goodness of their hearts, no matter how much you insist that you're owed their unpaid labour).

There are small and local means of getting free food, or free woodworking, etc, but the general reality is that a high-quality high-dependency maintained product, over the long term, is more feasible when it's paid.

replies(2): >>31265858 #>>31278017 #
303. fullstackchris ◴[] No.31264830[source]
OK, reading the comments it is a totally different product, but I guess I have to try it!

"Zero config VPN. Installs on any device in minutes, manages firewall rules for you, and works from anywhere."

Okay... at first I said to myself, _no way_. But then I thought, "Any sufficiently advanced technology is indistinguishable from magic."

304. fullstackchris ◴[] No.31264845[source]
But HOW can this work? It MUST have config level access to each machine, that's the only way I can see this working. I guess I just have to try it to see.
replies(1): >>31265799 #
305. throw0101a ◴[] No.31264872{7}[source]
Which can be done via UPnP and PCP, and without having to maintain TURN/STUN/etc infrastructure. The latter of which can only be done with IPv6, since with IPv4 you're NATing.

So IPv6 makes things easier—which was the point of my post: IPv6 makes things easier.

306. pkulak ◴[] No.31264883{5}[source]
It means you can self host all kinds of things and never worry about opening a port on your router.
replies(1): >>31265059 #
307. JeremyNT ◴[] No.31264889{5}[source]
It's easy to get started, but the issues come mostly from managing that "just a config file" over time.

Have a bunch of new nodes? Replacing a lighthouse? Revoking and replacing certs?

Here's a mistake that I made personally. Did you read the docs fully and realize that the default expiration for a CA is one year? The same is true for certificates. You need some kind of tooling to rotate certs every year, by default, or one day you'll find your entire overlay network disappears.

What about the ACL lists? Well, they're just stored in that same config file. What if you add a new service you didn't count on initially? Or you have a new class of clients?

What if your lighthouse needs to change its IP address? Or you need to retire and replace it outright?

And if you have hosts coming and going a lot, suddenly managing all those configuration files looks like quite a pain indeed...

None of this is unsolvable - assuming you have root on all the nodes you care about. You could even create tooling to automate these things with some kind of configuration management system (which indeed, if you are deploying to more than a handful of systems, you basically must do). But these pain points will eventually add up if you are just trying to connect to friends.

replies(1): >>31265035 #
308. pkulak ◴[] No.31264890{5}[source]
Like a million times more secure.
309. ◴[] No.31264905{6}[source]
310. benjaminwootton ◴[] No.31264948[source]
Every time I refresh my feed I read about another company raising tens of $millions.

A lot of that is Crypto related, but money seems to be absolutely flooding into tech at the moment despite all of the doom and gloom around

311. throw0101a ◴[] No.31264973{7}[source]
With IPv4 I have to worry about UPnP/PCP working and TURN/STUN/etc non-sense when it comes to peer-to-peer protocols. With IPv6 I only have to worry about about UPnP/PCP working. In my books that's an improvement.

If I want to self-host something, then with IPv4 I have publish my IP and worry about the CPE supporting port forwarding. With IPv6 I have publish my IP and use UPnP/PCP to allow all connections. Is there any CPE gear that does not support UPnP/PCP?

312. anderspitman ◴[] No.31264974[source]
> Web3 happens when people can host stuff on their phones

This has essentially been the guiding principle of my side projects for the last two years. Folks shouldn't need to understand DNS, TLS, HTTPS, IP addresses, ports, NAT, CGNAT, etc in order to own their data. Self-hosting a small server for you and your friends shouldn't be any more difficult or less secure than installing an app on your phone.

313. depingus ◴[] No.31264992{5}[source]
I found it too complex for a lay person. On a regular computer or server its not too bad. I can send someone a config file with the certs and keys already built in. That's easy enough. But on mobile it requires a back and forth exchange of keys over a different medium.

Compare that to ZeroTier where I can just tell someone, "install this app and punch in this Network ID". Also, ZT lets me control the entire network firewall from a centralized place. Where Nebula is doing it on a per-client basis and requires new certs if device groups change.

I don't want to talk up ZT too much though. Their self-hosted option is a joke. There is no webui. You have to do everything via the API...including the firewall rules; And you have to write those rules in the non-human readable format that their webui abstracts away. Worse still, their mobile apps won't work with the self-hosted option. I used them to get something up and running quickly, but I'll probably end up on Nebula anyways.

replies(1): >>31265633 #
314. anderspitman ◴[] No.31265016{6}[source]
For more background on just how much Tailscale is doing for you with respect to NAT:

https://tailscale.com/blog/how-nat-traversal-works/

315. depingus ◴[] No.31265035{6}[source]
Just FYI, when you create a CA cert or sign certs with nebula-cert you can specify a -duration. Which I know doesn't help you after the fact, but it might help someone going forward.
replies(1): >>31266051 #
316. anderspitman ◴[] No.31265059{6}[source]
As long as you don't need to share any of your services with non-Tailscale users. Otherwise you'll need to set up some sort of public server.
replies(1): >>31265644 #
317. anderspitman ◴[] No.31265104{4}[source]
Definitely stealing mom-technical. Though I do disagree somewhat with the conflation with blue-collar. I would almost argue white-collar folks are less likely to understand computers.
318. chipsa ◴[] No.31265111{3}[source]
I've seen them mention that they're looking at having the coordination server being self-hostable (and is for some client already), so I expect that to be one of the things you can get at the higher price points in the near future.
319. orojackson ◴[] No.31265188{4}[source]
For enterprise, sure, using a separate IDM provider works, but last I checked, neither Okta nor OneLogin cater to individuals and their personal accounts. So as far as threat models go, I understand why people view this requirement from Tailscale as utter garbage for personal accounts.
320. seedie ◴[] No.31265233{6}[source]
I remember Astaro did this with their Astaro Security Gateway UTM solution. Provide a full featured software appliance for home users and hope the admins are so caught up that they don't want to change to another vendor at work. Astaro got acquired by Sophos in 2011 but I just checked, they still offer the Sophos UTM Gateway in a Home edition.

https://www.sophos.com/en-us/free-tools/sophos-xg-firewall-h...

321. apitman ◴[] No.31265249[source]
Why use SSH? With Tailscale all you need is rsh ;)
322. colordrops ◴[] No.31265253{7}[source]
That is true. Sometimes we are talking about the business aspects of product-market fit, and sometimes we are talking about our own personal use of the product or domain. In this case it's both.
323. polote ◴[] No.31265274[source]
> The biggest risk that this company has is that Cloudflare (in all reality) should just buy them or reimplement it. It’s the type of product cloudflare would make, that’s for sure.

The same thing is being said on HN about all kind of network software, but tell me one software that Cloudflare is really known for except its cdn ? None.

HN is really a strong echo chamber and some people believe Cloudflare and Stripe are going to be the leader in all software areas. (Even though Cloudflare is not the leading CDN and Stripe is not the leading payment processor). They are both amazing companies but they won't fix all problems of the world. I would even argue that they won't even solve more than their current core domains

replies(3): >>31265346 #>>31265897 #>>31271702 #
324. seedie ◴[] No.31265304{5}[source]
op is talking about headscale [0] "An open source, self-hosted implementation of the Tailscale control server"

[0] https://github.com/juanfont/headscale

325. anderspitman ◴[] No.31265322{3}[source]
The problem is that vision has a pretty poor track record when going head-to-head with incentives.
326. freedomben ◴[] No.31265346{3}[source]
We must be in different circles, because WAF (web application firewall) is what I would say they're most known for. But I agree Cloudflare isn't well known (at least yet) fort many of the other things they offer. Been a lot of buzz around workers but I haven't tried it myself yet.
replies(1): >>31266523 #
327. ignoramous ◴[] No.31265378[source]
> We've raised $100M in a Series B financing led by CRV and Insight Partners

I see they are staying away from a16z ;)

> We don't want to put revenue ahead of quality, because our stats say quality is where all our growth comes from.

Dr. Deming shining through here [0], but really, even this 1986 article paints a neat little picture of how I presume tailscale's operating at the moment: https://hbr.org/1986/01/the-new-new-product-development-game

> How, Avery, on earth, are you all planning to spend one hundred million dollars?

Wireguard platinum sponsorship in 3, 2, 1...?

> Now I just tell people: We're here to fix the Internet. If we don't, who will?

I called this a year ago, as it was pretty evident to me even then (downvotes notwithstanding), but I'd not be surprised if tailscale became a ISP someday, given their holistic approach to product development: https://news.ycombinator.com/item?id=26249199 But hey, there are many more people working to fix the internet... including tailscale clones and other over-funded/under-funded developers, which brings me to...

> I mean, imagine. What if the Internet just worked like it was supposed to? [and goes on to list e2ee + Mobile IP + SSO + DDNS + NAT Traversal]

If you squint just enough, it reads like the MASQUE protocol (built atop QUIC) that Google, Apple, Cloudflare are working to standardize: https://ietf-wg-masque.github.io/

That said, in time, I see tailscale not only compete with Zscaler, but also with Tanium, Cloudflare, CrowdStrike, F5, Palo Alto Networks and the likes. Once they are embed in an enterprise' network, there's very little their product couldn't expand into to make other SaaS / solutions obsolete.

[0] Systems thinking and Deming, https://archive.is/tXJhw

328. rhuber ◴[] No.31265394{7}[source]
I mean... the title of the Tailscale blog post is "Tailscale raises $100M… to fix the Internet", and that's pretty massive scale. /s

I don't have 100k hosts on a large network to test deploying Tailscale, but if I did, I'd be benchmarking the cpu/network/storage overhead of telling 99,999 hosts about a new one that comes online, every time that happens, or every time its pubkey changes. You can optimize this away _if_ your "fan out" is not as large, but there are plenty of cases where every host on your network needs to talk to a particular host, so all of them need to know about its keys as soon as possible.

Again these aren't unsolvable problems, to a point, but we didn't want to solve a problem when we could avoid it entirely, so that's the path we chose. It removes complexity and is a good part of the reason the system we built has been resilient.

A complaint some people express about tailscale is the battery life on mobile (or at least iOS). This exists because there is coordination overhead on even idle tailscale nodes. Back when we ported Nebula to iOS, we sweated details like "how often it wakes the radios" and did a lot of profiling. I never turn Nebula "off" on my iPhone, and it just sits in there in the background not using any resources most of the time.

We worked hard to optimize this out of our architecture, so that Nebula avoids generating traffic that is unrelated to the actual communication between hosts or lookups to lighthouses. An idle nebula tunnel can truly be idle indefinitely, and that also matters as the set of hosts becomes larger.

I do not think the Nebula project and Tailscale are direct replacements for each other in any fashion, and afaik neither is trying to be. I'm just pointing out that different design goals led to unique advantages and disadvantages to each architecture.

329. naikrovek ◴[] No.31265442{6}[source]
you want a free service written, maintained, and hosted by others that they don't control. Am I understanding you?
replies(1): >>31265589 #
330. criddell ◴[] No.31265482{4}[source]
Doesn’t putting Tailscale in the middle mean you are now hoping they are secure? I supposed that’s probably better than connecting to the VPN on your home gateway router that your ISP has access to.
replies(1): >>31268173 #
331. ignoramous ◴[] No.31265499[source]
Well, we run our servers without ssh access... no amount escalation through ACLs / Security Groups let you in. Can't say it would work for everyone, but at least, no one can mutate prod unless the code itself exposes those interfaces.
332. airstrike ◴[] No.31265555{3}[source]
"It's just FTP with curlftpfs and SVN"
333. chipsa ◴[] No.31265559{6}[source]
I think they've said they don't actually enforce the usage limits, so you can add an additional subnet router and they largely don't care (because they haven't put the engineering into enforcing the limits, because it doesn't actually use up appreciably more resources for them when you exceed those limits). I think they do enforce the user limits though.
334. ncmncm ◴[] No.31265589{7}[source]
No. I would be happy to pay for service, but they offer no choice but to rely on somebody else's authentication, regardless.
replies(1): >>31265854 #
335. antihero ◴[] No.31265604{4}[source]
Ah, the exit node thing is really cool, always handy to have a residential IP to route through too :)
336. api ◴[] No.31265633{6}[source]
> Their self-hosted option is a joke. There is no webui.

There's a community developed one:

https://github.com/key-networks/ztncui

replies(1): >>31268518 #
337. ignoramous ◴[] No.31265635{5}[source]
You're not wrong but they do seem to want to keep focusing on consumers (not just developers), teams, and enterprises all at the same time but market [0] the product differently.

> If we're going to fix the Internet, there's no point only fixing it for big companies who can pay a lot. That misses the point of the whole adventure. The Internet is for everyone. We have to fix it for everyone, or why bother? We knew we had to design a business model and a technical architecture that removes any incentive to abuse your privacy. Providing an ever-expanding free tier is how we help as many people as possible.

> ...

> Tailscale's go-to-market strategy is what we call bottom-up growth, or product-led growth (PLG). An earlier name for this is "GTM 3.0", which is explained beautifully in a presentation by Adam Gross... To summarize: in GTM 3.0, you give away an unlimited free tier for individual use (Not a trial, a free tier; this is what makes it different from GTM 2.0). Then, for collaboration in small teams, you charge a bit. Then, for big company control and auditability, you charge even more. At each level, the value proposition is different, so that users use your tech differently and benefit differently from it. And at each level, the buyer is different, so the messaging is different.

From tailscale.com/blog: How our free plan stays free, https://archive.is/R7jqw

[0] https://en.wikipedia.org/wiki/Marketing_mix

338. Melatonic ◴[] No.31265636[source]
I think your last point is what many of us are hoping Web3 really is
339. vineyardmike ◴[] No.31265644{7}[source]
But you can also try to get them to be Tailscale users and effortlessly share the devices with access control features they built. I share my home servers and game servers with family/friends easily while still keeping everything off the public internet.
replies(1): >>31266200 #
340. SparkyMcUnicorn ◴[] No.31265678{6}[source]
> I can't trust that they don't hold master keys to all the vaults on their saas offerings.

So you think they could be lying about their fundamental selling point, and hiding it in all of their audits? Personally, I'd trust them more than Apple/Google/etc.

https://support.1password.com/1password-security/

https://1passwordstatic.com/files/security/1password-white-p...

https://support.1password.com/security-assessments/

341. chipsa ◴[] No.31265757{4}[source]
They don't want to build basic auth. They probably could, but it gives them more headaches and customer service touch points compared to delegating that out. Like: what if the user forgets their password? Or what if they lose their 2FA device?
replies(1): >>31265792 #
342. SahAssar ◴[] No.31265776{3}[source]
Requiring you to disclose info to google, microsoft, okta or onelogin can very clearly be an "attitude towards privacy", right?
replies(1): >>31269500 #
343. 1vuio0pswjnm7 ◴[] No.31265787[source]
"Being based on open source wireguard, and being just a STUN/TURN server at its core... I'm sure that Tailscale will be the first but maybe not the best."

I like this assessment. "[J]ust a STUN/TURN server at its core." It gives me hope maybe more people are starting to learn how to look at peer-to-peer not as something that is unreasonably complex and off-limits to ordinary users. LAN-like connectivity is not just for offices and gamers.

Of course, following a STUN/TURN standard is just one approach to a rendezvous server. It isn't the first or last approach to have worked.

By "rendezvous server" I mean a program that accepts connections and saves each client's address and open port number and makes this data available to other connecting clients, thereby allowing one client to connect directly to another client without involving the rendezvous server. The server needs only to tell clients about IP addresses and port numbers, nothing more.^1 Thus it can be a relatively small, relatively simple program.^2

I hope that going forward there will be even more choice in small, open source rendezvous servers, not created for commercial purposes, that ordinary users can run on globally reachable IP addresses. Most users must "lease" these addresses from others. Because not every user has a globally reachable IP address available, the use of "hosting" and now what people today call "cloud" services has been necessary.

Enormous amounts of traffic are passing through these third party "cloud" providers. They are, to use a popular term, "gatekeepers". Business customers, including ones who already control globally reachable IPv4 address space, let alone individual customers without such resources, are effectively beholden to them if they want to be on the internet. Not only that, the services are generally expensive.

However no data needs to be sent to or received from a rendezvous server other than address and port information. If customers are charged based on ingress/egress, it could be affordable for users to run these small programs on a "cloud server" due to the smaller amount of data transfer. With less data being sent to these third party providers, the privacy concerns would arguably be reduced as well (cf. eliminated).

The ability to connect devices directly over a network, including the internet, should not be monopolised like so many other aspects of the computers and the internet today. It should be available for everyone. The only cost should be paying for the globally reachable IP address and a tiny amount of traffic required for running a rendezvous server.

1. The advantage here is that the program can be easier and quicker to compile and users may be more inclined to read the source code and, optionally, make edits and recompile. Non-commercial, not a complex program like a web browser that is prohibitively slow to compile that almost no one compiles for themselves, nor one that few people have both the aptitude and inclination to read, edit and improve its source code.

2. Yes, there can be exceptions. For example, in some cases two clients using the same ISP might not be able to reach other directly. But these cases are the exceptions, not the rule.

344. systemvoltage ◴[] No.31265792{5}[source]
Yes, welcome to operating a SaaS.
345. ramary ◴[] No.31265799{3}[source]
It's a really neat piece of software - you're right that it does have the ability to configure your system, routing tables in particular.

The Tailscale agent (thing that runs on your machine) changes the system routing table (at least on Linux) and uses policy-based routing (marks packets destined for the "Tailnet" specially) to build the overlay network. Since everything is done at L3 in the OSI model, iOS and Android clients (in the form of an app) are also available without needing root (jailbreaking).

There are some things it can't do owing to the whole thing operating at L3, but it's a really awesome implementation nevertheless. And just to add, they aren't the first to build a product like this, but they do it incredibly well and the time to value for most users is extremely short, made even better by the fact that the expectation is that the time to value will be long(ish) and painful.

346. ctrlc-root ◴[] No.31265825{4}[source]
Here's one more: https://fastd.readthedocs.io/en/v22/index.html
347. shepherdjerred ◴[] No.31265838{5}[source]
I meant that for larger organizations where security is a concern you'd want both -- your network should be secured and the individual applications should be as well. Again it's contextual advice and really doesn't matter for my internal site where there's not too much at stake.
348. naikrovek ◴[] No.31265854{8}[source]
read harder next time. https://tailscale.com/kb/1119/sso-saml-oidc/
replies(2): >>31270238 #>>31270408 #
349. shepherdjerred ◴[] No.31265858{6}[source]
It's the same argument as the famous Dropbox comment[0]. I'm generally going to prefer a polished service over a technical solution.

[0]: https://news.ycombinator.com/item?id=9224

replies(1): >>31267992 #
350. nickysielicki ◴[] No.31265897{3}[source]
I bring up cloudflare because the technologies involved with Tailscale are really cloudflare core competencies. Cloudflare runs 1.1.1.1/WARP which is a massive dns server and wireguard VPN, respectively. They already have Cloudflare Access. It’s a natural fit. It’s pretty easy to imagine that cloudflare is better positioned to steal customers from Tailscale than Cisco, F5, or Fortinet.

Cloudflare needs to solve two problems: they need to introduce a free tier of Access that doesn’t use the CDN and creates direct connections between endpoints (to basically remove all operating costs), and they need to make the onboarding process for hobbyists easier instead of having a “contact sales” link on their homepage for these products. That’s doable.

351. zepearl ◴[] No.31265916{4}[source]
But isn't that just part of Wireguard itself? In the end that's what's happening in my case when I exchange data through Wireguard between my flat and the one of my parents... .
replies(1): >>31266087 #
352. SahAssar ◴[] No.31265922{6}[source]
So "People sometimes ask me to describe the differences between Nebula and Tailscale" and the answer is "performance and scale", but you don't have clear comparisons for those numbers?
replies(1): >>31266049 #
353. Spooky23 ◴[] No.31265929{5}[source]
It’s pretty similar as far as how it works for you.

It may be cheaper to VPN to home vs a cloud server, and you may avoid issues where sites block AWS. You can also securely forward other ports. Sometimes I print or access other services in my house that aren’t internet safe.

replies(1): >>31266277 #
354. kall ◴[] No.31265980[source]
Congratulations to Tailscale. Imagine how many times you can migrate to a new novel database architecture with that kind of money.
355. rhuber ◴[] No.31266049{7}[source]
We have an automated set of ansible scripts that spin up large groups of hosts for Nebula performance regression testing, and a while back I added zerotier, tailscale, wireguard-userspace, wireguard, tinc, ipsec, and openvpn to that automation so I could get a sense of where things stand. I spent a lot of time optimizing each of the above options to make fair comparisons, but it was mostly for mine and the team's curiosity, and we weren't interested in playing benchmark-fight with similar softwares of the world.

Publishing repeatable benchmarks is hard, and when doing open source work, it just hasn't been a priority. As I replied above, if I'm going to say it I should prove it, and I promised to do just that.

And a counterpoint: tailscale does mention in the "Tailscale vs Nebula" article on their website that performance is just about the same but similarly provides no proof. This is motivation enough for me to show proof of the opposite, I guess.

356. JeremyNT ◴[] No.31266051{7}[source]
Very good to know! I did learn this and used 10 year certs/ca when my originals expired... as will presumably most of the other people who didn't fully grok the implications of the defaults :)
replies(1): >>31266113 #
357. seabrookmx ◴[] No.31266087{5}[source]
No, wireguard is just the VPN itself.

The NAT traversal stuff is all magic that happens before the socket is given to wireguard.

replies(1): >>31273161 #
358. rhuber ◴[] No.31266113{8}[source]
We need to do a better job of this and I'm really sorry you had a not-great experience with expiration. Totally agree with your take.
replies(1): >>31273594 #
359. RobertRoberts ◴[] No.31266172{9}[source]
The idea of "you have something permanently static that identifies what is yours" on the internet that never goes away, and it runs through a corporation's server, that supposedly is marketed as "fixing the internet"... do you really think this sounds good?
360. crthpl ◴[] No.31266194[source]
From their privacy policy: > The personal information we collect, use, and disclose includes business contact information such as names, job titles, and company email addresses, as well as information about individual devices (such as device hardware and operating system) and aggregated usage statistics (such as amount of data transmitted in a period of time).

> Your personal information will be transferred ... to certain third parties that provide services on our behalf.

> We use service providers to provide services such as ... data analysis to better understand and improve product and website usage, and providing advertising and marketing services.

:/

361. apitman ◴[] No.31266200{8}[source]
But now your friends and family are locked into a proprietary system, subject to whatever the future incentives of Tailscale end up being. How many people can you connect on the free plan?
replies(2): >>31267453 #>>31288614 #
362. Sohcahtoa82 ◴[] No.31266277{6}[source]
I have the PiHole VPN configured so that only DNS lookups go through it. All other traffic is not tunneled. It means I don't get billed for several gigabytes of traffic from AWS and my traffic doesn't come from an AWS IP, but I still get all the ad-blocking benefits of a PiHole.

At home on my desktop, I just use uBlock Origin in my browser.

replies(1): >>31269013 #
363. falcolas ◴[] No.31266299[source]
First - congratulations! I like the idea behind your product. Easily configured VPN tunnels are something I enjoy having.

But, and I'm probably just shouting into the void at this point, relying upon your network being secured as a method of securing your office/product will only result in heartache.

If you're a company SEO or similar trying to protect your company from threats, your first assumption must be "the network is compromised" no matter whether it's on the internet, or VPN tunnels, or firewalled local network.

replies(1): >>31274056 #
364. anderspitman ◴[] No.31266308[source]
Makes me miss n-gate.
365. pottertheotter ◴[] No.31266360{4}[source]
That happened long before they took outside money, so it’s not related.
366. skinnymuch ◴[] No.31266444{6}[source]
Why? 1PW is succeeding. They didn’t do some huge moral quandary either that would make stopping the one time buying product a moral failing. People like the first commenter and myself have used 1PW for many years too and are fine with what has gone down.

Vs a clear moral screw up like the big tech companies colluding to not hire one another’s employees.

replies(1): >>31291079 #
367. anderspitman ◴[] No.31266447{3}[source]
Is DERP raw HTTP or based on WebSockets?
replies(1): >>31268362 #
368. skinnymuch ◴[] No.31266473{5}[source]
A small vocal minority. The company’s two relatively recent fund raises are massive.
369. devman0 ◴[] No.31266523{4}[source]
CDN and Reverse Proxy are Cloudflare's bread and butter really, WAF came later. The issue is that those technologies are rather invisible to most users when they are working correctly.
370. archon810 ◴[] No.31266524{3}[source]
For those curious: https://www.linkedin.com/in/josephruscio.

Seed investor in Tailscale since 2019.

371. devman0 ◴[] No.31266547{6}[source]
Is forwarding a single port that difficult in most circumstances? I do realize there are some instances where that is hard like CGNAT, but if I have easy access to wireguard in my network already what does tailscale buy me?
replies(1): >>31266791 #
372. kbumsik ◴[] No.31266737{4}[source]
Really? I have more than 1000k files and I have never faced issues for more than 7 years.
373. donaldihunter ◴[] No.31266791{7}[source]
I was running Wireguard exactly as you describe, but I'm now using Tailscale because convenience.
374. AceJohnny2 ◴[] No.31266802{3}[source]
Growth as a precursor for revenue.

Massive growth just means you can dominate the market then have more flexibility on the price you'll charge.

375. mrkurt ◴[] No.31266947[source]
Tailscale raised a Series A two years ago. They've been doing fine as it was – running a venture funded, high growth startup.

I am wary of investors wrecking incentives for founders but that ship sails when you raise an A round. They've done an incredibly good job for me in that time, I think they'll keep on doing that.

Why would their free service change? They're going to make money off big companies. They're not going to make money off me with a bait-n-switch to capture my $10/mo personal budget.

376. vgel ◴[] No.31266998{6}[source]
That's fair, if you've been benchmarking but haven't made the benchmarks public / repeatable yet. Too used to software where the authors claim it's fast with no proof or based on heuristics like what language it's written in :-)
377. aetherspawn ◴[] No.31267167[source]
Started using Tailscale the other week and it just blew my mind.

But: Now that they have more money, I just wish they could spend some time making it enterprisey and not hobbyist-ey.

Things like: improve all the screens with high-density modes so we can filter thousands of devices, not hundreds. And make it integrate better with Windows Intune for hands-free deployment i.e. if we're a Hybrid 365 environment, please detect the users credentials from their Windows install and login automatically. Maybe release an installer for enterprise deployment that silently downloads and installs the latest version so that we can i.e. integrate it into a Windows Autopilot unboxing experience.

replies(1): >>31267719 #
378. Serow225 ◴[] No.31267311{3}[source]
fwiw, those on the Enterprise plan can bring their own IdP :) https://tailscale.com/kb/1119/sso-saml-oidc/
379. neycoda ◴[] No.31267366[source]
The fact that money got involved in this means it's already a privacy risk.
380. gzer0 ◴[] No.31267453{9}[source]
Everything in Tailscale is Open Source, except the GUI clients for proprietary OS (Windows and macOS/iOS), and the control server.

Headscale [1] allows one to implement a self-hosted, open source alternative to the Tailscale control server.

[1] https://github.com/juanfont/headscale

Almost all of tailscale is opensourced at this point besides the GUI.

replies(1): >>31267504 #
381. anderspitman ◴[] No.31267504{10}[source]
Does headscale do all the same NAT traversal that Tailscale is capable of?
382. lewisl9029 ◴[] No.31267524[source]
Also been a happy user since their very early days.

I do have some nits though:

- It's kind of finicky on Android, especially with exit nodes enabled. Sometimes I lose connectivity completely after connecting to an exit node, until I flip my WiFi on and off, then everything starts working.

- Not being able to auto-update the desktop clients, or at least update remotely, is a bit of a pain, and potentially a security risk?

383. LoveGracePeace ◴[] No.31267601{5}[source]
I do the same, for multiple domains I own. Definitely not difficult.
384. enos_feedler ◴[] No.31267632[source]
Isn’t it only possible to host things on your phone if you can have a listener that binds to a socket/port? I don’t think mobile apis allow for this. Am I wrong?
replies(1): >>31274977 #
385. ignoramous ◴[] No.31267719[source]
Consider penning your feature requests over at https://github.com/tailscale/tailscale/issues
386. aaaaaaaaata ◴[] No.31267720{5}[source]
Very cool. Microsoft doing newish work on this, too! https://www.microsoft.com/en-us/security/business/identity-a...
387. ignoramous ◴[] No.31267751[source]
There's https://zerotier.com, https://netbird.io, https://defined.net, https://github.com/tonarino/innernet and likely many more.
388. ignoramous ◴[] No.31267812[source]
Quoting Larry Wall there is surely a dig against the HN crowd that likes to quote Rich Hickey's Simple made easy presentation often? https://www.youtube-nocookie.com/embed/LKtk3HCgTa8
389. nicknow ◴[] No.31267882{4}[source]
> For example, I think they’d still be able to do the pay once model if they abstracted they storage to work with Dropbox/icloud/OneDrive/whatever.

I get why they don't but I often wish more SaaS companies had a bring your own computer & storage model. It doesn't make sense for 95% of customers and the 5% of us who might like it and have the tech chops to use it would just complain about having to pay more because we are outliers. But I wish it was offered!

replies(1): >>31276553 #
390. girvo ◴[] No.31267904{3}[source]
For me, its so I can use Moonlight to stream games from my gaming desktop PC to my iPhone using a Backbone One controller.

Handheld Elden Ring is amazing :)

Though my use-case is extremely simple, and so I just use bare WireGuard

391. frutiger ◴[] No.31267917[source]
> I’ve been dreaming lately of a tor-like network that’s based loosely on the idea of tailnets. Rather than blockchain bullshit, you’d have a direct ring of trust with friends, and then you could set up access policies to forward packets for people you don’t trust, but who know someone you do trust.

This is basically just `git pull` on steroids.

392. girvo ◴[] No.31267931{3}[source]
I found 1Passwords UI/UX and development tooling choices... not ideal, as of 1P v8. I miss the native apps, and the latest iOS app/integration had far too many bugs initially (I just use autofill alone now, on my iPhone. Not ideal, but good enough)
393. CryptoPunk ◴[] No.31267947[source]
>>I’ve been dreaming lately of a tor-like network that’s based loosely on the idea of tailnets. Rather than blockchain bullshit, you’d have a direct ring of trust with friends, and then you could set up access policies to forward packets for people you don’t trust, but who know someone you do trust.

The network will coalesce around using a handful of hub nodes for the packet forwarding, and a malicious party need only to coopt that central cluster of nodes to unmask all web users.

The "blockchain bullshit" enables trusted decentralized interaction at scale.

replies(1): >>31268640 #
394. girvo ◴[] No.31267960{5}[source]
> Any project that uses dependencies (in any language) has the same issue.

While that's absolutely true, the Node ecosystem (which I use, love, and make my money in) definitely takes the sheer dependencies of dependencies of dependencies problem to a rather fascinating extreme, compared to nearly any other language I use.

replies(1): >>31268328 #
395. samhw ◴[] No.31267992{7}[source]
Haha, yup, that's what I was quoting in my comment ("just use curlftpfs!").
replies(1): >>31279320 #
396. ignoramous ◴[] No.31268145{3}[source]
If the tailscale control-plane is pwnd, outside of compromised ACLs (access controls) and DNS routes, I don't think it affects anything critical on the data-plane like passwords (because SSO) or private-keys since tailscale machine keys and node keys never leave the device: https://tailscale.com/blog/tailscale-key-management/
397. stanmancan ◴[] No.31268173{5}[source]
I have a model and my own router; I don't use (or even have) one provided by my ISP. I'm not entirely sure how Tailscale works TBH, so yes I'm betting on them being secure.

Tailscale comes with a few other benefits that don't come on other VPN's. I have my home server setup as an 'exit node' which allows me to route my traffic through it when I'm travelling. Super handy sometimes like when I'm travelling and my bank decides not to let me log in.

398. bibabaloo ◴[] No.31268227[source]
NAT and firewall traversal are two other things that Tailscale gives you that you don't easily get with Wireguard alone, FWIW.
399. gobins ◴[] No.31268249[source]
Would love to work for Tailscale but the openings are limited to US and Canada.
400. klabb3 ◴[] No.31268264{6}[source]
I don't think parent is saying it's unexpected, but rather that having a third-party identity provider (especially a corporation) is an unwarrented and/or unwanted political dependency. I deeply empathize with this sentiment but also recognize why many companies choose to rely on them (identity is very difficult).
401. danenania ◴[] No.31268328{6}[source]
It would be interesting to see some data. Node definitely has that reputation, but every other language I’ve worked in—ruby, python, golang, clojure, hell even objective c—all have rich library ecosystems and most libraries include other libraries. They also all have plenty of small, single-purpose libraries. Perhaps node is a bit worse, but it’s not like it’s in a different category. Most popular languages/ecosystems are like this.
replies(1): >>31268882 #
402. ignoramous ◴[] No.31268362{4}[source]
derp seems to be its own protocol.

tailscale seems to prefer websocket transport for derp frames: https://github.com/tailscale/tailscale/blob/505f844/derp/der...

403. conductr ◴[] No.31268396[source]
Maybe a apt place to ask the question, all of my devices are silos. I’m still wondering if this is for people besides me, or if I’m just missing the potential use cases for myself. I have never needed to connect my device to each other. In the house I have a few laptops, a couple phones, Xbox, Apple TV’s, fire sticks, and every device is just connected to the google mesh Wi-Fi. Every device communicates out for what it needs (and yeah probably more) but I never in years have needed to use a device as a server unless I was developing on it and using it as localhost. Do I still have a use for tailscale?
404. stavrianos ◴[] No.31268402{3}[source]
What precisely are the consequences of the third-party auth? Is it, they get an IP ping each time a device connects or does anything? Or, does that only happen once, but they can revoke access at any time? *Surely* they aren't granted access to the content? That would be mindboggling.
405. pid-1 ◴[] No.31268413{5}[source]
IMO it's still the best pw manager by a fair margin.
406. depingus ◴[] No.31268518{7}[source]
I had looked at this. It doesn't seem like they've implemented anything to handle firewall rules. They may not even be able to, seeing as how that part of ZT is closed source. Also, this doesn't solve the problem with mobile apps, so the whole thing was a moot point for me.
replies(1): >>31270067 #
407. nickysielicki ◴[] No.31268640{3}[source]
It would only unmask those connecting directly to the central cluster nodes, everyone behind them would be fine.
replies(1): >>31268652 #
408. CryptoPunk ◴[] No.31268652{4}[source]
I'm suggesting every one would connect directly to the central cluster.
409. dataangel ◴[] No.31268813[source]
How is that different than just regular VPN?
410. pilif ◴[] No.31268868{5}[source]
This is 1.24.2 while the phone was connected to my charger over night

https://i.imgur.com/hQU6Orz.jpg

Tailscale app not force quit but also not connected

411. fastball ◴[] No.31268882{7}[source]
Node/JS definitely is a lot worse and in a different category by several orders of magnitude.

My theory is that this is because there is no standard library in Node.

My JS frontend has something like 20,000 packages that need to be installed to build the app. The next highest-dependency lang I use is python, where my average python app will have approx 100 packages all in. And then it only goes down from there with other systems.

replies(1): >>31269264 #
412. O_H_E ◴[] No.31269013{7}[source]
oh wow that is cool. I have never heard or thought about putting a pi-hole in the cloud.
replies(1): >>31277143 #
413. FrenchTouch42 ◴[] No.31269097{3}[source]
Any chance to be able to get the dmg directly from Tailscale vs the App Store? It's been a pain on MacOS as not everyone wants to mix personal accounts with corporate laptops
414. danenania ◴[] No.31269264{8}[source]
I suppose a lot of that can be chalked up to the overall size of the ecosystem (and also the complexity of frontends).

There's an exponential effect at work based on the number of libraries that do any one thing. If in python you have (for sake of argument) an average of 5, and in node an average of 25, the downstream effect is that you have massively more dependencies in your tree (many, many, more than 5x), just like you're seeing.

I still don't think the O(n) properties of dependency trees are any different in other languages though. Node just has the largest scale. If python had as many total packages as node, and was also as popular for building frontends, I think you'd have exactly the same situation. That's what I meant by "not in a different category". Node's scale/popularity is in a different category than python's, but its approach to dependencies is basically the same.

415. yawaramin ◴[] No.31269500{4}[source]
Not necessarily. It's possible to create a new Google account (e.g.) just for Tailscale, and not use it for anything else. That way the only thing Google can know about it is that it's used to log in somewhere.
replies(1): >>31270044 #
416. fijiaarone ◴[] No.31269545[source]
Netskope / Zavala’s / Cisco Umbrella DNS proxy server VPN with a free personal level?
417. euroderf ◴[] No.31269777{3}[source]
My use case is like many others' here: accessing a remote Raspberry Pi. Please do not start charging for this kind of simple setup ! If you want to charge for IoT-type stuff, add a new layer of added value on top of the current wonderful free service.
418. SahAssar ◴[] No.31270044{5}[source]
Google requires a phone number to sign up these days, and you'd need to isolate google & tailscale in a private window or a firefox privacy container. If you use chrome you'd also get auto-logged in to chrome with your google account.

IMO there is no real way to use google in a privacy-protecting way.

419. benoliver999 ◴[] No.31270067{8}[source]
The mobile app does work with the self hosted option, we use it at work.
replies(1): >>31290153 #
420. benoliver999 ◴[] No.31270167[source]
Nebula is the only completely self hosted option I think. But I couldn't get NAT traversal to work and it's the main reason I want a system like this.

Tailscale hosts all the auth and coordination stuff and uses SSO.

Zerotier lets you host an auth server, which also handles connections, but when required some already-established connections go through zerotier servers (encrypted).

We use the latter option at work

421. Handytinge ◴[] No.31270198{4}[source]
I'd love to try headscale, but a bit of research shows that the tailscale macOS client requires a CLI param to connect to a custom server, registry keys for Windows, Android client requires custom compile, and there's no iOS client at all.

Unfortunately if I need to bring anyone into my mesh network who is non technical, this is now a non starter.

422. benoliver999 ◴[] No.31270222[source]
We used openvpn for years and it felt like every client had an obscure reason it wouldn't work, and we'd have to find a workaround.

Installed zerotier and it couldn't be simpler now.

423. Handytinge ◴[] No.31270238{9}[source]
This isn't a very nice comment (from my reading anyway).

> Be kind. Don't be snarky. Have curious conversation; don't cross-examine. Please don't fulminate. Please don't sneer, including at the rest of the community.

> Comments should get more thoughtful and substantive, not less, as a topic gets more divisive.

424. ncmncm ◴[] No.31270408{9}[source]
Thank you. It is hard to interpret what this might mean, for me.
425. jhugo ◴[] No.31270941{8}[source]
I'm guessing you're in the US? Haven't had any problems with IPv6 on ISP-supplied routers in UK, NL, DE, CN, HK, VN, TH, SG over the last 10y or so, seems like a solved problem for most of the world.
426. PLG88 ◴[] No.31270944{4}[source]
Here is another (sort of), OpenZiti - https://openziti.github.io/. OpenZiti provides a mesh overlay network built on zero trust priinciples with outbound only connections so that we do not need inbound ports or link listeners. Similar to TS, you can host anything anywhere and has options to deploy on any popular host OS or as a virtual appliance.

What makes it realluy unique though is that it can actually be embedded inside the application via a suite of SDKs. Yes, private, zero trust connectivity inside an application! That provides the highest security and convenience as it can be completely transparent to the user!

Disclaimer, I work for the company who built and maintains OpenZiti so I am opinionated.

replies(1): >>31276061 #
427. Aeolun ◴[] No.31270974{3}[source]
> You can BYO SAML provider if you like, you'll just have to pay for it

Their website makes it seem like you can do SSO/MFA with even the free personal plan though. If you cannot integrate with your SSO provider then that's just marketing bullshit.

What they should really put there is "Can only sign in with Google/Github/Microsoft account".

428. PinguTS ◴[] No.31271256{4}[source]
So then, whats is the difference to run OpenConnect and then connecting to it via activating CiscoVPN on the phone/mobile device?

I used that while I was in China as this allowed me to have my own personal VPN.

429. dx034 ◴[] No.31271594{4}[source]
A bit offtopic, but how did they create the visualizations? Do they have a designer on their team for that or is there any good tool that creates charts like these?
replies(1): >>31272940 #
430. SergeAx ◴[] No.31271702{3}[source]
CloudFlare has a world best DNS system, and if you are still using another DNS provider - I wholeheartedly recommend to switch ASAP.
431. legalcorrection ◴[] No.31271734{5}[source]
Very cool write-up. Thank you all for writing (and linking) it.
432. deadbunny ◴[] No.31271758{5}[source]
Seemed to work for a lot software before SaaS ate the world. But who wants viable when you can bleed you customers for 10-1000x the would have paid for the software once? /s
433. dovholuknf ◴[] No.31272295[source]
You don't need to dream about it. You can absolutely do this today with OpenZiti. You just need to be able to set it up which is - imo (I am a dev on the project and wrote the quickstarts) just as easy to get up and running as anything. I do it in "under a minute" but I work on the project so my timing is not fair... :)

You can find information about it over at https://openziti.github.io/ you don't even need to trust the software itself. You can add a 3rd party certificate to the server and mint your own private keys/certs and deliver them to your friends and have 100% control over where and how and whom you trust. You control access down to individual services, not CIDR blocks, not IP addresses. You can embed the sdks into any of your own apps if you're into that sort of thing. :) you could setup a relay server in some cloud provider for the 'untrusted' traffic (hmmmm you make me wonder if we could integrate with tor somehow now too...)

Seems like it'd do most/much of the things you want it to. I'd be happy to help you out. We have a discourse you can post questions to.

replies(2): >>31277517 #>>31279829 #
434. simonebrunozzi ◴[] No.31272344[source]
Avery is an incredible founder. Met him just once in 2013 (maybe? He was at Google I think), had him mentioned perhaps a dozen times by various folks in the industry, always in absolutely fantastic terms.
435. PLG88 ◴[] No.31272508{3}[source]
You should checkout the opensource project OpenZiti (https://openziti.github.io/). It has its own internal PKI system so you dont need to (but can) like to an external 3rd party. It also allows you to close all inbound ports and link listeners (as every endpoint has embedded identity so makes outbound only connections) and can be embedded directly into apps with SDKs as well as deploy on any popular OS or as a virtual appliance.
436. PLG88 ◴[] No.31272536{3}[source]
You should checkout the opensource project OpenZiti (https://openziti.github.io/). It has its own internal PKI system so you dont need to (but can) like to an external 3rd party. It also allows you to close all inbound ports and link listeners (as every endpoint has embedded identity so makes outbound only connections) and can be embedded directly into apps with SDKs as well as deploy on any popular OS or as a virtual appliance.

Our opinion of zero trust is that you should not have to trust us. Thats why we made is open source and with its own internal identity system. The only things you need to trust are the controller (which uses your CA/PKI) and the code (which you can audit).

437. zellyn ◴[] No.31272940{5}[source]
A designer drew them: https://twitter.com/apenwarr/status/1241188397013774337

I took a stab at recreating one of the diagrams here, using pikchr: https://zellyn.com/2022/02/tailscale-diagram-in-pikchr/

438. zepearl ◴[] No.31273161{6}[source]
thx
439. JeremyNT ◴[] No.31273594{9}[source]
I hope I don't come across as too negative! Sure I'd love to see some improvements here, and they would help adoption amongst hobbyists / home users, but I totally understand focusing on the features needed to make the business work first.

The existing open source functionality for the overlay network itself is (for me) what's really exciting, and it's all there. The management limitations just keep me from evangelizing more broadly (outside of places like HN).

440. JoachimSchipper ◴[] No.31274056[source]
You may want to take a second look at Tailscale - it can be used as a classic VPN ("exit node"), but it really wants to broker host-to-host connectivity secured by ACLs and SSO.
replies(1): >>31274220 #
441. falcolas ◴[] No.31274220{3}[source]
Respectfully, this doesn't change the advice. Always assume the network is compromised - that someone who shouldn't has access your hosts via the network. A user's device is taken, a new user is added via social engineering, a computer is left unlocked, a host is compromised...
442. nickysielicki ◴[] No.31274977{3}[source]
I think so, it’s not something I’m too familiar with, but I found apps for both iOS and Android that let you host a web server that can be accessed from another computer on your LAN.
replies(1): >>31276200 #
443. dstanbro ◴[] No.31275084{3}[source]
If you're that concerned with 3rd party auth, I'm surprised you're not more concerned about trusting your virtual network to a SaaS platform (who could definitely decrypt the traffic). For those more privacy minded, they'd probably wanna go with one of the self-hosted alternatives, of which there are now a few.
444. afeiszli ◴[] No.31275314{4}[source]
Hey! Netmaker author here. I think it’d be a cool option for this use case. We have some users already doing blockchain stuff. Benefits are it’s self hosted, so you don’t need to depend on a SaaS, no mandatory 3rd party auth, and a lot faster because of kernel WireGuard.
445. GekkePrutser ◴[] No.31276061{5}[source]
All the solutions I mentioned are outbound only (for the clients), though they do all have a central point which is open for inbound connections so they can find each other. Or in some cases their own cloud serves this purpose. They call them lighthouses, Moons, etc but the principle is the same.

The embedding inside an app sounds like a really cool discerning feature though. I'll have a look!

replies(1): >>31282574 #
446. enos_feedler ◴[] No.31276200{4}[source]
Do those apps need to be in the foreground? It kind of defeats the purpose if so
447. prepend ◴[] No.31276553{5}[source]
It makes sense because they make less money that way. It seems like they have some cognitive dissonance where they try to explain their SaaS fee because of the “features” that require SaaS. If they supported bring your own storage then that cuts out the main reason for the SaaS fees.

Also sad because bring your own storage is more secure to me than trusting a company with all of my passwords. So they are reducing security and increasing price.

448. Sohcahtoa82 ◴[] No.31277143{8}[source]
It made more sense to me for using a PiHole on my phone. I didn't want to expose a VPN port on my home network, and didn't want to deal with trying to tunnel VPN through SSH.

And the EC2 instance I installed it on was already being used for other toy projects, so it's not like it cost me anything. The additional egress bandwidth is likely fractions of a penny.

449. ◴[] No.31277498{3}[source]
450. qrkourier ◴[] No.31277517{3}[source]
I guess it's like anything else. You can trust someone a little to manage your crypto keys or you can do it yourself whether its PKI or a Bitcoin wallet. You have to know and do more to trust less. For me, it's a really great value if software makes DiY crypto convenient enough to do crypto stuff safely enough that I don't have to trust or pay a 3rd party and don't end up wrecked because I got in over my head. Like bowling bumpers, but for cryptography.
451. oicU00 ◴[] No.31278017{6}[source]
If agency to make a thing must be purchased the long term viability of the thing is suspect. The work becomes about payments not the thing.

If it’s a real human problem, humans will solve it. If it’s instigated due to someone with coins in their pocket to mesmerize lizard brains, it’s a synthetic solution that will vanish with the synthetic driver of the work; payments.

Just because paying for things is common throughout history does not mean it’s necessary or the best choice long term; see Netflix propping up payment flows churning out crap. It means meat based tape recorders simply LARP the past.

452. nikolay ◴[] No.31279218[source]
If I was Cloudflare, I'd have bought Tailscale long ago!
453. oicU00 ◴[] No.31279320{8}[source]
Apples and oranges

A fully functional web app in a Docker image is what wg-ui is.

Web companies could probably just provide API keys for customers at this point and abandon UX teams.

454. CMCDragonkai ◴[] No.31279829{3}[source]
You said you can embed this in an application? What does that mean? Is this a C library that is embeddable?
replies(2): >>31282598 #>>31298783 #
455. PLG88 ◴[] No.31282574{6}[source]
Yes, outbound only is great for client side and for me table stakes. OpenZiti allows you to make the server side outbound only too. Do you care about Log4Shell or Spring4Shell when your server is dark to the internet? Java Magazine recently did a piece on it as the OpenZiti team 'zitified Springboot' - https://blogs.oracle.com/javamagazine/post/java-zero-trust-o.... We also recently zitified Prometheus - https://openziti.github.io/articles/zitification/prometheus/...... private, outbound-only connectivity natively part of the code.
replies(1): >>31293744 #
456. PLG88 ◴[] No.31282598{4}[source]
You can literally embed private, outbound-only connectivity into your application code using one of the many SDKs - C, Java, Go etc etc... here is a good overview https://ziti.dev/. As you can embed inside you app, you can now build 'zitifications' which is apps which have native, private connectivity embedded both client or server side.

Here are a couple of cool artciles on some we have already done: - Springboot framework: https://blogs.oracle.com/javamagazine/post/java-zero-trust-o... - Prometheus: https://openziti.github.io/articles/zitification/prometheus/...

457. vineyardmike ◴[] No.31288614{9}[source]
Yea, but my friends and family would rather have a service that just works, has apps, etc instead of an open one. Tailscale is a good actor ~for now~ and ~for now~ thats good enough for us. Not everyday in every situation can I be an activist. I have a list of alternatives incl FOSS ones should I need, but I'll cross that bridge only if I need to, since this JustWorks.

You can connect one person on a free plan, but each person can have their own free plan that you share devices between.

458. depingus ◴[] No.31290153{9}[source]
The official ZT docs* say, "The mobile apps don't support custom roots." And I don't see any setting in the Android app to point it to any server.

* https://docs.zerotier.com/self-hosting/introduction

replies(1): >>31298146 #
459. samhw ◴[] No.31291079{7}[source]
If they said "buy once, get upgrades forever" and didn't provide that, then yeah, that's definitely a very plain example of immoral dealing. The future service is exactly what the purchasers were buying - not a nice-to-have add-on.
460. GekkePrutser ◴[] No.31293744{7}[source]
Oh that's interesting. But how do the server and clients manage to find one another then? Indeed an outbound-only server is a discerning feature and a huge security advantage.

I should really read up on it. I know... I will soon!

replies(1): >>31302874 #
461. benoliver999 ◴[] No.31298146{10}[source]
Ah, that's because we run a controller node not a root. So you just add an ID as normal.

The software linked in the parent works with the mobile apps.

462. qrkourier ◴[] No.31298783{4}[source]
Yes: https://github.com/openziti/ziti-sdk-c/
463. Groxx ◴[] No.31298817{6}[source]
Yep, ramming online vaults down everyone's throat is also what killed it for me. Since then I've gone from a massive supporter to recommending everyone look elsewhere.

Their online security-related UX is also a freaking nightmare. The desktop and mobile apps are excellent and still clearly the best, but yikes, their password plus secret uuid plus device identity is awful. I know multiple people who permanently lost everything thanks to that (remember, no local backups any more! That's what cloud storage almost always guarantees!), and they now push others away too.

I'm now a (relatively) happy KeePass user.

464. PLG88 ◴[] No.31302874{8}[source]
OpenZiti has an architecture of 'Edge' and 'fabric'. The Edge is at source and destinatation and outbound connects into the fabric. The fabric is SDN, edge connects and authenticates/authorises to controller based on embedded identity, then based on policy and rules, outbound connects to the data plane using smart routing over the mesh. The fabric only 'listens' for endpoints which have embedded, correct identity based on a process called 'bootstrapping trust' (there is a 5 part blog on this).

Clint and Ken did a really good ZitiTV on Friday which covered many of the cool superpowers of OpenZiti - https://www.youtube.com/watch?v=4wOGvZqN6Co&ab_channel=OpenZ...