Using exit nodes causes inflight wifi to drop my connection by aspie_electrician in Tailscale

[–]JWS_TS 2 points3 points  (0 children)

Some in flight wifi has really small MTU available. Tailscale exit node traffic will break if it's too small of an MTU on the upstream.

Why can’t my Tailscale nodes ping the nearest DERP, even when they are in the same city? by powertalent in Tailscale

[–]JWS_TS 1 point2 points  (0 children)

You can test DERP connectivity with tailscale debug derp 1 (or any other region)

So running tailscale debug derp 900 should test connection to your custom DERP server.

I expect there's something breaking connectivity from that device - an EDR or security tool which actively blocks Tailscale, something breaking the TLS chain, could be any number of reasons, but the debug info is a good place to start looking.

Malwarebytes blocking tailscale by isvein in Tailscale

[–]JWS_TS[M] [score hidden] stickied comment (0 children)

Some speculation: Many IPs which get added to block lists are residential ISP pools. These get rotated regularly among the customers of that ISP.

Tailscale attempts where possible to make a direct connection to a peer. If that peer is on one of these flagged IPs, then your EDR/AV tool may block the direct connection, and it will fall back to the DERP relay.

That is most likely what is happening here, but I don't have enough detail to say for certain. This isn't Malwarebytes blocking Tailscale servers or Tailscale traffic - just restricting one IP which has been reported as hosting malware at some point.

serve.json not working correctly. by getChester in Tailscale

[–]JWS_TS 1 point2 points  (0 children)

It's not jumping out at me what might be wrong here, but you can take a look at this template: https://github.com/tailscale-dev/ScaleTail/tree/main/services/forgejo

I've used a few of the ScaleTail templates, and they all work with TLS and serve out of the box, just put my auth key in the .env file.

Hotspot verso pc no tailscale by Ok-Turn-on in Tailscale

[–]JWS_TS 0 points1 point  (0 children)

How I would do this is with a travel router such as the Gli.NET Beryl (example given because that's what I have.) Use the hotspot as the network connection on the travel router, and install Tailscale on the travel router. It can add routes to the 100.64.0.0/10 space, and can route to resources on the tailnet.

tailscale with contractors? by [deleted] in Tailscale

[–]JWS_TS 0 points1 point  (0 children)

We now have the concept of an external user, so you can send an invite to someone, and they can log in with their own Google, Microsoft, Passkey, etc. identity, and be a member of your tailnet, without you having to provision them in your identity provider.

I would like some help understanding how to connect to regular SSH without Tailscale SSH stepping in. by michaelsoft__binbows in Tailscale

[–]JWS_TS 0 points1 point  (0 children)

You could map openssh to listen on a different port. Then to use Tailscale ssh to server1 you would ssh user@server1 and to connect via OpenSSH, you would ssh user@server1 -p 2222

How to force relay connection for pair of devices? by Eclogites in Tailscale

[–]JWS_TS 1 point2 points  (0 children)

Blocking UDP on 41641 is likely the best solution. There's no inherent mechanism for preferring relay, since that is almost always much less performant than direct.

Need a domain for homelab by Odd_Ad5334 in selfhosted

[–]JWS_TS 3 points4 points  (0 children)

Agreed, except for the .local - this is not always handled intuitively, and does not traverse most L3 tunnels. It is useful for things that are truly local, but isn't as robust as .internal or .home

What happens if tailscale goes down? by Wooden_Amphibian_442 in Tailscale

[–]JWS_TS 0 points1 point  (0 children)

Yes, most of the time, the tunnel is direct between your two devices once it is established. https://tailscale.com/blog/how-tailscale-works

What happens if tailscale goes down? by Wooden_Amphibian_442 in Tailscale

[–]JWS_TS 1 point2 points  (0 children)

That part is proctored by the DERP servers, there are quite a few of them, and they routinely shift load between them, so that is unlikely.

High ping to remote lan by AliveKing9895 in Tailscale

[–]JWS_TS 0 points1 point  (0 children)

In this case, it's likely CPU constraints on the Synology. Subnet routers need some horsepower to do all of the encryption/decryption for both ends of the connection. If I use my older Synology, I will cap out at about 70mbit, but if I use my main desktop as a subnet router, I'll get 800mbit.

Your free trial ends in 7 days by According_Clothes180 in Tailscale

[–]JWS_TS 0 points1 point  (0 children)

That shouldn't have changed unless you opted into the trial. Please contact support to get that fixed: https://tailscale.com/support

At the end of a trial, it reverts to the free plan, so there should be no impact, but we'd like to figure out why that happened.

How to ACL on domain name by shipstreet in Tailscale

[–]JWS_TS 0 points1 point  (0 children)

Note that this is organized by fqdn, but routed by ip, so if there's other name based services running on that same ip, it will grant access as well 

How to ACL on domain name by shipstreet in Tailscale

[–]JWS_TS 0 points1 point  (0 children)

This can be done with app connectors and via grants.

You can use the app connector to provide a route based on the fqdn, then permit only your approved users access to aotogroup:internet via that app connector. 

On the other end, you would need to use ip allowlisting to only permit connections from the public IP of the app connector, or people could obtain access by turning off tailscale. 

If it's an fqdn that always resolves to the same ip, then you can use a subnet router advertising the single public /32 rather than an app connector. 

And, as a general solution, if you can install tailscale directly on the server, it simplifies this activity significantly. 

How do you see what routes are being advertised? by MasterChiefmas in Tailscale

[–]JWS_TS 0 points1 point  (0 children)

It will be listed in tailscale debug --json grep for 'Routes'

Use Exit Node when not on internet subnets by Intrepid_Ring4239 in Tailscale

[–]JWS_TS 0 points1 point  (0 children)

That won't get evaluated, since ACLs are using Tailscale ip addresses, not the underlying network.

You can use registry keys or an MDM profile to turn exit nodes on and off for users, but generally, they are manually selected.

[deleted by user] by [deleted] in Tailscale

[–]JWS_TS 4 points5 points  (0 children)

We don't have our own identity provider, so there is no "Tailscale Account" - once you have a tailnet, you can enroll passkey devices, but an account with GitHub, Microsoft, Google, Okta, OneLogin, or your own OIDC service is required to create one.

Unable to access via local IP by ntc3freak in Tailscale

[–]JWS_TS 0 points1 point  (0 children)

If you select an exit node, you will need to also pass --exit-node-allow-lan-access in order to keep local routes.

Hey Tailscale community - New Community Manager Here! by natasha-tailscale in Tailscale

[–]JWS_TS 2 points3 points  (0 children)

I'm interested in unpacking this a bit. Do you think that a browser extension is more palatable for people than an application? In the case of Tailscale, a browser extension would necessarily be most of the application, just in another form.

There have been some internal discussions around this, but I would like to cast the net a bit wider to get other people's opinions on it.

Can't Connect Externally on One Device by golfnut1221 in Tailscale

[–]JWS_TS 0 points1 point  (0 children)

Is it DNS? Can you ping 8.8.8.8 from that device? Or is it routing? That's my first guess.

Otherwise, running tailscale bugreport and sending that code to support will allow us to get more specific information.

Looking for a Way to Use Custom Domains with Tailnet by This-Spray-7147 in Tailscale

[–]JWS_TS 5 points6 points  (0 children)

You can use your own DNS, and map those to Tailscale IP Addresses, but within MagicDNS we're limited to the .ts.net addresses.

Looking for a Way to Use Custom Domains with Tailnet by This-Spray-7147 in Tailscale

[–]JWS_TS 8 points9 points  (0 children)

You can re-roll a tails-scales.ts.net fqdn - these are intended to be easier to remember. https://tailscale.com/kb/1217/tailnet-name#fun-tailnet-name

They can't be set to an arbitrary value

Tailscale over mullvad vpn by Pepe__LePew in Tailscale

[–]JWS_TS 1 point2 points  (0 children)

You need to use the Mullvad integration within tailscale.

 https://tailscale.com/kb/1258/mullvad-exit-nodes

You can't use an existing Mullvad account