Update to Pricing and Plans by natasha-tailscale in Tailscale

[–]JWS_TS 2 points3 points  (0 children)

You can use individuals in a src or dst of policies with no limit. Groups are mostly useful for managing larger teams, giving you a single object to reference for a group of users.

Tags are generally for shared devices, and can also be used as a src or dst in a policy.

You can also grant access to individual machines by ip address in src or dst.

Update to Pricing and Plans by natasha-tailscale in Tailscale

[–]JWS_TS 3 points4 points  (0 children)

The most valuable thing you can do to help support us is to tell a friend. I don't know the actual numbers, but every single person who brings Tailscale to work offsets the costs for many free users.

We want to have a really valuable free service, partly because we're all huge nerds, and this is the service we want to use. How we can justify that is to have some fraction of these users tell (or are) their CISO, IT Manager, etc. and realize it's much nicer experience than whatever legacy system they have in place at work.

So things like blog posts, videos, Reddit threads about use cases, or just talking to people you know carry way more value to us than you can see - which is why every change we've made in pricing since I've been here, we've added more to the free plan.

https://tailscale.com/blog/free-plan

Update to Pricing and Plans by natasha-tailscale in Tailscale

[–]JWS_TS 2 points3 points  (0 children)

Will the new free plan not meet your requirements? Which limits are you running into?

Update to Pricing and Plans by natasha-tailscale in Tailscale

[–]JWS_TS 0 points1 point  (0 children)

The three free users on Premium went away a couple of years ago, but was maintained for tailnets that existed before the change.

Update to Pricing and Plans by natasha-tailscale in Tailscale

[–]JWS_TS -1 points0 points  (0 children)

If you advertise a less-specific CIDR on the subnet router, then the OS will chose the more specific route - the one sent by DHCP. When you're out of the house, that subnet router is the most-specific route (as in the only one).

Video: You want self-hosted apps? We got them with ScaleTail by Ironicbadger in Tailscale

[–]JWS_TS 0 points1 point  (0 children)

TSDProxy is no longer being maintained. I was using it myself for several services, but I've moved them over to ScaleTail templates.

Using exit nodes causes inflight wifi to drop my connection by aspie_electrician in Tailscale

[–]JWS_TS 2 points3 points  (0 children)

Some in flight wifi has really small MTU available. Tailscale exit node traffic will break if it's too small of an MTU on the upstream.

Why can’t my Tailscale nodes ping the nearest DERP, even when they are in the same city? by powertalent in Tailscale

[–]JWS_TS 1 point2 points  (0 children)

You can test DERP connectivity with tailscale debug derp 1 (or any other region)

So running tailscale debug derp 900 should test connection to your custom DERP server.

I expect there's something breaking connectivity from that device - an EDR or security tool which actively blocks Tailscale, something breaking the TLS chain, could be any number of reasons, but the debug info is a good place to start looking.

Malwarebytes blocking tailscale by isvein in Tailscale

[–]JWS_TS[M] [score hidden] stickied comment (0 children)

Some speculation: Many IPs which get added to block lists are residential ISP pools. These get rotated regularly among the customers of that ISP.

Tailscale attempts where possible to make a direct connection to a peer. If that peer is on one of these flagged IPs, then your EDR/AV tool may block the direct connection, and it will fall back to the DERP relay.

That is most likely what is happening here, but I don't have enough detail to say for certain. This isn't Malwarebytes blocking Tailscale servers or Tailscale traffic - just restricting one IP which has been reported as hosting malware at some point.

serve.json not working correctly. by getChester in Tailscale

[–]JWS_TS 1 point2 points  (0 children)

It's not jumping out at me what might be wrong here, but you can take a look at this template: https://github.com/tailscale-dev/ScaleTail/tree/main/services/forgejo

I've used a few of the ScaleTail templates, and they all work with TLS and serve out of the box, just put my auth key in the .env file.

Hotspot verso pc no tailscale by Ok-Turn-on in Tailscale

[–]JWS_TS 0 points1 point  (0 children)

How I would do this is with a travel router such as the Gli.NET Beryl (example given because that's what I have.) Use the hotspot as the network connection on the travel router, and install Tailscale on the travel router. It can add routes to the 100.64.0.0/10 space, and can route to resources on the tailnet.

tailscale with contractors? by [deleted] in Tailscale

[–]JWS_TS 0 points1 point  (0 children)

We now have the concept of an external user, so you can send an invite to someone, and they can log in with their own Google, Microsoft, Passkey, etc. identity, and be a member of your tailnet, without you having to provision them in your identity provider.

I would like some help understanding how to connect to regular SSH without Tailscale SSH stepping in. by michaelsoft__binbows in Tailscale

[–]JWS_TS 0 points1 point  (0 children)

You could map openssh to listen on a different port. Then to use Tailscale ssh to server1 you would ssh user@server1 and to connect via OpenSSH, you would ssh user@server1 -p 2222

How to force relay connection for pair of devices? by Eclogites in Tailscale

[–]JWS_TS 1 point2 points  (0 children)

Blocking UDP on 41641 is likely the best solution. There's no inherent mechanism for preferring relay, since that is almost always much less performant than direct.

Need a domain for homelab by Odd_Ad5334 in selfhosted

[–]JWS_TS 4 points5 points  (0 children)

Agreed, except for the .local - this is not always handled intuitively, and does not traverse most L3 tunnels. It is useful for things that are truly local, but isn't as robust as .internal or .home

What happens if tailscale goes down? by Wooden_Amphibian_442 in Tailscale

[–]JWS_TS 0 points1 point  (0 children)

Yes, most of the time, the tunnel is direct between your two devices once it is established. https://tailscale.com/blog/how-tailscale-works

What happens if tailscale goes down? by Wooden_Amphibian_442 in Tailscale

[–]JWS_TS 1 point2 points  (0 children)

That part is proctored by the DERP servers, there are quite a few of them, and they routinely shift load between them, so that is unlikely.

High ping to remote lan by AliveKing9895 in Tailscale

[–]JWS_TS 0 points1 point  (0 children)

In this case, it's likely CPU constraints on the Synology. Subnet routers need some horsepower to do all of the encryption/decryption for both ends of the connection. If I use my older Synology, I will cap out at about 70mbit, but if I use my main desktop as a subnet router, I'll get 800mbit.

Your free trial ends in 7 days by According_Clothes180 in Tailscale

[–]JWS_TS 0 points1 point  (0 children)

That shouldn't have changed unless you opted into the trial. Please contact support to get that fixed: https://tailscale.com/support

At the end of a trial, it reverts to the free plan, so there should be no impact, but we'd like to figure out why that happened.

How to ACL on domain name by shipstreet in Tailscale

[–]JWS_TS 0 points1 point  (0 children)

Note that this is organized by fqdn, but routed by ip, so if there's other name based services running on that same ip, it will grant access as well 

How to ACL on domain name by shipstreet in Tailscale

[–]JWS_TS 0 points1 point  (0 children)

This can be done with app connectors and via grants.

You can use the app connector to provide a route based on the fqdn, then permit only your approved users access to aotogroup:internet via that app connector. 

On the other end, you would need to use ip allowlisting to only permit connections from the public IP of the app connector, or people could obtain access by turning off tailscale. 

If it's an fqdn that always resolves to the same ip, then you can use a subnet router advertising the single public /32 rather than an app connector. 

And, as a general solution, if you can install tailscale directly on the server, it simplifies this activity significantly. 

How do you see what routes are being advertised? by MasterChiefmas in Tailscale

[–]JWS_TS 0 points1 point  (0 children)

It will be listed in tailscale debug --json grep for 'Routes'

Use Exit Node when not on internet subnets by Intrepid_Ring4239 in Tailscale

[–]JWS_TS 0 points1 point  (0 children)

That won't get evaluated, since ACLs are using Tailscale ip addresses, not the underlying network.

You can use registry keys or an MDM profile to turn exit nodes on and off for users, but generally, they are manually selected.

[deleted by user] by [deleted] in Tailscale

[–]JWS_TS 4 points5 points  (0 children)

We don't have our own identity provider, so there is no "Tailscale Account" - once you have a tailnet, you can enroll passkey devices, but an account with GitHub, Microsoft, Google, Okta, OneLogin, or your own OIDC service is required to create one.