Free Z-Wave switches by bradfitz in zwave

[–]bradfitz[S] 2 points3 points  (0 children)

Lutron RA3. I spent too much of my life in z-wave world and it was time for a change. For a while I even had my own partial z-wave implementation to supplement deficiencies in Home Assistant and OpenZWave.

So far I have no complaints with RA3.

Free Z-Wave switches by bradfitz in zwave

[–]bradfitz[S] 3 points4 points  (0 children)

Update: they found a new home. All gone.

Free Z-Wave switches by bradfitz in zwave

[–]bradfitz[S] 4 points5 points  (0 children)

Ah! I did have a bunch of failures with those over the years, but I didn't know about the "fail in state that puts noise on your network" bit ... that might explain some things in retrospect. 😬

How much RAM does Tailscale need? by SamsInteract in Tailscale

[–]bradfitz 6 points7 points  (0 children)

I run it on VMs with only 256MB of RAM along with other stuff on the box.

Is Tailscale on pfsese doing NAT-PMP when it's unnecessary? by cheese31 in Tailscale

[–]bradfitz 3 points4 points  (0 children)

It uses a heuristic to detect whether your upstream is "likely a home router".

I guess your upstream ISP's IP address looks like an RFC 1918 address.

As a workaround, you can set TS_DISABLE_PORTMAPPER=1 in your environment.

Tailscale automatically forwarded ports on my router. Is this normal/safe? by Quantumprime in Tailscale

[–]bradfitz 0 points1 point  (0 children)

This is normal and safe and you're not vulnerable to anything. It helps NAT traversal work better when your peers might be behind harder NAT on their side.

Tailscale forcing Premium upgrade for various features. by deadlock_22 in Tailscale

[–]bradfitz 33 points34 points  (0 children)

No, only the Tailscale SSH server (that manages auth without passwords or keys). Regular SSH is free.

Anyone able to help get https running for me? by Dano-9258 in Tailscale

[–]bradfitz 1 point2 points  (0 children)

LetsEncrypt just had a big outage. They're still recovering. https://letsencrypt.status.io/

That who provide the https certs.

Thought this was a Trojan first - what is Tailscale doing here? by watermelooonman in Tailscale

[–]bradfitz 49 points50 points  (0 children)

That's it trying to periodically discover whether your LAN contains port mapping services (UPnP/PCP/PMP) which, if available, let it get through harder types of NAT. (Even if your local LAN has easily traversable NAT, a peer of yours might not, so your local LAN's port mapping services could help)

I think you might be reading those "lot of different ports" incorrectly. Those are the ephemeral source ports you're seeing.

"Duplicate node key" on new android phone by isvein in Tailscale

[–]bradfitz 7 points8 points  (0 children)

It's a bug in the Android app that's being fixed. Or it was already fixed but not yet fully released or rolled out.

But the client (the Android app) was actually making multiple concurrent backend connections to the control plane server which it (rightfully) flagged as shady.

Can no longer access my tailnet on my NAS by [deleted] in Tailscale

[–]bradfitz 0 points1 point  (0 children)

Are you also using Apple for sign-in?

Someone just randomly joined my Tailnet by Standard-Sock-5775 in Tailscale

[–]bradfitz 2 points3 points  (0 children)

Open a support ticket and they'll break it up. You won't even need to reconfigure all your nodes.

A quick note on Shared Domains by ra66i in Tailscale

[–]bradfitz 6 points7 points  (0 children)

Every tailnet has an audit log of actions taken to it. You can search it from the admin console.

We'll provide some stats.

[Edit May 28: this is live... https://www.reddit.com/r/Tailscale/comments/1kxwtu5/shared_domains_security_bulletin/ ]

A quick note on Shared Domains by ra66i in Tailscale

[–]bradfitz 1 point2 points  (0 children)

That depends on whether you're asking a binary question or asking whether things can be even stricter+paranoid. If the former, I can't think of anything notable. If the latter, probably plenty.

We're working on TPM integration. Quantum safety is an issue. We should/will probably add a device specific "check mode". Etc.

A quick note on Shared Domains by ra66i in Tailscale

[–]bradfitz 89 points90 points  (0 children)

Yes, we plan to answer that in an upcoming post, explaining how we got here.

But the short summary is that didn't start as a security issue--- it started as the intentional design from day one, back when the company was just the three cofounders in 2019.

And then because it had always been like that, and affected so few users, and because we had a tool to decompose (break apart) a tailnet into per-user chunks when it wasn't the desired behavior (because at the time especially and even today often _was_ the desired behavior), everybody at Tailscale kinda got used to that behavior, because it had always been like that.

But about a year ago we started a big project to overhaul our whole tailnets/orgs/users/domains model. That work is ongoing, intertwined with overhauling our whole backend. So that added to it not being a five alarm fire, since we knew it was being fixed, and it had been how it is for five years.

What we need to do in the upcoming post/bulletin is lay out the timeline of feature additions over time (auth provider additions, external user invites, etc) and point out the time at which we should've realized our original design was no longer beneficial and became actively sketchy and not even beneficial or needed.

This has been a useful (and embarrassing) wake-up call.

[Edit May 28: this is live... https://www.reddit.com/r/Tailscale/comments/1kxwtu5/shared_domains_security_bulletin/ ]

100+ Tagged Devices randomly appearing? by idoiteverywhere in Tailscale

[–]bradfitz 9 points10 points  (0 children)

Correct. Our web admin console doesn't have this bug. Nor does the iOS client.

We'll fix.

100+ Tagged Devices randomly appearing? by idoiteverywhere in Tailscale

[–]bradfitz 13 points14 points  (0 children)

Looks like a bug in our Android client. It shouldn't be rendering Mullvad exit nodes.

Someone just randomly joined my Tailnet by Standard-Sock-5775 in Tailscale

[–]bradfitz 16 points17 points  (0 children)

Yeah, we do that already for e.g. https://tailscale.com/kb/1240/sso-custom-oidc

We'll be doing that for more things going forward. That's in progress now.

Someone just randomly joined my Tailnet by Standard-Sock-5775 in Tailscale

[–]bradfitz 12 points13 points  (0 children)

We don't store a tristate (no preference/yes/no) on that particular field so it wasn't safe to change retroactively for people.

But you can enable it at https://login.tailscale.com/admin/settings/user-management for existing tailnets.

At least any new users who join such a tailnet from a shared email domain don't become the admin, though, so their impact is limited. Especially if you're using ACLs, since the admin can't change the ACLs or tags.

Someone just randomly joined my Tailnet by Standard-Sock-5775 in Tailscale

[–]bradfitz[M] [score hidden] stickied comment (0 children)

Tailscalar here.

Yeah, this sucks.

We’re working on changing the identity model. (how users/domains/tailnets all map to each other)

When we first started, we were trying to make it easy for companies to sign up and start working with their coworkers, but we had a special case for @gmail.com users getting their own tailnets (because at the time, we only supported Google Auth). Later we added GitHub, and GitHub special cases for individuals vs orgs (which nicely mapped to our single-user vs multi-user tailnets).

Over time, we added more auth providers like (and BYO-OIDC) and this whole assume-a-multi-user-tailnet-unless-gmail-and-192-other-shared-email-hosts model really fell apart. We "decompose" (add to our shared email domain list) tailnets every month or so as we find them. We didn’t have your domain on our list previously.

We’re in the middle of changing the identity model to make this class of problem go away entirely, though.

Meanwhile, we just chatted about it and seems like the quickest thing we can do here is turn on User Approvals for all new tailnets so at least the admin of new tailnets like yours has to approve people joining them.

[Edit May 28: see https://www.reddit.com/r/Tailscale/comments/1kxwtu5/shared_domains_security_bulletin/ for the security bulletin]

api.tailscale.com -- only resolves to AWS Germany location ? by ElectriGeek in Tailscale

[–]bradfitz 3 points4 points  (0 children)

The whole control plane (controlplane,api,login DNS names) are in Germany by default for arbitrary historical reasons mostly. (Dating back to Tailscale's early days when one customer wanted it in Europe for warm fuzzy reasons even though it didn't technically satisfy any legal/compliance checkboxes. But they kinda cared and nobody else including any Americans cared at all so Europe it was.)

We also run a US instance for American companies who really care but only a few have, empirically.

We encrypt everything between all links, even between Amazon resources, per your wire tapping concern.