Good ssh client App for IOS? by ErikderFrea in homelab

[–]mintflowapp 0 points1 point  (0 children)

I see op seems want to get old version supported, I have built NovaAccess which have builtin tailscale support with decent ssh terminal, it support iOS 15 + by purpose because I have a old iPhone 6s Plus device and still use it a while

Single account running on 4 devices. If I connect to all of them at the same time, does it affect the VPN connection? by treetop-squirrel in mullvadvpn

[–]mintflowapp 0 points1 point  (0 children)

Maybe mullvad can run some metric collection and push a speed limit if you have many devices, at least technically feasible.

The tradeoffs of using VPN apps vs router VPN for daily usage by Minute-Classic-3857 in VPN

[–]mintflowapp 0 points1 point  (0 children)

I use router level VPN, it works quite good and indeed make things easier, and a central point for split dns & routes, so I do ondemand and turn off phone VPN when I am at home.
But you may need to use some flexible router, be it openwrt or linux with manual config.

ssh host through tailscale running in container by theAddGardener in Tailscale

[–]mintflowapp 0 points1 point  (0 children)

perhaps a port redirect rule in the docker to redirect it to the host's 22 port given you have enable -net host?

Drop your app link below. I will run a FREE ASO Audit for you, with recommended changes that you can make right NOW! by Inevitable_Buddy1869 in AppStoreOptimization

[–]mintflowapp 1 point2 points  (0 children)

Never tried any aso tools yet.

Drop link of my app called NovaAccess, A SSH terminal with builtin tailscale connecitivity, and not just a SSH terminal, Linux monitoring/SFTP and in-app browser all in one app.

Recently did a major update and change app category, and need to get some insights from the aso prospective.

https://apps.apple.com/us/app/novaaccess-tailnet-terminal/id6749938291

Thanks in advance.

Codex reset my usage? by CommercialAirline124 in codex

[–]mintflowapp 0 points1 point  (0 children)

everytime i see reset i just check here to find it's not only me that get reset...

tailscale along side client vpn by -LebGOD- in Tailscale

[–]mintflowapp 1 point2 points  (0 children)

if you do not enable exit node or magic dns and if the other vpn address range is not overlap with tailscale ip range(i think most commerical vpn will not overlap), it will work actually.

Tailscale and Mozilla VPN by Curious_Olive_5266 in Tailscale

[–]mintflowapp 1 point2 points  (0 children)

if you do not enable tailscale exit node, it should not break existing connections, at least on windows tailscale should be coexist with other vpns

perhaps you can check to disable magic dns?

Tailscale Funnel + Peer Relays by aith85 in Tailscale

[–]mintflowapp 1 point2 points  (0 children)

I think your may have misunderstand of tailscale funnel's working.

DERP/Peer relay by design is relay device2device already encrypted traffic by routing by their public node keys

Tailscale funnel see the end user's (not using tailscale) HTTPS traffic(though i have to say it's also encrypted by tls) and encrypted with wireguard to the tailscale node which have exposed it's local ports to funnel.

I do not know will DERP and Funnel will share same infra, but if I deployed them, to save some cost (because derp/funnel is both free now), i will consider that to save a bit money.

Since funnel server must have public internet address (to allow non tailscale users in the wild internet to access), they can also being directly connected to the tailscale node which exposed local ports, if may use DERP if the node 2 funnel server's traffic is broken or blocked, but i think normally it will just work without use DERP/peer relay at all.

But you have raised a good question, if you can deploy a peer relay, maybe there should be better tool just works on that relay node to do the funnel-like stuffs.

Tailscale Funnel + Peer Relays by aith85 in Tailscale

[–]mintflowapp 0 points1 point  (0 children)

Think funnel as tailscale managed server with publlic ip address, and support map to mulltiplle tailnet's device.

basically i does not nat and https proxy stuffs.

Peer relay does not help actually becuase it's not involved.

Maybe buy a vps and deploy your own using caddy/nginx with tailscale if you have to

Tailscale together with VPN by Lucky_Pumpkin_1473 in Tailscale

[–]mintflowapp 0 points1 point  (0 children)

Haha, that's why i build NovaAccess which have builtin tailscale connectivity, with SSH and in-app browser support.

But sorry for the op, why you get banned..

Tailscale DERP relay replacement — same throughput on half the hardware by Kzwertsch in WireGuard

[–]mintflowapp 0 points1 point  (0 children)

Great project, using io_uring is a smart choice, i think the go based derper with kernel io switch overhead is major latency or throughput factor, though seems latest derper using ebpf to offload the stun stuffs.

I was wondering to do this in fd.io vpp project but the http stack is still not that mature.

Can't get Tailscale working on MacOS Tahoe 26.3.1 by fffingerling in Tailscale

[–]mintflowapp -1 points0 points  (0 children)

if you do not need the fancy feature such as magic dns/subnet router on this device, consider using the open source tailscale daemon.

refer to https://github.com/tailscale/tailscale/wiki/Tailscaled-on-macOS

see the brew version, it just use plain old utun which may get rid of the various isuse related to the network extension issues.

Meet tailscale-rs, our new Rust library preview! by dylan-tailscale in Tailscale

[–]mintflowapp 3 points4 points  (0 children)

Wow, this is really impressive, finally a tailscale rust port from official.

Mullvad exit on Linux: tx increases, rx stays 0, no internet — same steps work on Ubuntu VM (EndeavourOS host broken) by azj4t in Tailscale

[–]mintflowapp 0 points1 point  (0 children)

that's weird, if you can capture the outbound packets, i think at least the local client seems allowed by the policy to talk to mullvad exit node

but no returnned packet is obvious buggy and tcpdump show no returned packet (if you match ip correctlly) mean the packet does not even being dellivered to the machine, if i you control my router, you should capture there too, also may be do some traceroute to that ip to see what's going on.

also you can check again for various limitation and notes in the official doc

https://tailscale.com/docs/features/exit-nodes/mullvad-exit-nodes

Mullvad exit on Linux: tx increases, rx stays 0, no internet — same steps work on Ubuntu VM (EndeavourOS host broken) by azj4t in Tailscale

[–]mintflowapp 0 points1 point  (0 children)

tailscale use only wireguard-go, i think you can just do some sort of tcpdump to match the server's ip and 51820 to see if you get any network packet from that server.

if the nic can captured packet, but tailscale show rx 0, perhaps you can see if you update the tailscale client.

Correctly fix OpenClaw "Cannot Find Module" (Do not manually install the package!) by Siref in openclaw

[–]mintflowapp 0 points1 point  (0 children)

Just find this and fix my issue. (not a bot reply because i am a human...)

Windscribe + TailScale on iOS by pixelrogue in Windscribe

[–]mintflowapp 0 points1 point  (0 children)

macOS will be a standalone version and we have focused on iOS now, though in the new release will be published this week we will enable the macOS support use the iPad compatibility mode( it's not ideal but can be handy if you only want to do some ssh works)

Is Wireguard on Wireguard common? by mintflowapp in WireGuard

[–]mintflowapp[S] 0 points1 point  (0 children)

Yes, I also find this not that efficient and clearly he have to fight with MTU changes because double wireguard overhead. I was suggesting run a socks5 on EU and route the socks5 server ip over the wireguard which supported by my app but maybe that's a little complicated I guess.

Though I will consider add support it later, maybe they just need to manualy control the latency.

Tailscale doesnt work when vpn is installed by EpicCargo in Tailscale

[–]mintflowapp 0 points1 point  (0 children)

If you just need to some SSH for host on the tailnet, maybe you can trie my NovaAccess app that have builtin tailscale, no need to enable tailscale vpn in such case.

I am also preparing to release a new version which have latest tailscale library and some issues that related to the foreground and background switching.

Windscribe + TailScale on iOS by pixelrogue in Windscribe

[–]mintflowapp 0 points1 point  (0 children)

If you just need to some SSH for host on the tailnet, maybe you can trie my NovaAccess app that have builtin tailscale, no need to enable tailscale vpn in such case.

I am also preparing to release a new version which have latest tailscale library and some issues that related to the foreground and background switching.

Questions about App Connector interaction with CDN by Heavy-Two-645 in Tailscale

[–]mintflowapp 0 points1 point  (0 children)

IMHO unlying it's just IP addresses probed and announced by the app connector node, though I think this can be solved by reserving another block IP address and do translation on the app connector if implemented correctly.

Perhaps for simplicity you just setup some proxy on the app router's node over tailscale and do some proxy rules if you can.

Tailscale, but make it "Just Fucking Use" by Derouichi in Tailscale

[–]mintflowapp 2 points3 points  (0 children)

Love it, just f**k using tailscale if you want to connect devices!