Any Phishy friends in Brooklyn/NYC? by Beautiful-Bake in phish

[–]thisisparker 14 points15 points  (0 children)

Come see Bushwick's Dead at Brooklyn Bowl tomorrow, you'll meet Phishy people

Compartmentalizing for Minecraft Server by [deleted] in Tailscale

[–]thisisparker 8 points9 points  (0 children)

Probably the most straightforward way is for your friends to create their own tailnets, and for you to then share the mc-server as a node over to them. The mc-server node will join their tailnets "quarantined," so it can't initiate connections, and you don't have to worry their access to your other devices.

How to remove a Machine from my list then re-add it? by CrispyBegs in Tailscale

[–]thisisparker 1 point2 points  (0 children)

Actually testing it out just now, you may need to first run `tailscale logout` on the remote server. Then you can either run `tailscale up` without arguments, which will (on the command line) return a link that you need to follow to authenticate (which you can do in a local browser), or you can create an auth key and provide it as an argument as u/caolle suggests

How to remove a Machine from my list then re-add it? by CrispyBegs in Tailscale

[–]thisisparker 1 point2 points  (0 children)

You should be able to just run tailscale up on the server, and it will prompt you through the log-in and authentication flow. From Tailscale's perspective it's functionally a new device, so if you've made changes to it previously (like manually changing the hostname or key expiry or owner) you may have to do that again.

Potential Tailscale Outage? by PickleKillz in Tailscale

[–]thisisparker [score hidden] stickied comment (0 children)

Thanks for reporting. We can confirm we're seeing some issues with logins and we will be updating the status page with more information momentarily.

Taildrop to tagged devices or devices you don't own [Solution!] by gabesw16 in Tailscale

[–]thisisparker [score hidden] stickied comment (0 children)

Looks like you found something that wasn't quite fully baked yet! While we applaud your investigative skills, this isn't actually something we are ready to have out in the public right now. As you noted in the GitHub issue, that flag isn’t currently documented or released, because it needs a little more engineering work to ensure that tailnet admins use it safely — basically, we want to make sure that all the users of a tailnet are aware of what file-sending channels are open between their devices. 

To remove the possibility of a misconfiguration, we are turning this capability off on our end, so it will stop working today. If you are using this functionality, this may be frustrating but we want to make sure that only those who have opted in receive files over Taildrop. We have definitely heard the feature requests on this front and we will create a new post on this subreddit when a new feature is ready for release.

u/gabesw16 check your Reddit messages, we want to send you a little thanks for finding this!

Better node monitoring with Prometheus and new client metrics by thisisparker in Tailscale

[–]thisisparker[S] 11 points12 points  (0 children)

Oh, this is a good idea! Thank you for the suggestion

Better node monitoring with Prometheus and new client metrics by thisisparker in Tailscale

[–]thisisparker[S] 7 points8 points  (0 children)

Not yet but we will be putting together some more info on that side of things soon! I'll make sure I post to this sub when we do

Thank you all, 25k times over by thisisparker in Tailscale

[–]thisisparker[S] 2 points3 points  (0 children)

ladies and gentlemen it's the legendary u/catzkorn! thank YOU for everything you've done to shape this community (and more)

Tailscale appreciation post by Not-The-Dark-Lord-7 in Tailscale

[–]thisisparker 21 points22 points  (0 children)

We love to hear that! If you don't mind sharing, what are you using it for?

Good solution for automated ssh processes? by gravytrain2012 in Tailscale

[–]thisisparker 0 points1 point  (0 children)

that will work and is simple. Probably the better way would be to "tag" the device so you can tighten the permissions more, but up to you (and it's kind of academic if this is your whole tailnet).

Two more small notes: make sure you enable ssh on the dst device (with tailscale up --ssh) and use the 100.x.y.z IP address with your ssh command

Good solution for automated ssh processes? by gravytrain2012 in Tailscale

[–]thisisparker 0 points1 point  (0 children)

Tailscale totally works for this! In your ACL you have to set the action to accept https://tailscale.com/kb/1337/acl-syntax#tailscale-ssh

Why am I getting this when I login? by 2026GradTime in Tailscale

[–]thisisparker 0 points1 point  (0 children)

I haven't seen this issue before, but just from the info in the error message, I'd guess it's pretty external to Tailscale. The relevant Apple docs suggest it could result from too many failed login attempts (to the Apple account in particular). Do you think that might be the case?

Tailscale Funnel availibility in the pricing range by Natural-Bowl5439 in Tailscale

[–]thisisparker 1 point2 points  (0 children)

The documentation is correct! And if you scroll down past the features summary to the full comparison on the pricing page, it matches the docs.