Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse

NodeBB

  1. Home
  2. Selfhosted
  3. Friendly reminder that Tailscale is VC-funded and driving towards IPO

Friendly reminder that Tailscale is VC-funded and driving towards IPO

Scheduled Pinned Locked Moved Selfhosted
selfhosted
254 Posts 114 Posters 253 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • T [email protected]

    If you only need to worry about the IP changing, then your ISP is not using NAT, or CGNAT as it is better known. I'm pretty sure that you can also use port forwarding, which is not commonly available under CGNAT.

    F This user is from outside of this forum
    F This user is from outside of this forum
    [email protected]
    wrote last edited by
    #181

    Ah, I see where I got confused. Yeah, CGNAT isn't very common around here. I don't think I've ever run into an ISP that uses it. I can see how that complicates things.

    I 1 Reply Last reply
    2
    • heals@discuss.tchncs.deH [email protected]

      To be fair, anything the GUI clients do can be done with the CLI which is still open source and on all desktop platforms and headscale is literally their open source control server.

      F This user is from outside of this forum
      F This user is from outside of this forum
      [email protected]
      wrote last edited by
      #182

      Yea, but in iOS?

      heals@discuss.tchncs.deH L 2 Replies Last reply
      2
      • avidamoeba@lemmy.caA [email protected]

        Huh, I actually didn't know this because I don't use Windows/macOS/iOS. Somehow completely missed this.

        F This user is from outside of this forum
        F This user is from outside of this forum
        [email protected]
        wrote last edited by
        #183

        Granted this is not Headscale's fault, they're just using Tailscale clients. Either way I'm glad I use a roll-your-own Wireguard.

        I and my partner also don't use those OSs, but it's more the point of using FOSS when we can.

        1 Reply Last reply
        2
        • V [email protected]

          Crap, I really need to switch of Tailscale but currently it is an easy way for me to access my stuff outside of home as a temporary solution while I am on a 5G modem.

          N This user is from outside of this forum
          N This user is from outside of this forum
          [email protected]
          wrote last edited by
          #184

          Do you pay for a domain? They likely provide dynamic DNS (DNS). If you're lucky, they have an API for it, instead of an app, and you can configure a cronjob on your home server to run every 1-5 minutes (or more often, if your IP is super unstable!).

          V 1 Reply Last reply
          3
          • K [email protected]

            I can recommend to take a look at netbird.io

            U This user is from outside of this forum
            U This user is from outside of this forum
            [email protected]
            wrote last edited by
            #185

            I can't. I tried it first and installed it on my phone from f-droid. After opening it up, it connected to an already existing network with other people's old machines from years ago on it. I was horrified.

            So then I tried to delete my whole account and couldn't due to an error. I sent them an email about it and they took like two weeks to respond.

            possiblylinux127@lemmy.zipP 1 Reply Last reply
            6
            • vanilla_puddinfudge@infosec.pubV [email protected]

              I just replaced my entire setup with base wireguard as a challenge, easier than I expected it to be, and not hard to mimic tailscale.

              U This user is from outside of this forum
              U This user is from outside of this forum
              [email protected]
              wrote last edited by
              #186

              If you just have to talk from many devices to the one server sure, but Tailscale sure makes it easy for many to many. Also if a direct connection is impossible (e.g. firewall of china, CGNAT etc) tailscale puts a relay server in the middle for you.

              vanilla_puddinfudge@infosec.pubV 1 Reply Last reply
              4
              • N [email protected]

                Do you pay for a domain? They likely provide dynamic DNS (DNS). If you're lucky, they have an API for it, instead of an app, and you can configure a cronjob on your home server to run every 1-5 minutes (or more often, if your IP is super unstable!).

                V This user is from outside of this forum
                V This user is from outside of this forum
                [email protected]
                wrote last edited by
                #187

                Yeah I can always do that, but putting stuff behind something like Tailscale is (or atleast feels) more secure than making my IP known to the public. I have a DMZ setup though so it should be fine.

                C 1 Reply Last reply
                2
                • pjusk@lemmy.dbzer0.comP [email protected]

                  Big difference in users and devices here. Tailscale might have a 3 user limit, but you can add up to 100 devices for free. So for me for example I have tailscale running in each and every docker container in my NAS. So each and every container can now act as a node on my tailnet. Users isn't a big deal, any one node can activate funnel with a simple command and poof its available to the public. The convenience coupled with simplicity is what makes Tailscale so god damn good.

                  avidamoeba@lemmy.caA This user is from outside of this forum
                  avidamoeba@lemmy.caA This user is from outside of this forum
                  [email protected]
                  wrote last edited by
                  #188

                  Can you segregate connections between different nodes on the tailnet, like say node G and H can only talk to each other and no other nodes?

                  pjusk@lemmy.dbzer0.comP 1 Reply Last reply
                  1
                  • V [email protected]

                    Yeah I can always do that, but putting stuff behind something like Tailscale is (or atleast feels) more secure than making my IP known to the public. I have a DMZ setup though so it should be fine.

                    C This user is from outside of this forum
                    C This user is from outside of this forum
                    [email protected]
                    wrote last edited by
                    #189

                    Your "IP address" is already public. That's why an IPv4 address is assigned to you as a "public IP address" and you NAT to a private space. When using IPv6, everything is public.

                    The key is to secure everything with access restrictions.

                    V 1 Reply Last reply
                    4
                    • L [email protected]

                      Enshittification is inevitable for all free services (services as in with a server component). Thankfully the functions of tailscale are open source so until enshittification actually happens I will be happy with using a a useful but VC funded project. When I am not willing to make the trade off anymore I will use headscale or some other drop in replacement.

                      T This user is from outside of this forum
                      T This user is from outside of this forum
                      [email protected]
                      wrote last edited by
                      #190

                      Realistically Tailscale seems to currently be running on a model of get all of the self hosters to love running it at home so then they advocate to run it at work where all of the pricey enterprises licenses make the real money.

                      I've actually seen some real world usecases where if I had more political push, I would've put Tailscale onto the running as a potential solution

                      Hopefully they have the right people in place to push back at the VC firms about maintaining their current strategy rather than scaring away all of their best advocates before they can truly get off the ground. Having worked at a company owned by a hedgefund, part of the trick is having the right people in place in the company who can block the worst decisions by the capital-hungry owners

                      1 Reply Last reply
                      0
                      • avidamoeba@lemmy.caA [email protected]

                        Corporate VPN startup Tailscale secures $230 million CAD Series C on back of “surprising” growth

                        Pennarun confirmed the company had been approached by potential acquirers, but told BetaKit that the company intends to grow as a private company and work towards an initial public offering (IPO).

                        “Tailscale intends to remain independent and we are on a likely IPO track, although any IPO is several years out,” Pennarun said. “Meanwhile, we have an extremely efficient business model, rapid revenue acceleration, and a long runway that allows us to become profitable when needed, which means we can weather all kinds of economic storms.”

                        Keep that in mind as you ponder whether and when to switch to self-hosting Headscale.

                        I This user is from outside of this forum
                        I This user is from outside of this forum
                        [email protected]
                        wrote last edited by
                        #191

                        And here I am, still using OpenVPN in 2025 lol

                        P 1 Reply Last reply
                        9
                        • C [email protected]

                          Your "IP address" is already public. That's why an IPv4 address is assigned to you as a "public IP address" and you NAT to a private space. When using IPv6, everything is public.

                          The key is to secure everything with access restrictions.

                          V This user is from outside of this forum
                          V This user is from outside of this forum
                          [email protected]
                          wrote last edited by
                          #192

                          Well yes I know, but there is a difference between using a domain bound to me as a person and a random string of numbers that changes every 5 minutes

                          C 1 Reply Last reply
                          1
                          • avidamoeba@lemmy.caA [email protected]

                            Not so much ire than awareness and planning so we don't get caught pants down. I've been using them for 5 years, in part because their clients (for my OSes) are open source and there was a path out of their infrastructure. I paid for it and have a pretty elaborate setup which supports services for family and friends. I've been happy so far, but will be decoupling from their infrastructure. No ire for them, just for the system. The system makes people and firms do what they do. 😄

                            irmadlad@lemmy.worldI This user is from outside of this forum
                            irmadlad@lemmy.worldI This user is from outside of this forum
                            [email protected]
                            wrote last edited by
                            #193

                            Ok I can understand awareness. This whole time I've been thinking, Plex started in 2008 and 'Plex Hate' followed about two years into it's existence and has perpetuated itself for these 15 +/- years now. So I'm wondering, if during this time, anyone's personal narrator went off in their head with something like:

                            Hey bro....you know we're gonna have to dismount.

                            Awww maaan!

                            Yeah, I know it's your little honey hole but we're going to have to marry it if this keeps up.

                            Perhaps I misread the tone of the article.

                            avidamoeba@lemmy.caA 1 Reply Last reply
                            1
                            • F [email protected]

                              Yea, but in iOS?

                              heals@discuss.tchncs.deH This user is from outside of this forum
                              heals@discuss.tchncs.deH This user is from outside of this forum
                              [email protected]
                              wrote last edited by
                              #194

                              The iOS app is the exception for now but with the CLI and the core libs being open source it’s at least not off the table to make an alternate iOS client I’d say.

                              1 Reply Last reply
                              1
                              • vanilla_puddinfudge@infosec.pubV [email protected]

                                The vps is the wg server and my home server is a client and it uses pihole as the dns server. Once your clients hang around for a minute, their hostnames will populate on pihole and become available just like TS.

                                You do have to set available ips to wg's subnet so your clients don't all exit node from the server, so you'll be able to use 192.168.0.0 at home still for speed.

                                As for NPM, run it on the proxy, aim (for example) Jellyfin at 10.243.21.4 on the wg network and bam.

                                C This user is from outside of this forum
                                C This user is from outside of this forum
                                [email protected]
                                wrote last edited by
                                #195

                                I am a newbie so I am not sure I understand correctly. Tell me if my understanding is good.

                                Your Pi-Hole act as your DNS, so the VPS use the pi-hole through the tunnel to check for the translation IP, as set through the DNS directive in the wg file. For example, my pi-hole is at 10.0.20.5, so the DNS will be that address.

                                On the local side, the pi-hole is the DNS for all the services on that subnet and each service automatically populate their host name on pi-hole. I can configure the DNS server in my router/firewall (OPNSense in my case)

                                So when I ping service.example.com, it goes through the VPS, which queries the pi-hole through the tunnel and translates the address to the local subnet IP if applicable.

                                So when I have the wg connection active and my pi-hole is the DNS, every web request will go through the pi-hole. If the IP address is inside the range of AllowedIPs, the connection will go through the tunnel to the service, otherwise, the connection will go through outside the wg tunnel.

                                Does that make sense?

                                vanilla_puddinfudge@infosec.pubV 1 Reply Last reply
                                0
                                • avidamoeba@lemmy.caA [email protected]

                                  Corporate VPN startup Tailscale secures $230 million CAD Series C on back of “surprising” growth

                                  Pennarun confirmed the company had been approached by potential acquirers, but told BetaKit that the company intends to grow as a private company and work towards an initial public offering (IPO).

                                  “Tailscale intends to remain independent and we are on a likely IPO track, although any IPO is several years out,” Pennarun said. “Meanwhile, we have an extremely efficient business model, rapid revenue acceleration, and a long runway that allows us to become profitable when needed, which means we can weather all kinds of economic storms.”

                                  Keep that in mind as you ponder whether and when to switch to self-hosting Headscale.

                                  R This user is from outside of this forum
                                  R This user is from outside of this forum
                                  [email protected]
                                  wrote last edited by
                                  #196

                                  Nerds stop recommending corporate crap: challenge: impossible

                                  1 Reply Last reply
                                  24
                                  • G [email protected]

                                    Vps can be really inexpensive, I pay $3 a month for mine

                                    0 This user is from outside of this forum
                                    0 This user is from outside of this forum
                                    [email protected]
                                    wrote last edited by
                                    #197

                                    Or get something like a rapsberry-pi (second hand or on a sale). I have netbird running on it and I can use it to access my home network and also use it as tunnel my traffic through it.

                                    G 1 Reply Last reply
                                    0
                                    • M [email protected]

                                      Wireguard if you're just using it yourself. Many various ways to manage it, and it's built in to most routers already.

                                      Otherwise Headscale with one of the webUIs would be the closest replacement.

                                      nfreak@lemmy.mlN This user is from outside of this forum
                                      nfreak@lemmy.mlN This user is from outside of this forum
                                      [email protected]
                                      wrote last edited by
                                      #198

                                      I decided to experiment a bit with Headscale when the wg-easy v15 update broke my chained VPN setup. Got it all set up with Headplane for a UI, worked amazingly, until I learned I was supposed to set it all up on a VPS instead and couldn't actually access it if I wasn't initially on my home network, oops.

                                      I might play around with it again down the road with a cheap VPS, didn't take long to get it going, but realistically my setup's access is 95% me and 5% my wife so Wireguard works fine (reverted back to wg-easy v14 until v15 allows disabling ipv6 though, since that seemed to be what was causing the issues I've been seeing).

                                      M 1 Reply Last reply
                                      0
                                      • U [email protected]

                                        If you just have to talk from many devices to the one server sure, but Tailscale sure makes it easy for many to many. Also if a direct connection is impossible (e.g. firewall of china, CGNAT etc) tailscale puts a relay server in the middle for you.

                                        vanilla_puddinfudge@infosec.pubV This user is from outside of this forum
                                        vanilla_puddinfudge@infosec.pubV This user is from outside of this forum
                                        [email protected]
                                        wrote last edited by
                                        #199

                                        My entire setup might not be your entire setup, I have the basic functionality of connecting multiple systems into one mesh network. That's all I needed so it's all I did.

                                        1 Reply Last reply
                                        2
                                        • C [email protected]

                                          I am a newbie so I am not sure I understand correctly. Tell me if my understanding is good.

                                          Your Pi-Hole act as your DNS, so the VPS use the pi-hole through the tunnel to check for the translation IP, as set through the DNS directive in the wg file. For example, my pi-hole is at 10.0.20.5, so the DNS will be that address.

                                          On the local side, the pi-hole is the DNS for all the services on that subnet and each service automatically populate their host name on pi-hole. I can configure the DNS server in my router/firewall (OPNSense in my case)

                                          So when I ping service.example.com, it goes through the VPS, which queries the pi-hole through the tunnel and translates the address to the local subnet IP if applicable.

                                          So when I have the wg connection active and my pi-hole is the DNS, every web request will go through the pi-hole. If the IP address is inside the range of AllowedIPs, the connection will go through the tunnel to the service, otherwise, the connection will go through outside the wg tunnel.

                                          Does that make sense?

                                          vanilla_puddinfudge@infosec.pubV This user is from outside of this forum
                                          vanilla_puddinfudge@infosec.pubV This user is from outside of this forum
                                          [email protected]
                                          wrote last edited by [email protected]
                                          #200

                                          the VPS uses the pi-hole through the tunnel

                                          The VPS is Pihole, the dns for the server side is 127.0.0.1. 127.0.0.1 is also 10.x.x.1 for the clients, so they connect to that as the dns address.

                                          server dns - itself

                                          client dns - the server's wg address

                                          On the local side, the pi-hole is the DNS for all the services on that subnet and each service automatically populate their host name on pi-hole. I can configure the DNS server in my router/firewall (OPNSense in my case)

                                          Only if your router/firewall can directly connect to wg tunnels, but I went for every machine individually. My router isn't aware I host anything at all.

                                          So when I ping service.example.com, it goes through the VPS, which queries the pi-hole through the tunnel and translates the address to the local subnet IP if applicable.

                                          Pihole (in my case) can't see 192.x.x.x hosts. Use 10.x.x.x across every system for continuity.

                                          So when I have the wg connection active and my pi-hole is the DNS, every web request will go through the pi-hole. If the IP address is inside the range of AllowedIPs, the connection will go through the tunnel to the service, otherwise, the connection will go through outside the wg tunnel.

                                          Allowed ips = 10.x.x.0/24 - only connects the clients and server together

                                          Allowed ips = 0.0.0.0/0 - sends everything through the VPN, and connects the clients and server together.

                                          Do the top one, that's how TS works.

                                          C 1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          Powered by NodeBB Contributors
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups