Find out what's new in the latest 1.86 release of Tailscale in our brand new show, The Tailscale Changelog Show over on YouTube. #tailscale
Find out what's new in the latest 1.86 release of Tailscale in our brand new show, The Tailscale Changelog Show over on YouTube. #tailscale
No you idiots #tailscale isn't a VPN it simply creates the compartments of my system which re accessible to other machines connected to it with internet
That's why #android need be rooted
We setup Tailscale at work, and so now I have two tailnets I need to switch between fairly often. Which has me opening up a terminal more than I'd like ("tailscale switch --list", "tailscale switch").
What I'd like is an indicator that works on Ubuntu that allows me to toggle between them in a menu. I can't seem to find such a thing. But it seems too obvious not to exist. (Tailscale seems to include this in their client for OSX)
Really getting tired of the "think of the children" bullshit in this country. These people are so obcessed with it that it's disgustingly creepy. And it tramples all over civil rights. I even have the managed exit node package on #tailscale, which is a Canadian company, I use fulltime now. It's just eww. Eww. #gross #news https://www.eff.org/deeplinks/2025/07/you-went-drag-show-now-state-florida-wants-your-name
I have a very weird issue with my #tailscale + #mumble server setup:
I have a murmur (mumble) server that binds to the tailscale interface on my server.
I have shared that endpoint with a friend and we're both connecting via tailscale to that mumble server to talk.
Every few minutes (3, 5, something like that), one of us gets reconnected. Mumble (client) says "Server failed to respond to TCP ping". On the server it says (murmur log): "Connection closed: The remote host closed the connection".
The tailscale log on the server says something like "adding connection to derp-* for ..." at that very moment of reconnecting.
How to debug this issue? I don't even know where to start. It looks like (to me, as a networking noob) that tailscale reconfigures connections and breaks the mumble connection.
#followerpower #linuxadmin #NetworkEngineering #networking #sysadmin
CC @tailscale
Please boost
We are hiring someone to manage the Developer Relations team at @tailscale
Fancy being my boss? Have a passion for developer tooling? Reach out! We'd love to hear from you. #tailscale
Yay! I finally got around to writing that #blog post about #tailscale WebDav, orgzly, and #emacs org mode. Purview, here! #tech #foss https://kasbjornsen.codeberg.page/blog/2025-07-28-orgzly-tailscale.html
When copying 36GB of pcapng files from my server via Tailnet with scp, the rate was 1MB/s for each file. On the contrary, rsync was blazing fast with 1GB/s. What a significant difference.
well that was easy enough, golink setup using their youtube tutorial and gemini to help me get the docker stuff working properly #tailscale
well that was easy enough, golink setup using their youtube tutorial and gemini to help me get the docker stuff working properly
currently figuring out how to setup golink on my #Tailscale tailnet! looks very cool & useful :)
currently figuring out how to setup golink on my #Tailscale tailnet! looks very cool & useful :)
New blog post!
I've been using TLS certificates generated by Tailscale to access my self-hosted, private services with HTTPS for some time now, but there is one problem with them: they do not auto-regenerate.
So I used some bash and..
*thunder*, *ominous music*
systemd
to create an automated task that autoregenerates them periodically.
To crank the fun to 11, I also use https://ntfy.sh to notify me if the task succeeded or not
https://stfn.pl/blog/78-tailscale-certs-renew/
#blog #tailscale #systemd #lxc #nextcloud
A Self-hosted, BSD-native Gemini Protocol Server Stack
For those who are adventurous enough to explore the non-http corners of the Internet, the Gemini protocol is a delightful experience to use. It has been around a number of years, making the biggest bang around the time when discontent with the web’s general demise started to reach current heights (so maybe around 2022).
My “capsule”, Vigilia, is self-hosted, and has been since its inception. It used to run on a disused Macbook Pro running Fedora Server, under our TV at home, but since […]
https://journal.bsd.cafe/2025/07/22/a-self-hosted-bsd-native-gemini-protocol-server-stack/
@RockyC I'm guessing you meant #tailscale in the first paragraph btw
@remakingeden HOLY SHIT. After dicking around with Cosmos and Cloudflare and Let’sEncrypt and Docker and Omada ALL FUCKING DAY, I got #Tailscale installed on four devices and was browsing my Nextcloud files on my iPhone in TWO HOURS.
YOU, Fine Internet Person, are my new best friend! THANK YOU! That was STUPID EASY. In fact, the hardest part was remembering how to edit the Nextcloud config.php file inside Docker to add the authorized domain.
@tailscale FTW!
I have an older nest 2nd Gen thermostat that's going EOL (won't work remotely anymore). Remote access is a handy feature I'd like to keep.
I don't mind having to use VPN ( #tailscale ftw here), but it seems like the non cloud integrated options are zigbee or z wave, which involve getting a 'hub' and probably venturing down the #homeassistant rabbit hole.
Got an offer from borg aka Google for a decent rebate on nest 4th Gen.
So do I inflict (more) home IT tomfoolery on myself and family? Or just take the easy way and continue as part of the Google borg?
#Tailscale #Funnel ist schon verdammt praktisch
I'm in the middle of migrating my HA from docker to an HAOS VM. As part of the cleanup, I did a fresh install of Node-RED to a separate #docker container so I could use tailscale to proxy it.
I wrote up how at https://unixorn.github.io/post/homelab/nodered-homeassistant-and-tailscale/
#homelab #nodered #NodeRedInstallation #HomeAssistant #Tailscale @homeassistant