I can’t praise Tailscale and its developers enough… I discovered this do-it-yourself VPN solution about half a year ago and boy has it improved my life… Here is what I managed to accomplish with it.

I am running Tailscale on my old macbook air, henceforth referred to as my “server”, my two firesticks, and my phones.

*remotely=outside of LAN, so over internet*

-I can access my SMB shares remotely from my phones with OwlFiles and from my M1 Macbook air seamlessly through Finder. All I had to do was enter a simple command on my server in Terminal to add TCP/445 to “Services”. Tailscale then forwards incoming TCP connections on port 445 from within my tailnet to port 445 on my mac’s server. The result is that I am able to mount my 2TB share from anywhere I have internet and manage my files as though I was on my home network. I also have access to my entire media library from VLC installed on all my devices (once again, through SMB). If only I could somehow add my remote SMB shares to Kodi… But Kodi doesn’t seem to allow me to type in custom IP addresses when trying to add SMB shares. Let me know in the comments if you know how to add remote SMB shares to Kodi (the ones it does not detect automatically).

-Similarly, by adding a suitable HTTPS port to my server’s Tailscale services, I am able to manage the Transmission torrent client installed on my server remotely through Transmission’s web interface (while connected to Tailscale, of course).

-I can back up to Time Machine remotely and accessing my Time Machine backups remotely as well. There are a few caveats though. On my server, I had to add a shared folder (from Settings), allow access to it via SMB and mark it as a Time Machine backup destination. The process is pretty straightforward. The trick is to add it as a backup destination THROUGH TAILSCALE by typing in the Tailscale IP of your server or the Magic-DNS domain name. Also, you will not be able to access pre-existing time machine backups through Tailscale! Only the destinations that you initially add through Tailscale. This is why I have two backup destinations on my server - one that I back up to from my LAN and one that I use over Tailscale remotely. Works like a charm!!!

-I can control my server through VNC remotely and seamlessly as if I was connected to LAN. To do that, I had to add TCP/5900 to my server’s Tailscale services (which is akin to opening up TCP port 5900 to incoming connections from within the tailnet). This is particularly useful when I don’t have my M1 mac with me, but need to run Python code inside Spyder. I just turn on my bluetooth/trackpad combo, connect it to my S10+, jack myself into my tailnet, MultiVNC my way into my server and BAM.

-MagicDNS deserves its own praiseful review. Not only did it assign a permanent, simple domain name to all my Tailscale-enabled devices, but it allowed me to configure my own DNS server for Tailscale-connected devices. I was then able to choose custom DNS servers for specific domains, which let me block FireTV updates without compromising my security (The DNS server used for that looks a little sketchy so I don’t want all of my traffic to go through it) and also use AdGuard DNS without breaking Doordash’s Dasher app by routing doordash-specific DNS requests to Google’s DNS and not AdGuard’s. Solid win here, as Adguard’s DNS bricks the Dasher app. Let me know in the comments if you want to see my Magic-DNS configuration.

-FUNNEL: By running a funnel (proxy) on my home server, I am able to access my dad’s Bell Fibe TV channels through their web interface from anywhere on Earth - Bell treats my traffic as if it’s coming from my home network! It will NOT work if you use the mobile app, but works flawlessly from within Samsung Internet, Safari (on mac) and Grazing 3 (on iOS). Also, it’s quite neat to browse with my Canadian IP even when I am travelling (no more annoying “cookie consent” notices when in the EU). I suspect Netflix users could use this sort of setup to get around password-sharing restrictions. I am also running funnels on my firesticks just in case I need more bandwidth.

-SUBNETS: I am running a subnet on my home server so that I could adb into my firesticks and manage them remotely with scrcpy (update apps, install tweaks, etc). Yes, I am not a huge fan of the command line ^^’ . I can also access my wifi cameras remotely from my mac. The desktop app for the cheap chinese ones only allows you to manage them over LAN, but Tailscale takes care of that. Works like a charm!

I am beyond pleased with everything Tailscale enables me to do. It baffles me that this technology is somehow free to use. I am extremely grateful to be a part of the Tailscale community. Thank you!!

Share your ideas and questions in the comments.

1 point

Boy, can “guerilla” marketing get more obvious?

permalink
report
reply
2 points

I started using tailscale a while ago and it is quite nice tbf

permalink
report
parent
reply
1 point

What? Is recommending a product you like marketing?

Or is OP affiliated with them in any way?

permalink
report
parent
reply
1 point

Haha if I was affiliated with them, I would not be talking about my collection of torrented material LOL

permalink
report
parent
reply
1 point

That’s a very good point 😀

Anyway, I enjoy reading about what people use, proprietary or not, so kudos for the post!

permalink
report
parent
reply
1 point

Since you were most definitely just referring to torrenting your fine selection of exquisitely curated Linux distros, I guess we can let that slide. 😇

permalink
report
parent
reply
2 points

Wait till you learn about Wireguard.

permalink
report
reply
0 points

way easier to just use tailscale

permalink
report
parent
reply
1 point

Yeah as long as you want to be tied to a business forever. Just like youtube and netflix increasing rates, it’s only a matter of time. This is the business plan of technology unfortunately. Charge for software that is free to use.

permalink
report
parent
reply
1 point

Once it starts to cost anything it will be easy to swap away.

permalink
report
parent
reply
1 point

Unlike YouTube and Netflix, Tailscale is a business oriented product. And as some of the others say, it’ll be easy to switch away from it, if push comes to shove.

permalink
report
parent
reply
2 points

Tailscale uses wireguard under the hood

permalink
report
parent
reply
1 point

I think you know that I and everyone else knows that.

permalink
report
parent
reply
3 points

Serious question, what makes tailscale so great? Isn’t it just vpn? I have been using wireguard for years and am now seeing everyone saying how great tailscale is but I can’t see any difference between them. If I already have wireguard setup and running, is there any point to look into setting up tailscale?

permalink
report
reply
1 point

It’s just the ease of use, Tailscale sets everything up for you, keeps track of IPs so you don’t need to manually define endpoints, and handles NAT negotiation.

permalink
report
parent
reply
1 point

It is simple. One click and done.

permalink
report
parent
reply
3 points

Not really, no. Tailscale uses wireguard under the hood. It has a nice user interface and makes setting up a split VPN super easy. It also provides relatively easy ways to do ACL between devices. If you already got wireguard set up, you can skip tailscale.

permalink
report
parent
reply
1 point

But it is not opensouce and free?

permalink
report
parent
reply
1 point

The client is not, no. Wireguard is open source and you can selfhost headscale, which is an open source server for tailscale, provided by tailscale themselves.

permalink
report
parent
reply
1 point

For the time being, their recent additions to wireguard-go have increased its performance by nearly double when compared to the kernel version.

From what I’ve read, the patches are currently under revision by zx2c4 for the kernel version.

permalink
report
parent
reply
1 point

Oh, that is crazy! I think I should do a bit of performance testing then :)

permalink
report
parent
reply
1 point

I have been running wireguard for a couple of years now, with a DigitalOcean VPS setup as the main server.

One thing I’ve noticed, is that specific wg clients will occasionally lose their connection to the wireguard network, and I’ll have to find some way to get to that machine and then a simple ping will re-establish it’s connection, and I can access that system again.

Started using tailscale a few months ago, parallel to the wg network, and have never ran into that issue with the tailscale daemons. I started using ts, as my backend remote to the wg locked out systems to get wg working again, but ts has been so reliable vs straight wg, that I’m now making it my preferred connection preference.

permalink
report
parent
reply
1 point

To be clear: I too am using tailscale for its convenience and reliability. While I havent had any issues with wireguard clients, it is interesting to see that there may be cases where switching from wireguard to tailscale can actually still make sense.

permalink
report
parent
reply
1 point

The 1st and main reason I use it for, is to avoid port forwarding.

permalink
report
parent
reply
1 point

If you’re already running wireguard and just want a VPN, there isn’t much that you’re missing out on except for convenience when it comes to device management and routing, automatic hostname DNS resolution, and also getting access to more advanced features like meshing and failover LAN/subnet sharing without needing to figure out how to do it in bare wireguard.

Honestly though, it’s free and makes for a great hassle-free backup VPN that just works. I use wireguard as my primary because it’s fully self-hosted, runs at the kernel level instead of within the userspace so it’s faster, and is more native than installing third-party solutions; with that said, I still run tailscale on all my servers as well in case I bork something while editing wireguard configs at any point.

permalink
report
parent
reply
1 point

any downsides to running tailscale? seems like it might just be adding risk (though minor) with little upside.

permalink
report
parent
reply
1 point

For my situation, as a backup/secondary VPN? I haven’t really noticed any downsides. It’s come in handy couple of times when I messed up the wireguard config on my wireguard server - it’s on an oracle cloud VM and it’s harder to get a local terminal in there in case you lose SSH/remote access, which I did.

permalink
report
parent
reply
1 point

I was also using Wireguard (and OpenVPN) until my ISP let’s me share the ipv4 with my neighbors. Now I need Talescale.

permalink
report
parent
reply
1 point

What also makes it great it’s the NAT traversal techniques. I’ve had trouble escaping my school network with plain wireguard (tried different ports and ideas). With tailscale I have never find a network I can’t escape.

permalink
report
parent
reply
1 point

One of the biggest things that it helps with is the double Nat dilemma that folks can run into if they’re either behind cgnat or don’t have control of their network management.

permalink
report
parent
reply
1 point

thanks for the effort write-up, I’m still trying to wrap my mind around how this works beyond its just magic

permalink
report
reply
0 points

Been a techy since a kid, IT “professional” for 12+ years. In undergrad, I had a professor tell me something I will never forget for as long as I live…

“What I’m teaching you is 95% science (physics, electronic engineering theory, FFT, etc.) and 5% magic”

It’s absolutely true that no matter how well you understand how and why something is working, there is still that absolutely small percentage of “holy shit, I can beam a picture of a cat across the entire planet in a fraction of a second while pooping”.

If that isn’t magic, I truly don’t know what is.

permalink
report
parent
reply
1 point

FYI: I read this while pooping :)

permalink
report
parent
reply
1 point

I set it up in the last couple months as well, but am using headscale as my controller on a small vps.

permalink
report
reply

Self-Hosted Main

!main@selfhosted.forum

Create post

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.

For Example

  • Service: Dropbox - Alternative: Nextcloud
  • Service: Google Reader - Alternative: Tiny Tiny RSS
  • Service: Blogger - Alternative: WordPress

We welcome posts that include suggestions for good self-hosted alternatives to popular online services, how they are better, or how they give back control of your data. Also include hints and tips for less technical readers.

Useful Lists

Community stats

  • 23

    Monthly active users

  • 1.8K

    Posts

  • 11K

    Comments

Community moderators