Friendly reminder that Tailscale is VC-funded and driving towards IPO
-
Netbird isn't on F-droid
Are we talking about the same thing?
It used to be
-
It used to be
It has never been on F-droid. I've been following the service since it started. It didn't even have a mobile app not that long ago.
-
Or get something like a rapsberry-pi (second hand or on a sale). I have netbird running on it and I can use it to access my home network and also use it as tunnel my traffic through it.
I don’t think that would solve the cgnat issue.
I use a vps because I don’t want to pay 250 a month for a starlink routable ip -
CGNAT is for IPv4, the IPv6 network is separate. But if you have IPv6 connectivity on both ends setting up WG is the same as with IPv4.
I usually have IPv6 access in my home, on the outside it varies from the ISPs
-
Thats just how IPv6 works. You get a delegate address from your ISP for your router and then any device within that gets it own unique address. Considering how large the pool is, all address are unique. No NAT means no port forwarding needed!
I guess so, my previous ISP also gave me IPv6 address (I could navigate using it) but I could never access my NAS services with it from an IPv6 ready network, I thought it would be the same with the newer ISP, but nope.
Maybe some firewall is active by the ISP? I could not do much thinker back then as I used the stock modem (router) and it was heavily locked.
-
I mean is anything iOS really open source?
Yes? There are Lemmy clients that are open source, for instance. And the Wireguard client is.
-
Yeah, OpenVPN definitely doesn't have light spec requirements
thankfully hardware is unfathomably powerful these days.
Sure but wireguards connection is just faster.
-
Corporate VPN startup Tailscale secures $230 million CAD Series C on back of “surprising” growth
Pennarun confirmed the company had been approached by potential acquirers, but told BetaKit that the company intends to grow as a private company and work towards an initial public offering (IPO).
“Tailscale intends to remain independent and we are on a likely IPO track, although any IPO is several years out,” Pennarun said. “Meanwhile, we have an extremely efficient business model, rapid revenue acceleration, and a long runway that allows us to become profitable when needed, which means we can weather all kinds of economic storms.”
Keep that in mind as you ponder whether and when to switch to self-hosting Headscale.
become profitable when needed
By what, laying off all QA and support staff and half your developers the moment a single quarterly earnings report isn't spotlessly gilded?
-
I never really understood the point of using Tailscale over plain ol' WireGuard. I mean I guess if youve got a dozen+ nodes but I feel like most laymens topologies won't be complex beyond a regular old wireguard config
NAT punching and proxying when a p2p connection between any 2 nodes cannot be achieved. It’s a world of difference with mobile devices when they always see each other, all the time. However, headscale does all that.
-
Why does it need to be on a VPS? It seems to work on a home network when I played around with it.
Well a VPS or an exposed service, but I feel like the latter ends up somewhat defeating the purpose anyway.
When running locally (not exposed), it worked great until I tried to make the initial connection from mobile data - can't establish a connection to headscale if it can't reach it in the first place. Unless I'm mistaken, the headscale service needs to be publicly accessible in some way.
-
Chances are you've had the same public IP for a long time. Mine hasn't changed in 2 years.
That was the case when I lived with my parents, but now it changes every 5 minutes sadly.
So I had to shut down my Minecraft server etc for now because I am on a 5G modem which makes it really annoying to open up ports and point a domain to your IP
-
I'm unsure if it has been mentioned, but a similar tool which is open source (you can run the backend unlike tailscale), netbird
Is there an issue with Netbird's servers at the moment? In my testing devices are connected and reach eachother, but the web admin is missing a lot of functionality compared to what's in the docs. The peer devices section is there, but everything else, user settings, rules etc, isn't showing/says I don't have admin permission (of my own account.. Lol?)
-
Would you rather a difficult and hard to use program?
Easy to use means people will want to adopt it, and that's what VC companies want. Nobody wants to pay millions of dollars to make a program that nobody wants to use.
would you rather ...
If it means no VC, yes, without a doubt. That's kind of the point.
-
Is there an issue with Netbird's servers at the moment? In my testing devices are connected and reach eachother, but the web admin is missing a lot of functionality compared to what's in the docs. The peer devices section is there, but everything else, user settings, rules etc, isn't showing/says I don't have admin permission (of my own account.. Lol?)
Honestly, no idea, worth checking their GitHub etc or their status pages if they have any
-
I never really understood the point of using Tailscale over plain ol' WireGuard. I mean I guess if youve got a dozen+ nodes but I feel like most laymens topologies won't be complex beyond a regular old wireguard config
Same thing here, either tailscale selfhosted or Netbird selfhosted I'd the way to go for all the nice features, having the free tier or tailscale for personal data never sounded right to me.
-
Used to run OpenVPN. Tried Wireguard and the performance was much better, although lacking some of the features some might need/want fit credential-based logins etc
I can highly recommend Netbird selfhosted, it has SSO support, logins, complex network topologies, it uses wireguard under the hood and it's open source.
-
Well a VPS or an exposed service, but I feel like the latter ends up somewhat defeating the purpose anyway.
When running locally (not exposed), it worked great until I tried to make the initial connection from mobile data - can't establish a connection to headscale if it can't reach it in the first place. Unless I'm mistaken, the headscale service needs to be publicly accessible in some way.
Oh gotcha yes it does. Are you on CGNAT with your ISP so you can't forward ports?
-
Oh gotcha yes it does. Are you on CGNAT with your ISP so you can't forward ports?
Nah, but personally I have no need to expose anything and would rather avoid the security headaches and such that come with it
-
Thank you for your insight, I'm assuming the only public part is the UI and coturn (the bit that enables two clients between firewalls to hole-punch)?
Yes, the underlying model is the same as Tailscale, Zerotier and Netmaker (also worth checking out, btw). Clients connect to a central host (which can be self-hosted) and use that to exchange information on addresses and open ports, then form direct connections to each other.
-
Much more user friendly
Json is awful for config
wrote last edited by [email protected]Crockford is a good and smart person but he really dropped the fucking ball on JSON.
Double-quotes-only and no comments kill the whole spec for me. Extremely opinionated and dumb. I fucking hate JSON.
My boss once sent me a machine generated config. He's terminally addicted to double-quotes (like, a fatal condition). I searched and there were 27k sequences of
\"
.Edit: my point is - all that compute and network wasted, every single time the file is requested and parsed. Completely pointless waste