fly-tailscale-exit
flyio-tailscale-gateway
fly-tailscale-exit | flyio-tailscale-gateway | |
---|---|---|
10 | 1 | |
1,501 | 11 | |
- | - | |
7.1 | 2.2 | |
6 days ago | about 1 year ago | |
Dockerfile | Shell | |
- | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
fly-tailscale-exit
-
Show HN: Serverless VPN, pay as you go, unlimited devices, no subscriptions
I used to do Algo with a VM on GCP. But fly.io and tailscale has made this really simple. Try this if you are looking for an easier alternative https://github.com/patte/fly-tailscale-exit
-
Make your own VPN with Fly.io, tailscale and GitHub
Yes, fly.io allows you to expose a UDP port. See the [fly.toml](https://github.com/patte/fly-tailscale-exit/blob/main/fly.to...) in the repo. To make, the tailscale port [is pinned](https://github.com/patte/fly-tailscale-exit/blob/main/start....) to the exposed port (41641 in that case).
I just tested it again and the connections are made directly (after the first 2,3 go via DERP):
- Cheapest way to run an exit node
- Run a VPN with global exit nodes with fly.io, tailscale and GitHub
- Show HN: Run a global VPN with tailscale and fly for you and your friends
flyio-tailscale-gateway
-
Make your own VPN with Fly.io, tailscale and GitHub
I've recently built something similar [0], but the complete opposite. I wanted to forward traffic onto my homeserver without a public IPv4. I've tried Tailscale Funnel, but the inability to use custom domains made me look for other solutions. I ended up with a fly.io app acting as a TCP proxy over Tailscale. Considering how crappy the setup is, it's surprisingly reliable. Great job fly.io and Tailscale teams! I haven't had any issues in the month or so I've been using it.
[0]: https://github.com/vakabus/flyio-tailscale-gateway
What are some alternatives?
outline-apps - Outline Client and Manager, developed by Jigsaw. Outline Manager makes it easy to create your own VPN server. Outline Client lets you share access to your VPN with anyone in your network, giving them access to the free and open internet.
zrok - Geo-scale, next-generation peer-to-peer sharing platform built on top of OpenZiti.
headscale - An open source, self-hosted implementation of the Tailscale control server
fly-wireguard-vpn-proxy
algo - Set up a personal VPN in the cloud
tailscale-tailwings - Run a Personal VPN with global exit nodes and proxy via Tailscale IPN
outline-server - Outline Server, developed by Jigsaw. The Outline Server is a proxy server that runs a Shadowsocks instance and provides a REST API for access key management.