tailscale
algo
Our great sponsors
- Onboard AI - Learn any GitHub repo in 59 seconds
- Revelo Payroll - Free Global Payroll designed for tech teams
- InfluxDB - Collect and Analyze Billions of Data Points in Real Time
- SonarLint - Clean code begins in your IDE with SonarLint
tailscale | algo | |
---|---|---|
983 | 154 | |
13,676 | 27,671 | |
3.0% | 0.4% | |
0.0 | 0.0 | |
2 days ago | 5 days ago | |
Go | Jinja | |
BSD 3-clause "New" or "Revised" License | GNU Affero General Public License v3.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
tailscale
-
Tailscale Kubernetes Operator
I agree, it's a feature that I find sorely lacking in my tailnet.
These are the relevant Github issues to follow, hopefully they address these someday:
- Apple TV, now with more Tailscale
-
Plex to block all servers hosted at Hetzner
tailscale runs a continuous netcheck to an unroutable IP (203.0.113.1:12345:UDP) [1] for whatever reason. This triggered Hetzner's ghetto-ass DDOS protection, thinking my server was compromised or something. They sent me an email saying my server was compromised and I had 24hrs to remedy it.
I responded to the email and filled out this attestation form declaring that my server was not under attack and it was a false positive etc. They still null routed my server and refused to turn it back on, and their arrogant support told me there was no way I was in control of this server etc.
Anyway, took my box offline during a peak user day, migrated to AWS and never looked back.
Don't do anything of importance on Hetzner. No wonder they only get people running pirated plex boxes.
[1] https://github.com/tailscale/tailscale/blob/94304819263b0553...
-
Duck DNS
Fond memories of using DDNS on old Netgear routers at home in the aughts and port forwarding services with some rudimentary firewall rules and tcpwrappers to try and lock down access.
Now I use a combination of Tailscale[1] for private services only to me and Tailscale Funnels[2], and Cloudflare Tunnels[3] for public service exposure.
This accomplishes the same thing I was doing with DDNS and my ISP IP, but in a much more secure and stable manner.
2. https://tailscale.com/kb/1223/tailscale-funnel/
3. https://developers.cloudflare.com/cloudflare-one/connections...
-
Which overlay network?
Tailscale: Seems to have quite good NAT support and seems to do DNS resolution. Clients for most relevant platform - a well rounded package. But I find their plans to be prohibitive. Only 20 devices on the free plan. The first paid tier is 5 devices per 1 user, so 5 devices for me paying? A head scratcher. There is an open source control plane https://github.com/juanfont/headscale but given the clients are not open source it feels a bit scary to rely on. My knowledge of wireguard is not good enough, but I am also wondering if it is really meant for a mesh setup?
- Remote Desktop from anywhere
- Open source projects to look at for best practices?
-
IT-s redditorok. Hogyan tudok otthoni VPN-t felállítani?
Ha van mindket modem mogott fixen szamitogep (akar egy olcso raspberry pi) akkor felrakod a tailscale-t, engedelyezed exit node-kent es kesz vagy. Gepenkent kb 5 perc melo
algo
-
Best Platform to run Stable Diffusion REMOTELY: Answers Needed
Check out the command line args for Auto1111, it talks about a gradio setup that can be accessed remotely. There's a time limit on gradio links though, I think. You could also set up a vpn that will allow you to access your PC remotely, then run A1111 with the --listen command and access it that way. I've done this with an Algo VPN on Azure and a Wireguard client for Windows for Android, but any VPN that lets you access your PC remotely would work.
-
School does not allow VPN
One way you could try to get around is building your own VPN service, like this: https://github.com/trailofbits/algo/blob/master/README.md
- Any servers working in Russia left?
- Quick VPN Setup with AWS Lightsail and WireGuard
-
Make your own VPN with Fly.io, tailscale and GitHub
If you want a quick way to setup wiregaurd on your cloud provider of choice there's this easy tool by the security company trailofbits https://github.com/trailofbits/algo
they specifically try to remove extraneous features and make it easy to use, I'm surprised more people don't use it
Isn't the problem that the exit IPs will be flagged / blocked, meaning at best you'll get a ton of captchas etc.? I have set up personal Wireguard VPNs with Algo[1] before on DO, and while they work fine, they cause a lot of friction for that reason.
-
Opening up geth RPC endpoints publically?
To make matters slightly more complicated, I am using algo which is a DIY wireguard VPN for all my devices (including my validator machine). So all traffic likely needs to get routed to/from the VPN machine running in the cloud (though I might be wrong about this).
-
Build your own private WireGuard VPN with PiVPN
Algo project still works well. Very quickly launch a WireGuard VPN to several popular cloud providers, or any Linux instance you already have access to, including your rPi.
-
ELI5: Why companies push the phone app on us?
I set up an algo VPN server at Hetzner, then installed AdGuard Home on it.
What are some alternatives?
headscale - An open source, self-hosted implementation of the Tailscale control server
Netmaker - Netmaker makes networks with WireGuard. Netmaker automates fast, secure, and distributed virtual networks.
ZeroTier - A Smart Ethernet Switch for Earth
netbird - Connect your devices into a single secure private WireGuard®-based mesh network with SSO/MFA and simple access controls.
pivpn - The Simplest VPN installer, designed for Raspberry Pi
Nebula - A scalable overlay networking tool with a focus on performance, simplicity and security
mistborn
traefik - The Cloud Native Application Proxy
OpenVPN - OpenVPN is an open source VPN daemon
cloudflared - Cloudflare Tunnel client (formerly Argo Tunnel)
innernet - A private network system that uses WireGuard under the hood.
wireguard-vyatta-ubnt - WireGuard for Ubiquiti Devices