tailscale

The easiest, most secure way to use WireGuard and 2FA. (by tailscale)

Stats

Basic tailscale repo stats
61
4,463
9.9
about 5 hours ago

tailscale/tailscale is an open source project licensed under GNU General Public License v3.0 or later which is an OSI approved license.

SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com

Tailscale Alternatives

Similar projects and alternatives to tailscale

  • GitHub repo ZeroTier

    A Smart Ethernet Switch for Earth

  • GitHub repo innernet

    A private network system that uses WireGuard under the hood.

  • GitHub repo Nebula

    A scalable overlay networking tool with a focus on performance, simplicity and security

  • GitHub repo algo

    Set up a personal VPN in the cloud

  • GitHub repo matrix-docker-ansible-deploy

    Matrix (An open network for secure, decentralized communication) server setup using Ansible and Docker

  • GitHub repo wireguard-vyatta-ubnt

    WireGuard for Ubiquiti Devices

  • GitHub repo headscale

    An open source implementation of the Tailscale control server

  • GitHub repo ztncui-containerized

    A Docker image that contains ZeroTier One and ztncui to set up a standalone ZeroTier network controller with a web user interface in a container.

  • GitHub repo Grafana

    The open and composable observability and data visualization platform. Visualize metrics, logs, and traces from multiple sources like Prometheus, Loki, Elasticsearch, InfluxDB, Postgres and many more.

  • GitHub repo Wiki.js

    Wiki.js | A modern and powerful wiki app built on Node.js (by Requarks)

  • GitHub repo Trilium Notes

    Build your personal knowledge base with Trilium Notes

  • GitHub repo Gravitational Teleport

    Certificate authority and access plane for SSH, Kubernetes, web applications, and databases

  • GitHub repo Invoice Ninja

    Invoices, Expenses and Tasks built with Laravel and Flutter

  • GitHub repo Camlistore

    Perkeep (née Camlistore) is your personal storage system for life: a way of storing, syncing, sharing, modelling and backing up content.

  • GitHub repo Baïkal

    Baïkal is a Calendar+Contacts server

  • GitHub repo tinc

    a VPN daemon

  • GitHub repo Cluster SSH

    Cluster SSH - Cluster Admin Via SSH

  • GitHub repo osync

    A robust two way (bidirectional) file sync script based on rsync with fault tolerance, POSIX ACL support, time control and near realtime sync

  • GitHub repo minimalist-web-notepad

    Minimalist Web Notepad

NOTE: The number of mentions on this list indicates mentions on common posts. Hence, a higher number means a better tailscale alternative or higher similarity.

Posts

Posts where tailscale has been mentioned. We have used some of these posts to build our list of alternatives and similar projects - the last one was on 2021-06-13.
  • Remotely connect to the internet through a Raspberry Pi cloud proxy
    You could try something like Tailscale. It's practically a better version of Wireguard. There are two ways you could set this up. The preferable one would be to install Tailscale on the Raspberry PIs and configure them as exit nodes. Then you would connect to them and route your traffic through to one Raspberry PI to another. Another way you could set this up is without that exit node. You can just connect all the devices to Tailscale and connect to them using VNC to use the browser that's on the Raspberry PI. And since Tailscale basically kind of centralizes all the devices you plan to connect to it, in this case multiple Raspberry PIs, it'll be a lot easier to manage since Tailscale provides their Magic DNS which you can use host names instead of fumbling around with IPs allocated by Tailscale.
  • Taildrop Was Kind of Easy
    news.ycombinator.com | 2021-06-13
    Awesome work, I wish I could use it. Unfortunately I use tailscale at work too and until https://github.com/tailscale/tailscale/issues/713 I'm turned off from using tailscale also for my personal stuff since I don't want to physically switch to a different set of machines for work and personal projects.
    news.ycombinator.com | 2021-06-13
    > Do you think it is sufficient to rely on update channels via distributions?

    Tailscale employee here. Most officially supported distributions use our own package repo server (https://pkgs.tailscale.com), which would pull Tailscale updates in your normal system updates. The other distributions that aren't in the package repo server (Alpine, Arch, Gentoo, NixOS, Void Linux, etc.) use packages made by the distribution themselves. We do our best to make sure they get updated (contacting the maintainers can be a slog at times), but we do not completely control the update process for them.

    > I haven't read the docs enough, but can a node belong to many domains at once? If so, does it need one port per domain that it is shared on?

    Not currently, follow this bug (https://github.com/tailscale/tailscale/issues/713) to be updated on the details for this. You can sorta hack around it with node sharing (https://tailscale.com/kb/1084/sharing/), but that's unidirectional instead of bidirectional.

    news.ycombinator.com | 2021-06-13
    I wonder how uneasy this sort of nicely documented and packaged user-space networking is making IT admins. It seems like it's pretty easy to, for example, create an internet facing service that pulls from internal company data sources. With user-space tunnels that probably aren't very easy to find from the IT admin perspective.

    I get that Tailscale didn't invent this capability, but they do a nice job of showing how it would work, some of the pieces (wireguard-go), and so on.

    They do seem aware: https://github.com/tailscale/tailscale/issues/204

    news.ycombinator.com | 2021-06-13
    > Tailscale does not do ipv6

    Tailscale does! https://github.com/tailscale/tailscale/issues/19

    $ ip addr show dev tailscale0

  • Bandwidth benchmark: Direct / SSH / ZeroTier / ZeroTier self-hosted / TailScale
    On the TailScale side, the free version allows you to easily connect different machines, and by relying on WireGuard and NAT magic, offers good performance. If you want to use different networks and accounts as it can be the case for ZeroTier in a native way, TailScale will not allow you to do it easily for the moment but the question is asked (here for example).
  • Access Local Services From Internet Without PortForwarding Or Using VPN
    reddit.com/r/homelab | 2021-06-10
    https://tailscale.com. Kind of a VPN, but you don’t actually have to run a VPN server or do any port forwarding. Though I’m not sure if you can use your own custom domain.
  • Is it possible to write a working VPN service in Golang ?
    reddit.com/r/golang | 2021-06-09
    The Wireguard project has a Go userspace implementation, which is currently improved by and/or built upon at tailscale. At, work, we've ported fastd to Go (but we've since moved on).
  • Help Setting up pfSense + WireGuard (or openvpn) for Remote Access
    reddit.com/r/PFSENSE | 2021-06-06
    AS stated above try Tailscale as it has clients for windows, macs, iOS and android. You won't need to do any port forwarding on the old router/gateway and you won't have to set up Proxmox or pfSense/opnsense to get access to the devices on your home network form basically anywhere.
    reddit.com/r/PFSENSE | 2021-06-06
    Might be possible with a single interface, but I think it would be simpler to setup an OpenVPN server on its own (not in pfsense) on a Linux VM in proxmox, and then you wouldn’t have to deal with WAN/LAN in pfsense. The simplest solution, since looks like you only want to access the Win10 machine, is to look at Tailscale VPN (https://tailscale.com/). With that you wouldn’t have to worry about setting up a VPN server for accessing a single device.
  • How to setup a VPN to access a web server behind a CGNAT?
    If only you want access to it, you can use Tailscale (https://tailscale.com).
  • Fill in the blanks: You may be using _______, but should be using _______.
    Innernet is a quite nice alternative for tailscale
  • Way to manage on premise devices? Is my approach decent?
    You might want to look into Tailscale.
  • Ask HN: Who is hiring? (June 2021)
    news.ycombinator.com | 2021-06-01
    Tailscale | Remote (US or Canada)

    https://tailscale.com/

    https://apply.workable.com/tailscale/j/DF581EE971/

    We're seeking a full-time Windows Software Developer to join our growing team. In this role you will be primarily responsible for improving, extending, and maintaining Tailscale’s highly popular Windows client. Work will involve a mix of frontend and backend development, with emphasis on systems and network-level programming.

    Because we’re an early-stage and fully remote company, we’re looking for a motivated individual who can think on their feet, enjoys collaborating with highly technical teams, and is comfortable working asynchronously.

  • Need feedback on this crazy idea
    reddit.com/r/ruby | 2021-06-01
    If you don't want to discover how to do that, you can always use Tailscale https://tailscale.com/ which works great. It might be the simplest-to-use system out there for these kinds of scenarios. You can get a mesh network running between your nodes in about 10 minutes. (No affiliation, just a happy free user)