I understand people sharing TailScale for convenience.
I have trouble understanding people sharing #TailScale for #SelfHosting though. Their server software isn't hostable. Even if you use their server, which seems contrary to *self* hosting, well you also have to use servers from either Google, Apple or Microsoft, just to log in unless you also want to maintain an OIDC provider, which negates the "convenience" always touted.
Run what you wish, but recommending for SelfHosting seems odd.
@Blort Agreed. The only truly safe tunnel is one where you are the only one who has access to the private keys. Tailscale is a great product and has its uses, but you are having to trust them both that they can adequately secure things and that they don't become a malicious actor.
Sharing for awareness by Headscale is a thing. It is self-hosted server part of Tailscale, not client unfortunantely. I otherwise agree full with your post!
I'd argue it's still quite doable as long as you have routable addresses to point to. The configs fer wireguard really ain't that hard to understand, even for novice technical readers. 😜
Blort™ 🐀Ⓥ🥋☣️
in reply to Anomaly ☑️ • • •I understand people sharing TailScale for convenience.
I have trouble understanding people sharing #TailScale for #SelfHosting though. Their server software isn't hostable. Even if you use their server, which seems contrary to *self* hosting, well you also have to use servers from either Google, Apple or Microsoft, just to log in unless you also want to maintain an OIDC provider, which negates the "convenience" always touted.
Run what you wish, but recommending for SelfHosting seems odd.
eshep likes this.
Tech Cyborg reshared this.
nhgeek
in reply to Blort™ 🐀Ⓥ🥋☣️ • • •jgkawell
in reply to Blort™ 🐀Ⓥ🥋☣️ • • •jalict
in reply to Blort™ 🐀Ⓥ🥋☣️ • • •eshep
Unknown parent • •