Tailscale continues to delight me every day. I wish I could pay them for them my modest little use-case of remotely-accessing my ham radio and my rpis. Before tailscale I relied on flaky upnp or "configuring my router" and trying to bust through nats. Not sure IPv6 would have helped this at all given how hostile ISPs are.
I'm looking for a solution to the problem of exposing a port on my laptop port to the internet (let's say for example purposes: ssh server port) from whatever network my laptop happens to be connected to ... I want to be able to initiate connections back to my laptop from random devices which are connected to the internet via network infrastructure that I don't control ...
Can tailscale give me that without me having to setup my own network infra somewhere?
I loved these two articles and feel some amount of trust for the author's company based on the communication style and knowledge sharing -- just wondering before I dive in whether this tech offers a good solution to my problem?
> IP mobility is what we do, in a small way, with Tailscale’s WireGuard connections. We try all your Internet links, IPv4 and IPv6, UDP and TCP
From the wireguard website[0]:
> WireGuard explicitly does not support tunneling over TCP, due to the classically terrible network performance of tunneling TCP-over-TCP. Rather, transforming WireGuard's UDP packets into TCP is the job of an upper layer of obfuscation (see previous point), and can be accomplished by projects like udptunnel and udp2raw.
I assume this means Tailscale has their own client where they’ve bolted this on themselves?