Hacker Newsnew | past | comments | ask | show | jobs | submitlogin



Tailscale continues to delight me every day. I wish I could pay them for them my modest little use-case of remotely-accessing my ham radio and my rpis. Before tailscale I relied on flaky upnp or "configuring my router" and trying to bust through nats. Not sure IPv6 would have helped this at all given how hostile ISPs are.


I'm not sure about the specifics of your setup, but it sounds like ZeroTier could help you there.

I run it on my router as a Layer 2 bridge, and a client on each "road warrior" device (laptop, phone, etc).

For my laptop, I even rely on self-hosted services for many things, including DNS and I have no noticeable latency even when on a crappy network.

For context, all of that is running behind CGNAT for IPv4, which is very impressive.


I'm looking for a solution to the problem of exposing a port on my laptop port to the internet (let's say for example purposes: ssh server port) from whatever network my laptop happens to be connected to ... I want to be able to initiate connections back to my laptop from random devices which are connected to the internet via network infrastructure that I don't control ...

Can tailscale give me that without me having to setup my own network infra somewhere?

I loved these two articles and feel some amount of trust for the author's company based on the communication style and knowledge sharing -- just wondering before I dive in whether this tech offers a good solution to my problem?


If you can install tailscale on it you can join your private tailscale mesh network from it.


From the follow up:

> IP mobility is what we do, in a small way, with Tailscale’s WireGuard connections. We try all your Internet links, IPv4 and IPv6, UDP and TCP

From the wireguard website[0]:

> WireGuard explicitly does not support tunneling over TCP, due to the classically terrible network performance of tunneling TCP-over-TCP. Rather, transforming WireGuard's UDP packets into TCP is the job of an upper layer of obfuscation (see previous point), and can be accomplished by projects like udptunnel and udp2raw.

I assume this means Tailscale has their own client where they’ve bolted this on themselves?

[0]: https://www.wireguard.com/known-limitations/


Eh, I sort of ignored the plug at the end. It's not really what the issue is about, completely different scale.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: