TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Headscale: Open-source implementation of the Tailscale control server

363 pointsby harporoederover 3 years ago

13 comments

mediocregopherover 3 years ago
Another similar project to Tailscale, for those in the market:<p><a href="https:&#x2F;&#x2F;github.com&#x2F;slackhq&#x2F;nebula" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;slackhq&#x2F;nebula</a><p>Crazy simple, fully open source, trivial to self-host. Maybe not as featureful as Tailscale, but imo that can be a feature unto itself.
评论 #28573225 未加载
评论 #28573595 未加载
评论 #28573689 未加载
评论 #28573358 未加载
评论 #28572844 未加载
评论 #28572875 未加载
评论 #28574995 未加载
评论 #28574159 未加载
评论 #28574823 未加载
评论 #28573017 未加载
评论 #28573299 未加载
评论 #28572382 未加载
jlark77777over 3 years ago
The ZeroTier ecosystem has a number of open source self-hosted controller projects for those who want unlimited members&#x2F;networks&#x2F;admins.<p>- <a href="https:&#x2F;&#x2F;github.com&#x2F;key-networks&#x2F;ztncui" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;key-networks&#x2F;ztncui</a> (the most popular one, GUI)<p>- <a href="https:&#x2F;&#x2F;github.com&#x2F;dec0dOS&#x2F;zero-ui" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;dec0dOS&#x2F;zero-ui</a> (GUI)<p>- <a href="https:&#x2F;&#x2F;github.com&#x2F;thedunston&#x2F;bash_cli_zt" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;thedunston&#x2F;bash_cli_zt</a> (CLI)
评论 #28572460 未加载
评论 #28572452 未加载
cheesetableover 3 years ago
Not sure what I think about this.<p>I don&#x27;t use Tailscale because I don&#x27;t trust their key distribution, and this open source project would solve that, but it might undermine Tailscale&#x27;s sustainability.<p>This would be a shame because Tailscale is working well with the open source community: open source clients, working well with distros, working well with Linux DNS stack, supporting a more P2P secure Internet, and documenting their well through it.
评论 #28574279 未加载
评论 #28574477 未加载
评论 #28572957 未加载
评论 #28574170 未加载
jgiliasover 3 years ago
Can someone shed some light on the full use-case of Tailscale&#x2F;Zerotier&#x2F;Nebula please? I may be not getting something fully.<p>The question is this. Say, I use one of the above to form a private mesh network for the nodes that an organization needs to have access to. So far so good. But on the machine side I would still want to have key (ideally certificate) based authentication, and some user management, such that access can be revoked. Is this an anti-pattern? Or do people use something like Go Teleport in combination with a zero trust mesh network?
评论 #28580573 未加载
a-dubover 3 years ago
so this whole zerocorp&#x2F;zerotier&#x2F;encrypted-mesh networking approach is pretty cool, but every time i see it i ask myself: how do you monitor for malicious nodes? in old setups, typically there would be some sort of passive monitoring system that would monitor the traffic between hosts and could be used for forensics&#x2F;malicious traffic identification. but if you&#x27;re encrypting traffic at each node for each other node, then only the participant nodes are privy to the traffic. if one or both are compromised, how would you ever know? sure you can run userland security agents on them that collect data, but if the machines are actually compromised, you can&#x27;t really trust what they say, right? (that&#x27;s the whole reason why you use a third system for monitoring!)
评论 #28573359 未加载
评论 #28575640 未加载
beagle3over 3 years ago
Is there anything among these that incorporates a basic configurable firewall policy?<p>In the more distant past, I used sshuttle to create “one way” poor man’s VPN; it is slow, but it was enough to saturate the remote connections I had at the time; and —- unlike many other systems at the time —- I knew I could trust the cryptography and key distribution, which piggybacks ssh.<p>At the minimum,I want to have connections going only one way between sine hosts, or no way in the case of two edge devices - and possibly also list specific ports and protocols. Sshuttle only provided directionality - and not intentionally either…<p>Sshuttle was conceived and written by Avery Pennarun, who later went to co-create … tailscale.
评论 #28574988 未加载
评论 #28574912 未加载
js4everover 3 years ago
No one mentioned yet Netmaker[1]<p>It&#x27;s a fully meshed network based on wireguard, it&#x27;s open source including the web ui<p>[1]: <a href="https:&#x2F;&#x2F;github.com&#x2F;gravitl&#x2F;netmaker" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;gravitl&#x2F;netmaker</a>
评论 #28575543 未加载
s_Hoggover 3 years ago
I read through the README and I&#x27;m still not quite sure - given how simple it is to set up wireguard, what&#x27;s the value add here?
评论 #28575196 未加载
评论 #28573254 未加载
crawshawover 3 years ago
Great name.
评论 #28574548 未加载
KingMachiavelliover 3 years ago
I saw this a while ago but had not realized it was feature complete now. Fantastic work. I look forward to moving from pure-wireguard to Headscale&#x2F;Tailscale soon.
RL_Quineover 3 years ago
As far as I could work out, you can’t use the iOS client for Tailscale without building your own binary for it. I’d love to be proven wrong.
评论 #28573026 未加载
synergy20over 3 years ago
With nearly all websites running https now, is it safe enough to surf without vpn these days.<p>Adding dns-over-https so your ISP can not collect where you&#x27;re going.<p>As far as google etc collecting your info, it will work the same as long as you&#x27;re using their service, with&#x2F;without VPN.<p>I do use VPN(tailscale) for work so I can access corporate internal network, but for general surfing purpose, do I really need vpn these days.
评论 #28573246 未加载
xyzzy_plughover 3 years ago
While this is great, of course, it&#x27;s definitely not feature parity with Tailscale, which currently allows me to have <i>nothing</i> listening on the opening internet and still form a private network spanning hosts all over the world, share resources within that network with 3rd parties trivially and send files across my network, android&#x2F;iOS apps, etc.<p>I still posit the alternative to Tailscale is simply just wireguard. I don&#x27;t see huge value in hosting my own Tailscale over just using Tailscale.
评论 #28573807 未加载