Tailscale n00b questions
from mrnobody@reddthat.com to selfhosted@lemmy.world on 02 Mar 14:52
https://reddthat.com/post/61205620

Playing around with a new self-host NAS OS, finally thought about Tailscale. But, I see it wants a login to an account. Checking online, seems I have to use Google, Apple, MS, Github or OIDC (which iassume costs money based on the site).

So how tf y’all setting to your tail scale stuff? I’m not using a big brother us tech account for auth on this thing. Think I’d rather go back to regular wireguard if that’s the case.

Edit: OK I see you can use regular email. It didn’t load the webpage correctly the first time or I missed it. Odd. Anyway, I do don’t want an account add I don’t want to risk any data compromise at some point

#selfhosted

threaded - newest

user224@lemmy.sdf.org on 02 Mar 14:57 next collapse

I went with Google.

Edit: I am just saying what I went with. I didn’t have another fitting option.

nfms@lemmy.ml on 02 Mar 21:42 collapse

I went with GitHub. In the end it’s just an OAuth service, to provide identity. It’s not used to gather data on you (just the same we already share by visiting regular websites).
I’m still gonna lookup Headscale and Wireguard because It’s been on my radar.

nfreak@lemmy.ml on 02 Mar 15:08 next collapse

If you have a VPS, consider setting up either Headscale or Netbird if you don’t want to use any of Tailscale’s built-in auth methods (with all necessary security precautions taken of course). If that’s not an option I’d suggest going back to Wireguard for sure.

irmadlad@lemmy.world on 02 Mar 15:51 next collapse

I don’t want to risk any data compromise at some point

What data compromise are you worried about?

  • End-to-End Encryption: Tailscale utilizes WireGuard
  • No Centralized Servers: Tailscale creates a direct peer-to-peer connection between devices
  • Minimal Metadata: Tailscale may collect some metadata to facilitate connections, but this info does not include the content of your data.
  • User-Controlled Access: You have control over which devices can connect
  • Tailscale does not, and cannot inspect your traffic

I’m not the Tailscale sales person. Go with whatever suites your threat model. I am just curious what data compromise you are concerned with. If it’s the metadata aspect, you already blew that away when you made the post here at Lemmy, even assuming you are using a VPN.

node815@lemmy.world on 02 Mar 16:38 next collapse

I use Pocket-ID for my OIDC and it was easy to set up with Tailscale, you just have a custom domain which I do and I just login with my OIDC Account which is 100% self hosted on my local server.

nesc@lemmy.cafe on 02 Mar 17:53 next collapse

headscale /thread

frongt@lemmy.zip on 02 Mar 19:28 collapse

Is there a good guide? I tried setting up headscale and tailscale and I got everything running and linked, but it doesn’t pass traffic for the routes I’ve enabled and I’m not sure how to troubleshoot it.

illusionist@lemmy.zip on 02 Mar 18:22 next collapse

Since when can you use regular email? That’s odd. When i checked it out it wasn’t possible and there was even a post why. That tailscale is no identity provider and such things

dieTasse@feddit.org on 02 Mar 22:39 collapse

I will teach you a trick. Login with e.g. github. Create a tailnet. Create new user invite link, use it yourself - you can setup login with passkey to this second user. Promote to admin. Leave with your github user. Voila you have an account and tailnet with only passkey, no big brother oauth or anything.