Corporate VPN startup Tailscale secures $230 million CAD Series C on back of “surprising” growth

Pennarun confirmed the company had been approached by potential acquirers, but told BetaKit that the company intends to grow as a private company and work towards an initial public offering (IPO).

“Tailscale intends to remain independent and we are on a likely IPO track, although any IPO is several years out,” Pennarun said. “Meanwhile, we have an extremely efficient business model, rapid revenue acceleration, and a long runway that allows us to become profitable when needed, which means we can weather all kinds of economic storms.”

Keep that in mind as you ponder whether and when to switch to self-hosting Headscale.

  • fmstrat@lemmy.nowsci.com
    link
    fedilink
    English
    arrow-up
    55
    arrow-down
    1
    ·
    edit-2
    17 days ago

    Join our Discord server for a chat and community support.

    Sigh…

    And even worse:

    Everything in Tailscale is Open Source, except the GUI clients for proprietary OS (Windows and macOS/iOS), and the control server.

    • Heals@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      14
      ·
      17 days ago

      To be fair, anything the GUI clients do can be done with the CLI which is still open source and on all desktop platforms and headscale is literally their open source control server.

    • Avid Amoeba@lemmy.caOP
      link
      fedilink
      English
      arrow-up
      4
      ·
      17 days ago

      Huh, I actually didn’t know this because I don’t use Windows/macOS/iOS. Somehow completely missed this.

      • fmstrat@lemmy.nowsci.com
        link
        fedilink
        English
        arrow-up
        4
        arrow-down
        1
        ·
        17 days ago

        Granted this is not Headscale’s fault, they’re just using Tailscale clients. Either way I’m glad I use a roll-your-own Wireguard.

        I and my partner also don’t use those OSs, but it’s more the point of using FOSS when we can.

  • anachrohack@lemmy.world
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    1
    ·
    18 days ago

    What is even the point of tailscale? What can it do that other VPN solutions don’t? I feel like this is a problem that was solved like 20 years ago and still we’re coming up with novel solutions for some reason. At my company they want to start using tailscale and I don’t see why we don’t just set up wireguard on a node in our k8s cluster instead

    • lepinkainen@lemmy.world
      link
      fedilink
      English
      arrow-up
      9
      ·
      18 days ago

      Because I can have 3 phones, 2 tablets, 3 computers and 4 server on the same Tailnet in 15 minutes when starting from scratch

      • anachrohack@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        2
        ·
        18 days ago

        I guess that’s neat but I don’t think I’ve ever needed more than one connection to a corpo VPN at a time

        • thejml@lemm.ee
          link
          fedilink
          English
          arrow-up
          6
          ·
          18 days ago

          Tailscale/headscale/wire guard is different from a normal vpn setup.

          VPN: you tunnel into a remote network and all your connections flow through as if you’re on that remote network.

          Tailscale: your devices each run the daemon and basically create a separate, encrypted, dedicated overlay network between them no matter where they are or what network they are on. You can make an exit node where network traffic can exit the overlay network to the local network for a specific cidr, but without that, you’re only devices on the network are the devices connected to the overlay. I can setup a set of severs to be on the Tailscale overlay and only on that network, and it will only serve data with the devices also on the overlay network, and they can be distributed anywhere without any crazy router configuration or port forwarding or NAT or whatever.

          • lepinkainen@lemmy.world
            link
            fedilink
            English
            arrow-up
            2
            ·
            17 days ago

            And on Unraid you can add individual docker containers to the tailnet too.

            So you can just go ssh <container> on any device in the Tailnet and it’ll connect

    • witx@lemmy.sdf.org
      link
      fedilink
      English
      arrow-up
      5
      ·
      18 days ago

      Because it offers much more than just VPN even though that’s what most users use it for. Read their documentation and you’ll see

    • NuXCOM_90Percent@lemmy.zip
      link
      fedilink
      English
      arrow-up
      7
      ·
      18 days ago

      If you are capable of setting up your own personal VPN, you don’t need Tailscale. You still may want to use it though, depending on how much of a novelty Network Fun is for you in your spare time.

      For me, the main advantage to Tailscale et al is that it is on a per device basis. So I can access my SMB shares or Frigate setup remotely while still keeping the rest of my internal network isolated( to the degree I trust the software and network setup). You CAN accomplish that with some fancy firewall rules and vlanning but… yeah.

  • chameleon@fedia.io
    link
    fedilink
    arrow-up
    10
    arrow-down
    1
    ·
    18 days ago

    They also had a major ass security issue that a security company should not be able to get away with the other day: assuming everyone with access to an email domain trusts each other unless it’s a known-to-them freemail address. And it was by design “to reduce friction”.

    I don’t think a security company where an intentional decision like that can pass through design, development and review can make security products that are fit for purpose. This extends to their published client tooling as used by Headscale, and to some extent the Headscale maintainer hours contributed by Tailscale (which are significant and probably also the first thing to go if the company falls down the usual IPO enshittification).

  • PumaStoleMyBluff@lemmy.world
    link
    fedilink
    English
    arrow-up
    11
    ·
    16 days ago

    become profitable when needed

    By what, laying off all QA and support staff and half your developers the moment a single quarterly earnings report isn’t spotlessly gilded?

  • ChickenAndRice@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    19
    ·
    18 days ago

    If I host headscale on a VPS, is that as seamless of an experience as Tailscale? And would I miss out on features, like the Tailscale dashboard? How does the experience change for me (an admin type) and my users (non-technical types)?

      • couch1potato@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        13 days ago

        I actually did this instead of tailscale first; installing tailscale on a pfsense router was a challenge, iirc i had to find and install the freebsd tailscale pkg from the command line because the plugin doesn’t give the option to connect to a non-tailscale control plane.

        After I did that and connected to my headscale server (on my vps) I could ping pfsense’s local ip over the tailnet, but couldn’t get any traffic out from pfsense. Turns out I had forgotten the pfsense tailscale plugin automatically sets up outbound rules for you.

        That was a rabbit hole I didn’t feeling like falling down, so I turned off headscale and just used tailscale account and the normal pfsense tailscale plugin. But it’s there and it does work fine if I ever wanted to go figure out the outbound traffic rules.

  • Tillman@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    2
    ·
    17 days ago

    Headscale requires tailscale client so it’s a no-go for me. I’m still trying to block cloudflare from my network.

  • pulsewidth@lemmy.world
    link
    fedilink
    English
    arrow-up
    36
    ·
    17 days ago

    I think I’ll just keep using tailscale until they start enshittifying, and then set up a Headscale instance on a VPS - no need to take this step ahead of time, right?

    I mean, all the people saying they can avoid any issues by doing the above - what’s to stop Tailscale dropping support for Headscale in future if they’re serious about enshitification? Their Linux & Android clients are open source, but not IOS or Windows so they could easily block access for them.

    My point being - I’ll worry when there is something substantial to worry about, til then they can know I’m using like 3 devices and a github account to authenticate. MagicDNS and the reliability of the clients is just too good for me to switch over mild funding concerns.

    • Avid Amoeba@lemmy.caOP
      link
      fedilink
      English
      arrow-up
      14
      arrow-down
      1
      ·
      17 days ago

      Yeah, as I said, it’s a friendly reminder. I’m personally probably doing it this year. It’s entirely possible that enshittification could come even years from now. It all depends on how their enterprise adoption goes I think. The more money they make there, the longer the individual users are gonna be left unsqueezed.

    • sonosonic@lemy.lol
      link
      fedilink
      English
      arrow-up
      2
      ·
      16 days ago

      Is there an issue with Netbird’s servers at the moment? In my testing devices are connected and reach eachother, but the web admin is missing a lot of functionality compared to what’s in the docs. The peer devices section is there, but everything else, user settings, rules etc, isn’t showing/says I don’t have admin permission (of my own account… Lol?)

      • Avid Amoeba@lemmy.caOP
        link
        fedilink
        English
        arrow-up
        12
        ·
        17 days ago

        Well not “the” backend server but “a” different backend server. As far as I know Headscale is a separate implementation from what Tailscale run themselves.

    • Voroxpete@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      4
      ·
      17 days ago

      We’ve implemented netbird at my company, we’re pretty happy with it overall.

      The main drawback is that it has no way of handling multiple different accounts on the same machine, and they don’t seem to have any plans for ever really solving that. As long as you can live with that, it’s a good solution.

      Support is a mixed bag. Mostly just a slack server, kind of lacking in what I’d call enterprise level support. But development seems to be moving at a rapid pace, and they’re definitely in that “Small but eager” stage where everything happens quickly. I’ve reported bugs and had them fixed the same day.

      Everything is open source. Backend, clients, the whole bag. So if they ever try to enshittify, you can just take your ball and leave.

      Also, the security tools are really cool. Instead of writing out firewall rules by hand like Tailscale, they have a really nice, really simple GUI for setting up all your ACLs. I found it very intuitive.

      • httperror418@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        17 days ago

        Thank you for your insight, I’m assuming the only public part is the UI and coturn (the bit that enables two clients between firewalls to hole-punch)?

        • Voroxpete@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          2
          ·
          16 days ago

          Yes, the underlying model is the same as Tailscale, Zerotier and Netmaker (also worth checking out, btw). Clients connect to a central host (which can be self-hosted) and use that to exchange information on addresses and open ports, then form direct connections to each other.

  • Goretantath@lemmy.world
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    1
    ·
    18 days ago

    Didnt even work for me, i use mullvad so if i wanted to use tailscale on my android to connect to my desktop, it wants me to disable mullvad unlike on my desktop…

    • irmadlad@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      18 days ago

      Hmmm. I run PIA and Tailscale simultaneously on my devices. I did have to tinker around with the settings in PIA such as the VPN & Advanced Kill Switch. So, now Tailscale is for administrating remote servers, and PIA for everything else. DNS leak checks, etc all check out.

    • milicent_bystandr@lemm.ee
      link
      fedilink
      English
      arrow-up
      5
      ·
      18 days ago

      I think that’s because both work on Android by being a VPN, and the system can’t handle doing two vpns simultaneously

    • scrooge101@lemmy.ml
      link
      fedilink
      English
      arrow-up
      3
      ·
      18 days ago

      Tailscale offers a paid Mullvad integration, where you can select most Mullvad servers as exit nodes. Works quite well.

      • lautre@jlai.lu
        link
        fedilink
        English
        arrow-up
        1
        ·
        17 days ago

        Yes, I’m using it as well. It works very well on android and Linux.

  • HelloRoot@lemy.lol
    link
    fedilink
    English
    arrow-up
    159
    ·
    18 days ago

    a long runway that allows us to become profitable when needed

    Switch to self-hosting headscale when they enshittify in an attempt to become profitable, duh

    • kratoz29@lemm.ee
      link
      fedilink
      English
      arrow-up
      23
      arrow-down
      1
      ·
      18 days ago

      I mainly use Tailscale (and Zerotier) to access my CGNATED LAN, headscale will require me to pay a subscription for a VPS wouldn’t it?

      I really envy the guys who say only use them because they’re lazy to open ports or want a more secure approach, I use them because I NEED them lol.

      If (when?) Tailscale enshitify I’ll stick with ZT a bit until it goes the same way lol, I started using it 1st, I don’t know if ZT came before Tailscale though.

        • 0_o7@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          2
          ·
          17 days ago

          Or get something like a rapsberry-pi (second hand or on a sale). I have netbird running on it and I can use it to access my home network and also use it as tunnel my traffic through it.

          • gungho4bungholes@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            16 days ago

            I don’t think that would solve the cgnat issue. I use a vps because I don’t want to pay 250 a month for a starlink routable ip

        • Vanilla_PuddinFudge@infosec.pub
          link
          fedilink
          English
          arrow-up
          4
          ·
          edit-2
          17 days ago

          Same, my Hetzner proxy running NPM, with pivpn and pihole is doing all it needs to do for $3 and some change.

          My only open ports on anything I own are 80, 443 and the wg port I changed on that system. Love it.

          • Croquette@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            3
            ·
            17 days ago

            How does WG work on the local side of the network? Do you need to connect each VM/CT to the wireguard instance?

            I am currently setting up my home network again, and my VPS will tunnel through my home network and NPM will be run locally on the local VLAN for services and redirect from there.

            I wonder if there is any advantage to run NPM on the VPS instead of locally?

            • Vanilla_PuddinFudge@infosec.pub
              link
              fedilink
              English
              arrow-up
              3
              ·
              edit-2
              17 days ago

              The vps is the wg server and my home server is a client and it uses pihole as the dns server. Once your clients hang around for a minute, their hostnames will populate on pihole and become available just like TS.

              You do have to set available ips to wg’s subnet so your clients don’t all exit node from the server, so you’ll be able to use 192.168.0.0 at home still for speed.

              As for NPM, run it on the proxy, aim (for example) Jellyfin at 10.243.21.4 on the wg network and bam.

              • Croquette@sh.itjust.works
                link
                fedilink
                English
                arrow-up
                1
                ·
                17 days ago

                I am a newbie so I am not sure I understand correctly. Tell me if my understanding is good.

                Your Pi-Hole act as your DNS, so the VPS use the pi-hole through the tunnel to check for the translation IP, as set through the DNS directive in the wg file. For example, my pi-hole is at 10.0.20.5, so the DNS will be that address.

                On the local side, the pi-hole is the DNS for all the services on that subnet and each service automatically populate their host name on pi-hole. I can configure the DNS server in my router/firewall (OPNSense in my case)

                So when I ping service.example.com, it goes through the VPS, which queries the pi-hole through the tunnel and translates the address to the local subnet IP if applicable.

                So when I have the wg connection active and my pi-hole is the DNS, every web request will go through the pi-hole. If the IP address is inside the range of AllowedIPs, the connection will go through the tunnel to the service, otherwise, the connection will go through outside the wg tunnel.

                Does that make sense?

                • Vanilla_PuddinFudge@infosec.pub
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  edit-2
                  17 days ago

                  the VPS uses the pi-hole through the tunnel

                  The VPS is Pihole, the dns for the server side is 127.0.0.1. 127.0.0.1 is also 10.x.x.1 for the clients, so they connect to that as the dns address.

                  server dns - itself

                  client dns - the server’s wg address

                  On the local side, the pi-hole is the DNS for all the services on that subnet and each service automatically populate their host name on pi-hole. I can configure the DNS server in my router/firewall (OPNSense in my case)

                  Only if your router/firewall can directly connect to wg tunnels, but I went for every machine individually. My router isn’t aware I host anything at all.

                  So when I ping service.example.com, it goes through the VPS, which queries the pi-hole through the tunnel and translates the address to the local subnet IP if applicable.

                  Pihole (in my case) can’t see 192.x.x.x hosts. Use 10.x.x.x across every system for continuity.

                  So when I have the wg connection active and my pi-hole is the DNS, every web request will go through the pi-hole. If the IP address is inside the range of AllowedIPs, the connection will go through the tunnel to the service, otherwise, the connection will go through outside the wg tunnel.

                  Allowed ips = 10.x.x.0/24 - only connects the clients and server together

                  Allowed ips = 0.0.0.0/0 - sends everything through the VPN, and connects the clients and server together.

                  Do the top one, that’s how TS works.

      • not_amm@lemmy.ml
        link
        fedilink
        English
        arrow-up
        9
        ·
        18 days ago

        Same. I mean, I was already looking to rent a VPS, but at least there’s some time so I can save money until things get weird.

        • kratoz29@lemm.ee
          link
          fedilink
          English
          arrow-up
          7
          ·
          18 days ago

          Yeah, don’t get me wrong, I can see value of getting a VPS, especially if you are gonna be using it for some other projects, I have had a DO instance in the past and I thinkered with WG back then BTW, but if it is only for remote accessing your home LAN, I don’t feel like paying for it tbh, especially when some users get it for free (public IPv4) and it feels even dumber for me since I have a fully working IPv6 setup!

          BTW my ISP is funny, no firewall at all with it, I almost fainted when I noticed everyone could access my self hosted services with the IPv6 address and I did nothing regarding ports or whatsoever… They were fully accessible once I fired up the projects! I think I read an article about this subject… But I can’t recall when or where… I had to manually set up a firewall, which tbh, you always should do and it is especially easy to do in a Synology NAS.

          Anyway, back to the mesh VPN part, if they enshitify so be it, but in the meantime we still can benefit from it.

          • tux7350@lemmy.world
            link
            fedilink
            English
            arrow-up
            3
            ·
            17 days ago

            Thats just how IPv6 works. You get a delegate address from your ISP for your router and then any device within that gets it own unique address. Considering how large the pool is, all address are unique. No NAT means no port forwarding needed!

            • kratoz29@lemm.ee
              link
              fedilink
              English
              arrow-up
              1
              ·
              16 days ago

              I guess so, my previous ISP also gave me IPv6 address (I could navigate using it) but I could never access my NAS services with it from an IPv6 ready network, I thought it would be the same with the newer ISP, but nope.

              Maybe some firewall is active by the ISP? I could not do much thinker back then as I used the stock modem (router) and it was heavily locked.

    • Showroom7561@lemmy.ca
      link
      fedilink
      English
      arrow-up
      10
      ·
      18 days ago

      Bookmarking “headscale”!

      I only recently started using Tailscale because it makes connecting to my local network through a Windows VM running in Boxes on Linux a hell of a lot easier than figuring out how to set up a networked bridge.

      This sounds like a great alternative, and it looks like it can even work on a Synology NAS.

    • three@lemmy.zip
      link
      fedilink
      English
      arrow-up
      48
      ·
      18 days ago

      Been meaning to do this. Tailscale was just there and easy to implement when I set my stuff up. Is it relatively simple to transition?

  • lefixxx@lemmy.world
    link
    fedilink
    English
    arrow-up
    11
    arrow-down
    9
    ·
    17 days ago

    Yeah and steam is closed source DRM platform. Great software sometimes is worth the trade off.

    • Uncut_Lemon@lemmy.world
      link
      fedilink
      English
      arrow-up
      40
      ·
      edit-2
      17 days ago

      Steam is a private company, not publicly traded and has no VC funding.

      VC funding and potential IPO normally means enshittification is inevitable, as they will eventually need to make insane profits by turning the screws on its users, as their business model wasn’t self sustaining.

      • lefixxx@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        6
        ·
        17 days ago

        Enshittification is inevitable for all free services (services as in with a server component). Thankfully the functions of tailscale are open source so until enshittification actually happens I will be happy with using a a useful but VC funded project. When I am not willing to make the trade off anymore I will use headscale or some other drop in replacement.

        • splendoruranium@infosec.pub
          link
          fedilink
          English
          arrow-up
          7
          ·
          17 days ago

          Enshittification is inevitable for all free services (services as in with a server component).

          No, it is not that bleak. It is only inevitable when there is an active push for a short-term maximization of user base monetization (which is very much in the nature of VC). It can usually be avoided with products that are wholly under the ownership of all users (such as a cooperative or a government-provided service) or - only if one is lucky - with products of financially independent private enterprises under vaguely benevolent and unhurried leadership (such as Steam, to some extent)

        • Trainguyrom@reddthat.com
          link
          fedilink
          English
          arrow-up
          2
          ·
          17 days ago

          Realistically Tailscale seems to currently be running on a model of get all of the self hosters to love running it at home so then they advocate to run it at work where all of the pricey enterprises licenses make the real money.

          I’ve actually seen some real world usecases where if I had more political push, I would’ve put Tailscale onto the running as a potential solution

          Hopefully they have the right people in place to push back at the VC firms about maintaining their current strategy rather than scaring away all of their best advocates before they can truly get off the ground. Having worked at a company owned by a hedgefund, part of the trick is having the right people in place in the company who can block the worst decisions by the capital-hungry owners

  • Franconian_Nomad@feddit.org
    link
    fedilink
    English
    arrow-up
    3
    ·
    18 days ago

    Was listening to some computer podcast a while ago and the co-host and ex- hacker was saying that more and more VPNs are getting targeted and it’s just a matter of time we see quite a bit of them owned. (I think he was talking about implementation of VPNs for remote workers, rather than actual VPN providers. Sorry, it was some time ago)

    Anyway, the host asked „What about wireguard?“

    And the co-host: „Oh yeah, wireguard is solid! But all the services building up on wireguard? … They’ll get popped.“

    Doesn’t have to be true, but something to keep in mind.

  • Wahots@pawb.social
    link
    fedilink
    English
    arrow-up
    44
    ·
    18 days ago

    Are there better alternatives? I was planning on using tailscale until now. :P

    • 4k93n2@lemmy.zip
      link
      fedilink
      English
      arrow-up
      8
      ·
      18 days ago

      ive been eyeing up netbird but havnt got around to trying it yet. its fully open source at least, and theyre based in germany is anyone cares about that

      • hobbsc@lemmy.sdf.org
        link
        fedilink
        English
        arrow-up
        1
        ·
        17 days ago

        i used netbird heavily at my last job and i use it for a few things at home. it works pretty well.

      • Avid Amoeba@lemmy.caOP
        link
        fedilink
        English
        arrow-up
        9
        ·
        18 days ago

        Just looked at NetBird, it looks suspiciously similar to Tailscale in what it does except they also got an open-source control server. They have self-hosting doc right in their web site. Looks interesting. Can’t find much about the company other than it’s based in Berlin and it’s currently private - Wiretrustee UG.

        • nfh@lemmy.world
          link
          fedilink
          English
          arrow-up
          3
          ·
          18 days ago

          What’s the difference with their open-source control server, from headscale? That it’s officially published by the company?

    • Avid Amoeba@lemmy.caOP
      link
      fedilink
      English
      arrow-up
      53
      ·
      18 days ago

      For me personally, the next step is using Headscale - a FOSS replacement of the Tailscale control server. The Tailscale clients are already open source and can be used with Headscale.

      Someone else could give other suggestions.

      • Jo Miran@lemmy.ml
        link
        fedilink
        English
        arrow-up
        13
        ·
        18 days ago

        I’ve been meaning to switch from Tailscale to Headscale but I have been to busy. Do you have any instructions, write-ups/walk-thrus you could recommend to set this up? I have three sites with 1GB internet I can use. One has a whole house UPS but dynamic IP, another has a static IP but no UPS, and the third is Google fiber with no UPS, but I can use the app to get the current IP anytime. I also own a number of domain names I could use.

        • Avid Amoeba@lemmy.caOP
          link
          fedilink
          English
          arrow-up
          8
          ·
          edit-2
          18 days ago

          No writeups. I tried following the Headscale doc for a test last year. Set it up on the smallest DigitalOcean VM. Worked fine. Didn’t use a UI, had to add new clients via CLI on the server. When I set it up for real, I’d likely setup a UI as well and put it in a cloud outside of the US. It would work at home too but any other connection would die if my home internet dies or the power does. E.g. accessing one laptop from another, or accessing the off-site backup location.

    • candyman337@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      13
      ·
      18 days ago

      I use the built in wireguard VPN in my router. If you just need local network access elsewhere it’s usually really easy to setup if your router provides it. I would look into it!

    • milicent_bystandr@lemm.ee
      link
      fedilink
      English
      arrow-up
      5
      ·
      18 days ago

      I use Nebula. It’s lightweight, well-engineered and fully under your control. But you do need a computer with a fixed IP and accessible port. (E.g. a cheap VPS)

      You can also use “managed nebula” if you want to enjoy the same risk of the control point of your network depending on a new business ;-)

    • exu@feditown.com
      link
      fedilink
      English
      arrow-up
      21
      ·
      18 days ago

      A bunch really, Headscale with Tailscale client, Nebula VPN, Netmaker, Zerotier.

    • MangoPenguin@piefed.social
      link
      fedilink
      English
      arrow-up
      26
      ·
      edit-2
      18 days ago

      Wireguard if you’re just using it yourself. Many various ways to manage it, and it’s built in to most routers already.

      Otherwise Headscale with one of the webUIs would be the closest replacement.

      • nfreak@lemmy.ml
        link
        fedilink
        English
        arrow-up
        1
        ·
        17 days ago

        I decided to experiment a bit with Headscale when the wg-easy v15 update broke my chained VPN setup. Got it all set up with Headplane for a UI, worked amazingly, until I learned I was supposed to set it all up on a VPS instead and couldn’t actually access it if I wasn’t initially on my home network, oops.

        I might play around with it again down the road with a cheap VPS, didn’t take long to get it going, but realistically my setup’s access is 95% me and 5% my wife so Wireguard works fine (reverted back to wg-easy v14 until v15 allows disabling ipv6 though, since that seemed to be what was causing the issues I’ve been seeing).

          • nfreak@lemmy.ml
            link
            fedilink
            English
            arrow-up
            1
            ·
            16 days ago

            Well a VPS or an exposed service, but I feel like the latter ends up somewhat defeating the purpose anyway.

            When running locally (not exposed), it worked great until I tried to make the initial connection from mobile data - can’t establish a connection to headscale if it can’t reach it in the first place. Unless I’m mistaken, the headscale service needs to be publicly accessible in some way.

              • nfreak@lemmy.ml
                link
                fedilink
                English
                arrow-up
                1
                ·
                16 days ago

                Nah, but personally I have no need to expose anything and would rather avoid the security headaches and such that come with it

      • Vanilla_PuddinFudge@infosec.pub
        link
        fedilink
        English
        arrow-up
        2
        ·
        17 days ago

        Pivpn is really easy, and since pivpn is just scripts, it always installs current wireguard even if they lax on updating pivpn that often.