👉 We’d love to hear your thoughts on Tailscale. Filling out this feedback form helps us build a better product for you: https://forms.gle/FA9UJwiTbdoRzKsK7
This has been a busy month, with the launch of Tailscale v1.8 and a new feature, Taildrop, that lets you easily send files between your devices. Here’s a quick preview before we jump into this month’s update:
- Statusbar UI for Tailscale Kevin López and Rodrigo Sanabria built a Tailscale UI for Ubuntu. We think it’s a pretty cool contribution and recommend trying it out.
- Using Tailscale and FreeNAS (or TrueNAS CORE) Together Brian Moses (who we feature regularly on this newsletter) walks through installing Tailscale on a server appliance, for folks that have a FreeNAS or TrueNAS.
- Build a Raspberry Pi Kubernetes Cluster with k3s, Ansible, and Tailscale Sam Linville takes a deep dive into how to build and secure a Raspberry Pi cluster. He shares how to secure cluster nodes with Ansible, connect the nodes to Tailscale, prepare images for Raspberry Pi, and assemble the hardware.
- Pi-hole, Unbound & Tailscale GitHub user 0xmachos details how to configure a mesh VPN with your own DNS using Unbound, Pi-hole, and Tailscale.
- Pat and Brian Discuss How They’re Each Using the Zero-Config Mesh VPN Pat Regan and Brian Moses talk about computer networking at home. In particular, the number of different ways that they are each using Tailscale, a zero-configuration mesh VPN to securely access things they’re self-hosting.
- Tutorial: Tailscale on AWS with Terraform The team over at Media Machine demonstrates how to setup Tailscale on AWS with Terraform.
From the Tailscale team
- Sending Files with Taildrop Want to share files between all your devices without the cloud? Tailscale now makes this possible with a new alpha feature, Taildrop. Sonia Appasamy explains it all in this knowledge base article turned blog post.
- Using GitHub Actions and Tailscale to build and deploy applications securely Naman Sood, our most recent co-op student, explains Tailscale + Ephemeral nodes + GitHub Actions, so your CI can have ACLed connections to internal services, no matter where they are.
- The long wondrous life of a Tailscale packet This post by Josh Bleecher Snyder tracks a single packet from creation in one process to arrival in another, far away, through an encrypted Tailscale mesh network.
- Tailscale v1.8 has arrived! A blog post detailing everything shiny and new in v1.8.
General Fixes and Improvements
We’ve added a long-awaited
tailscale logout command. We also now allow clients access to an exit node’s public IPs.
tailscale up command now warns when options are being changed by omission. For example, if you used
tailscale up --advertise-route=192.168.0.0/24 and then
tailscale up --advertise-exit-node, it would notice and warn that the
advertise-route would be removed.
🐛 We added the
tailscale bugreport command to add a marker in your logs, along with an optional note. If you run it shortly after a problem occurs (or ideally both before and after reproducing a problem) it will make it easier for firstname.lastname@example.org to find the details in your logs. Note that you still need to send an email or file a bug: the bugreport only adds a known point in the logs so we can work with you to solve it more efficiently.
There was a large effort to improve and address DNS configuration issues and MagicDNS across all platforms. This leads nicely into our work on another new feature…
Split DNS lets you set a DNS server that is only used for specific domain names — something users with complicated DNS configs have been asking for. Split DNS enables better control over where DNS requests go, and allows you to apply more advanced policies. For example, you could route DNS queries for your AWS VPC to one server, and queries for your Azure private network to another one, without interfering with regular DNS on your LAN.
Split DNS is complementary to MagicDNS. You can create split DNS configs with and without MagicDNS, and this is now generally available to everyone.
Admin Console Updates
The admin UI now has a new “Settings” panel, including a page for “feature previews” letting admins to easily toggle features on and off. Use this page to opt your network into new Tailscale features.
Taildrop makes it easy to send files between your personal devices on a Tailscale network. Like all traffic sent over Tailscale, Taildrop transfers files over encrypted peer-to-peer connections, using the fastest available path. This makes it a great solution for sending sensitive or large files without third-party servers in the middle.
📢 This feature is in public alpha, with many planned improvements to the UX and capabilities. To try Taildrop today, you’ll need to opt-in for your network and use Tailscale v1.8 or later.
You can transfer any kind of files with Taildrop. Taildrop is currently limited to sending files between your own personal devices. You cannot send files to devices owned by other users even on the same Tailscale network.
To send a file with Taildrop:
- macOS: Right-click on any file and go to “Share → Tailscale.” The first time you use Taildrop, it might be hidden in the “More…” section.
- iOS: Open a photo and tap the Share menu. Choose Tailscale and tap the device you’d like to send files to. The first time you use Taildrop, it might be hidden in the “More…” section of the menu.
- Windows: Right-click on any file and choose “Send with Tailscale…”
- Linux: Use the tailscale file subcommand to choose which files to send. For example, to send a text file to your phone:
tailscale file cp ./my-file.txt my-phone:
- Android: Coming soon!
What a month!
That’s all for now — stay well!