Attending AWS re:Invent?Where to find us
Get started
Login
WireGuard is a registered trademark of Jason A. Donenfeld.
© 2024 Tailscale Inc. All rights reserved. Tailscale is a registered trademark of Tailscale Inc.
Blog|September 30, 2022

September Tailscale newsletter

alt

👉 We’d love to hear your thoughts on Tailscale. Filling out this feedback form helps us build a better product for you: https://forms.gle/FA9UJwiTbdoRzKsK7

This month we’re making sharing nodes a rewarding experience! When you share a node with a unique user and they accept the invitation, we’ll increase the device limit on both your accounts by two. The rewards will be reflected in your device limits on your Billing page. (Don’t worry, if you happened to do this before we officially launched our rewards, your device count has been automatically updated.)

Tailscale is growing! We’re looking for motivated individuals who can think on their feet, enjoy collaborating with highly technical teams, and are comfortable working asynchronously. See our open roles below, and learn more about our company vision.

It was a busy September. We have lots of community and Tailscale contributions to spotlight. Let’s jump in:

From the community

Want to be included in future Tailscale newsletters? Tag us in your rant, guides, or tutorials on Twitter.

From the team

  • Tailscale: a modern replacement for Hamachi
    This article traces back Xe’s personal nostalgia for Hamachi and explains how Tailscale solves many of the same problems in ways that are better for today’s Internet.

  • Making heads or tails of open source
    David Crawshaw on the history of open source at Tailscale.

  • Now with more DERP
    We added nine additional DERP locations to complement our existing relay network (plus three more since this blog post!). By operating in more locations globally, your devices are more likely to be closer to a server. David Crawshaw and Denton Gentry detail the DERPs for you.

  • The case of the spiky file descriptors
    Not all engineering work at Tailscale requires changing Go internals or deep insights into how to leverage the birthday paradox for NAT traversal. There are countless small bugs and edge cases that we investigate in our quest to meet an unreasonably high percentile of our users’ expectations. Mihai Parparita details the story of one such investigation.

  • What we learned (and can share) from passing our SOC 2 Type II audit
    David Anderson, Rachel Lubman, Denton Gentry and Maya Kaczorowski share the good, the bad, and the ugly from passing our SOC 2 Type II audit.

  • GitOps for Tailscale ACLs
    Our own Archmage of Infrastructure Xe Iaso covers how you can set up a GitOps workflow for your tailnet policy file with GitHub Actions so you can maintain ACLs in a central repository; apply the same controls for changes to your configuration file as you do for code (“config as code”), such as requiring review; and automatically apply these configuration changes to your network.

Tailscale IRL

GopherCon Chicago

Join the Tailscale team for exclusive swag, to talk shop, and fuel up at the 2121 Pantry at the Marriott Marquis in Chicago for our “Coffee & Go” event.

An event announcement flier with location and time information for Tailscale's Coffee & Go Event.

Monktoberfest

We are proud to be the lunch sponsors for the upcoming Monktoberfest October 6-7 in Portland, Maine. If you’re planning to attend, be sure to say hello to Maya, our Head of Product!

An event announcement flier with location and time information for Tailscale's Coffee & Go Event.

Tailscale learning library

We are building a learning library to help folks at any stage in their career. If you have a topic you’d like to see covered, send us a tweet @Tailscale.

  • Implementing privileged access management
    No, the other PAM. Privileged access management (PAM) is a method of restricting access to sensitive resources to only those who need it. Learn the best practices for implementing PAM.

  • How to secure Remote Desktop Protocol
    Remote Desktop Protocol (RDP) is a convenient method for interacting with a remote machine, but it’s also a common vector for attacks. Learn how to make RDP more secure.

That’s all for now. Stay well!

Share

Author

Laura FranzeseLaura Franzese
Loading...

Try Tailscale for free

Schedule a demo
Contact sales
cta phone
mercury
instacrt
Retool
duolingo
Hugging Face