4/3/2025 at 3:38:03 AM
Every few months I come back to this repo to check if they finally got Tailnet lock running or if someone security audited them in the meanwhile. Unfortunately neither of these things seem to make any progress and thus, I’ve grown uncertain in how much I can trust this as a core part of my infrastructure.The entire premise of Tailscale SaaS builds on creating tunnels around your firewalls, then enabling the user to police what is allowed to be routed through these tunnels in a intuitive and unified way.
Headscale seems to have nailed down the part of bypassing the firewall and doing fancy NAT-traversal, but can they also fulfill the second part by providing enough of their own security to make up for anything they just bypassed, or will they descend to just being a tool for exposing anything to the internet to fuck around with your local network admin? To me, not giving your Tailscale implementation any way for the user to understand or veto what the control server is instructing the clients to do while also not auditing your servers code at all sure seems daring…
by SuperShibe
4/3/2025 at 4:24:47 AM
> Headscale seems to have nailed down the part of bypassing the firewall and doing fancy NAT-traversalDid they really roll-their-own for those functions? I thought this was just a control layer on top of Tailscale’s stock services on the backend, are they facilitating connections with novel methods? Apologies if I’m asking obvious questions, I use ZeroTier pretty regularly, but I am not too familiar with Tailscale.
by nativeit
4/3/2025 at 6:44:21 AM
They have a really great in-depth blog post describing how they do it: https://tailscale.com/blog/how-nat-traversal-worksby bingo-bongo
4/3/2025 at 12:54:01 PM
This is a fascinating read!by jacobtomlinson
4/3/2025 at 7:17:51 AM
i think they mean headscale's implementation specificsby throawayonthe
4/3/2025 at 12:59:09 PM
Can you share why you use ZeroTier over Tailscale? I run several headscale control planes and it really is nice to self-host. But, I'm curious about other options.by xrd
4/3/2025 at 3:38:19 PM
Not OP but I'm on ZeroTier because it was one of the best free tiers available before Tailscale could run as a Windows service.Also I believe it implements a lower layer of the network stack so more options are supported, though I haven't needed to investigate in detail.
by password4321
4/3/2025 at 6:12:24 PM
More ZeroTier 3 years ago: https://news.ycombinator.com/item?id=30283987#30284754by password4321
4/3/2025 at 9:05:46 AM
tailnet lock seems way way less important for headscale than tailscale, given you personally control the headscale infra.by bananapub
4/3/2025 at 1:22:14 PM
Depends on your threat model. Mine definitely includes one of my servers getting compromised. (Which, tbh, is probably more likely than Tailscale getting hacked.)by codethief
4/3/2025 at 1:37:42 PM
only until someone finds a zeroday in headscale (remember, it never got audited) or until the server running headscale itself gets compromised. Especially in countries where getting a dedicated public IPv4+IPv6 from your ISP is hard-impossible and you‘d have to rely on a server hosted externally (unless you’re large enough to make deals with the ISP) some company hosting your server still retains at minimum physical control over your headscale infra. For why this is a problem, see the recent Oracle cloud breach.by SuperShibe
4/3/2025 at 11:33:28 AM
This is my thought as well, if you are in control then you also control which nodes go on your tailnetby botto
4/3/2025 at 3:54:38 AM
One of the maintainers work for tailscale now.by gpi
4/3/2025 at 4:03:03 AM
maintainer's employment != security auditby wutwutwat
4/3/2025 at 4:10:17 AM
My thinking is their time is divided now and could lead to less efforts spent on headscale.by gpi
4/3/2025 at 6:40:54 AM
Not compared to the previous state where he worked for an unrelated company and only had his free time to contribute to Headscale.by palotasb
4/3/2025 at 4:16:45 AM
c.f. https://github.com/juanfont/headscale/issues/2416by themgt