Comment by nine_k

2 months ago

What makes Tailscale more secure, or more reliable, than just a direct Wireguard tunnel?

Tailscale's complexity and features make sense when you have 200 nodes, or maybe 20 nodes at least. When you have 3-5 nodes, I think it's overkill, and a bunch of extra dependencies which may fail, and lock you out of your private nodes when you need it most.

The benefit of Tailscale is that it gives you “lots” of wireguard tunnels that work through NAT with near zero configuration and a central admin interface.

I use a personal plan and have multiple nodes. Desktop, laptop, tablet, phones, docker containers just for me and a couple of raspberry Pis on my families home networks.

Only once have I been “locked out” of a node and that was due to an expired key.

Sure, for just connecting one node to another with a known IP and accessible port it’s overkill, but for anything more complex it an awful lot of awesome for very little effort.

  • I second this, and want to highlight that only recently I learned about this similar project called netbird. I tried it, and it looks and works very similarly from the first glance. However, Magic DNS like feature did not work for me, for some reason. Maybe I need to do something, e.g. to enable it. More likely there are others, similar projects, but I’m not aware of them. By this point I stayed with Tailscale, but in any case, I see such project as of tremendous help for a self-hoster.

NAT busting, and no key management. What extra dependencies does Tailscale have?