aboutsummaryrefslogtreecommitdiff
path: root/net/tailscale/README.md
Commit message (Collapse)AuthorAge
* tailscale: set nftables as defaultTyler Young2023-09-15
| | | | | | | | | | | | | | | | | | This changes the default firewall method used by Tailscale to nftables. The 'autodetection' mode is only supported by arm64 and amd64 for now[1]. This causes mips devices to not do proper detection and incorrectly default back to iptables. I added a fw_mode variable to the tailscale.conf file that could be set to iptables for easy conversion for someone still using iptables. I was able to test on an older mips device and my current aarch64 without issues. Also a few readme updates to bring it up to the current status. 1. https://github.com/tailscale/tailscale/blob/dc7aa98b768bf82017aa5cc82a62dd4d685f811d/util/linuxfw/linuxfw_unsupported.go#L4C58-L4C58 Signed-off-by: Tyler Young <git@yfh.addy.io>
* tailscale: update to 1.36.0Oskari Rauta2023-02-04
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | - Update tailscale to version 1.36.0 - Patch iptables support Tailscale does not (yet) support nftables. Tailscale allows running with --netfilter=off allowing end-user to create his own firewall rules, but this affects only tailscale cli, not tailscaled daemon, so connection cannot be made without error telling that tailscaled was unable to determine execute iptables for determining it's version. There is a work-around for those who do not want nft-iptables compatibility package; they can create a script to /usr/bin/iptables which responds to --version argument and echos fake version string and on any other arguments or no arguments, just exits. After this procedure and starting tailscale cli with netfilter off- it works. Openwrt has moved on to nftables, so iptables manipulation seems unnecessary. Especially for other reasons, on Openwrt, firewall should be configured on it's own, because firewall rules made by other software, such as tailscale, loose their firewalling rules when firewall restarts. So I patched it to allow "fake" iptables pointing to executable /bin/false and ignoring version request. And I also set cli to default to netfilter off setting. If still end-user wants to use iptables, this patch does not make it impossible; just install iptables, or nft-iptables, and run tailscale with argument --netfilter=on and it works out as it did before, tailscaled daemon still matches with iptables if it is found in $PATH. Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
* tailscale: update to version 1.8.1Jan Pavlinec2021-05-10
Add readme with simple tailscale howto. Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>