Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Sounds a bit like a fancier ngrok.

Accidentally wiring everything to everything else sounds kind of scary.

There's 1 or 2 things I wouldn't mind securely exposing to the internet (like Plex) but nothing I need so desperately while I'm out and about that I'd even want to take that risk.

Sounds like this is just for self-hosting?



Speaking of SSH, Tailscale has special support for it whereby it handles any incoming connection to port 22 from the Tailscale network, and deals with authentication itself. No public keys or passwords: if you’re logged into Tailscale you can be logged into the machine. This is particularly handy when you SSH from a phone, as proper credential management is a bit of a nightmare there.

this has me worried. i would not want that. i use zerotier, not tailscale, but the principle is the same. i have my laptops and my phone connected to my servers. given that all of those machines are already on the internet, connecting them into a virtual network does not add any risk in my opinion. (at least as long as you don't use features like the above). all i get is a known ip address for all my devices, with the ability to connect to them if they have an ssh server running. when i am outside the primary benefit is that i can tell which devices are online.


This feature isn't enabled by default.


this is for teams where you don't want to create passwords or keep track of ssh keys for everyone by hand. it greatly simplified our server usage as we can simply ssh user@machine and it just works. you can create access controls for it as well.


> Sounds a bit like a fancier ngrok.

Well, yes and no.

You can use it like ngrok, and I'm sure you could configure wireguard and ngrok to give you something similar to what Tailscale does, but Tailscale does it out of the box, with polished and well built client and server apps.

I'm no infra guy, I'm just a former front-end eng, but it gives me the confidence to expose media centres and file servers etc to "the wild" without it being public.

Using Jellyfin to watch content from my home server on my iPad while I'm away from home is as "easy" as Disney or Netflix with Tailscale, just installed the clients and servers and .. voila?


I was an infra guy early in my career, and I'm still savvy, and I still prefer using Tailscale. It's very polished and reliable.

But personally, I'm past the point of wanting to fiddle with things like this and would much prefer them to just work out of the box.. so I can fiddle with the things I wanted to, and not end up down a (personally) unenjoyable rabbit hole.

No judgment on people who do enjoy it, though! I used to, and maybe I will again at some point.


It's pretty handy to setup an exit node on your home network so that when you go abroad you can still watch your streaming services too!

More importantly you can use it to access your bank or other services which often block non-US IPs. It's saved me a few times in the last year or two.


Having all your mobile traffic routed through AdGuard Home (or PiHole) is a game changer. It's also nice using an exit node through my home network whenever I am on public wifi.


Plex already supports remote access via UPnP. https://support.plex.tv/articles/200289506-remote-access/


To me WireGuard is safer than exposing services directly to the internet.


Sure, it's pretty simple. I had WG provided by an Deciso OPNsense router with an automatic VPN profile on most user devices. All of my infrastructure also had PKI. (I moved recently and have yet to set it up again.)


Tailscale is able to hole punch in scenarios where UPnP is disabled (just good practice) as well as many NAT environments.


I wrote a POC for using Tailscale serve and funnel similarly to ngrok here:

https://github.com/jaxxstorm/tgate




Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: