
Tailscale has raised $160 million USD ($230 million CAD) in our Series C, led by Accel with participation from CRV, Insight Partners, Heavybit, Uncork Capital — and new investment from Anthony Casalena - CEO of Squarespace.

A community for the Tailscale WireGuard-based VPN. https://tailscale.com/
Tailscale raises $160 Million (USD)
Tailscale has raised $160 million USD ($230 million CAD) in our Series C, led by Accel with participation from CRV, Insight Partners, Heavybit, Uncork Capital — and new investment from Anthony Casalena - CEO of Squarespace.
Tailscale v1.82.0 & v1.82.1
Secure Connection issues with Tailscale Exit Nodes?
I can't for the life of me figure this out:
I want to use tailscale on my home server as an exit node, but cannot seem to get it to do secure connections properly. I have Nginx Proxy Manager running on the same home server and I wonder if that's causing problems with the HTTPs encryption verification.
Has anyone had similar issues to this? I've tried messing with DNS resolution settings by overriding it to use the server's pihole setup as the DNS provider, but this hasn't helped either. I'm running out of ideas on ways I can try to solve this.
Product updates, notes from the community about how folks are using Tailscale, and some upcoming events where you can meet our experts in December 2024.
Tailscale client metrics are now available for local or remote examination, and can be directly ingested by Prometheus or any compatible monitoring system. These are especially useful for keeping tabs on the health and connectivity of subnet routers, and we think they’ll be an immediate upgrade for ...
Help with a Foundry server meant to be accessed through Tailscale?
Hey all, I'm pretty illiterate when it comes to networking. I'm trying to set up a Foundry server on my PC, using Tailscale to bypass not having a public IP. The first time I set Tailscale up it worked perfectly, I asked a buddy to try and access and he reached the log in screen. The second time, when a session was supposed to happen, it didn't work; tailscaled.exe would launch and immediately quit . I was a few versions behind so I uninstalled, rebooted, installed the new version. Now, I'm getting those same errors regardless of what I do. I'm honestly not sure what to mess with to fix it. Any help would be appreciated.
Problem with new Tailscale install to bypass ISP CGNAT
I have a cloud VPS running Ubuntu with Tailscale installed directly. I also have Tailscale installed on my home server.
I'm trying to access my self-hosted applications from outside my home network which I did easily until I switched to fiber internet that uses CGNAT.
Tailscale is working locally but not outside my home network. A suggestion was to disable IP v4 on Tailscale since it conflicts with the CGNAT IP my ISP is using. However when I add the "disableIPv4": true to the config file in the access control area of Tailscale, I keep getting various errors.
Any help would be appreciated.
Git SSH through docker sidecar?
Hey all!
I'm trying to ssh into my tailnet-hosted (through tailscale serve) gogs instance and I can't seem to figure out how. Has anyone tried doing this? Will I need to add a user to the sidecar container and add a shim like they do in the regular gogs setup? I appreciate any insight.
Edit: Modified title for clarity
This month's newsletter brings a bunch of recent product updates, notes from the community about how folks are using Tailscale, and some upcoming events where you can catch us online and IRL.
Getting started with Docker and Tailscale
Walking through the basics of installing Docker and connecting your first container with Tailscale.
TS-2024-011 - SCIM group name disclosure via the ACL editor
Security notifications affecting the Tailscale client and service Read our incident disclosure and notification policy. If you’re directly affected by a security issue in Tailscale, and we have your contact information, we will contact you.
TS-2024-010 - Accidental ACL edits due to browser caching
Security notifications affecting the Tailscale client and service Read our incident disclosure and notification policy. If you’re directly affected by a security issue in Tailscale, and we have your contact information, we will contact you.
TS-2024-004
Security notifications affecting the Tailscale client and service Read our incident disclosure and notification policy. If you’re directly affected by a security issue in Tailscale, and we have your contact information, we will contact you.
Description: Unclear network flow logs collection status for alpha testers.
When network flow logs first entered private alpha, tailnet admins who were interested in testing out the feature had to request to be manually opted into the alpha testing track. When we subsequently introduced admin console settings for self-serve network flow logs for the public beta launch, these settings were not properly connected to the alpha testing track. As a result, for the small number of tailnets that volunteered for alpha testing, the admin console interface did not show that logs were still being collected as initially requested.
We fixed this bug on April 25, 2024 and the admin console now correctly shows the status of network flow logs for all users.
15 tailnets were opted into network flow log collection through the alpha testing track that did not re-enroll through the admin console. We notified security contacts for the affected tailnets about this
Hello headscale users! Did anyone get headscale working in a non standard port? E.g. https://hs.example.com:8443 ? For me It does not work and I think the tailscale clients still send some
@tailscale Hello headscale users! Did anyone get headscale working in a non standard port? E.g. https://hs.example.com:8443/ ? For me It does not work and I think the tailscale clients still send some of the requests to the default port 443
On March 7, 2024, tailscale.com was unavailable for approximately 90 minutes due to an expired TLS certificate. We were able to identify and address the issue quickly, and the downtime was mostly limited to our marketing materials and documentation; still, we would like to explain exactly what happe...
Tailscale v1.62.1
Linux
Windows
macOS
Synology
Kubernetes operator
Tailscale SSH is now Generally Available
Tailscale SSH is now generally available, offering seamless SSH authentication and authorization with SSO, MFA, and ACLs. Enjoy robust security, zero trust remote access, and tools like session recording and VS Code integration.
Explanation on handling DNS
I'm looking into ways to access my home network which is behind a CGNAT. Tailscale looks like the best solution so far. I would like to clarify a doubt on Tailscale
I have a domain name registered with one of the popular services out there. I saw that Tailscale uses MagicDNS. But I wanted to use my personal domain. My doubt is if I want to use my custom domain with Tailscale, the following will be the procedure,
Now when I try to access this domain what will happen is,
If there is anyt