Tail Scale VPN

I was game to try Tailscale but now I'm not sure. It seems that I need to create an account using my Apple, Google, etc. ID to use their apps and services. Then I will be connected through their servers which are collecting data from my usage. Am I correct? I thought I would ask here to be sure before I make my decision.
You don’t get something for nothing! Just create a free gmail account and use that, that is what I did?
 
I was game to try Tailscale but now I'm not sure. It seems that I need to create an account using my Apple, Google, etc. ID to use their apps and services. Then I will be connected through their servers which are collecting data from my usage. Am I correct? I thought I would ask here to be sure before I make my decision.
You need to use an existing identity provider to add nodes to your TailScale MESH VPN. Once a node is added, you are only using their coordination server to connect devices together through your firewall NAT/CGNAT. Once the connection is established, all traffic is then routed directly between devices and not through their coordination server. You can also host your own coordination server (aka HeadScale) if you wish, although that requires hosting it on a VPS.

TailScale is not a so called "Privacy" VPN promoted by YouTube shills in exchange for kickbacks, which tracks all your information or installs a root certificate to decrypt all your information to sell to advertisers. You can watch an excellent video on that subject.

In fact, I use Tailscale to encrypt all my information when connected to untrusted networks (public venues, airports, pubs, etc.) and select an exit node to route all traffic through my home ISP.

Supported SSO identity providers · Tailscale Docs


Supported native identity providers

Tailscale natively supports the following identity providers:

Signing up with an email address

Tailscale does not support sign-up with email addresses. By design, Tailscale is not an identity provider—there are no Tailscale passwords.

Identity providers build robust infrastructure to handle identity and authentication, which are core and complex aspects of security. Tailscale delegates user authentication to identity providers because of their expertise, which allows Tailscale to focus on areas like secure networking.

Using an identity provider is not only more secure than email and password, but it allows us to automatically rotate connection encryption keys, follow security policies set by your team such as multifactor authentication (MFA), and more.

For more information about why Tailscale is not an identity provider, refer to the Tailscale doesn't want your password and SSO tax, cut blog posts.
 
Last edited:
I have used Tailscale myself for a specific purpose on a network outside of my control. But all things being equal, I simply like self hosted solutions better. Setting up your own wireguard self hosted VPN is not that difficult and the benefit is that you are not relying on anyone else's cloud service to make it work. While your actual data might not pass through Tailscale's system, the connection requests do rely on their systems. Their system might go down, they might change their business model and start charging even for small setups, etc, etc, etc. By self hosting, you are only relying on your own equipment.

Sure self hosting requires a single port to be forwarded to an encrypted service that you are running, but I still feel that is more secure than relying on Tailscale and having to install their software on every device I want to connect with. EDIT - as elvisimprsntrr points out below, the "software issue" really isn't different from other solutions.
 
Last edited:
Tailscale also can require a port to be forwarded for best performance/reliability. Although usually it does this by itself via UPnP (if the router owner did not turn that off) or through UDP "hole punching" through your NAT (and the ISP's NAT if you have CGNAT). But with some kinds of NATs the hole punching technique is very difficult and slow to achieve a working tunnel because of port numbers being randomized. This is why you may observe, upon initial connection, you have higher latency or lower speed for a while as Tailscale will tunnel its traffic through a hosted proxy server while it is trying to establish a direct tunnel. I used to get that effect all the time with zerotier but don't notice it as much with Tailscale - I think Tailscale has either better tunneling tech or just faster proxy servers. Or maybe both.
 
  • Like
Reactions: Flintstone61
...and having to install their software on every device I want to connect with.

You only need a single instance of Tailscale running on or behind your firewall to connect to any device on your home network via its local IP address if you enable advertise routes, including embedded devices. For example, I run Tailscale on my pfSense firewall to remotely connect to my HDHomeRun streaming OTA TV tuner when not at home. I can also connect directly to all my camera RTSP streams using third party IP Cam apps.
 
Last edited:
Tailscale also can require a port to be forwarded for best performance/reliability. Although usually it does this by itself via UPnP...
Tailscale does not require UPnP nor does it require manual port forwarding. It establishes a P2P connection between clients on your TailScale MESH VPN. Anyone with good security practices should never enable UPnP on a router/firewall.
 
Last edited:
  • Like
Reactions: VorlonFrog
Tailscale does not require UPnP nor does it require manual port forwarding. It establishes a P2P connection between clients on your TailScale MESH VPN. Anyone with good security practices should never enable UPnP on a router/firewall.

Perhaps a poor choice of words on my part. Tailscale certainly does not require a port to be forwarded, but it does help it to achieve direct tunnels faster.

Some routers let you limit UPnP to be usable by specific LAN IPs but not by everything on your LAN, which is nice.
 
  • Like
Reactions: Flintstone61
Perhaps a poor choice of words on my part. Tailscale certainly does not require a port to be forwarded, but it does help it to achieve direct tunnels faster.

Some routers let you limit UPnP to be usable by specific LAN IPs but not by everything on your LAN, which is nice.
Also, Tailscale is using Wireguard as its VPN "engine", and Wireguard is using UDP as its transport protocol. That makes port forwarding pretty safe, because you cannot discover the port by traditional probing. Wireguard will only respond to the connections(UDP packets) that use known secrets.

I'm not using Tailscale, but bare-bone Wireguard, what is definitely slightly more complex to setup but it gives you full control over your VPN.

In short, having UDP port forwarding definitely makes tunnel setup and the connection much faster, without compromising security.
 
You only need a single instance of Tailscale running on or behind your firewall to connect to any device on your home network via its local IP address if you enable advertise routes, including embedded devices. For example, I run Tailscale on my pfSense firewall to remotely connect to my HDHomeRun streaming OTA TV tuner when not at home. I can also connect directly to all my camera RTSP streams using third party IP Cam apps.
Yeah, that was flawed logic on my part...... I was thinking more about mobile devices, but you have to install an app regardless of which remote solution you want to use, so that issue is moot. If I want to run Wireguard (directly), then I still need to install the Wireguard app on my phone, so it is really no different than having to install Tailscale on my phone. I guess because I have to have both installed on my phone and I installed Tailscale second, I was incorrectly making it sound like Tailscale required something "more" than the other solutions.

Thanks for pointing out my error.....
 
  • Like
Reactions: tigerwillow1
I still install Zerotier and Tailscale both on new remote machines just for redundancy, but yeah Tailscale seems to be better at NAT traversal (establishing direct tunnels through NAT). Both can be problematic depending on your router though. pfsense in particular is known to have a "hard NAT" by default that makes it difficult/slow for Tailscale to establish direct tunnels. It can be worked around but you have to know to do it (Tailscale has a support document about pfsense setup) and it can be tricky to get it right. The good news is you can install Tailscale directly on a pfsense/opnsense router instead of on the machines behind the router, and I think that may avoid some of the issues.

If you are like me and you hate having to connect a VPN client to access Blue Iris, then Cloudflare DNS is also a great option because it is cheap, around $10 a year, and you can use free Cloudflare Tunnels to host your Blue Iris servers on a public domain whether you have your own public IP address or not.
How does the Cloudflare DNS option work?
 
How does the Cloudflare DNS option work?
It is not what I'd call super easy to set up, but the general idea is you register a domain using Cloudflare (or transfer one in from another domain host), then set up a Cloudflare Tunnel which is where a machine (e.g. Blue Iris machine) on your network establishes an outbound connection to Cloudflare which they can use to proxy traffic from the internet to a service running on your LAN. The value is that it works like port forwarding even if you can't port forward.