• 0 Posts
  • 8 Comments
Joined 2 years ago
cake
Cake day: October 18th, 2023

help-circle
  • Are you using some Apple or MS author account?

    Google and Github SSO were the only options when I originally setup tailscale. There are a few more options now including what looks like every self-hosted OIDC provider I’ve ever heard of, and a few I hadn’t.

    How did you config tail scale though?

    There are a couple options depending on how you are using it. Most of the time I just use the tailscale command to configure each node.

    Most systems were just sudo tailscale up --ssh to get it up and running, although I have one system setup as a subnet router to give me outside-the-house access to systems that I can’t put tailscale on. That was a little more involved but it was still pretty straightforward and well documented. Their documentation is actually very well written and is worth the read.


  • The way Tailscale works, you don’t need to worry to much about your local IP address. You can just use the Tailscale IP address and it will connect as if you were local using the fastest route. That’s the beauty of a mesh VPN. Each device knows the fastest route to each other.

    Without more information I can’t really tell what issue you are actually having, but if your system has internet, you have a local IP and if the system is showing as up on your tailscale dashboard than it will have a tailscale IP. Not being able to connect using one or the other would be a configuration issue. Whatever service you are having trouble with is probably only listening to one of the interfaces but not the other.

    I’m assuming you are running a linux or unix box, but try running the command ip addr. Assuming you have the package installed, it will tell you all of your IP addresses for the system you run the command on. The list may be quite long if you have a lot of docker containers running. The command tailscale ip will do the same but limited to your tailscale IP addresses.




  • A point. However, how far do you need to go to reach an area, that doesn’t speak your native language commonly?

    We recently moved a fair distance, not too far as things go here. Roughly 2000 km. English language spoken by almost everyone throughout the entire trip. Plus 15 random languages from tourists and immigrants from around the globe. I could have gone another 2000 km and I still would have had to dig to find a community that had a common language other than english.

    I would have had to travel 2000 km the other way to reach an area where a single language other than English was spoken by more than 5% of the population.

    Maybe 1000 km, I forget about Creole in Louisiana, though I’m not sure how common that language is in the State. I just remember running across the language frequently while driving trucks in that area for a living.

    We are a truly massive nation that largely shares a single language. Most of us, rarely ever leave a 250 km radius from where we were born. Most of us don’t have passports and will never leave the US.

    Hell, I’m well traveled. I’ve been to 45 on the 50 States, and in all my travels I’ve only needed another language once. In Larado, TX, which is right on the border with Mexico.

    There are small enclaves that speak an alternative language, but they are few and far between.

    Would it be to the students benefit to learn a second language, sure. But it’s unlikely that the student would ever use whatever random language they were required to learn. Spanish and perhaps Arabic might occasionally be helpful, but not necessarily, depending on what part of the country (or trade) you’re they are in.



  • Well, yes I looked at tailscale too, but that would prevent me from using my normal commercial VPN

    You can split your devices traffic, Tailscale traffic through Tailscale, everything else through your masking VPN.

    I’m trying to get the best of 2 worlds: using the VPN to hide my IP from services that i visit and my ISP, and a secure connection to my home server.

    For that, what I would do is put the masking VPN (like PIA or whatever) on your router (not all routers can do this) and then have Tailscale on the devices or individual services. In theory, everything would still be able to talk to each other (even if your mobile device is not behind the router), but everything that is behind the router would enter and exit their traffic wherever you have the masking VPN set to. Downside of doing this is that EVERYTHING that is behind that router is also behind that VPN which can cause problems with some services, like banking and streaming.

    It would also mean that the only way you could host a public service is to have an external VPS acting as a reverse proxy. Cloudflare might also have something that could work around this setup, but I’m not familiar with their offerings.

    This setup also doesn’t mask your traffic (origin and destination) from your mobile provider (just your home ISP), but that is a harder nut to crack as they can see, real time, where you are physically, and depending on your device, may have deeper device access anyways. I’m thinking prepaid phones and phones bought from the carrier (at least here in the US) or if your carrier has “asked” you to install an app to manage your account. My assumption is that my mobile provider can see anything I do while I have my phone or tablet with me, and just work around that.

    You might want to ask in !privacy@lemmy.ml and !privacy@lemmy.world, as this is more up their alley.