Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I’m on the free plan at the moment, and it’s pretty neat, but I’d actually be willing to pay for a self-hosted version :P (But I guess the existence of such an option might tempt some paying enterprise customers to attempt self-hosting instead?)

(I’m aware of headscale as an open-source control plane, but the iOS client is still closed-source and hard-coded to only use the first-party control plane :( )



While not apples-to-apples and less polished, we're slowly building up https://github.com/tonarino/innernet as a fully open-source (and self-hosted) alternative to things like Tailscale. It controls vanilla WireGuard under the hood (kernel or userspace implementations), and is lower level (no graphical interfaces yet), though, but depending on your needs it might still fit :).


I have been experimenting with headscale as well. I have it set up and everything works nicely but the Tailscale OSX client actually cannot automatically relogin.

Headscale has the preauthkey, it is still valid even but I need to do the tailscale up --login-server ... dance every time to get it connected.

Not ideal.


Interesting. I've been running Headscale since the beginning of 2022, and haven't had any issues like this (MacOS Monterey). Have about 5-6 other MacOS users, and they haven't mentioned anything like this either.

I've probably logged in a grand total of two or three times (during initial testing in Jan). Everything "just works" for us.


You can get macOS specific overrides that solve this by going to /apple on your headscale instance


Thank you, sounds like this will actually take care of it. I thought the /apple instructions were only for iOS since --login-server option was present on the binary already.

> defaults write io.tailscale.ipn.macos ControlURL ...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: