<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: tailscaletom</title><link>https://news.ycombinator.com/user?id=tailscaletom</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sat, 18 Apr 2026 05:32:28 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=tailscaletom" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by tailscaletom in "Mullvad on Tailscale: Privately browse the web"]]></title><description><![CDATA[
<p>Yepp! Strong recommend on using systemd-resolvd, we've observed the least bugs and issues there.</p>
]]></description><pubDate>Thu, 07 Sep 2023 17:49:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=37422803</link><dc:creator>tailscaletom</dc:creator><comments>https://news.ycombinator.com/item?id=37422803</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37422803</guid></item><item><title><![CDATA[New comment by tailscaletom in "Mullvad on Tailscale: Privately browse the web"]]></title><description><![CDATA[
<p>Userspace mode might be an option (runs without a TUN or doing any system network wiring, at the expense of performance): <a href="https://tailscale.com/kb/1112/userspace-networking/" rel="nofollow noreferrer">https://tailscale.com/kb/1112/userspace-networking/</a><p>Running Tailscale without privileges is a challenge because tailscaled needs to be able to configure your network, and if you enable Tailscale SSH it also needs to be able to create sessions for configured users. For people who dont need SSH and accept this challenge + maintenance burden, it is possible: <a href="https://tailscale.com/kb/1279/security-node-hardening/" rel="nofollow noreferrer">https://tailscale.com/kb/1279/security-node-hardening/</a></p>
]]></description><pubDate>Thu, 07 Sep 2023 17:41:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=37422682</link><dc:creator>tailscaletom</dc:creator><comments>https://news.ycombinator.com/item?id=37422682</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37422682</guid></item><item><title><![CDATA[New comment by tailscaletom in "Tailscale bug allowed a person to share nodes from other tailnets without auth"]]></title><description><![CDATA[
<p>Yes. Peers added in this fashion would not have been signed by a trusted tailnet-lock key, so clients would refuse to trust them.</p>
]]></description><pubDate>Wed, 18 Jan 2023 17:34:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=34429898</link><dc:creator>tailscaletom</dc:creator><comments>https://news.ycombinator.com/item?id=34429898</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=34429898</guid></item><item><title><![CDATA[New comment by tailscaletom in "Tailscale bug allowed a person to share nodes from other tailnets without auth"]]></title><description><![CDATA[
<p>If you're excited about tailnet lock and want to get on the alpha sooner rather than later, feel free to drop me an email. As Dave mentioned we are slowly crunching through the waitlist to get some miles in, but I'm also happy to take on enthusiastic testers ahead of that!<p>You can email me at tom@ (tailscale dot com)</p>
]]></description><pubDate>Wed, 18 Jan 2023 04:56:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=34423573</link><dc:creator>tailscaletom</dc:creator><comments>https://news.ycombinator.com/item?id=34423573</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=34423573</guid></item><item><title><![CDATA[New comment by tailscaletom in "Tailnet Lock"]]></title><description><![CDATA[
<p>(Tailscalar and a tailnet lock author here)<p>If you're okay with trusting Tailscale's control plane, we have a feature for exactly this use case! Its called Device Authorization: <a href="https://tailscale.com/kb/1099/device-authorization/" rel="nofollow">https://tailscale.com/kb/1099/device-authorization/</a><p>You could also use tailnet lock in this fashion, by issuing a `tailscale lock sign` command for the new node once you've verified the provenance of the new device. Because it involves signatures with keys on your device it could never be as simple as a REST API, but maybe we could offer a more easy to automate command or better client library support (suggestions welcome!)</p>
]]></description><pubDate>Thu, 15 Dec 2022 17:08:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=34002537</link><dc:creator>tailscaletom</dc:creator><comments>https://news.ycombinator.com/item?id=34002537</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=34002537</guid></item><item><title><![CDATA[New comment by tailscaletom in "Tailnet Lock"]]></title><description><![CDATA[
<p>(Tailscalar and a tailnet lock author here)<p>Thanks for the feedback!! Writing the documentation for how this worked was a challenge, and its good to hear what pieces we need to call out more strongly in the future.<p>If you're interested in gory details around tailnet lock internals, we have the beginnings of a whitepaper here: <a href="https://tailscale.com/kb/1230/tailnet-lock-whitepaper/" rel="nofollow">https://tailscale.com/kb/1230/tailnet-lock-whitepaper/</a></p>
]]></description><pubDate>Thu, 15 Dec 2022 16:52:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=34002280</link><dc:creator>tailscaletom</dc:creator><comments>https://news.ycombinator.com/item?id=34002280</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=34002280</guid></item></channel></rss>