Shizlminizel Posted February 11 Share Posted February 11 Hi, current deployed version Tailscale v1.34.1 is outdated and meanwhile 3 versions are skipped: Tailscale v1.34.2 LINUX Handling of a very large number of SplitDNS domains with an exit node Tailscale v1.36 ALL PLATFORMS --json flag for the tailscale lock status and tailscale lock log commands --json flag for the tailscale version command tailscale update command to update client tailscale debug daemon-logs to watch server logs tailscale status --json now includes KeyExpiry time and Expired boolean on nodes tailscale version now advertises when you’re on the unstable (dev) track (Unix platforms) When /etc/resolv.conf needs to be overwritten for lack of options, a comment in the file now links to https://tailscale.com/s/resolvconf-overwrite Tailscale SSH: SSH to tailscaled as a non-root user works again, as long as you only SSH to the same user that tailscaled is running as Handle cases where a node expires and we don’t receive an update about it from the control server (#6929 and #6937) Support UPnP port mapping of gateway devices where they are deployed as a highly available pair (#6946) Support arbitrary IP protocols like EOIP and GRE (#6423) Exit node handling of a large number of split DNS domains (#6875) Accept DNS-over-TCP responses up to 4K bytes (#6805) LINUX Add build support for Loongnix CPU architecture Improved throughput performance on Linux (#6663) Tailscale v1.36.1 ALL PLATFORMS Potential infinite loop when node key expires Quote Link to comment
dsmith44 Posted February 11 Author Share Posted February 11 Hi, current deployed version Tailscale v1.34.1 is outdated and meanwhile 3 versions are skipped: Tailscale v1.34.2 LINUX Handling of a very large number of SplitDNS domains with an exit node Tailscale v1.36 ALL PLATFORMS --json flag for the tailscale lock status and tailscale lock log commands --json flag for the tailscale version command tailscale update command to update client tailscale debug daemon-logs to watch server logs tailscale status --json now includes KeyExpiry time and Expired boolean on nodes tailscale version now advertises when you’re on the unstable (dev) track (Unix platforms) When /etc/resolv.conf needs to be overwritten for lack of options, a comment in the file now links to https://tailscale.com/s/resolvconf-overwrite Tailscale SSH: SSH to tailscaled as a non-root user works again, as long as you only SSH to the same user that tailscaled is running as Handle cases where a node expires and we don’t receive an update about it from the control server (#6929 and #6937) Support UPnP port mapping of gateway devices where they are deployed as a highly available pair (#6946) Support arbitrary IP protocols like EOIP and GRE (#6423) Exit node handling of a large number of split DNS domains (#6875) Accept DNS-over-TCP responses up to 4K bytes (#6805) LINUX Add build support for Loongnix CPU architecture Improved throughput performance on Linux (#6663) Tailscale v1.36.1 ALL PLATFORMS Potential infinite loop when node key expires 1.36.0 is the latest available if you read the previous posts. 1.36.1 came out yesterday. Latest tag will be moved to 1.36.1 in the next few days. 1 1 Quote Link to comment
dsmith44 Posted February 12 Author Share Posted February 12 Latest = 1.36.1 = 1.36 Anyone that pulled 1.36.0 I would suggest updating as there are issues with this .0 release fixed in .1 1 Quote Link to comment
Shizlminizel Posted February 14 Share Posted February 14 Hi, thank you for the update and sorry for not reading the previous post. I was just notified by github and was a bit concerned about missing updates in my tailscale Dashboard. I can confirm all my unraid instances are up to date now. Thanks for the fast response *thumbsup* Quote Link to comment
Simone Valmacco Posted March 1 Share Posted March 1 Hi @dsmith44, there's a way to have a status banner in the dashboard as the built in Wireguard VPN do? Thank you very much! Simone Quote Link to comment
Blue300 Posted March 11 Share Posted March 11 (edited) Hi! I've been trying to get tailscale on my unraid server but not sure if stupid or something 😶 While looking at the logs after authenticating the docker to tailscale it just keeps saying: Quote Received error: register request: Post "https://controlplane.tailscale.com/machine/register": connection attempts aborted by context: context deadline exceeded My server shows up on the tailscale app as connected using talescale debug ts2021 yealds: Quote 21:15:18.094764 Fetching keys from https://controlplane.tailscale.com/key?v=56 ... 21:15:38.200131 Dial("tcp", "18.193.143.177:443") ... 21:15:38.200324 trying bootstrapDNS("derp1c.tailscale.com", "104.248.8.210") for "controlplane.tailscale.com" ... 21:15:38.228032 Dial("tcp", "18.193.143.177:443") = 192.168.1.14:38238 / 18.193.143.177:443 21:15:38.289558 controlhttp.Dial = 0xc000012218, <nil> 21:15:38.289564 did noise handshake 21:15:38.289567 final underlying conn: 192.168.1.14:38238 / 18.193.143.177:443 and using talescale status yealds: "Logged out." Not sure if I did anything wrong during startup but something seems to have broken 😓 Shouldn't be any VPN or firewall issues as far as I know, followed this video as I installed //Update Also when intalling the docker it seems to just wanting to login instead of giving the auth link and wait. I just managed to get the link the 3rd time installing the docker after deleting "tailscale.state". Edited March 11 by Blue300 Quote Link to comment
dsmith44 Posted March 13 Author Share Posted March 13 On 3/1/2023 at 12:38 PM, Simone Valmacco said: Hi @dsmith44, there's a way to have a status banner in the dashboard as the built in Wireguard VPN do? Thank you very much! Simone As this is a docker container, and not a plugin, there is no way for it to interact with the underlying unraid install. Sorry. Quote Link to comment
dsmith44 Posted March 13 Author Share Posted March 13 On 3/11/2023 at 9:21 PM, Blue300 said: Hi! I've been trying to get tailscale on my unraid server but not sure if stupid or something 😶 While looking at the logs after authenticating the docker to tailscale it just keeps saying: My server shows up on the tailscale app as connected using talescale debug ts2021 yealds: and using talescale status yealds: "Logged out." Not sure if I did anything wrong during startup but something seems to have broken 😓 Shouldn't be any VPN or firewall issues as far as I know, followed this video as I installed //Update Also when intalling the docker it seems to just wanting to login instead of giving the auth link and wait. I just managed to get the link the 3rd time installing the docker after deleting "tailscale.state". It looks like tailscale cannot connect to the internet at all, which is why it is failing. If you open the console, right click on tailscale container, can you ping anything? Quote Link to comment
dsmith44 Posted March 14 Author Share Posted March 14 1.38 == 1.38.1 is pushed. Latest will move in a week or two Quote Link to comment
dsmith44 Posted March 23 Author Share Posted March 23 On 3/14/2023 at 11:07 PM, dsmith44 said: 1.38 == 1.38.1 is pushed. Latest will move in a week or two 1.38.2 == 1.38 == latest. Quote Link to comment
oafish Posted April 4 Share Posted April 4 How to enable the tailscale funnel in this container? I tried command "tailscale serve https:443 / text:"Hello, world!". It works. I can use the tailscale hosted domain name fetch this text. But when I tried command "tailscale serve https / https://127.0.0.1:443". I can not access the unraid dashboard with the tailscale hosted FQDN Quote Link to comment
tank101 Posted April 9 Share Posted April 9 I have tailscale setup. i can access it over the local network on my wifi but when i try to access the unraid machine from my phone's internet, it wont access it. any ideas? Quote Link to comment
dsmith44 Posted May 9 Author Share Posted May 9 1.4.0 has been uploaded, if you want it. I won't tag latest just late as previously discussed Quote Link to comment
dsmith44 Posted May 30 Author Share Posted May 30 1.40.1 = latest 1.42.0 is available Quote Link to comment
dsmith44 Posted June 9 Author Share Posted June 9 On 5/30/2023 at 10:26 PM, dsmith44 said: 1.40.1 = latest 1.42.0 is available 1.42.0 = latest Quote Link to comment
chchiyan Posted June 13 Share Posted June 13 On 6/9/2023 at 1:02 PM, dsmith44 said: 1.42.0 = latest @dsmith44it looks like the older version is still connected to the "latest" tag Quote Link to comment
dsmith44 Posted June 14 Author Share Posted June 14 On 6/13/2023 at 10:00 AM, chchiyan said: @dsmith44it looks like the older version is still connected to the "latest" tag Thank you @chchiyan, not sure what happened there, now fixed. 1 Quote Link to comment
K1LLA_KING_KING Posted June 19 Share Posted June 19 (edited) Hello Tailscale team Im attempting to configure remote access via VPN with Tailscle to my Unraid server. I have followed this guide perfectly: https://www.youtube.com/results?search_query=tailscale+unraid, including adding the code:| and UP_FLAGS field Connected on Tailscale The result: 1. Is there any possibility I have limitations from the ISP? When I requested port forwarding from the ISP (for wiregaurd), they told me it would not be forwarded as an external IP and I would have to pay for a different service for that. This most likely is now irrelvant as Tailscale bypasses the need for port forwarding. But the situation makes me wonder could they limit external access somehow? Diagnostics attached Its is essential I have remote access to the server, please help me troubleshoot this problem🙏🙏🙏 TIA tgtbserver-diagnostics-20230619-1041.zip Edited June 19 by K1LLA_KING_KING Quote Link to comment
dsmith44 Posted June 19 Author Share Posted June 19 The advertised-routes option is not officially supported, that is about routing all your traffic back to Unraid before it goes to the internet. So in the first instance I'd remove that from UP_FLAGS until you get basics working. Also Tailscale shouldn't need a port forward. From the device connecting can you ping the tailscle IP address of the unraid server? If you can, then something else is stopping the web interface working. If you can't then can you ping the device from unread? Quote Link to comment
K1LLA_KING_KING Posted June 20 Share Posted June 20 (edited) 17 hours ago, dsmith44 said: The advertised-routes option is not officially supported, that is about routing all your traffic back to Unraid before it goes to the internet. So in the first instance I'd remove that from UP_FLAGS until you get basics working. OK ill delete that Also Tailscale shouldn't need a port forward. No I'm not port forawrding, I just mentioned that regarding a time when I did ask the ISP about it. From the device connecting can you ping the tailscle IP address of the unraid server? If you can, then something else is stopping the web interface working. If you can't then can you ping the device from unread? Yes, I can Thanks for helping Edited June 20 by K1LLA_KING_KING Quote Link to comment
mihcox Posted June 22 Share Posted June 22 I have a few questions about the plugin: 1: What is proper setup for the taildrop file location, is something like this acceptable? /mnt/user/Downloads/TailDrop/ 2. should i be concerned about any of these errors: Running pre-startup script Enabling IP Forwarding net.ipv4.ip_forward = 1 net.ipv6.conf.all.forwarding = 1 Stopping tailscaled. Starting tailscaled: /usr/local/sbin/tailscaled logger: send message failed: Bad file descriptor /usr/local/emhttp/plugins/tailscale/update-settings.sh: line 53: tailscale: command not found tailscale set --accept-routes=false /usr/local/emhttp/plugins/tailscale/update-settings.sh: line 70: tailscale: command not found tailscale set --accept-dns=true Running post-startup script Quote Link to comment
dianasta Posted June 23 Share Posted June 23 Hello @dsmith44 , There is a new tailscale version 1.44.0 could you please kindly update the docker? Thank you very much! Quote Link to comment
dsmith44 Posted June 23 Author Share Posted June 23 1 hour ago, dianasta said: Hello @dsmith44 , There is a new tailscale version 1.44.0 could you please kindly update the docker? Thank you very much! Please see previous discussions. Latest will not be moved for a few weeks. 1.44 is available if you want to manually pick it. Quote Link to comment
dsmith44 Posted June 23 Author Share Posted June 23 On 6/20/2023 at 4:24 AM, K1LLA_KING_KING said: The fact that you can ping your client device tailscale address form unraid, but no vica versa suggest ACLs/firewalls. Have you set any custom ACLs in the tailscale admin interface? Have you done anything to unraid with firewalls? Quote Link to comment
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.