#LaBEE 62
Formidable ! - 51 mots - 267 points
🟧🟧🟧🟧🟧🟧🟧🟧
#LeMotLeJeu
Bien sûr que si tu parles français ! Peut-être pas encore aussi facilement que tu le voudrais, mais je n’ai eu aucun mal à comprendre ce que tu voulais dire.
Continue de pratiquer, le français est loin d’être une langue facile, même pour les Français !
Je lis, un article de magazine ou un chapitre d’un roman. C’est pratique, quand tu te rends compte que ça fait 3 fois que tu lis la même phrase, c’est que c’est le moment d’éteindre 😴
Un blaireau d’Amérique ?
I’m getting a lot of Westworld players vibes from the photos in this thread.
Not the “good” players vibes, more the “I’m here to pose a badass, get drunk at the saloon, fuck a prostitute and then shoot her” vibes…
It mostly depends where. French use it for almost anything, even more since COVID. On the other hand, Germans have a tradition to prefer cash.
The quickest way is to add the Newpipe repo: https://newpipe.net/FAQ/tutorials/install-add-fdroid-repo/
If you already installed Newpipe from the f-droid main repo, you may need to backup your data, uninstall and reinstall it. https://github.com/TeamNewPipe/NewPipe?tab=readme-ov-file#installation-and-updates
DISCLAIMER: I never used Tailscale. All I know about Tailscale I learned reading their “How it works” blogpost and documentation, because I wanted to understand the hype.
Since nobody answered your questions, I’ll try my best. Just trust that I spent most of the last 25 years configuring security systems, including but not limited to VPNs.
Hmm, I guess my question would be how does this all work?
See my 2 links above.
I mean, is it not possible to configure STUN/DERP services yourself?
Of course it is, but it will be additional work, that most users are not willing/confident to do and Tailscale provides this service.
Or add control lists yourself? […] For ACLs, I guess Apparmor and/or SELinux profiles would be configured?
Deploying network ACLs on your hosts indeed does not require you to use Tailscale. However they provide an centralised way to manage and deploy them, without worrying about the underlying OS and ACL system. Or even requiring you to have access to the host, it could be an authorised user trying to access your Tailscale network.
Note: AppArmor/SELinux are more “system/process ACLs”, not directly related to network ACLs. I’m oversimplifying a lot, they’re difficult to describe without knowing your sysadmin skills.
The removing a key I can understand why it’s be a nightmare yourself, but how does Tailscale do it where it’s just so simple?
Simple: they ask you to run an agent on all of your Tailscale hosts and connect to their centralised platform. To paraphrase their blogpost: config management is centralized, but that doesn’t matter because it carries virtually no traffic. It just exchanges a few tiny encryption keys and sets policies. The VPNs and their traffic are a distributed mesh.
EDIT: Another question I have is how does Tailscale work when I have a VPN for securing network traffic when browsing the internet etc.? Or is that just seamless?
I’m not sure to understand this question, so I’ll make an asumption: you’re asking what happens if you run Tailscale on a host that already has a VPN configured to access the Internet.
Tailscale (and Wireguard under it) is already a VPN solution, and tunneling a VPN inside another VPN is generally discouraged. But as Tailscale is providing STUN/DERP, if they manage correctly the MTU issues and things like that, I don’t see an immediate reason why it should not work at all.
You can configure Tailscale or Wireguard to create a VPN to access the Internet though.
Once again, if you try to understand how Tailscale works, please read the links at the start of this post. RTFM, kids!
On a more personal opinion, I find their solution clever and elegant. If I have the need for a distributed VPN solution in the near future, I will definitively consider it (or Headscale’s). For the moment, I’m fine with all my hosts connecting to my homelab, configuring a Wireguard tunnel for each roaming host, and opening ports and creating rules on my firewall. Compared to IPSec or OpenVPN tunnels, it seems almost too easy each time.
The main benefit of Tailscale are:
Tailscale also provides more advanced services or configuration helpers, such a file sharing (in alpha), ACLs…
#SUTOM #1039 3/6
🟥🟦🟦🟥🟦🟡🟦
🟥🟦🟥🟦🟥🟦🟦
🟥🟥🟥🟥🟥🟥🟥
https://sutom.nocle.fr/
#LeMOT 1038 3/6
⬜⬜⬜🟧⬜
⬜🟧⬜🟧⬜
🟧🟧🟧🟧🟧
#LeMotLeJeu
https://www.solitaire-play.com/lemot/
#LeMOT6 982 6/6
🔵⚪⚪⚪🔵⚪
⚪🔵⚪⚪🔵🔵
⚪🟠🔵🔵🔵🟠
🔵🟠⚪🟠🟠🟠
⚪🟠🟠🟠🟠🟠
🟠🟠🟠🟠🟠🟠
#LeMotLeJeu
https://www.solitaire-play.com/lemot6/