Skip to content
This repository has been archived by the owner on Jun 1, 2023. It is now read-only.

Tailscale Documentation #130

Merged
merged 2 commits into from
May 30, 2023

Conversation

blinc117
Copy link
Contributor

@blinc117 blinc117 commented Jul 4, 2022

Built off the work initially done by @Grok13 in PR #82

Split out into its own page and added to the menu system, made a few updates as well as reference images.

@jclapis
Copy link
Member

jclapis commented Jul 15, 2022

@fmoledina @jshufro Can you take a quick look at this?


![](./images/tailscale-dashboard-servers.png)

It is suggested to [disable key expiry](https://tailscale.com/kb/1028/key-expiry) to prevent the need to periodically re-authenticate.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

specify only to do this for the node


It is suggested to [disable key expiry](https://tailscale.com/kb/1028/key-expiry) to prevent the need to periodically re-authenticate.

You should now be able to `exit` the SSH session to your node on your client, and SSH into your node again through Tailscale using `ssh your.user@rocketnode`.
Copy link
Contributor

@jshufro jshufro Jul 15, 2022

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this kind of assumes magicdns is enabled, but the guide doesn't say to enable it

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Agreed with this. I think the guide should be clear about this. Perhaps something like

...
If you would like to access your node using a memorable hostname such as rocketnode, you can do so by enabling MagicDNS in the Tailscale settings.
...

sudo ufw allow 41641/udp
```

Remove the SSH port added before from the firewall (for example, if you used the default port of 22):
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

should leave 22 open to lan, otherwise tailscale becomes a single point of failure


```shell
sudo ufw allow in on tailscale0 comment
sudo ufw allow 41641/udp
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Although the Tailscale UFW article provides this example command, their firewall and ports guides indicate that forwarding 41641/udp is not required unless you're dealing with a problematic NAT environment.

FWIW, I haven't had to forward any ports for Tailscale to just work on the handful of local machines (Linux, Windows) and remote VPS instances that I've used it with.

I think the guide should avoid suggesting that this port be forwarded and instead it could become a support item if people are encountering issues with connectivity.


It is suggested to [disable key expiry](https://tailscale.com/kb/1028/key-expiry) to prevent the need to periodically re-authenticate.

You should now be able to `exit` the SSH session to your node on your client, and SSH into your node again through Tailscale using `ssh your.user@rocketnode`.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Agreed with this. I think the guide should be clear about this. Perhaps something like

...
If you would like to access your node using a memorable hostname such as rocketnode, you can do so by enabling MagicDNS in the Tailscale settings.
...

@ryanscovill
Copy link
Contributor

Picked up this PR in #224

@nickdoherty nickdoherty merged commit d893286 into rocket-pool:main May 30, 2023
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants