From Gentoo Wiki
Jump to:navigation Jump to:search
This article is a stub. Please help out by expanding it - how to get started.

Tailscale facilitates remote access between devices and services across complex network boundaries such as CGNAT.



Tailscale does not support any USE flags.

Merge the package:

root #emerge --ask net-vpn/tailscale


Signing up

Setting up Tailscale requires an account. Tailscale does not store passwords, but instead relies on third-party single sign-on (SSO) providers such as Google, GitHub or OpenID connect. Users can sign up at login.tailscale.com.

See also
https://tailscale.com/kb/1013/sso-providers has a list of supported SSO providers.



Add the Tailscale daemon to the default runlevel:

root #rc-service tailscale start
root #rc-update add tailscale default


Enable the Tailscale daemon:

root #systemctl start tailscaled.service
root #systemctl enable tailscaled.service



user $tailscale --help
  tailscale [flags] <subcommand> [command flags]

For help on subcommands, add --help after: "tailscale status --help".

This CLI is still under active development. Commands and flags will
change in the future.

  up         Connect to Tailscale, logging in if needed
  down       Disconnect from Tailscale
  set        Change specified preferences
  login      Log in to a Tailscale account
  logout     Disconnect from Tailscale and expire current node key
  switch     Switches to a different Tailscale account
  configure  [ALPHA] Configure the host to enable more Tailscale features
  netcheck   Print an analysis of local network conditions
  ip         Show Tailscale IP addresses
  status     Show state of tailscaled and its connections
  ping       Ping a host at the Tailscale layer, see how it routed
  nc         Connect to a port on a host, connected to stdin/stdout
  ssh        SSH to a Tailscale machine
  funnel     Serve content and local servers on the internet
  serve      Serve content and local servers on your tailnet
  version    Print Tailscale version
  web        Run a web server for controlling Tailscale
  file       Send or receive files
  bugreport  Print a shareable identifier to help diagnose issues
  cert       Get TLS certs
  lock       Manage tailnet lock
  licenses   Get open source license information
  exit-node  Show machines on your tailnet configured as exit nodes
  update     [BETA] Update Tailscale to the latest/different version
  whois      Show the machine and user associated with a Tailscale IP (v4 or v6)

  --socket string
    	path to tailscaled socket (default /var/run/tailscale/tailscaled.sock)

Enabling the VPN

Once the service is running, enable the VPN and follow the instructions:

root #tailscale up



Unmerge the package:

root #emerge --ask --depclean --verbose net-vpn/tailscale

See also

  • WireGuard — a modern, simple, and secure VPN that utilizes state-of-the-art cryptography.

External resources