frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Open in hackernews

Tailscale 4via6 – Connect Edge Deployments at Scale

https://tailscale.com/blog/4via6-connectivity-to-edge-devices
120•tiernano•1mo ago

Comments

Arnt•1mo ago
Reminds me of the network a friend described. After a couple of mergers and sales, they had so much NAT that one particular cron job tab used an internal server-to-server connection that passed through five NAT instances.

And this tailscale product seems to say "this product makes that kind of situation less awful" which I'm sure is somehow good but I can't help thinking that "less awful" is going to mean "still awful" for most deployments.

rahimnathwani•1mo ago
Years ago I was responsible for consolidating three separate office locations into a new, larger, office.

We had some on-premise hosting, and I figured the easiest thing would be to keep the existing network LAN addressing. Each LAN had a different IP range, so it would be no problem for them to share the same ethernet network, as long as only one of the three LANs provided DHCP for the PCs.

We already had a Cisco router for internet access. That should be able to provide routing between our three LANs, right?

That was a terrible idea, as local traffic was bottlenecked on this small router that wasn't designed for the job. Transfers between LANs were as slow as they'd been when we in different physical locations.

I spent an hour or two consolidating the LAN onto a single IP subnet, and everything worked as you'd expect.

Sesse__•1mo ago
Why do they feel the need to call NAT64 by some new weird “4via6” name?
SparkyMcUnicorn•1mo ago
Maybe because it's not exactly NAT64, even though it has the same goal?
danielbln•1mo ago
As far as I understand it, both involve translating between IPv6 and IPv4, but NAT64 is a broad standard for general IPv6-to-IPv4 internet access, whereas Tailscale's 4via6 is more specific feature to solve a niche problem of overlapping private IP ranges within a Tailscale VPN environment using some proprietary addressing scheme. But it's been a while since I was deep in network land.
ko_pivot•1mo ago
Most people working outside the network layer are not familiar with the basics of IPv6 and how it interops with v4 systems. In fact, I would bet that many AWS admins are not familiar with dualstack VPC configurations, for example. This product name communicates clearly to those users what the value prop is.
kingforaday•1mo ago
Don't forget 6to4 and Teredo. Different names for different things.
bradfitz•1mo ago
I'm largely responsible for this, so I'll try to answer.

Technically it's not NAT64 today. Different prefix for one, but it's also not translated at the IP layer (yet). For TCP, we terminate the TCP in tailscaled and make a new TCP connection out and switch them together, so packets are not 1:1 end-to-end.

We also had grander plans for the 32 "site-id" bits in the middle there. Instead of just a 8-bit (now 16-bit) "site ID" number in there, you could actually put the 32-bit CGNAT IPv4 address of any peer of yours, and then access its IPv4 space relative to that node, without any configuration.

Say you have an Apple TV plugged in at home.

Then you're at a coffee shop and want to access something on your LAN and don't have a subnet router set up.

You should be able to `ssh 10-0-0-5-via-appletv.foo-bar.ts.net` and have MagicDNS map that "appletv" as the "Site ID" and put its 32-bit CGNAT address in, and then parse out the 10.0.0.5 as the lower 32-bits, and then have Tailscale route your packets via your home Apple TV node.

All subject to ACLs, of course, but we could make it a default or easy-to-enable recommended default that you could do such things as an admin for your self-owned devices.

So why it's called "4via6"? That was just kinda a temporary internal name that ended up leaking out to docs/KB and now a blog post, apparently. :)

vessenes•1mo ago
Wow people don't like this in the comments. I like this! This is cool. I think the use case of deploying robots and being able to rely on their IPs for various uses is smart, and interesting. Looking forward to seeing how this evolves.
throwaway314155•1mo ago
> Wow people don't like this in the comments

Not a single purely negative comment here as of the time i'm writing this. Maybe a criticism or two, but no one has a "dislike".

vessenes•1mo ago
well, at least there was a lot of bikeshedding.
hcfman•1mo ago
* What bandwidth throughput is supported through tailscale? * Are there data limitations with the 6 dollars per month account? Could I stream multiple web cameras through it continuously at no extra cost for example?

If that's a big yes it costs you no more and you can stream like that with high bandwidth and no throttling because perhaps I won't have any negative comments either :)

lostmsu•1mo ago
Or just use Yggdrasil with a firewall.
yjftsjthsd-h•1mo ago
Isn't Yggdrasil IPv6-only? I guess you could maybe do something similar with Yggdrasil+NAT64?
lostmsu•1mo ago
This is not a problem if you are running services that support IPv6.
aquariusDue•1mo ago
I've been hearing about Yggdrasil for some time now, I'd like to dive into it a bit more but I don't really know where to start for practical stuff. Do you happen to have some personal success story with it, or could you please point me to some blog posts maybe?

Thanks and I apologize in advance for imposing on you.

lostmsu•1mo ago
No problem, I love the tech.

My journey was: Wireguard (dropped because it is pain in the ass to configure and poor Windows support) -> Tailscale (dropped because it had RCEs at the time) -> Nebula (needs a separate service that issues host certificates, or manual clunky process) -> Yggdrasil. This was for personal stuff, but now I am also using it for my p2p GPU cloud startup (see https://borg.games/setup).

In comparison to other options I found Yggdrasil to be straightforward to setup:

1. Get it

2. Edit yggdrasil.conf to add public peers you want to connect to. You can get them from https://publicpeers.neilalexander.dev/

3. Repeat on all machines (Android is supported, unsure about iOS)

Now they have access to each other and everyone else in Yggdrasil by their _permanent_ Yggdrasil IPv6 address (derived from PrivateKey in yggdrasil.conf).

OPTIONAL quality-of-life stuff:

4. add Listen entries to yggdrasil.conf and a corresponding port forward on your home router then use it as a peer for your out-of-home machines to avoid extra hop to public peers

5. Create a bunch of DNS AAAA (IPv6) at your favorite DNS provider to give your machines names

Extra bonus: they recently added userspace stack support, so you can embed Yggdrasil directly into your app, and use it as a SOCKS proxy: https://github.com/yggdrasil-network/yggstack

xlmnxp•1mo ago
You can also use bridge46 to give global WAN access to your subnet

https://www.reddit.com/r/ipv6/s/QkWNW3PCZN

lostmsu•1mo ago
Does it work with https? How?
xlmnxp•1mo ago
yes it works with https, read SNI from echo hello message then connect both connection without decrypt and traffic
lostmsu•1mo ago
This is brilliant! How much bandwidth did you dedicate to it?
xlmnxp•1mo ago
you mean the public service? I think about 0.5Gbps with 10TB/month traffic

it simple bandwidth but enough for free service and there option to self-host the service anytime you want

jetsnoc•1mo ago
We chose Tailscale as our mesh zero-trust platform primarily for its 4via6 subnet routing. Many of our interfacing networks reuse CIDR ranges, and we had no interest in maintaining a custom WireGuard implementation to handle subnet overlaps. The hidden operational cost of bespoke networking solutions is never trivial. Tailscale’s combination of 4via6, fine-grained ACLs, lightweight agents, and a customer-friendly licensing model made it an easy decision for us—especially given their flexibility around node licensing, which erred in favor of the customer and our custom use cases that would have otherwise inflated our COGS.
tptacek•1mo ago
Love to see more schemes that put the lie to 128 bit addresses being overkill. We'll find ways to run out of them soon enough!

(Signed: someone who deployed at scale a scheme that eats 8 octets for two embedded IPv4 addresses, plus an additional 2 octets of signaling).

pmarreck•1mo ago
Honest question- Would a full IPv6 implementation across the board, hurt Tailscale's M.O. and bottom line, assuming all routing worked properly (a big assumption, to be sure)?

You can probably guess the next question, if the answer to that one is anything like a "yes"

That said, my experiences with Tailscale have been nothing but positive and I appreciate the work they're doing to simplify Internet connectivity between endpoints inside different LANs and WANs

liotier•1mo ago
I used to operate a home network all enterprisey and public Internetish, with VLAN, inter-VLAN routing & firewalling, a public IPv4 on the outside of an OPNsense router, and a Hurricane Electric free public /48 block (through their tunnel service) so that every node has at least one public IP... I ditched it all - I now operate a flat LAN with the ISP's standard box - and Tailscale everywhere. The only major functional difference is that services hosted on the LAN require an external reverse proxy (which I run on a free Oracle Cloud Ampere host)...

As a bonus, my family can call the ISP's tech support if anything dysfunction while I'm traveling: my self-hosting crap is perfectly independent from the ISP's standard service. And wait, there's more - I can add services anywhere, such as a backup server at my parent's, regardless of their configuration and with no impact.

So yes, Tailscale all the things... I'm nostalgic for the IPv6 flat end-to-end dream but, in our world of ubiquitous IPv4 NAT horrors, Tailscale functionally surpasses it.

easterncalculus•1mo ago

    > Honest question- Would a full IPv6 implementation across the board, hurt Tailscale's M.O. and bottom line, assuming all routing worked properly (a big assumption, to be sure)?
Despite what people say, absolutely. Tailscale's moat is the centrally deployed NAT traversal solutions built with an easy-to-use interface and (somewhat) friendly pricing model. At one point they wrote a blog post (looks to be deleted) basically saying that IPv6 and direct connectivity in general is 'bad actually' or something along those lines.
jiehong•1mo ago
Tailscale also goes through firewalls, not only NAT boxes. IPv6 won’t change firewall needs.
hcfman•1mo ago
Can tailscale work when firewalls block outgoing udp from everywhere except the company web proxy server ?
p_l•1mo ago
I think I actually have that in production somewhere, going through DERP always
thunderfork•1mo ago
Tailscale can work anywhere you can get an https connection... but it might not be fast, since the relays used for this have various limits.
wmf•1mo ago
Would a full IPv6 implementation across the board, hurt Tailscale's M.O. and bottom line, assuming all routing worked properly?

Maybe, but even asking the question is kind of conspiratorial. Companies like Cisco, Google, and Apple have been pushing IPv6. A small startup can't somehow hold back IPv6 "world domination" even if they tried.

bigfatkitten•1mo ago
In my view, no.

The key thing it gives you is the ability to define policies about who can talk to what, irrespective of where the endpoints actually are, while also cryptographically protecting your traffic.

On the other hand, if you never ever use anything but HTTPS, then you probably don’t need it and you could do away with it today.

paulddraper•1mo ago
Yes.

But I haven’t the foggiest what the next question is.

Many network technologies/services exist to manage suboptimal circumstances, which would not be needed in better circumstances.

easterncalculus•1mo ago
Not sure why the questions asking about what differentiates this (if anything) from NAT64 are getting flagged in this thread.
karmicthreat•1mo ago
Is there a way to translate these into friendlier names? It would be nice if something like lidar-front.robot1.yada-fleet.bar could be made.

The End of the Arctic? Ocean Could Be Ice Free by 2015

https://www.thedailybeast.com/the-end-of-the-arctic-ocean-could-be-ice-free-by-2015/
1•bilsbie•1m ago•0 comments

Castlevania: Symphony of the Night Decompilation Project

https://sotn.xee.dev/
1•retro_guy•4m ago•1 comments

Young Americans Are Spending a Whole Lot Less on Video Games This Year

https://www.gamespot.com/articles/young-americans-are-spending-a-whole-lot-less-on-video-games-this-year/1100-6532877/
2•andsoitis•8m ago•0 comments

Benchmark for Evaluating Text Embeddings

https://huggingface.co/spaces/embedding-benchmark/RTEB
1•fzliu•9m ago•0 comments

Celebrating love in all its forms across identities and relationships

https://childrensbookforall.org/readings/16
1•chbkall•13m ago•1 comments

Qantas customers involved in mammoth data breach

https://www.news.com.au/travel/travel-updates/incidents/qantas-customers-involved-in-mammoth-data-breach
1•aussieguy1234•14m ago•1 comments

New claim added: X opens up to Community Notes written by AI bots

https://www.theverge.com/news/696210/x-community-notes-ai-note-writers
2•bundie•14m ago•0 comments

HTTP: H Is for Hallucinated

https://www.jasonthorsness.com/28
1•jasonthorsness•16m ago•0 comments

The simple act of reading can be a crime in Malaysia. Here's why

https://www.rnz.co.nz/life/books/the-simple-act-of-reading-can-be-a-crime-in-malaysia-here-s-why
3•billybuckwheat•17m ago•0 comments

Powell confirms that the Fed would have cut by now were it not for tariffs

https://www.cnbc.com/2025/07/01/powell-confirms-that-the-fed-would-have-cut-by-now-were-it-not-for-tariffs.html
2•fedest•25m ago•0 comments

Hilbert's sixth problem: derivation of fluid equations via Boltzmann's theory

https://arxiv.org/abs/2503.01800
1•nsoonhui•40m ago•0 comments

Wider or Deeper? Scaling LLM Inference-Time Compute with Adaptive Tree Search

https://arxiv.org/abs/2503.04412
1•vrm•41m ago•0 comments

Should you lose your rights with age?

https://news.harvard.edu/gazette/story/2025/07/as-wave-of-dementia-cases-looms-law-school-looks-to-preserve-elders-rights/
2•gnabgib•45m ago•1 comments

Self-hostable AT Protocol backlink index that runs on a RPi 4

https://github.com/at-microcosm/links/tree/main/constellation
1•ffin•46m ago•0 comments

Cross-Device Flows: Security Best Current Practice

https://www.ietf.org/archive/id/draft-ietf-oauth-cross-device-security-10.html
3•mooreds•48m ago•0 comments

The Eiffel Tower is closed to tourists due to searing heat

https://www.cnn.com/2025/07/01/weather/europe-heat-wave-global-warming
1•mooreds•49m ago•0 comments

Dewdrop: A Java Event Sourcing Framework

https://dewdrop.events/
2•mooreds•50m ago•0 comments

You MUST Listen to RFC 2119

https://ericwbailey.website/published/you-must-listen-to-rfc-2119/
4•zdw•51m ago•1 comments

Show HN: Conduit – Turn large text files into listenable audio

https://conduit-landing-page-git-master-tobys-projects-a638df7e.vercel.app/
2•tboneskibs•53m ago•0 comments

Show HN: I built a procedural universe in Python to explore simulation theory

https://github.com/SurceBeats/Atlas
1•SurceBeats•59m ago•1 comments

Trump threatens Tesla, SpaceX support

https://www.reuters.com/business/autos-transportation/elon-musk-renews-criticism-trump-spending-bill-calls-new-political-party-2025-06-30/
9•geox•1h ago•3 comments

Qantas says 6M customers caught up in cyberattack

https://www.afr.com/companies/transport/qantas-says-6-million-aussies-caught-up-in-cyberattack-20250702-p5mbup
3•sen•1h ago•2 comments

Visual intuitive tool to design predict and optimise complex economic models

https://machinations.io
1•leetrout•1h ago•0 comments

iPhone Satellite Functionality Saves Denver Mountaineer

https://www.macrumors.com/2025/07/01/iphone-satellite-denver-climber/
1•alwillis•1h ago•1 comments

Meta bans two anti-Zionist comedians from Instagram

https://mondoweiss.net/2025/07/metas-banning-of-two-anti-zionist-comedians-from-instagram-is-the-latest-example-of-big-techs-deep-anti-palestinian-bias/
9•siltcakes•1h ago•0 comments

Australians to face age checks from search engines

https://ia.acs.org.au/article/2025/australians-to-face-age-checks-from-search-engines.html
18•stubish•1h ago•8 comments

Cursor for the first time today. It was perfect until

https://medium.com/@tahaymerghani/cursor-fixed-everything-until-it-didnt-1e8c20a8f30b
1•taha_moji•1h ago•0 comments

Proximity to Golf Courses and Risk of Parkinson Disease

https://jamanetwork.com/journals/jamanetworkopen/fullarticle/2833716
1•pseudolus•1h ago•0 comments

AI: Great Expecations (1988) [pdf]

https://people.csail.mit.edu/brooks/idocs/AI_hype_1988.pdf
1•Rexxar•1h ago•0 comments

European consumers are mostly saying 'non' to trading in their old phones

https://www.theregister.com/2025/06/18/used_phones_europe/
2•PaulHoule•1h ago•0 comments