https://tailscale.com/blog/how-tailscale-works
Ah! OK, now I get it! :-)
But, what found particularly interesting on that page was the following:
>" Some especially cruel networks block UDP entirely
, or are otherwise so strict that they simply cannot be traversed using STUN and ICE. For those situations, Tailscale provides a network of so-called DERP (Designated Encrypted Relay for Packets) servers. These fill the same role as TURN servers in the ICE standard, except they use HTTPS streams and WireGuard keys instead of the obsolete TURN recommendations."
DERP seems like one interesting solution (there may be others!) to UDP blockages...
It tended to happen a lot more when switching between wifi / cellular when leaving and entering buildings, etc.
Now I just don’t use it
Short lived tokens is not always an option
It can get especially interesting when you do things like have your GitHub runners onboard themselves to Tailscale - at that point you can pretty much fully-provision isolated systems directly from GitHub Actions if you want
We use it for to allow us to connect in from the outside (and user to user access etc), but not for service to service connections.
Performance between fly.io web servers in iad region to RDS databases in us-east-1 via subnet routers has been spotty to say the least.
They provided much-needed solutions to annoying problems and did it in a way that made developers love them.
Really smart and well executed.
Similarly I’m going to host my small business’ staging database on a home server and expose that on my tail net.
setheron•1d ago