Tailscale Services
Posted2 months agoActive2 months ago
tailscale.comTechstory
excitedpositive
Debate
20/100
TailscaleNetworkingSecurityVPN
Key topics
Tailscale
Networking
Security
VPN
Video walkthrough: https://www.youtube.com/watch?v=mELAg50ljSA
Tailscale has announced a new 'Services' feature, allowing users to expose services on their tailnet, sparking excitement and discussion among users about its potential use cases and limitations.
Snapshot generated from the HN discussion
Discussion Activity
Active discussionFirst comment
6h
Peak period
12
30-36h
Avg / period
3.7
Comment distribution37 data points
Loading chart...
Based on 37 loaded comments
Key moments
- 01Story posted
Oct 28, 2025 at 8:19 AM EDT
2 months ago
Step 01 - 02First comment
Oct 28, 2025 at 2:47 PM EDT
6h after posting
Step 02 - 03Peak activity
12 comments in 30-36h
Hottest window of the conversation
Step 03 - 04Latest activity
Oct 31, 2025 at 12:34 AM EDT
2 months ago
Step 04
Generating AI Summary...
Analyzing up to 500 comments to identify key contributors and discussion patterns
ID: 45731848Type: storyLast synced: 11/20/2025, 2:24:16 PM
Want the full context?
Jump to the original sources
Read the primary article or dive into the live Hacker News thread when you're ready.
https://tailscale.com/blog/how-tailscale-works
Ah! OK, now I get it! :-)
But, what found particularly interesting on that page was the following:
>" Some especially cruel networks block UDP entirely
, or are otherwise so strict that they simply cannot be traversed using STUN and ICE. For those situations, Tailscale provides a network of so-called DERP (Designated Encrypted Relay for Packets) servers. These fill the same role as TURN servers in the ICE standard, except they use HTTPS streams and WireGuard keys instead of the obsolete TURN recommendations."
DERP seems like one interesting solution (there may be others!) to UDP blockages...
Would encourage anyone to go look at the wireguard source code, it's amazingly concise and easy to read.
But they do seem to contribute and open source a lot to the community which I am grateful for.
You can't VPN out of the guest WiFi at my work (using personal device), but Tailscale, if connected while I'm at my house or via phone hotspot, will happily let me use my home devices as exit nodes. So I just leave it on all the time and only disconnect if there are issues (rare). I can use sketchy WiFi without really worrying about snooping, and for services that require me to use a US IP address... well, my house is definitely in the US and it's not going anywhere.
It tended to happen a lot more when switching between wifi / cellular when leaving and entering buildings, etc.
Now I just don’t use it
Short lived tokens is not always an option
It can get especially interesting when you do things like have your GitHub runners onboard themselves to Tailscale - at that point you can pretty much fully-provision isolated systems directly from GitHub Actions if you want
We use it for to allow us to connect in from the outside (and user to user access etc), but not for service to service connections.
Performance between fly.io web servers in iad region to RDS databases in us-east-1 via subnet routers has been spotty to say the least.
They provided much-needed solutions to annoying problems and did it in a way that made developers love them.
Really smart and well executed.
Similarly I’m going to host my small business’ staging database on a home server and expose that on my tail net.