From dfc84c84d0ef880e6e7190c4b444394a197bf1c5 Mon Sep 17 00:00:00 2001 From: journoSEC Date: Sat, 18 Feb 2023 17:36:59 +0000 Subject: [PATCH] Create Tailscale how-to --- docs/customization/tailscale.md | 42 +++++++++++++++++++++++++++++++++ 1 file changed, 42 insertions(+) create mode 100644 docs/customization/tailscale.md diff --git a/docs/customization/tailscale.md b/docs/customization/tailscale.md new file mode 100644 index 0000000..f63bd8c --- /dev/null +++ b/docs/customization/tailscale.md @@ -0,0 +1,42 @@ +How to Enable Tailscale in AppVM +================================== +Note: If you seek to enhance your privacy, you may also wish to consider a VPN proxy Qube. + +Tailscale is a mesh private network that lets you easily manage access to private resources, quickly SSH into devices on your network, and work securely from anywhere in the world. If you have devices in your private home network or at work at which you cannot use a VPN, Tailscale is a simple alternative with minimal setup. + +### Template VM + +In a `t-tailscale` template VM, install tailscale with the simple sh script, then stop the service: + +``` +-curl -fsSL https://tailscale.com/install.sh | sh +systemctl stop tailscaled +``` + +### AppVM + +In your `tailscale` AppVM, use your favorite editor to sudo edit '/rw/config/rc.local', adding the following lines at the bottom of the file: + +``` +sudo systemctl start tailscaled +sudo tailscale up +``` + +Now make sure folder /rw/config/qubes-bind-dirs.d exists. + +``` +sudo mkdir -p /rw/config/qubes-bind-dirs.d +``` + +Create a file /rw/config/qubes-bind-dirs.d/50_user.conf with root rights. Edit the file 50_user.conf to append a folder or file name to the binds variable. + +``` +binds+=( '/var/lib/tailscale' ) +``` +Save. + +Reboot the app qube. + +Done. + +From now on any files within the /var/lib/tailscale folder will persist across reboots. Shutdown and reboot the VM. Enter a console and run `sudo tailscale up` again to get the Tailscale tunnel link to your VM.