qusal/salt/sys-tailscale
Ben Grande e98a6dbc83
fix: undo provides network as firewall is not done
Committed by mistake on 972ca1f8dcf4c058d2811f16585547adf3d5a611
2025-01-09 17:55:03 +01:00
..
2024-07-05 16:35:32 +02:00
2024-07-05 16:35:32 +02:00
2024-07-05 16:35:32 +02:00
2024-07-05 16:35:32 +02:00
2024-07-05 16:35:32 +02:00
2024-07-05 16:35:32 +02:00
2024-07-05 16:35:32 +02:00
2024-07-05 16:35:32 +02:00
2025-01-08 16:12:31 +01:00
2024-07-05 16:35:32 +02:00

sys-tailscale

Tailscale environment in Qubes OS.

Table of Contents

Description

Install Tailscale and use it on the "sys-tailscale" or with any other qube you want to install. The "sys-tailscale" qube can provide network for other qubes, but its clients can only access devices in the tailnet via IP and not via DNS.

Installation

  • Top:
sudo qubesctl top.enable sys-tailscale
sudo qubesctl --targets=tpl-sys-tailscale state.apply
sudo qubesctl top.disable sys-tailscale
  • State:
sudo qubesctl state.apply sys-tailscale.create
sudo qubesctl --skip-dom0 --targets=tpl-sys-tailscale state.apply sys-tailscale.install

The Tailscale qube requires the Tailscale service to be enabled:

qvm-features QUBE service.tailscale 1

Usage

Authenticate to your Tailnet by following the upstream instructions to generate an auth key for use in automated setups. For interactive setups, get the authorization link from the following command:

sudo tailscale up

On the Tailscale web interface, authorize the new device.

You may want to disable automatic key expiry to avoid having to redo the authentication steps.

There are various functionalities Tailscale provides, consult upstream documentation for more information. There is also an introductory video covering the basics.