this post was submitted on 09 Jun 2025
740 points (98.6% liked)

Selfhosted

48262 readers
514 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

Corporate VPN startup Tailscale secures $230 million CAD Series C on back of “surprising” growth

Pennarun confirmed the company had been approached by potential acquirers, but told BetaKit that the company intends to grow as a private company and work towards an initial public offering (IPO).

“Tailscale intends to remain independent and we are on a likely IPO track, although any IPO is several years out,” Pennarun said. “Meanwhile, we have an extremely efficient business model, rapid revenue acceleration, and a long runway that allows us to become profitable when needed, which means we can weather all kinds of economic storms.”

Keep that in mind as you ponder whether and when to switch to self-hosting Headscale.

top 50 comments
sorted by: hot top controversial new old
[–] [email protected] 78 points 1 week ago (3 children)

I'm unsure if it has been mentioned, but a similar tool which is open source (you can run the backend unlike tailscale), netbird

https://netbird.io/

[–] [email protected] 13 points 6 days ago (1 children)

Headscale is the tailscale backend server

[–] [email protected] 12 points 6 days ago

Well not "the" backend server but "a" different backend server. As far as I know Headscale is a separate implementation from what Tailscale run themselves.

[–] [email protected] 4 points 6 days ago (2 children)

We've implemented netbird at my company, we're pretty happy with it overall.

The main drawback is that it has no way of handling multiple different accounts on the same machine, and they don't seem to have any plans for ever really solving that. As long as you can live with that, it's a good solution.

Support is a mixed bag. Mostly just a slack server, kind of lacking in what I'd call enterprise level support. But development seems to be moving at a rapid pace, and they're definitely in that "Small but eager" stage where everything happens quickly. I've reported bugs and had them fixed the same day.

Everything is open source. Backend, clients, the whole bag. So if they ever try to enshittify, you can just take your ball and leave.

Also, the security tools are really cool. Instead of writing out firewall rules by hand like Tailscale, they have a really nice, really simple GUI for setting up all your ACLs. I found it very intuitive.

load more comments (2 replies)
[–] [email protected] 2 points 5 days ago (1 children)

Is there an issue with Netbird's servers at the moment? In my testing devices are connected and reach eachother, but the web admin is missing a lot of functionality compared to what's in the docs. The peer devices section is there, but everything else, user settings, rules etc, isn't showing/says I don't have admin permission (of my own account.. Lol?)

[–] [email protected] 2 points 5 days ago

Honestly, no idea, worth checking their GitHub etc or their status pages if they have any

[–] [email protected] 54 points 6 days ago* (last edited 6 days ago) (4 children)

Join our Discord server for a chat and community support.

Sigh...

And even worse:

Everything in Tailscale is Open Source, except the GUI clients for proprietary OS (Windows and macOS/iOS), and the control server.

[–] [email protected] 50 points 6 days ago

everything is open source except half of all things.

Lol

[–] [email protected] 14 points 6 days ago (4 children)

To be fair, anything the GUI clients do can be done with the CLI which is still open source and on all desktop platforms and headscale is literally their open source control server.

load more comments (4 replies)
load more comments (2 replies)
[–] [email protected] 24 points 6 days ago

Nerds stop recommending corporate crap: challenge: impossible

[–] [email protected] 36 points 6 days ago (1 children)

I think I'll just keep using tailscale until they start enshittifying, and then set up a Headscale instance on a VPS - no need to take this step ahead of time, right?

I mean, all the people saying they can avoid any issues by doing the above - what's to stop Tailscale dropping support for Headscale in future if they're serious about enshitification? Their Linux & Android clients are open source, but not IOS or Windows so they could easily block access for them.

My point being - I'll worry when there is something substantial to worry about, til then they can know I'm using like 3 devices and a github account to authenticate. MagicDNS and the reliability of the clients is just too good for me to switch over mild funding concerns.

[–] [email protected] 13 points 6 days ago

Yeah, as I said, it's a friendly reminder. I'm personally probably doing it this year. It's entirely possible that enshittification could come even years from now. It all depends on how their enterprise adoption goes I think. The more money they make there, the longer the individual users are gonna be left unsqueezed.

[–] [email protected] 29 points 6 days ago (5 children)

I just replaced my entire setup with base wireguard as a challenge, easier than I expected it to be, and not hard to mimic tailscale.

[–] [email protected] 6 points 6 days ago (1 children)

If you just have to talk from many devices to the one server sure, but Tailscale sure makes it easy for many to many. Also if a direct connection is impossible (e.g. firewall of china, CGNAT etc) tailscale puts a relay server in the middle for you.

load more comments (1 replies)
load more comments (4 replies)
[–] [email protected] 11 points 5 days ago

become profitable when needed

By what, laying off all QA and support staff and half your developers the moment a single quarterly earnings report isn't spotlessly gilded?

[–] [email protected] 18 points 6 days ago (10 children)

Crap, I really need to switch of Tailscale but currently it is an easy way for me to access my stuff outside of home as a temporary solution while I am on a 5G modem.

[–] [email protected] 7 points 6 days ago (2 children)

I can recommend to take a look at netbird.io

[–] [email protected] 8 points 6 days ago (1 children)

I can't. I tried it first and installed it on my phone from f-droid. After opening it up, it connected to an already existing network with other people's old machines from years ago on it. I was horrified.

So then I tried to delete my whole account and couldn't due to an error. I sent them an email about it and they took like two weeks to respond.

[–] [email protected] 3 points 5 days ago* (last edited 5 days ago) (3 children)

Netbird isn't on F-droid

Are we talking about the same thing?

load more comments (3 replies)
[–] [email protected] 3 points 5 days ago (1 children)

Much more user friendly

Json is awful for config

load more comments (1 replies)
load more comments (9 replies)
[–] [email protected] 25 points 6 days ago* (last edited 6 days ago) (3 children)

Friendly reminder that Tailscale is VC-funded and driving towards IPO

You know what's to come.

The answer to the question is immediately. Or switch to OpenZiti or Pangolin even.

load more comments (3 replies)
[–] [email protected] 10 points 6 days ago (1 children)

And here I am, still using OpenVPN in 2025 lol

[–] [email protected] 4 points 6 days ago (3 children)

Used to run OpenVPN. Tried Wireguard and the performance was much better, although lacking some of the features some might need/want fit credential-based logins etc

[–] [email protected] 3 points 5 days ago (1 children)

I can highly recommend Netbird selfhosted, it has SSO support, logins, complex network topologies, it uses wireguard under the hood and it's open source.

[–] [email protected] 2 points 5 days ago (1 children)

That sounds kinda cool. I'll have to check it out. It's kinda hard sometimes to push FOSS stuff in a largercorporate environment but this looks like something I could recommend/build for small-mid private SOHO clients.

[–] [email protected] 1 points 1 day ago

This is what I used in a small/mid sized company to replace a legacy VPN, generally we had only very few issues but probably the employee personal computer is to blame, right now is very stable.

load more comments (2 replies)
[–] [email protected] 14 points 6 days ago* (last edited 6 days ago) (1 children)

I'm not that worried as there are alternatives like Netbird. The underlying tech really isn't hard to replicate since Wireguard is pretty standard.

I think it would be cool if Tailscale made it into the enterprise arena.

load more comments (1 replies)
[–] [email protected] 16 points 6 days ago* (last edited 6 days ago) (2 children)

Am I totally off-base in thinking that MagicDNS and pluggable DNS nameserver overrides are a huge feature of tailscale?

I love that I can refer to my tailnet devices just via their machine name. I use it everywhere. And also that I can just slot in my NextDNS ID so that any device running tailscale now automatically uses that, and I don’t have to mess with my shared router settings or per device settings. Is all that actually really easy to set up outside of tailscale? Cuz if it is and I just somehow missed that when doing all my research, I’ll happily give plain wireguard or other mesh orchestrators like NetBird a go.

And I already know that mDNS is not the answer. That protocol is simply not reliable enough.

[–] [email protected] 9 points 6 days ago (1 children)

I use wireguard and have public DNS refer to private IPs.

For example if my server is accessible at 10.0.0.1 via wireguard then I point *.myserver.mydomain.com to that IP.

Sorry if I've misunderstood your question.

load more comments (1 replies)
load more comments (1 replies)
[–] [email protected] 12 points 6 days ago (1 children)

I think a lot of companies view their free plan as recruiting/advertising


if you use TailScale personally and have a great experience then you'll bring in business by advocating for it at work.

Of course it could go either way, and I don't rely on TailScale (it's my "backup" VPN to my home network)... we'll see, I guess.

load more comments (1 replies)
[–] [email protected] 5 points 5 days ago (4 children)

I never really understood the point of using Tailscale over plain ol' WireGuard. I mean I guess if youve got a dozen+ nodes but I feel like most laymens topologies won't be complex beyond a regular old wireguard config

[–] [email protected] 10 points 5 days ago* (last edited 5 days ago)

Wireguard doesn't do NAT/Firewall traversal nor does it have SSO

Tailscale manages the underlying Wireguard for you. I would be great if Wireguard had native NAT traversal but that isn't the case.

[–] [email protected] 6 points 5 days ago

NAT punching and proxying when a p2p connection between any 2 nodes cannot be achieved. It’s a world of difference with mobile devices when they always see each other, all the time. However, headscale does all that.

[–] [email protected] 7 points 5 days ago (1 children)
load more comments (1 replies)
[–] [email protected] 4 points 5 days ago

Same thing here, either tailscale selfhosted or Netbird selfhosted I'd the way to go for all the nice features, having the free tier or tailscale for personal data never sounded right to me.

[–] [email protected] 1 points 4 days ago

Good thing I deleted it from my homeserver a month ago.

[–] [email protected] 6 points 6 days ago* (last edited 6 days ago)

So glad my router supports WireGuard/OVPN server hosting, doing it this way also relieves resources off your homelab and for whatever reason your homelab shuts off or loses network access you can at least rely on your router to re-establish the VPN server without further intervention.

load more comments
view more: next ›