[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1117209: ITP: headscale -- An open source, self-hosted implementation of the Tailscale control server



Package: wnpp
Severity: wishlist
Owner: Richard Hansen <rhansen@rhansen.org>

* Package name    : headscale
  Version         : 0.26.0-1
  Upstream Author : Juan Font
* URL             : https://github.com/juanfont/headscale
* License         : BSD-3-clause
  Programming Lang: Go
  Description     : An open source, self-hosted implementation of the Tailscale control server

 Headscale aims to implement a self-hosted, open source alternative to
 the Tailscale (https://tailscale.com/) control server. Headscale's goal
 is to provide self-hosters and hobbyists with an open-source server
 they can use for their projects and labs. It implements a narrow scope,
 a *single* Tailscale network (tailnet), suitable for a personal use, or
 a small open-source organisation.
 .
 About Tailscale:
 .
 Tailscale is a modern VPN (https://tailscale.com/) built on top of
 Wireguard (https://www.wireguard.com/). It works like an overlay
 network (https://tailscale.com/blog/how-tailscale-works/) between the
 computers of your networks - using NAT traversal
 (https://tailscale.com/blog/how-nat-traversal-works/).
 .
 Everything in Tailscale is Open Source, except the GUI clients for
 proprietary OS (Windows and macOS/iOS), and the control server.
 .
 The control server works as an exchange point of Wireguard public keys
 for the nodes in the Tailscale network. It assigns the IP addresses of
 the clients, creates the boundaries between each user, enables sharing
 machines between users, and exposes the advertised routes of your nodes.
 .
 A Tailscale network (tailnet) (https://tailscale.com/kb/1136/tailnet/)
 is private network which Tailscale assigns to a user in terms of private
 users or an organisation.


Reply to: