Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

They need to know how/where to route your outbound traffic. That inherently includes plaintext DNS, TLS handshakes, and otherwise plaintext traffic (like HTTP for example).

Anybody wanting to see what Tailscale is able to see can simply sniff any router interface passing outbound traffic before it enters the WireGuard tunnel interface.



No, that’s not quite true. The wireguard tunnels that the Tailscale daemon creates only go to your own machines. Nothing going through those tunnels goes to or is seen by Tailscale the company. Sometimes those tunnels go through a proxy (especially when you’re afflicted by CGNAT), but the proxy sees only encrypted traffic.


So how does the proxy know where to proxy packets to?


The tailscale client on one of your computers tells it the address of your other computer.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: