mittermayr 30 minutes ago

I can only recommend giving headscale a try. It's free, works extremely well, and can be used with the official Tailscale clients. Was super easy to set up.

https://headscale.net/stable/

regisso 4 minutes ago

I recommend it the NetBird team is transparent and easy to reach. I switched from Tailscale a while ago (2y), went fully self-hosted, and upgrades across versions have been smooth, which tells me they care about the self-hosted, not just their cloud offering.

junon 7 minutes ago

We just evaluated this the other day and we were pretty impressed by it. We were looking for something we could self host for wireguard config but tbh we might just pay for the managed solution.

edentrey an hour ago

Tailscale is the only non-self-hosted part of my setup now and this has bugged me since. I use a custom Nameserver rule to point all my subdomains to a Caddy container sitting on my Tailnet. Caddy handles the SSL and routes everything to the right containers. I skipped Tailscale Funnel on purpose; since these are just family services, I’d rather keep them locked behind the VPN than open them up to the web. This project looks promising as a replacement for my current setup and for its digital sovereignity of self hosting the server. I'm looking to manage several embedded devices remotely via Tailscale, but I've hit a major roadblock: the 90-day maximum expiration for Auth Keys. Constantly renewing these tokens is a significant maintenance burden, so I'm searching for a more permanent, 'set-and-forget' solution for my remote hardware.

  • tass an hour ago

    Tailscale allows you to disable the expiration time - I do this for my gateways.

    My other simplifier is having everything at home get a .home dns name, and telling Tailscale to route all these via tailnet.

    • edentrey an hour ago

      can you please tell me how to disable expiration time? I see auth keys have an Expiration which says it "Must be between 1 and 90 days." I do use a custom domain name as well with a Nameservers rule to have all my services reachable as subdomains of my custom domain.

      • matthewmacleod 44 minutes ago

        There is some confusion here because while you can disable node key expiration, you can’t disable auth key expiration. But that’s less of a problem than it seems - auth keys are only useful for adding new nodes, so long expiry times are probably not necessary outside of some specific use-cases.

        Edit: in fact from your original post it sounds like you’re trying to avoid re-issuing auth keys to embedded devices. You don’t need to do this; auth keys should ideally be single-use and are only required to add the node to the network. Once the device is registered, it does not need them any more - there is a per-device key. You can then choose to disable key expiration for that device.

  • tecleandor an hour ago

    You can manually disable key expiration for hosts in Tailscale, and I think you can do it with tags too...

    https://tailscale.com/kb/1028/key-expiry#disabling-key-expir...

    • katdork an hour ago

      The word "auth keys" meant nothing to you, I guess: https://tailscale.com/kb/1085/auth-keys

      • matthewmacleod an hour ago

        What would be your use-case for auth keys with long expiry times? Auth keys are only required for registering new nodes.

        • stingraycharles 16 minutes ago

          When managing your infrastructure as code, it’s quite common to deploy new instances for upgrades etc. Having these keys expire after 3 months is a big pain. Eg doing a routine update by rebuilding an AMI.

          I don’t understand how they can have such a strategy, and then not having any decent way to programmatically allocate new keys.

  • inapis 35 minutes ago

    Use tag-based node authentication. Login as a user and then switch the device to use a tag. I just recently did that and retained the usual 6 months expiry. I can also disable key expiry completely.

  • atmosx an hour ago

    Headscale is a self hosted drop-in control plane replacement that has been pretty stable for us.

speedgoose 38 minutes ago

I replaced Teleport by a bunch of various tools, and I had to chose between tailscale/headscale and netbird for the network connectivity. I’m pleased with netbird so far.

I had some weird bugs on a few old servers during the transition, and the support was helpful even though I am a small customer. We eventually switched to user space wireguard on those servers.

no_time an hour ago

F-droid inclusion seems to be stalled https://gitlab.com/fdroid/rfp/-/issues/2688

Having it in F-droid, vetted by their policies is kind of my benchmark for "software that is guaranteed to be not crapware."

That being said I'm rooting for the devs, having an alternative for tailscale+headscale would be nice, because as it stands it's kind of dependant on the goodwill of a for profit company (finite).

usagisushi 26 minutes ago

Netbird's flexibility with IdPs is really nice. I recently switched mine to Pocket ID. Overall, it's perfectly sufficient and lightweight for homelab use.

shtrophic 17 minutes ago

Last time I checked it couldn't do ipv6... in 2026?

  • niemandhier 15 minutes ago

    Could be intentional: German privacy advocates really like that the limited ipv4 pool forces reusing IPs and prevents accidental imprinting a practically static address on a device.

    • fc417fc802 7 minutes ago

      Can't do IPv6 internally or externally? Internally there should be zero need for ~infinite addresses. Externally though I certainly hope all software is capable of operating via IPv6 at this point because otherwise it will only be increasingly broken.

    • sunshine-o 9 minutes ago

      Makes a lot of sense.

      But self-hosting still require at least a public domain name [0], so here goes your privacy right?

      - [0] https://docs.netbird.io/selfhosted/selfhosted-quickstart#inf...

      • fc417fc802 5 minutes ago

        > The VM must be publicly accessible on TCP ports 80 and 443, and UDP port 3478.

        > A public domain name that resolves to the VM’s public IP address.

        Since it already uses DNS it's disappointing that it hardcodes ports instead of using SRV records. IMO anything that can use SRV records should. It makes for a more robust internet.

RedShift1 an hour ago

I'm really missing something like Cisco DMVPN. A VPN mesh between different routers where all routers have a connection to each other, so that all traffic doesn't have to pass through the hub. And that runs on a router, because all these solutions only run on a regular computer with a complete OS.

hollow-moe an hour ago

I'm currently comparing it with pangolin and headscale for my small scale company infrastructure access. Been running headscale for my own setup for a while but maybe netbird or pangolin might be better for real production.

  • edentrey an hour ago

    I am in the same position but currently using Tailscale and realize how important and critical it has become for my whole family infrastructure. A self-hosted solution which allowed me to use Nameservers and TLS termination as I currently do would be awesome.

lwde 2 hours ago

But it's missing a tailscale funnel like feature, right? That's one of the main features that I use for some home assistant instances.

  • gnyman 15 minutes ago

    Please be aware that when you use tailscale funnel you announce to the whole world that your service exists (through certificate transparency), and you will get scanned immediately. If you don't believe me just put up a simple http server and watch the scanning request come in within seconds of running `tailscale funnel`.

    Do not expose anything without authentication.

    And absolutely do not expose a folder with something like `python -m http.server -b 0.0.0.0 8080` if you have .git in it, someone will help themselves to it immediately.

    If you are aware of this, funnel works fine and is not insecure.

    Tailscale IMHO failing in educating people about this danger. They do mention in on the docs, but I think it should be a big red warning when you start it, because people clearly does not realise this.

    I took a quick look a while ago and watching just part of the CT firehose, I found 35 .git folders in 30 minutes.

    No idea if there was anything sensitive I just did a HEAD check against `.git/index` if I recall.

    https://infosec.exchange/@gnyman/115571998182819369

  • m_santos 21 minutes ago

    We are developing a similar feature and is scheduled to be available really soon. We've discussed some details in our public slack. Any feedback there will be helpful.

  • ethangk 2 hours ago

    Out of curiosity, why? I use TS for all my homelab bits (including my HA instance), but connect to TS before opening the HA app. Is it just a case of making it easier/ possible to connect if you’re on another VPN? Are you not concerned with having something from your local network open to the internet?

    • m_santos 6 minutes ago

      Besides the use cases listed, we see this as an opportunity for homelabers and organizations to add authentication with access control to already exposed services.

    • Galanwe 2 hours ago

      I use funnels for things like Vaultwarden, that are secure enough to be exposed on internet, and would be cumbersome if behind the tailnet.

      I use serve for everything else, just for the clean SSL termination for things that should stay within the telnet, like *arr stacks, immich, etc.

      • ethangk 2 hours ago

        Ah neat, that makes sense. Thanks.

        Do you have anything that’ll trigger a notification if there’s suspicious traffic on your local network? I may be overly paranoid about exposing things on my local network to the internet.

        • Galanwe an hour ago

          Not really, but these stuff are in an isolated DMZ vlan, so theres not much to escalate to.

          I fancy a bit upgrading to a smarter router like unify's with integrated firewall and stuff like like though.

      • edentrey an hour ago

        After a decade with KeePass, I’ve finally moved to Vaultwarden. I’ll admit, self-hosting such a critical service still feels a bit scary, but the seamless syncing across all my devices is a huge upgrade. To balance the risk, I keep it tucked safely behind Tailscale for that extra peace of mind.

  • Galanwe 2 hours ago

    Agree, I use funnels and serves a lot as well. Very useful for homelabers.

FloatArtifact 2 hours ago

If the VPN connection would stay connected despite having it set up that way in the web UI.. It would be a good product.

Still haven't figured out how to do Termux on Android with netbird ssh yet.

  • edentrey an hour ago

    can you please elaborate on this? I use termux on android with tailscale and it works flawless, is it not possible on Netbird?

Benedicht 2 hours ago

Using it self hosted for almost a year now, no issues, just works for me.

sunshine-o 15 minutes ago

For someone who want to setup a private network between host/devices, I feel the dilemma is always:

1. Trust a third party like Tailscale by giving them the key to your kingdom, but everything is incredibly easy and secure.

2. Self-host but need at least one host with a fixed IP address and an open port on the Internet. What requires a set of security skills and constant monitoring. That includes headscale, selhosted netbird, zerotier or a private yggdrasil mesh.

  • abcd_f 4 minutes ago

    You can conceal that open port with some form of port knocking. Though this does reinforce your "easy" point.

    Also, if it's an UDP port, then using a protocol that expects first client packet to be pre-authenticated and not emitting any response otherwise gets you pretty damn close to having this port closed.

vlovich123 an hour ago

How does this compare with Defguard? Also European but seems more featureful maybe?

  • braginini an hour ago

    Defguard as of my knowledge is a traditional VPN with a central gateway. NetBird is an overlay network with a full mesh capabilities. Though you can set it up in a gateway-like style with NetBird Networks but without opening ports and with HA out of the box: https://docs.netbird.io/manage/networks

oaiey 2 hours ago

Sweet. Alternatives are always something good.

BoredPositron an hour ago

Missing some technical bits to be a true contender for me but I bet they are getting there. That said I've seen so many shadcn based scam sites that my brain starts associating shadcn with scams.

  • braginini an hour ago

    For example? Curious what is missing

    • BoredPositron 38 minutes ago

      It funnels and lets encrypt certs for me and I am really not a fan of the android client.

      • braginini 32 minutes ago

        Got you. We are on it. One feature that is coming very soon is a reverse proxy .Similar to cloudflare tunnels. With auth, TLs, etc. Would it suffice?

      • m_santos 24 minutes ago

        Would love to learn more around your android experience

thenaturalist 2 hours ago

Besides the solid product, Misha & Maycon are just great and friendly people to work with.

estsauver 2 hours ago

There's also https://pangolin.net/ which is kind of similar, and I believe a YC company.

  • braginini an hour ago

    Not quite similar tho. Pangolin is a reverse proxy, NetBird is p2p mesh for internal resources remote access

  • OtomotO 2 hours ago

    Does that have ties to the US? If so it's not playing in the same ballpark.

    US citizens may not be aware, but due to POTUS "made and maintained in Europe" is becoming more and more important to EU.

    • edentrey an hour ago

      I see Pangolin has a Self-Host Community Edition, doesn't that already give something over digital sovereignity for EU users? I am considering both for a migration from Tailscale, any suggestion on their differences?