mirror of
https://github.com/tailscale/tailscale.git
synced 2025-05-19 16:58:31 +00:00
Updated Tailscale 1.6 (markdown)
parent
f62a011cf7
commit
6ba1a00873
@ -2,13 +2,12 @@
|
||||
|
||||
## Headline Features
|
||||
|
||||
* Default routes
|
||||
* IPv6
|
||||
* Portmapping (NAT-PMP only for now, not PCP or UPnP, but covers many popular devices: Google Wifi, etc. TODO: make a longer list)
|
||||
- Users behind pfSense/OPNsense will want to enable NAT-PMP in "Services")
|
||||
* SOCKS5 server
|
||||
* Userspace networking with `--tun=userspace-networking`, without requiring root.
|
||||
* Local API (currently just the `whois` handler)
|
||||
* **Exit nodes**: route all your non-Tailscale internet traffic through another Tailscale node in your network; see https://tailscale.com/kb/1103/exit-nodes
|
||||
* **Tunneled IPv6**: Tailscale has been able to use IPv6 as a transport for the WireGuard traffic for some time, but now we also support IPv6 inside the tunnel. All nodes will have an IPv6 Tailscale address in addition to the normal 100.x.y.z Tailscale IPv4 (CGNAT) address.
|
||||
* **Port mapping**: if your router supports NAT-PMP, Tailscale will now use it to make peer-to-peer connections. Many routers support this by default (such as Google Wifi). Others may require it be enabled (e.g. in pfSense/OPNsense or Unifi/Ubiquiti "Services"). For some routers it may be lumped together with a "UPnP" checkbox. For pfSense/OPNsense users in particular, enabling NAT-PMP is highly recommended to be able to get direct connections between Tailscale nodes.
|
||||
* **Userspace networking** is now possible with `tailscaled` using `--tun=userspace-networking`, which doesn't require root.
|
||||
* **SOCKS5 server**: the `tailscaled` binary now includes a SOCKS5 server. In particular, this allows a `tailscaled` using userspace networking to make outbound connections to other nodes in your Tailscale network, without your operating system's help.
|
||||
* **Local API**: `tailscaled` has the start of a node-local API. Currently the only interesting call is the `whois` method, to look up the Tailscale owner of a `ip:port` that's hitting a local service. (which also works for incoming userspace-networking localhost-forwarded connections)
|
||||
|
||||
## Bug fixes, improvements
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user