3.2 KiB
VPN
We run a Tailscale compatible VPN service on vpn.qo.is.
User and Client Management
To register a new client on the vpn.qo.is
host:, generate a pre-auth key and insert it in the client:
headscale users create marlene.mayer
headscale preauthkeys create --user marlene.mayer
⚠️ For now, the username must be added to
qois.vpn-server.wheelUsers
. In the future, the VPN ACL might get more granular to allow for non-wheel users.
Alternatively to using a pre-auth key, the register command shown when configuring the VPN client may be used.
ACL
At this time, there are a few ACL rules to isolate a users host but do not expect them to be expected to be enforced - expect your client to be accessible by the whole network.
Exit Nodes
These nodes allow access to the internet for clients connected to the VPN:
100.64.0.5
: lindberg (riedbach-net)100.64.0.6
: cyprianspitz (plessur-net)
⚠️ Currently, name resolution for these do not work reliably on first starts, hence the IP must be used. This hould be fixed in the future.
Add exit nodes:
- Create a preauth secret on the
vpn.qo.is
host:headscale preauthkeys create --user srv --reusable
- Configure the new exit-node host with the
qois.vpn-exit-node
module.
When using the srv
user, exit nodes and routes are automatically accepted as trusted.
Clients
To use the service, you can use a normal Tailscale client with following additional configuration:
Option | Recommended value | Description |
---|---|---|
accept-routes |
enabled (flag) | Accept direct routes to internal services |
exit-node |
100.64.0.5 (lindberg) or 100.64.0.6 (cypriaspitz) |
Use host as exit node |
login-server |
https://vpn.qo.is |
Use our own VPN service. |
⚠️ Currently, if the client is in an IPv6 network, the transport is broken. Disable IPv6 connectivity to use the VPN. See #4 for details.
NixOS
Sample config with automatic connectivity to VPN on boot:
{ config, pkgs, ... }: {
services.tailscale = {
enable = true;
openFirewall = true;
useRoutingFeatures = "client";
authKeyFile = "/secrets/wireguard/tailscale-key"; # This is the pre-auth secret. Make sure it's only accessible by root.
extraUpFlags = [
"--operator"
"yourUserNameChangePlease"
"--accept-routes"
"--exit-node=100.64.0.5"
"--login-server=https://vpn.qo.is"
];
};
}
Android
See this Headscale documentation for more on how to configure the mobile app.
⚠️ Note that on restarts, sometimes you have to reopen/save the config dialog. If the Tailscale login site is shown, just close the browser with the ❌.
Backup and Restore
Server
systemctl stop headscale
- Replace
/var/lib/headscale
systemctl start headscale
- Monitor logs for errors
Note: /var/lib/headscale
contains a sqlite database.
Clients
systemctl stop tailscaled
- Replace
/var/lib/tailscale
systemctl start tailscaled
- Monitor logs for errors