Tailscale is pretty useful
Performance and protocol behavior
- Several users see noticeable throughput loss on local networks, especially with Samba/SMB over Tailscale (e.g., ~10–15% drop on 1 Gbit LAN).
- Suspected causes include user‑space WireGuard on Windows, MTU/fragmentation issues, extra encapsulation overhead, and occasional DERP relay usage instead of direct paths.
- Others report WireGuard can easily saturate 1–10 Gbit with decent CPUs, arguing such large drops point to misconfiguration (MTU, routing, or Samba tuning) rather than inherent limits.
- Tailscale adds ~1 ms latency on LAN for some, which can matter for chatty protocols.
Alternatives and self‑hosting
- Many compare Tailscale to raw WireGuard, OpenVPN, and mesh systems like Netbird, ZeroTier, Nebula, Tinc, Hamachi, OpenZiti, and Headscale.
- Headscale is highlighted as a self‑hosted replacement for Tailscale’s control plane, trading simplicity for managing availability and updates yourself.
- Netbird, Nebula, and OpenZiti are noted for NAT traversal and more “zero trust” or app‑embedded models; ZeroTier for L2‑style networking and working where WireGuard is blocked.
- Some feel mesh VPNs “just for NAT traversal” add too much complexity compared to a simple WireGuard server when CGNAT isn’t an issue.
Security, trust, and architecture
- Big thread on whether to trust a managed control plane: concerns about compromise, metadata exposure, and non‑FOSS clients (for some alternatives).
- Tailnet Lock and E2E WireGuard encryption are cited as mitigations; clients keep private keys, coordination servers only see public keys and metadata.
- Some advocate an extreme “never trust providers” stance, layering client certs or app‑level auth on top of Tailscale, or preferring fully self‑hosted stacks.
- Others argue Tailscale is safer in practice than home‑rolled VPNs many users would misconfigure.
Use cases and benefits
- Common personal uses: accessing NAS, home servers, Jellyfin/Plex, SSH, Home Assistant, NVRs, and Pi‑hole from anywhere; LAN‑like gaming; remote family tech support.
- Exit nodes frequently solve geoblocking, censorship, and hostile public Wi‑Fi / MITM (airports, cruises, hotels, work guest networks).
- Enterprise uses: internal app access with ACLs, SSO/OIDC, device tags, Kubernetes operator, posture checks, and tsnet‑based internal apps.
- Features like Magic DNS, automatic NAT traversal, multi‑OS clients (including TVs/routers),
tailscale serve/funnel, and built‑in TLS cert issuance are repeatedly praised.
Limitations and rough edges
- Reports of high battery use and instability on some Android/iOS setups, and memory issues on very small routers or older Pis (mitigated by “small binary” builds).
- Missing features or pain points: lack of mDNS across the tailnet, no DNS entries for tags (group service discovery), tricky interactions with iptables/Docker and MTU, and being blocked on some restrictive networks.
- Some see Tailscale as overkill for a single‑site home setup where simple WireGuard + port forwarding suffices, especially when CGNAT isn’t present.
CGNAT, ISPs, and philosophy
- CGNAT is viewed as the main driver making Tailscale‑style solutions necessary, and as part of broader ISP “enshittification” (locked‑down routers, forced equipment, DNS hijacking).
- There’s debate over whether such tools prolong IPv4’s life and slow IPv6 adoption versus being pragmatic workarounds in a hostile networking environment.