Tailscale state file encryption no longer enabled by default
Change in behavior
- Node state file encryption and hardware attestation keys are no longer enabled by default in recent Tailscale versions.
- Behavior reverts to pre‑1.90.2: on Windows/Linux you must explicitly enable
--encrypt-state; macOS GUI clients still use Keychain, and mobile platforms aren’t affected. - Automated deployments that relied on “secure by default” must now add flags.
Security implications / threat model
- Encrypted state was meant to prevent “node cloning”: stealing the state file and impersonating a node from another machine.
- It mainly protects against attackers who can read the disk but don’t fully control the system; if they have root, they can still grab keys from memory or ask the TPM to decrypt.
- Commenters disagree on how important this is: some see it as an important hardening step for serious admins, others as a niche threat vs. the complexity cost.
Why it was disabled by default
- Linked PR and an engineer’s comment: the main reason is support burden and unreliability of TPM usage across a very heterogeneous device fleet.
- Common failure modes:
- BIOS/firmware updates or motherboard replacements resetting TPM or changing measured state.
- Flaky or buggy fTPMs on consumer boards.
- VMs/vTPMs, Kubernetes pods, and images cloned/moved between hosts.
- Resulting behavior: Tailscale stuck “starting” or refusing to connect with little diagnostic info. Even disabling encryption sometimes didn’t help due to hardware attestation key handling.
Debate on defaults: security vs. usability
- Some view this as a major U‑turn after a big blog post and a brief default‑on period; they expected “secure by default” to stick.
- Others argue the feature was clearly still maturing; once serious regressions appeared, rolling back the default was the only reasonable choice.
- Several say TPM-based protections should always be opt‑in because they behave like a time bomb when hardware or firmware changes.
General TPM discussion
- Many reports of TPM resets breaking Bitlocker or other crypto after BIOS updates; advice is always to have recovery keys/backups.
- Consensus: TPMs are powerful in tightly controlled or enterprise environments, but too fragile and confusing as a universal default for a product that runs “on everything.”