Skip to content

Releases: tailscale/tailscale

v1.8.6

19 Jun 23:10
Compare
Choose a tag to compare
  • Fix #1939 by communicating any login error to tailscale web
  • don't warn about iptables=off on Synology, it isn't really a problem and sounds scary
  • Partial fix for #1995, ignore NetfilterMode pref on Synology

v1.8.5

19 Jun 23:08
Compare
Choose a tag to compare
  • fix #1963 by initializing DNS maps unconditionally

1.8.4

19 Jun 23:07
Compare
Choose a tag to compare
  • Fix #1886 by making Magic DNS always answer queries sent to 100.100.100.100
  • Fix #1920 on Windows
  • Fix obscure deadlock in RequestEngineStatusAndWait()
  • update Persist.LoginName when it changes, so your username will be shown correctly if you switch accounts
  • Fix #1918 iOS crash

1.8.3

19 Jun 23:03
Compare
Choose a tag to compare
  • Fix #1892, systemd-resolved interaction

1.8.2

19 Jun 23:01
Compare
Choose a tag to compare
  • Add PeerStatus.ID stable ID to tailscale status --json
  • Fix #1880, tailscale up argument handling
  • wintun fix
  • normalize leading dots in Magic DNS names, fix #1888
  • fix Linux NetworkManager interaction, #1875

v1.8.1

06 May 23:37
Compare
Choose a tag to compare

Linux bugfixes

  • Correctly apply DNS settings on older versions of NetworkManager (#1870)
  • Fix an incorrect tailscale up error when using --advertise-routes and --advertise-exit-node.

v1.8.0

06 May 20:13
Compare
Choose a tag to compare

Bug fixes, improvements

  • Large effort to address DNS configuration issues and Magic DNS on all platforms.
  • Allow client access to an exit node's public IPs.
  • Tailscale up command now warns when options are being changed by omission. For example if one had used tailscale up --advertise-route=192.168.0.0/24 and then uses tailscale up --advertise-exit-node it will notice and warn that the advertise-route would be removed.
  • Support SCTP in port-based ACLs, in addition to TCP and UDP.
  • In magicsock if IPv4 and IPv6 have similar latency, prefer IPv6.
  • Add tailscale ping --tsmp w.x.y.z, which sends a ping at a layer which doesn’t involve the host IP stack. Only destinations running 1.8+ will respond.
  • Add tailscale ip [-4] [-6] command, suitable for use in shell scripts to retrieve Tailscale IP addresses of the local node or peers.
  • add tailscale bugreport command to log a timestamp, to use shortly after a problem occurs to make it easier for support@tailscale.com to find. Note that you do still need to send email or file a bug; the new bugreport just adds a known point in the logs so support can find it easily.
  • Add tailscale logout command.
  • When run with --tun=userspace-networking --socks5-server=..., tailscaled can now be a SOCKS5 proxy for all addresses not just Tailscale addresses.

Platform-specific

Linux

Windows

  • There is a new menu structure to better support the amount of functionality now present. Hold Control while clicking the taskbar icon to get access to a Debug menu of less-commonly used functions.
  • The tailscale.exe CLI command now supports a new flag, tailscale up --unattended to make Tailscale run in what the GUI calls "Unattended Mode" (to run in the background outside the context of a logged in desktop session). Previously on Windows the CLI always enabled Unattended Mode; now it must be specified explicitly.
  • Windows systems can now serve as subnet routers and exit nodes. As this support is new, there's no GUI support yet and the CLI must be used to enable it. From cmd.exe, run tailscale up --advertise-exit-node or tailscale up --advertise-route=192.168.1.0/24

MacOS

Synology

  • Synology systems can now serve as subnet routers and exit nodes.

Coming soon

  • A new Alpha feature allows users to send files to their own devices via Tailscale.
  • Split DNS functionality will be enabled in the near future.

v1.6.0

17 Mar 01:29
Compare
Choose a tag to compare

Headline Features

  • Exit nodes: route all your non-Tailscale internet traffic through another Tailscale node in your network; see our documentation and the video demo
  • Tunneled IPv6: Tailscale has been able to use IPv6 as a transport for the WireGuard traffic for some time, but now we also support IPv6 inside the tunnel. All nodes that support IPv6 will have an IPv6 Tailscale address in addition to the normal 100.x.y.z Tailscale IPv4 (CGNAT) address.
  • Port mapping: if your router supports NAT-PMP, Tailscale will now use it to make peer-to-peer connections. Many routers support this by default (such as Google Wifi). Others may require it be enabled (e.g. in pfSense/OPNsense or Unifi/Ubiquiti "Services"). For some routers it may be lumped together with a "UPnP" checkbox. For pfSense/OPNsense users in particular, enabling NAT-PMP is highly recommended to be able to get direct connections between Tailscale nodes.
  • Userspace networking is now possible with tailscaled using --tun=userspace-networking, which doesn't require root.
    • Known issue: userspace networking is not yet available on 32-bit CPUs, due to a bug in an upstream library. 32-bit support will be added in a future release.
  • SOCKS5 server: the tailscaled binary now includes a SOCKS5 server. In particular, this allows a tailscaled using userspace networking to make outbound connections to other nodes in your Tailscale network, without your operating system's help.
  • Local API: tailscaled has the start of a node-local API. Currently the only interesting call is the whois method, to look up the Tailscale owner of a ip:port that's hitting a local service. (which also works for incoming userspace-networking localhost-forwarded connections)

Bug fixes, improvements

  • A DNS fallback mechanism lets Tailscale start on systems with broken or unavailable DNS (and potentially fix the DNS configuration, if you've configured Tailscale DNS settings).

Platform-specific

Linux

Windows

  • In prior releases, the Tailscale background service and the GUI binary were the same binary. In Tailscale 1.6, the background service is now just the open source tailscaled.exe (which people can build themselves: https://github.com/tailscale/tailscale#building). In summary there are three binaries:
    • tailscaled.exe (the open source daemon that does all the networking)
    • tailscale.exe (the open source CLI tool to control the daemon)
    • tailscale-ipn.exe (the GUI to control the daemon)
  • The Windows service is now named just "Tailscale" (previously it was "Tailscale IPN").
  • The installer & uninstaller have been cleaned up and should now work correctly on multi-user Windows machines.

macOS

  • tailscaled now runs on macOS: https://github.com/tailscale/tailscale/wiki/Tailscaled-on-macOS
  • the network link monitor was rewritten on macOS and should now adapt to changes quicker and from more parts of Tailscale, notably when the network is entirely unavailable (e.g. wifi is off).
  • the Command-Q shortcut now works when the menu bar icon is open.

Synology

The Synology packaging has been transferred to Tailscale's GitHub organization (thanks, @nirev!) and Tailscale is now a co-maintainer (although we haven't done much yet). We plan to upload Tailscale to the Synology Package Center once we polish some things (like adding a web UI for config), but for now the SPK packages are available from: https://github.com/tailscale/tailscale-synology/releases

v1.4.6

13 Mar 05:10
Compare
Choose a tag to compare
  • Fix connectivity failure on Windows (#1448)
  • Fix rebind race that causes IPv4 WireGuard packets to be dropped (tailscale/corp#1289)
  • Call winhttp calls from a locked OS thread.

v1.4.5

23 Feb 23:46
Compare
Choose a tag to compare
  • Make the MagicDNS virtual IP respond to pings (#849)
  • Fix failure to update internal state when node keys change (#1391)
  • Skip tests that require IPv6 if IPv6 is unavailable (#1292)
  • Record whether Tailscale was installed via Chocolatey on Windows.
  • Make linux router try harder to continue when encountering errors.
  • Add more internal health reporting to the network engine.
  • Do PCP availability probing without side-effects, to reduce logspam in home routers.
  • Monitor for IPv6 address/route changes on linux.