Releases: tailscale/tailscale
Releases · tailscale/tailscale
v1.8.6
v1.8.5
1.8.4
1.8.3
1.8.2
v1.8.1
v1.8.0
Bug fixes, improvements
- Large effort to address DNS configuration issues and Magic DNS on all platforms.
- Allow client access to an exit node's public IPs.
- Tailscale up command now warns when options are being changed by omission. For example if one had used
tailscale up --advertise-route=192.168.0.0/24
and then usestailscale up --advertise-exit-node
it will notice and warn that the advertise-route would be removed. - Support SCTP in port-based ACLs, in addition to TCP and UDP.
- In magicsock if IPv4 and IPv6 have similar latency, prefer IPv6.
- Add
tailscale ping --tsmp w.x.y.z
, which sends a ping at a layer which doesn’t involve the host IP stack. Only destinations running 1.8+ will respond. - Add
tailscale ip [-4] [-6]
command, suitable for use in shell scripts to retrieve Tailscale IP addresses of the local node or peers. - add
tailscale bugreport
command to log a timestamp, to use shortly after a problem occurs to make it easier for support@tailscale.com to find. Note that you do still need to send email or file a bug; the newbugreport
just adds a known point in the logs so support can find it easily. - Add
tailscale logout
command. - When run with
--tun=userspace-networking --socks5-server=...
,tailscaled
can now be a SOCKS5 proxy for all addresses not just Tailscale addresses.
Platform-specific
Linux
- Much better support for DNS server configuration and Magic DNS in Linux distributions using systemd-resolved, NetworkManager, and resolvconf.
Windows
- There is a new menu structure to better support the amount of functionality now present. Hold Control while clicking the taskbar icon to get access to a Debug menu of less-commonly used functions.
- The
tailscale.exe
CLI command now supports a new flag,tailscale up --unattended
to make Tailscale run in what the GUI calls "Unattended Mode" (to run in the background outside the context of a logged in desktop session). Previously on Windows the CLI always enabled Unattended Mode; now it must be specified explicitly. - Windows systems can now serve as subnet routers and exit nodes. As this support is new, there's no GUI support yet and the CLI must be used to enable it. From
cmd.exe
, runtailscale up --advertise-exit-node
ortailscale up --advertise-route=192.168.1.0/24
MacOS
- There is a new menu structure to better support the amount of functionality now present. Hold Option while clicking the menu bar icon to get access to a Debug menu of less-commonly used functions.
- MacOS systems can now serve as subnet routers and exit nodes using https://github.com/tailscale/tailscale/wiki/Tailscaled-on-macOS
- Fixed MacOS Big Sur DNS behavior when using an exit node.
Synology
- Synology systems can now serve as subnet routers and exit nodes.
Coming soon
- A new Alpha feature allows users to send files to their own devices via Tailscale.
- Split DNS functionality will be enabled in the near future.
v1.6.0
Headline Features
- Exit nodes: route all your non-Tailscale internet traffic through another Tailscale node in your network; see our documentation and the video demo
- Tunneled IPv6: Tailscale has been able to use IPv6 as a transport for the WireGuard traffic for some time, but now we also support IPv6 inside the tunnel. All nodes that support IPv6 will have an IPv6 Tailscale address in addition to the normal 100.x.y.z Tailscale IPv4 (CGNAT) address.
- Port mapping: if your router supports NAT-PMP, Tailscale will now use it to make peer-to-peer connections. Many routers support this by default (such as Google Wifi). Others may require it be enabled (e.g. in pfSense/OPNsense or Unifi/Ubiquiti "Services"). For some routers it may be lumped together with a "UPnP" checkbox. For pfSense/OPNsense users in particular, enabling NAT-PMP is highly recommended to be able to get direct connections between Tailscale nodes.
- Userspace networking is now possible with
tailscaled
using--tun=userspace-networking
, which doesn't require root.- Known issue: userspace networking is not yet available on 32-bit CPUs, due to a bug in an upstream library. 32-bit support will be added in a future release.
- SOCKS5 server: the
tailscaled
binary now includes a SOCKS5 server. In particular, this allows atailscaled
using userspace networking to make outbound connections to other nodes in your Tailscale network, without your operating system's help. - Local API:
tailscaled
has the start of a node-local API. Currently the only interesting call is thewhois
method, to look up the Tailscale owner of aip:port
that's hitting a local service. (which also works for incoming userspace-networking localhost-forwarded connections)
Bug fixes, improvements
- A DNS fallback mechanism lets Tailscale start on systems with broken or unavailable DNS (and potentially fix the DNS configuration, if you've configured Tailscale DNS settings).
Platform-specific
Linux
Windows
- In prior releases, the Tailscale background service and the GUI binary were the same binary. In Tailscale 1.6, the background service is now just the open source
tailscaled.exe
(which people can build themselves: https://github.com/tailscale/tailscale#building). In summary there are three binaries:tailscaled.exe
(the open source daemon that does all the networking)tailscale.exe
(the open source CLI tool to control the daemon)tailscale-ipn.exe
(the GUI to control the daemon)
- The Windows service is now named just "Tailscale" (previously it was "Tailscale IPN").
- The installer & uninstaller have been cleaned up and should now work correctly on multi-user Windows machines.
macOS
- tailscaled now runs on macOS: https://github.com/tailscale/tailscale/wiki/Tailscaled-on-macOS
- the network link monitor was rewritten on macOS and should now adapt to changes quicker and from more parts of Tailscale, notably when the network is entirely unavailable (e.g. wifi is off).
- the Command-Q shortcut now works when the menu bar icon is open.
Synology
The Synology packaging has been transferred to Tailscale's GitHub organization (thanks, @nirev!) and Tailscale is now a co-maintainer (although we haven't done much yet). We plan to upload Tailscale to the Synology Package Center once we polish some things (like adding a web UI for config), but for now the SPK packages are available from: https://github.com/tailscale/tailscale-synology/releases
v1.4.6
v1.4.5
- Make the MagicDNS virtual IP respond to pings (#849)
- Fix failure to update internal state when node keys change (#1391)
- Skip tests that require IPv6 if IPv6 is unavailable (#1292)
- Record whether Tailscale was installed via Chocolatey on Windows.
- Make linux router try harder to continue when encountering errors.
- Add more internal health reporting to the network engine.
- Do PCP availability probing without side-effects, to reduce logspam in home routers.
- Monitor for IPv6 address/route changes on linux.