AI, ML, and networking — applied and examined.
Farewell, Public IP: Tailscale and the Afternoon Trapped by the Firewall
Farewell, Public IP: Tailscale and the Afternoon Trapped by the Firewall

Farewell, Public IP: Tailscale and the Afternoon Trapped by the Firewall

Tailscale Mesh Network Visualization
This image isn’t about showing off; it’s about helping you see: when your devices no longer need to detour through that congested “central hub,” the network finally returns to what it was meant to be—free connection.

[Body Start]

1. The Caged Bird and the Portal

In this era where an IPv4 address is harder to get than a license plate in Beijing, every geek attempting to run “naked” on the public internet has experienced similar despair.

In the past, to get my ultra-thin MacBook at Starbucks to connect to that roaring Ubuntu server at home, I had to act like a secret agent: applying for a public IP (at the mercy of the ISP), configuring DDNS, setting up port mapping on the router… and finally praying that the company firewall hadn’t blocked non-standard ports. After all these maneuvers, it felt less like doing tech and more like playing Mission: Impossible.

Until Tailscale appeared, and this old-world logic of “Castles and Moats” was completely shattered.

Simply put, Tailscale gives you a “portal.” It doesn’t require you to own a public IP, nor does it require punching holes in a firewall. You simply run a command on two devices, and it’s as if they’ve been dropped into the same invisible LAN. Even if one is on Mars (assuming there’s internet) and the other is in the Mariana Trench, they can Ping each other through that magical IP starting with 100.x.y.z.

This isn’t just “convenient”; it’s a “paradigm shift.” It abstracts complex physical network topologies into a flat logical layer. For developers, this is like no longer needing to care if your package is delivered by plane or train; you only need to know it arrived at your doorstep on time.

2. Hardcore Linux Wrapped in “Apple Skin”

Don’t be fooled by Tailscale’s idiot-proof “One-Click Login” and think it’s just an ordinary VPN client. Deep in its bones lies the most hardcore geek logic.

Digging into the Blind Spots: How does it “penetrate walls”?
Many people only know it’s based on WireGuard®—the VPN protocol with extremely lean code praised by Linus Torvalds. But Tailscale’s true killer feature is its NAT Traversal technology.

It resurrects ancient black magic: STUN and TURN, combined with extremely clever “hole-punching” algorithms. When two devices are hidden behind layers of NAT (e.g., you are in a corporate intranet, and your home is behind a carrier-grade NAT), Tailscale attempts every possible posture to establish a Peer-to-Peer (P2P) direct connection between them.

  • Direct Connection Success: Traffic bypasses any relay servers, speeds are incredibly fast, limited only by physical distance latency.
  • Direct Connection Failure: Only then does it reluctantly enable DERP (relay servers) to forward traffic.

Even more interestingly, Tailscale moved the networking stack to user-space networking. What does this mean? It means you don’t need Root privileges, and you can even run it freely inside Serverless functions or containers. In the old VPN era, this was unimaginable.

But here lies a subtle “Trust Paradox.” Although the Tailscale client is open source, its Coordination Server (Control Plane) is closed source and centralized. Your device list and public key distribution are in the hands of Tailscale’s servers.
Although they claim they “cannot see traffic content” (because the private key is in your hands), if you are a terminal “paranoia” patient, this might be a thorn in your throat.
The antidote? There is one, called Headscale. But that’s a story for another time.

3. Who is Swimming Naked: A Cold Industry Showdown

Zooming out, Tailscale isn’t the only player on this track. Let’s use a microscope to look at the close-quarters combat between it and its competitors.

VS. OpenVPN / IPsec:
This is simply a dimensional strike. OpenVPN is like a product of the internal combustion engine era: cumbersome configuration, bloated code, and reconnection speeds as slow as a snail. Tailscale is an electric car: instant start, and due to WireGuard’s stateless nature, connections almost never drop when switching networks (from Wi-Fi to 5G).

  • Hard Metrics: Configuring OpenVPN might take an afternoon; configuring Tailscale takes 30 seconds.

VS. ZeroTier:
This is the strongest opponent. ZeroTier operates at a lower level; it simulates a virtual Ethernet Switch (Layer 2), while Tailscale simulates an IP Router (Layer 3).

  • Differences: ZeroTier supports broadcast and multicast (great for LAN gaming), but in extremely complex network environments, Tailscale’s NAT traversal success rate is generally higher.
  • Philosophical Clash: ZeroTier wants to reconstruct the underlying layer of the entire internet; Tailscale just wants you to connect to your server. The former is grand; the latter is pragmatic.

VS. Cloudflare Tunnel:
Cloudflare exposes you to the whole world (mainly for hosting sites), while Tailscale exposes you to yourself. Although Tailscale has released the Funnel feature for public exposure, when it comes to CDN and DDoS protection, that is Cloudflare’s home turf.

Tailscale vs ZeroTier Comparison
This comparison chart visually demonstrates the divergence in protocol choices between the two. ZeroTier is an all-rounder, but Tailscale cuts deeper with the sharp sword of WireGuard.

4. The Panic After Boundaries Disappear

While we immerse ourselves in the pleasure of “SSH from anywhere,” I can’t help but ask a question usually discussed only among friends: If the intranet is no longer an intranet, what is left of so-called “security”?

The traditional security model is “M&M style”: a hard outer shell (firewall) with a soft chocolate center inside. Once hackers break through the shell, the intranet is a buffet.
Tailscale advocates Zero Trust. Every device is an island, and connections must pass authentication (ACLs). This sounds beautiful, but it shifts the pressure of security from the “network admin” to “everyone.”

If your laptop (acting as a node in the Mesh network) gets compromised, and you fat-fingered the configuration to “Allow Subnet Routing,” then congratulations—you haven’t just sold yourself out; you’ve gift-wrapped the entire company intranet for the hackers.
This “flattened” network structure eliminates hierarchies and buffers. While enjoying freedom, are we ready to bear this atomized responsibility?

5. The Geek’s Final Puzzle Piece

Tailscale’s success is essentially not a victory of network technology, but a victory of User Experience (UX).
It encapsulates complex BGP, NAT, and routing tables—things only a CCIE (Cisco Certified Internetwork Expert) could handle—into an action as simple as “Logging into a Google Account.”

This is very similar to the current AI wave—the technology has existed for a long time, but it wasn’t until it became simple enough that it truly changed the world.
In this era of excess computing power but obstructed connectivity, Tailscale is like issuing a universal intergalactic pass to every lonely computer.

Farewell, Public IP. We don’t need you anymore.
Because we finally understand that the essence of connection is not an IP address, but “I’m looking for you, and there you are.”


References:

Leave a Reply

Your email address will not be published. Required fields are marked *