2023-12-27 17:23:59 +00:00
2023-11-13 09:47:57 +00:00
2023-12-27 17:23:59 +00:00
2022-11-22 13:20:01 +00:00
2023-07-20 16:09:48 +01:00

Tailscale-scripts

Linux / deploy-vpr.sh

Deploy Tailscale Virtual Private Router

This script is designed to be run on a fresh Linode instance to deploy a Virtual Private Router, a virtual private router is an exit node running on a VPS to route all traffic securely through an encrypted VPN tunnel. Clients who use Tailscale can get NordVPN / ExpressVPN style protection whilst maintaining their P2P connections.

Options

  • None

You will be prompted for a Tailscale Auth Key, see here for more information: https://tailscale.com/kb/1085/auth-keys/

Remember to disable key expiry and to enable as an exit node in Tailscale admin.

Command to execute
curl -L https://prpl.it/vprdeploy | bash

Mac / launch-connect-vpr.sh

Launch Tailscale VPR on login

This script is designed to be run on login on an MDM asset to ensure Tailscale launch and connection to VPR.

Options

  • None
Command to execute
curl -s https://raw.githubusercontent.com/PurpleComputing/Tailscale-scripts/main/Mac/launch-connect-vpr.sh | bash

Mac / force-auth.sh

Launch Tailscale VPR on login

This script is designed to be run on login on an MDM asset to ensure Tailscale launches and authenticates Tailscale, we use this where a client has a requirement for all external server access has to be encrypted over a tunnel.

The script pings the exit node or a server which is online and verifies a connection, if it cannot find a connection after a short delay to force the authentication using an AUTH key.

Options

  • TAILSCALEAUTHKEY="tskey-auth-hdhhj8hjdhj-dwwdgewghEHWEH90238909"
  • TSSERVERIP="100.100.100.100"
Command to execute
curl -s https://raw.githubusercontent.com/PurpleComputing/Tailscale-scripts/main/Mac/launch-connect-vpr.sh | bash
Description
No description provided
Readme MIT 270 KiB
Languages
Shell 100%