-
### Description
Follow-up to the previous issue[1].
Currently, documentation[2] for secured routes[3] is clearly insufficient.
1. Out of three possible types of secure routes[4], two more advance…
-
### Tell us about your idea!
Automatically begin using an Exit Node on Untrusted/New Wifi Networks
### What are you trying to do?
I would like Tailscale to (optionally) automatically start us…
-
Unable to authenticate API. I have a reverse proxy on a public IP handling Tailscale client traffic to a headscale server. This all works. I put the same URL (same as server_url in headscale config.ya…
-
In Classic Mac OS 8, 9, OSX 10.0 and 10.1 the DHCAST128 protocol is the primary secure authentication method for AppleShare. As the name suggests, it uses 128 bit modulus size.
In the Netatalk proj…
-
## Describe the feature
**User story**: As a user, I want all my traffic to be encrypted throughout the Knative routing path, so that any data going over that path is not readable for anybody…
-
**Is your feature request related to a problem? Please describe.**
Yes, the problem arises when trying to use both Netbird and Surge on my iPhone. Currently, the VPN configuration on iOS allows only …
-
Our company mandates that the api-server of a Kubernetes cluster may not be exposed publicly without any network access restrictions.
As it is set up now, "AKS Automatic" (preview) is exposing its …
-
To have more accurate ghost timestamps, to allow the creation of any other mkwsp feature that uses the clock, and doesn't secure networking need an accurate time on the device too or is that not how t…
-
Following blog: https://auth0.com/blog/securing-kubernetes-clusters-with-istio-and-auth0/
Got to the step where you enable Mutual TLS auth between services which instructs you to apply networking/d…
-
### DO NOT REMOVE OR SKIP THE ISSUE TEMPLATE
- [X] I understand that I will be **blocked** if I *intentionally* remove or skip any mandatory\* field
### Checklist
- [X] I'm reporting that yt-…