This is intended to be used with an ephemeral auth key with an ACL tag, and ACL rules that restrict the ephemeral node to inbound-only traffic. It does not share instance state with tailscale running in Linux. Reference: - https://tailscale.com/kb/1111/ephemeral-nodes/ - https://tailscale.com/kb/1068/acl-tags/#generate-an-auth-key-with-an-acl-tag - https://tailscale.com/kb/1068/acl-tags/#using-tags-in-acls-for-access-control
21 lines
779 B
Plaintext
21 lines
779 B
Plaintext
Source: tailscale-initramfs
|
|
Section: net
|
|
Priority: optional
|
|
Maintainer: Paul Aurich <paul@darkrain42.org>
|
|
Build-Depends: debhelper-compat (= 13)
|
|
Standards-Version: 4.5.1
|
|
Homepage: https://github.com/darkrain42/tailscale-initramfs
|
|
Vcs-Browser: https://github.com/darkrain42/tailscale-initramfs
|
|
Vcs-Git: https://github.com/darkrain42/tailscale-initramfs.git
|
|
Rules-Requires-Root: no
|
|
|
|
Package: tailscale-initramfs
|
|
Architecture: all
|
|
Depends: initramfs-tools, tailscale, ${misc:Depends}
|
|
Recommends: ca-certificates
|
|
Suggests: dropbear-initramfs
|
|
Description: tailscale VPN - third-party initramfs integration
|
|
tailscale is a WireGuard VPN. This package provides initramfs integration,
|
|
intended to allow connectivity to/from a tailnet, e.g. to to allow remote
|
|
unlocking of a cryptroot.
|