https://github.com/jsiebens/ionscale
A lightweight implementation of a Tailscale control server
https://github.com/jsiebens/ionscale
tailscale tailscale-control-server tailscale-server wireguard
Last synced: 2 months ago
JSON representation
A lightweight implementation of a Tailscale control server
- Host: GitHub
- URL: https://github.com/jsiebens/ionscale
- Owner: jsiebens
- License: bsd-3-clause
- Created: 2022-05-07T07:44:31.000Z (about 3 years ago)
- Default Branch: main
- Last Pushed: 2025-03-16T10:03:39.000Z (3 months ago)
- Last Synced: 2025-03-28T09:01:43.547Z (2 months ago)
- Topics: tailscale, tailscale-control-server, tailscale-server, wireguard
- Language: Go
- Homepage: https://jsiebens.github.io/ionscale
- Size: 1.51 MB
- Stars: 253
- Watchers: 13
- Forks: 16
- Open Issues: 7
-
Metadata Files:
- Readme: README.md
- Contributing: .github/CONTRIBUTING.md
- License: LICENSE
Awesome Lists containing this project
README
# ionscale
> **Note**:
> ionscale is currently beta quality, actively being developed and so subject to changes**What is Tailscale?**
[Tailscale](https://tailscale.com) is a VPN service that makes the devices and applications you own accessible anywhere in the world, securely and effortlessly.
It enables encrypted point-to-point connections using the open source [WireGuard](https://www.wireguard.com/) protocol, which means only devices on your private network can communicate with each other.**What is ionscale?**
While the Tailscale software running on each node is open source, their centralized "coordination server" which act as a shared drop box for public keys is not.
_ionscale_ aims to implement such lightweight, open source alternative Tailscale control server.




⭐ If you find _ionscale_ useful, please consider giving it a star on GitHub, or [drop a note](https://github.com/jsiebens/ionscale/discussions/new?category=show-and-tell) on how you are using _ionscale_.
## Features
- multi [tailnet](https://tailscale.com/kb/1136/tailnet/) support
- multi user support
- OIDC integration (not required, although recommended)
- [Auth keys](https://tailscale.com/kb/1085/auth-keys/)
- [Access control list](https://tailscale.com/kb/1018/acls/) (with support for `autogroups`, `tagOwners`, `autoApprovers`, `nodeAttrs`, `grants` ...)
- [DNS](https://tailscale.com/kb/1054/dns/)
- nameservers
- Split DNS
- MagicDNS
- [Subnet routers](https://tailscale.com/kb/1019/subnets) and [Exit Nodes](https://tailscale.com/kb/1103/exit-nodes)
- [HTTPS Certs](https://tailscale.com/kb/1153/enabling-https/)
- [Tailscale SSH](https://tailscale.com/kb/1193/tailscale-ssh/)
- [Tailscale Serve](https://tailscale.com/kb/1312/serve)
- [Service collection](https://tailscale.com/kb/1100/services/)
- [Taildrop](https://tailscale.com/kb/1106/taildrop/)## Documentation
Some documentation can be found [here](https://jsiebens.github.io/ionscale)
## Disclaimer
This is not an official Tailscale or Tailscale Inc. project.