Skip to content

Magisk Tailscaled v1.56.1.3

Compare
Choose a tag to compare
@github-actions github-actions released this 11 Jan 20:54
· 76 commits to main since this release

Fix & Improvements for #9 #7 #5 #8

What's Changed

Highlighted

Added daemon control tailscaled.service

tailscaled.service {start|stop|restart|status|log{runs|service|tailscaled}}

View logs by tailscaled.service log

tailscaled.service log {runs|service|tailscaled}

Add setting

  • Located at /data/adb/tailscale/settings.ini.
  • HTTP Proxy/Socks5 port is 1099
  • Changed log from /data/adb/tailscale/tmp/tailscaled.log to /data/adb/tailscale/run/tailscaled.log

Add other features

/data/adb/tailscale/scripts/

  • start.sh
    Start service at boot, enable tailscaled daemon & inotifyd service.
  • tailscaled.inotify
    Inotifyd is for monitoring file changes at folder /data/adb/modules/magisk-tailscaled/, the main function is detect the file disable.
    If from magisk manager you disable this module, tailscaled daemon is stop, if you enable module again, tailscaled daemon start, you can restart tailscaled with disable and enable the module, accept the prompt [Yes] to use general script while install the module for always use this feature.
  • tailscaled.service
    This for control the daemon, show logs.

/data/adb/tailscale/run/

  • runs.log
    Log when you disable/enable tailscaled with command tailscaled.service.
  • service.log
    Log for inotifyd, when you disable/enable with magisk modules.
  • tailscaled.log
    Log for running tailscaled daemon, if logs increased to xMiB, you can clear the log with disable/enable the daemon.
  • tailscaled.pid
    Just store the running tailscaled pid.

/data/adb/tailscale/tmp/

  • tailscaled.state
    Your tailscale authorization.
  • tailscaled.sock
    For communicating with tailscaled daemon, disappear when daemon stop.
  • other file
    You can clear everything.

Use with other VPN

You need to route the IP-CIDR 100.64.0.0/10 to use localhost socks on port 1099.
Or you can use with proxy, example : curl OTHER_TAILSCALE_IP -x localhost:1099

Mihomo

Make sure to enable tun and set dns-hijack with tcp://any:53 and any:53. Default tun is disable, for avoid this error : failed: dial tcp: lookup log.tailscale.io on [::1]:53:

  dns-hijack:
    - any:53
    - tcp://any:53

Or you can use tailscale up --accept-dns=false

Create new proxy

proxies:
  - name: "tailscale-socks"
    type: socks5
    server: localhost
    port: 1099

Add new rules

rules:
  - IP-CIDR,100.64.0.0/10,tailscale-socks

NekoBox

Manual Setting - SOCKS5

Server/Port: 127.0.0.1:1099
Name: TAILSCALE

Route - Add

IP: 100.64.0.0/10
Outbound: TAILSCALE

Other VPN

You need to use socks5 port 1099 for accessing other tailscale devices, or you can just route the ip with NekoBox and create a Warp Wireguard.

Reference

IP 100.x.x.x
https://tailscale.com/kb/1015/100.x-addresses

Nekobox Configuration
https://matsuridayo.github.io/nb4a-route/

Mihomo Configuration
https://wiki.metacubex.one/config/
https://github.com/taamarin/box_for_magisk/blob/master/box/clash/config.yaml


Notes

If you encounter a problem, please search available fix at official tailscale repository, with your keyword https://github.com/tailscale/tailscale/issues?q=keyword , If you solve the problem, share to this magisk module repository.

I'm not affiliate with official tailscale, if you feel this module useful for you, dont forget the stars ⭐, the stars make me happy to help you, please open issue with respectfull, I'm feel sad with bad people who can't respectfull the opensource project.

Full Changelog: v1.56.1.2...v1.56.1.3