<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Tailscale on GAiA in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Tailscale-on-GAiA/m-p/165214#M27544</link>
    <description>&lt;P&gt;Curious why would you install it on a Check Point gateway/management and not something else?&lt;/P&gt;</description>
    <pubDate>Wed, 14 Dec 2022 19:37:17 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2022-12-14T19:37:17Z</dc:date>
    <item>
      <title>Tailscale on GAiA</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Tailscale-on-GAiA/m-p/165111#M27525</link>
      <description>&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;This is not supported by Check Point in any way. If you try this and it blows up your firewall or management server, restore to a backup which you surely took before running commands some random person you don't know posted.&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://tailscale.com" target="_self"&gt;Tailscale&lt;/A&gt;&amp;nbsp;is a sort of "zero-trust" mesh VPN system. At a technical level, it handles key distribution for peer-to-peer Wireguard VPN tunnels which can go through relays operated by Tailscale the company. As long as the endpoints have Internet access, they can establish a VPN with each other and talk through it (subject to rules which you set up in Tailscale). I like a lot of the core decisions they have made in how the product works.&lt;/P&gt;
&lt;P&gt;I recently started using it for remote access to some development systems. One of the things I'm developing involves talking via the management API to a Check Point management server, so I decided I would try to get the static build of Tailscale running there for consistency. It works pretty well, and I thought others here might be interested in how I did it.&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;On the GAiA system, download &lt;A href="https://pkgs.tailscale.com/stable/#static" target="_self"&gt;the latest static build from Tailscale's site&lt;/A&gt;. As of this post, that is 1.34.1. If you don't know the processor architecture you should use, 'uname -i' on the GAiA system will tell you. x86 and 386 are the same, and x86_64 and amd64 are the same. Copy the link for the right architecture, and run 'curl_cli -kO &amp;lt;link&amp;gt;' on the Check Point box. The '-k' to skip certificate validation is needed because GAiA doesn't include the CA which Tailscale uses (ISRG) for their website.&lt;/LI&gt;
&lt;LI&gt;Unzip the package. 'tar -zxvf tailscale*' should work.&lt;/LI&gt;
&lt;LI&gt;Move tailscale and tailscaled from the unzipped directory to /usr/sbin.&lt;/LI&gt;
&lt;LI&gt;To authenticate the node, you have to start tailscaled, then run 'tailscale up' like so:&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;[Expert@DallasSA]# nohup tailscaled -tun "userspace-networking" -state=/etc/tailscaled.state 2&amp;gt;&amp;amp;1 &amp;gt;/tmp/tailscaled.log &amp;amp;
[1] 1019
nohup: ignoring input and redirecting stderr to stdout
[Expert@DallasSA]# tailscale up

To authenticate, visit:

	https://login.tailscale.com/&amp;lt;path&amp;gt;
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Copy the link out, visit it in a web browser, and authenticate with the credentials you use for Tailscale. The node will be added to your tailnet. Tailscale is now running, and you can use it to remotely access your management or firewall. Sessions connecting over Tailscale will show as coming from 127.0.0.1:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;[Expert@DallasSA]# who
admin    pts/2        Dec 13 22:30 (10.0.3.22)
admin    pts/3        Dec 13 23:13 (127.0.0.1)&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It's annoying to have to manually start tailscaled every boot, and manually run 'tailscale up' to connect, though. To deal with that, I wrote a little init script:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;#!/bin/sh
#
# tailscale	This shell script takes care of starting and stopping
#		tailscaled.
#
# chkconfig: 3 99 74
# description: tailscale starts the tailscaled service for remote access
# and administration.

# Source function library.
. /etc/init.d/functions

[ -x /usr/sbin/tailscaled ] || exit 0
[ -x /usr/sbin/tailscale ] || exit 0

RETVAL=0
prog="tailscaled"

start() {
	echo -n $"Starting $prog:"
	nohup $prog -tun "userspace-networking" -state=/etc/tailscaled.state &amp;gt;/tmp/tailscale.log 2&amp;gt;&amp;amp;1 &amp;amp;
	tailscale up &amp;amp;&amp;amp; success || failure
	echo
}

stop() {
	echo -n $"Stopping $prog:"
	tailscale down
	killproc $prog -TERM
	echo
}

enableAutostart() {
	echo -n $"Setting $prog to start at boot:"
	ln -s /etc/rc.d/init.d/tailscale /etc/rc.d/rc3.d/S99ztailscale \
	&amp;amp;&amp;amp; success || failure
	echo
}

disableAutostart() {
	echo -n $"Removing $prog from bootup sequence:"
	rm /etc/rc.d/rc3.d/S99ztailscale \
	&amp;amp;&amp;amp; success || failure
	echo
}

# See how we were called.
case "$1" in
	start)
		start
		;;
	stop)
		stop
		;;
	restart|reload)
		stop
		start
		;;
	enable)
		enableAutostart
		start
		;;
	disable)
		stop
		disableAutostart
		;;
	*)
		echo $"Usage: $0 {start|stop|restart|enable|disable}"
		exit 1
esac
exit $RETVAL&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Put it in&amp;nbsp;&lt;SPAN&gt;/etc/rc.d/init.d/tailscale, run 'chmod 755&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;/etc/rc.d/init.d/tailscale' to let the script run&lt;/SPAN&gt;&lt;SPAN&gt;, and you can control it like any other service using 'service tailscale':&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;[Expert@DallasSA]# service tailscale enable
Setting tailscaled to start at boot:                       [  OK  ]
Starting tailscaled:                                       [  OK  ]
[Expert@DallasSA]# service tailscale stop  
Stopping tailscaled:                                       [  OK  ]
[Expert@DallasSA]# service tailscale start
Starting tailscaled:                                       [  OK  ]
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you 'enable' the service, it will start when the system boots, so you get access about when sshd starts up.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Dec 2022 23:29:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Tailscale-on-GAiA/m-p/165111#M27525</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2022-12-13T23:29:19Z</dc:date>
    </item>
    <item>
      <title>Re: Tailscale on GAiA</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Tailscale-on-GAiA/m-p/165115#M27526</link>
      <description>&lt;P&gt;Wow, amazing job&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/27871"&gt;@Bob_Zimmerman&lt;/a&gt;&amp;nbsp;! I will test it in my lab and report back.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Dec 2022 10:03:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Tailscale-on-GAiA/m-p/165115#M27526</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-12-14T10:03:48Z</dc:date>
    </item>
    <item>
      <title>Re: Tailscale on GAiA</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Tailscale-on-GAiA/m-p/165121#M27527</link>
      <description>&lt;P&gt;I have to make a very important note.&lt;/P&gt;
&lt;P&gt;It is not just the tailscale package that is not supported by Check Point. Installing a &lt;U&gt;not supported not authorized third-party package&lt;/U&gt; to a Check Point system renders &lt;U&gt;that system not supported&lt;/U&gt; too.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Dec 2022 08:05:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Tailscale-on-GAiA/m-p/165121#M27527</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-12-14T08:05:42Z</dc:date>
    </item>
    <item>
      <title>Re: Tailscale on GAiA</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Tailscale-on-GAiA/m-p/165202#M27538</link>
      <description>&lt;P&gt;Fortunately, it's trivial to remove Tailscale from a system thanks to the statically linked binaries.&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;service tailscale disable
rm /usr/sbin/tailscale
rm /usr/sbin/tailscaled
rm /etc/rc.d/init.d/tailscale&lt;/LI-CODE&gt;
&lt;P&gt;And with that, it's totally gone, as if it had never been used at all. It doesn't touch any libraries. Since it has an entire userspace network stack in tailscaled, it also doesn't make any modifications to the system's routes, interfaces, or anything else.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Dec 2022 16:05:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Tailscale-on-GAiA/m-p/165202#M27538</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2022-12-14T16:05:12Z</dc:date>
    </item>
    <item>
      <title>Re: Tailscale on GAiA</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Tailscale-on-GAiA/m-p/165204#M27539</link>
      <description>&lt;P&gt;Hmm, Tailscale brings additional weaknesses &lt;A href="https://tailscale.com/security-bulletins/" target="_self"&gt;as documented here&lt;/A&gt; to any system it is installed on. Also it requires to be modified &lt;A href="https://tailscale.com/kb/1011/log-mesh-traffic/?tab=linux" target="_self"&gt;as documented here&lt;/A&gt; to prevent it from local logging in order to hide it from Check Point.&lt;/P&gt;
&lt;P&gt;Anyhow, Tailscale &lt;A href="https://tailscale.com/kb/1181/firewalls/" target="_self"&gt;officially notes&lt;/A&gt; this for use on firewalls: "&lt;FONT color="#FF0000"&gt;&lt;EM&gt;Your organization may have configured a firewall to protect their network from unsolicited, unnecessary, or malicious traffic. Although the workarounds below may help Tailscale to establish direct connectivity between nodes, these may also make it easier for other traffic to reach your network.&lt;/EM&gt;&lt;/FONT&gt;"&lt;/P&gt;</description>
      <pubDate>Wed, 14 Dec 2022 17:14:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Tailscale-on-GAiA/m-p/165204#M27539</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2022-12-14T17:14:10Z</dc:date>
    </item>
    <item>
      <title>Re: Tailscale on GAiA</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Tailscale-on-GAiA/m-p/165205#M27540</link>
      <description>&lt;P&gt;Did you actually read their security bulletins?&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;TS-2022-005 allows a website to extract some environment variables from the client. GAiA doesn't have a web browser, so not an issue.&lt;/LI&gt;
&lt;LI&gt;TS-2022-004 affects only the Windows client, and involves a web browser, so not an issue for two reasons.&lt;/LI&gt;
&lt;LI&gt;TS-2022-003 is an issue authenticating to the control server. Not an issue on the endpoints.&lt;/LI&gt;
&lt;LI&gt;TS-2022-002 is an issue setting up an account on the control server. Not an issue on the endpoints.&lt;/LI&gt;
&lt;LI&gt;TS-2022-001 is an issue setting up an account on the control server. Not an issue on the endpoints.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Yes, anything which involves network connectivity can potentially introduce vulnerabilities. Tailscale's track record so far on the endpoint software is about on par with OpenSSH's which is enabled by default on every UNIX and Linux distribution I've dealt with in a very long time. tailscaled itself doesn't accept incoming connections, it only makes outgoing ones, so it can only really be exploited by other things already on the system.&lt;/P&gt;
&lt;P&gt;As for logging, I'm not sure what you mean "in order to hide it from Check Point". The init script as written above logs to /tmp/tailscale.log. Yes, it logs to their central logging as well by default, but it's easy enough to add '&lt;SPAN&gt;--no-logs-no-support' to all the tailscaled invocations. That's beyond the scope of this post.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If you want zero involvement of Tailscale the company, you can always &lt;A href="https://github.com/tailscale/tailscale" target="_self"&gt;build tailscale and tailscaled from source&lt;/A&gt;, run your own&amp;nbsp;&lt;A href="https://github.com/juanfont/headscale" target="_self"&gt;headscale&lt;/A&gt; instance, and use that. Even does away with the control server issues above, since there's no more external identity management. That's also beyond the scope of this post.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Dec 2022 17:48:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Tailscale-on-GAiA/m-p/165205#M27540</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2022-12-14T17:48:43Z</dc:date>
    </item>
    <item>
      <title>Re: Tailscale on GAiA</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Tailscale-on-GAiA/m-p/165214#M27544</link>
      <description>&lt;P&gt;Curious why would you install it on a Check Point gateway/management and not something else?&lt;/P&gt;</description>
      <pubDate>Wed, 14 Dec 2022 19:37:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Tailscale-on-GAiA/m-p/165214#M27544</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-12-14T19:37:17Z</dc:date>
    </item>
    <item>
      <title>Re: Tailscale on GAiA</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Tailscale-on-GAiA/m-p/165219#M27546</link>
      <description>&lt;P&gt;Tested it on brand new R81.20, not bad. Mind you, my outputs are bit different, as I used my personal gmail account when I copied the link to authenticate, I assume thats why.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Dec 2022 20:43:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Tailscale-on-GAiA/m-p/165219#M27546</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-12-14T20:43:37Z</dc:date>
    </item>
    <item>
      <title>Re: Tailscale on GAiA</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Tailscale-on-GAiA/m-p/275896#M46056</link>
      <description>&lt;P&gt;With R82.10 shipping systemd (my beloathed), Tailscale's included systemd unit file can be used to handle the service side of things. No need to mess with the init file.&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;[Expert@DallasSC]# fw ver
This is Check Point's software version R82.10 - Build 767

[Expert@DallasSC]# curl_cli --cacert $CPDIR/conf/ca-bundle.crt -O https://pkgs.tailscale.com/stable/tailscale_1.96.4_amd64.tgz
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100 34.8M  100 34.8M    0     0  28.5M      0  0:00:01  0:00:01 --:--:-- 28.6M

[Expert@DallasSC]# tar zxf tailscale_1.96.4_amd64.tgz 

[Expert@DallasSC]# mv tailscale_1.96.4_amd64/tailscale /usr/sbin/

[Expert@DallasSC]# mv tailscale_1.96.4_amd64/tailscaled /usr/sbin/

[Expert@DallasSC]# mv tailscale_1.96.4_amd64/systemd/tailscaled.service /etc/systemd/system/

[Expert@DallasSC]# mv tailscale_1.96.4_amd64/systemd/tailscaled.defaults /etc/default/tailscaled

[Expert@DallasSC]# sed -i 's/FLAGS=""/FLAGS="-tun userspace-networking"/' /etc/default/tailscaled

[Expert@DallasSC]# rm -r tailscale_1.96.4_amd64

[Expert@DallasSC]# systemctl daemon-reload;systemctl start tailscaled.service

[Expert@DallasSC]# tailscale up

To authenticate, visit:

	https://login.tailscale.com/a/&amp;lt;redacted&amp;gt;

Success.

[Expert@DallasSC]# tailscale status
100.###.###.###  dallassc ...&lt;/LI-CODE&gt;</description>
      <pubDate>Tue, 21 Apr 2026 18:12:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Tailscale-on-GAiA/m-p/275896#M46056</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2026-04-21T18:12:30Z</dc:date>
    </item>
  </channel>
</rss>

