Magisk Tailscaled Versions Save

Magisk/KernelSU module for running Tailscale on rooted Android devices. The easiest, most secure way to use WireGuard and 2FA.

v1.66.0.0

1 week ago

What's Changed

New Contributors

Full Changelog: https://github.com/anasfanani/Magisk-Tailscaled/compare/v1.64.0.0...v1.66.0.0

v1.64.0.0-socks5tun-dev

2 weeks ago

added socks5tun binary provided by @heiher at https://github.com/heiher/hev-socks5-tunnel

this tun is running by default. you may start and stop tun manual with tailscaled.tun start|stop

what this is for ?

previously we need route ip 100.x.x.x manual with other tools like clash, now i found the socks5 tunnel and try use that, confirmed working for connect trough vpn,box for magisk ( still problem ), or direct connection.

this is really can running with vpn.

now you can browse directly to tailscale ip range at 100.x.x.x by android browser.

i'm not expert at programming at all, feedback and help discussion at my telegram group at https://t.me/systembinsh/158 , please use english, i'm also using translate sometimes.

Full Changelog: https://github.com/anasfanani/Magisk-Tailscaled/compare/v1.64.0.0...v1.64.0.0-socks5tun-dev

v1.62.1.1

1 month ago

What's Changed

New Contributors

Full Changelog: https://github.com/anasfanani/Magisk-Tailscaled/compare/v1.62.1.0...v1.62.1.1

v1.62.1.0

1 month ago

What's Changed

New Contributors

Full Changelog: https://github.com/anasfanani/Magisk-Tailscaled/compare/v1.62.0.0...v1.62.1.0

v1.56.1.3

4 months ago

Fix & Improvements for #9 #7 #5 #8

What's Changed

Highlighted

Added daemon control tailscaled.service

tailscaled.service {start|stop|restart|status|log{runs|service|tailscaled}}

View logs by tailscaled.service log

tailscaled.service log {runs|service|tailscaled}

Add setting

  • Located at /data/adb/tailscale/settings.ini.
  • HTTP Proxy/Socks5 port is 1099
  • Changed log from /data/adb/tailscale/tmp/tailscaled.log to /data/adb/tailscale/run/tailscaled.log

Add other features

/data/adb/tailscale/scripts/

  • start.sh Start service at boot, enable tailscaled daemon & inotifyd service.
  • tailscaled.inotify Inotifyd is for monitoring file changes at folder /data/adb/modules/magisk-tailscaled/, the main function is detect the file disable. If from magisk manager you disable this module, tailscaled daemon is stop, if you enable module again, tailscaled daemon start, you can restart tailscaled with disable and enable the module, accept the prompt [Yes] to use general script while install the module for always use this feature.
  • tailscaled.service This for control the daemon, show logs.

/data/adb/tailscale/run/

  • runs.log Log when you disable/enable tailscaled with command tailscaled.service.
  • service.log Log for inotifyd, when you disable/enable with magisk modules.
  • tailscaled.log Log for running tailscaled daemon, if logs increased to xMiB, you can clear the log with disable/enable the daemon.
  • tailscaled.pid Just store the running tailscaled pid.

/data/adb/tailscale/tmp/

  • tailscaled.state Your tailscale authorization.
  • tailscaled.sock For communicating with tailscaled daemon, disappear when daemon stop.
  • other file You can clear everything.

Use with other VPN

You need to route the IP-CIDR 100.64.0.0/10 to use localhost socks on port 1099. Or you can use with proxy, example : curl OTHER_TAILSCALE_IP -x localhost:1099

Mihomo

Make sure to enable tun and set dns-hijack with tcp://any:53 and any:53. Default tun is disable, for avoid this error : failed: dial tcp: lookup log.tailscale.io on [::1]:53:

  dns-hijack:
    - any:53
    - tcp://any:53

Or you can use tailscale up --accept-dns=false

Create new proxy

proxies:
  - name: "tailscale-socks"
    type: socks5
    server: localhost
    port: 1099

Add new rules

rules:
  - IP-CIDR,100.64.0.0/10,tailscale-socks

NekoBox

Manual Setting - SOCKS5

Server/Port: 127.0.0.1:1099 Name: TAILSCALE

Route - Add

IP: 100.64.0.0/10 Outbound: TAILSCALE

Other VPN

You need to use socks5 port 1099 for accessing other tailscale devices, or you can just route the ip with NekoBox and create a Warp Wireguard.

Reference

IP 100.x.x.x https://tailscale.com/kb/1015/100.x-addresses

Nekobox Configuration https://matsuridayo.github.io/nb4a-route/

Mihomo Configuration https://wiki.metacubex.one/config/ https://github.com/taamarin/box_for_magisk/blob/master/box/clash/config.yaml


Notes

If you encounter a problem, please search available fix at official tailscale repository, with your keyword https://github.com/tailscale/tailscale/issues?q=keyword , If you solve the problem, share to this magisk module repository.

I'm not affiliate with official tailscale, if you feel this module useful for you, dont forget the stars ⭐, the stars make me happy to help you, please open issue with respectfull, I'm feel sad with bad people who can't respectfull the opensource project.

Full Changelog: https://github.com/anasfanani/Magisk-Tailscaled/compare/v1.56.1.2...v1.56.1.3