Magisk/KernelSU module for running Tailscale on rooted Android devices. The easiest, most secure way to use WireGuard and 2FA.
Full Changelog: https://github.com/anasfanani/Magisk-Tailscaled/compare/v1.64.0.0...v1.66.0.0
added socks5tun binary provided by @heiher at https://github.com/heiher/hev-socks5-tunnel
this tun is running by default.
you may start and stop tun manual with tailscaled.tun start|stop
what this is for ?
previously we need route ip 100.x.x.x manual with other tools like clash, now i found the socks5 tunnel and try use that, confirmed working for connect trough vpn,box for magisk ( still problem ), or direct connection.
this is really can running with vpn.
now you can browse directly to tailscale ip range at 100.x.x.x by android browser.
i'm not expert at programming at all, feedback and help discussion at my telegram group at https://t.me/systembinsh/158 , please use english, i'm also using translate sometimes.
Full Changelog: https://github.com/anasfanani/Magisk-Tailscaled/compare/v1.64.0.0...v1.64.0.0-socks5tun-dev
Full Changelog: https://github.com/anasfanani/Magisk-Tailscaled/compare/v1.62.1.0...v1.62.1.1
v
from $PREFIX
when downloading by @stevenxxiu in https://github.com/anasfanani/Magisk-Tailscaled/pull/15
Full Changelog: https://github.com/anasfanani/Magisk-Tailscaled/compare/v1.62.0.0...v1.62.1.0
Fix & Improvements for #9 #7 #5 #8
tailscaled.service
tailscaled.service {start|stop|restart|status|log{runs|service|tailscaled}}
tailscaled.service log
tailscaled.service log {runs|service|tailscaled}
/data/adb/tailscale/settings.ini
.1099
/data/adb/tailscale/tmp/tailscaled.log
to /data/adb/tailscale/run/tailscaled.log
tailscaled
daemon & inotifyd
service./data/adb/modules/magisk-tailscaled/
, the main function is detect the file disable
.
If from magisk manager you disable this module, tailscaled daemon is stop, if you enable module again, tailscaled daemon start, you can restart tailscaled with disable and enable the module, accept the prompt [Yes] to use general script while install the module for always use this feature.tailscaled.service
.tailscaled
daemon, if logs increased to xMiB, you can clear the log with disable/enable the daemon.tailscaled
pid.You need to route the IP-CIDR 100.64.0.0/10
to use localhost socks on port 1099.
Or you can use with proxy, example : curl OTHER_TAILSCALE_IP -x localhost:1099
Make sure to enable tun
and set dns-hijack
with tcp://any:53
and any:53
. Default tun
is disable, for avoid this error : failed: dial tcp: lookup log.tailscale.io on [::1]:53:
dns-hijack:
- any:53
- tcp://any:53
Or you can use tailscale up --accept-dns=false
Create new proxy
proxies:
- name: "tailscale-socks"
type: socks5
server: localhost
port: 1099
Add new rules
rules:
- IP-CIDR,100.64.0.0/10,tailscale-socks
Server/Port: 127.0.0.1:1099
Name: TAILSCALE
IP: 100.64.0.0/10
Outbound: TAILSCALE
You need to use socks5 port 1099 for accessing other tailscale devices, or you can just route the ip with NekoBox and create a Warp Wireguard.
IP 100.x.x.x https://tailscale.com/kb/1015/100.x-addresses
Nekobox Configuration https://matsuridayo.github.io/nb4a-route/
Mihomo Configuration https://wiki.metacubex.one/config/ https://github.com/taamarin/box_for_magisk/blob/master/box/clash/config.yaml
If you encounter a problem, please search available fix at official tailscale repository, with your keyword https://github.com/tailscale/tailscale/issues?q=keyword , If you solve the problem, share to this magisk module repository.
I'm not affiliate with official tailscale, if you feel this module useful for you, dont forget the stars ⭐, the stars make me happy to help you, please open issue with respectfull, I'm feel sad with bad people who can't respectfull the opensource project.
Full Changelog: https://github.com/anasfanani/Magisk-Tailscaled/compare/v1.56.1.2...v1.56.1.3