A lightweight, preconfigured proxy for the Tailscale control plane that enables Tailscale access in the event the Tailscale control plane is being blocked.
Tailscale connections between peers are incredible resiliant. If you are authenticated to Tailscale, it will endeavour to use all mechanisms at its disposal to forge connections it needs between clients.
However, some networks block the Tailscale control plane (ie, the tailscale.com domain) either via DNS blackholing or SNI interception.
Proxyt allows you to host a proxy to the Tailscale control plane which can be used by clients. You can host Proxyt anywhere, register your own domain or even expose it via Funnel giving you a reliable way of accessing the Tailscale control plane to authenticate clients.
Full documentation: proxyt.io
- 📦 Installation - Install ProxyT on your platform
- ⚙️ Configuration - Configure ProxyT with flags or environment variables
- 🚀 Deployment - Deploy to Railway, Docker, or your own server
- 🔧 Tailscale Setup - Configure Tailscale clients to use ProxyT
- 🛠️ Troubleshooting - Common issues and solutions
- 🔒 Security - Security considerations and best practices
- 🏗️ Architecture - How ProxyT works under the hood
💡 Browsing on GitHub? The documentation source files are in the
docs/
directory
- Fork the repository
- Create a feature branch
- Make your changes
- Add tests if applicable
- Submit a pull request
See LICENSE for details.