Oracle Cloud's restrictive default network policy

Oracle cloud doesn’t enable any ports other than SSH by default, which somehow doesn’t affect any Tailscale services but breaks the ability to negotiate a TLS certificate over ports 80 and 443.

September 16, 2025 · 1 min

Creating private services on NixOS using Tailscale and Caddy

A simple guide to setting up private services on NixOS using Tailscale and Caddy with authentication.

September 13, 2025 · Last modified: September 13, 2025 · 4 min

Tailscale ACL grants

Services being routed by caddy-tailscale are treated as full-fledged Tailscale nodes and thus follow the ACL policies of deny-by-default. If I want to be able to ping a Tailscale address from the server I will have to add an ACL grant allowing the server’s tag to access the tag applied to the service. This was necessary today for the Firefly-iii data importer to be able to access the Firefly-iii instance running on the same server.

June 30, 2025 · 1 min

Using Tailscale exit nodes on NixOS

Tailscale on NixOS requires setting services.tailscale.useRoutingFeatures = "client" on the non-exit-node machines to allow routing to work.

June 30, 2025 · 1 min