Magisk Tailscaled v1.56.1.3
Fix & Improvements for #9 #7 #5 #8
What's Changed
Highlighted
Added daemon control tailscaled.service
tailscaled.service {start|stop|restart|status|log{runs|service|tailscaled}}
View logs by tailscaled.service log
tailscaled.service log {runs|service|tailscaled}
Add setting
- Located at
/data/adb/tailscale/settings.ini
. - HTTP Proxy/Socks5 port is
1099
- Changed log from
/data/adb/tailscale/tmp/tailscaled.log
to/data/adb/tailscale/run/tailscaled.log
Add other features
/data/adb/tailscale/scripts/
- start.sh
Start service at boot, enabletailscaled
daemon &inotifyd
service. - tailscaled.inotify
Inotifyd is for monitoring file changes at folder/data/adb/modules/magisk-tailscaled/
, the main function is detect the filedisable
.
If from magisk manager you disable this module, tailscaled daemon is stop, if you enable module again, tailscaled daemon start, you can restart tailscaled with disable and enable the module, accept the prompt [Yes] to use general script while install the module for always use this feature. - tailscaled.service
This for control the daemon, show logs.
/data/adb/tailscale/run/
- runs.log
Log when you disable/enable tailscaled with commandtailscaled.service
. - service.log
Log for inotifyd, when you disable/enable with magisk modules. - tailscaled.log
Log for runningtailscaled
daemon, if logs increased to xMiB, you can clear the log with disable/enable the daemon. - tailscaled.pid
Just store the runningtailscaled
pid.
/data/adb/tailscale/tmp/
- tailscaled.state
Your tailscale authorization. - tailscaled.sock
For communicating with tailscaled daemon, disappear when daemon stop. - other file
You can clear everything.
Use with other VPN
You need to route the IP-CIDR 100.64.0.0/10
to use localhost socks on port 1099.
Or you can use with proxy, example : curl OTHER_TAILSCALE_IP -x localhost:1099
Mihomo
Make sure to enable tun
and set dns-hijack
with tcp://any:53
and any:53
. Default tun
is disable, for avoid this error : failed: dial tcp: lookup log.tailscale.io on [::1]:53:
dns-hijack:
- any:53
- tcp://any:53
Or you can use tailscale up --accept-dns=false
Create new proxy
proxies:
- name: "tailscale-socks"
type: socks5
server: localhost
port: 1099
Add new rules
rules:
- IP-CIDR,100.64.0.0/10,tailscale-socks
NekoBox
Manual Setting - SOCKS5
Server/Port: 127.0.0.1:1099
Name: TAILSCALE
Route - Add
IP: 100.64.0.0/10
Outbound: TAILSCALE
Other VPN
You need to use socks5 port 1099 for accessing other tailscale devices, or you can just route the ip with NekoBox and create a Warp Wireguard.
Reference
IP 100.x.x.x
https://tailscale.com/kb/1015/100.x-addresses
Nekobox Configuration
https://matsuridayo.github.io/nb4a-route/
Mihomo Configuration
https://wiki.metacubex.one/config/
https://github.com/taamarin/box_for_magisk/blob/master/box/clash/config.yaml
Notes
If you encounter a problem, please search available fix at official tailscale repository, with your keyword https://github.com/tailscale/tailscale/issues?q=keyword , If you solve the problem, share to this magisk module repository.
I'm not affiliate with official tailscale, if you feel this module useful for you, dont forget the stars ⭐, the stars make me happy to help you, please open issue with respectfull, I'm feel sad with bad people who can't respectfull the opensource project.
Full Changelog: v1.56.1.2...v1.56.1.3