I adore Nebula and half wish I had chosen it instead of Tailscale+Headscale, the one thing about headscale that I really like is how easy it is for users to just grab the client and then login using their gmail account and they're on the network. The biggest downside I've found to tailscale is their "network shenanigans" with firewall rules and route tables on Linux. In my testing 3-5 years ago, Nebula worked great in my test environment.

I'm tempted to add Nebula support to WeEncrypt for automated handing out of the certs using a LetsEncrypt-style short lived certs. I could even imagine a fairly easy to build workstation client that would require end-users to login to get their refreshed certs once they expire, like we do with Tailscale+Headscale.

That would dove-tail nicely with the existing TLS and SSH signed host keys support. https://github.com/linsomniac/weencrypt

> I adore Nebula and half wish I had chosen it instead of Tailscale+Headscale...

Could I ask you to expand on that a little? Besides Tailscale's "network shenanigans" with firewalls and routing tables, what else do you find that Nebula does better than Tailscale? Why would you recommend Nebula instead of Tailscale to someone who hasn't used either one before; what's Nebula's big "win" over Tailscale? (Assuming that this person's usage would fit within Tailscale's free tier so price isn't a consideration, because obviously free is nicer than $$$/month if your usage is large enough to be outside free-tier limits).

(preface: I'm talking about personal/homelab experience and usage)

I know this is not going to be popular, however: I still use plain and simple OpenVPN and frankly i've been very happy. It can do both ipv4 and ipv6 and with some more work also layer-2 bridging.

Yeah performance is lower in theory but frankly that has never been the issue for me.

I'm pretty much always bottlenecked by bandwidth rather than cpu time.

Not OP - my two issues with tailscale today:

- breaks wsl mirrored network to the point a reboot is needed (not sure how much of this is on windows, though)

- break dns randomly on an Debian system to the point I have a watchdog timer systemd unit to restart tailscaled

So I understand how you could onboard hosts on a static network using reverse DNS, but I do not understand how you would unboard a portable laptop onto Nebula using reverse DNS

Agreed, a roaming laptop would need to have a secured ethernet/wifi connection. I'm using it for servers, about half of them we respin nightly.

I believe you can disable this and it isn’t really required for TS to work