We have been using Tailscale for about four or five months, and we have been using it from the beginning.
For our main use case, we use Tailscale because it creates a peer-to-peer VPN mesh where we host our AWS infrastructure behind it, so the general web cannot directly access it. It is only accessible from authorized systems, such as the one that I have.
A specific example of how we use Tailscale for this peer-to-peer VPN mesh in my daily work is that the entirety of our AWS infrastructure and systems that we use to build at Flyra are behind a private VPN that is accessible using Tailscale. The general web cannot access it, so we ensure that there is nothing unauthorized accessing our servers. Authorized and recognized systems are only able to access the infrastructure and the resources that we want restricted, and that is where Tailscale comes in.
About my main use case, I am fully aware that it is end-to-end encrypted. We maintain access using ACLs, which allows us to fine-tune the fine-grained rules for who can connect and to what.
The best features Tailscale offers are highlighted by the fact that setting up Tailscale was straightforward, at least once you are following the documentation and the guides. The security is valuable, as there are many providers available, but Tailscale fulfills the requirements that we had, allowing us to access and expose internal apps without exposing them to the general internet. The complex site-to-site connections are replaced using VPNs, and we can SSH into our remote desktops or SSH into our EC2 machines in our AWS regions in a secure way.
About the features that make Tailscale stand out for me, with access control lists, we can fine-grain what can be accessed and by whom. It solved our base use case, which is keeping our secured infrastructure behind a private VPN, and that is why we started using it in the first place.
Tailscale has had more positive impacts on my organization regarding security.
Regarding how Tailscale can be improved, I think for free users, there are some limited options. However, we have a paid policy, so we pay Tailscale every month. At some point, we may want to host our own coordination servers, which Tailscale does not have right now. However, it is just a general consideration, and I doubt that we will have that problem soon.
Regarding the needed improvements for paid users, I think things are acceptable. The limits could be higher for free users, and that is all.
I have been a software developer for about two years, and that represents full-time experience.
My advice to others looking into using Tailscale is that if there is a use case where you want to secure your private EC2 instances, the workflows, your Git repositories, and sensitive data, Docker images, Maven builds, Gradle builds, and so forth, behind and away from the general internet and onto your private cloud, Tailscale can act as that link, allowing you access to that private information from authorized systems while also fine-graining that control. I would rate this product a nine out of ten.