Tailscale
We're adopting Tailscale as the de-facto way of connecting to the /dev/hack intranet remotely, and deprecating the old way of "ask someone for a WireGuard config".
What is Tailscale?
Basically WireGuard + IdP management. They handle the gruntwork of rotating WireGuard keys and allow you to access things at the space from theoretically any device, anywhere in the world. It's neat stuff, and obliviates a lot of the hard work of managing WireGuard configs.
Installing Tailscale
Windows / macOS
Go here: https://tailscale.com/download
Linux
Generally depends. Tailscale publishes packages for RPM / DEB-based systems, and supports virtually every distribution on the planet. You can run:
curl https://tailscale.com/install.sh | bash -
and it'll try to autodetect what distribution you're on, and automatically install Tailscale for you.
There is a Nix package for it in nixpkgs as well: `nixpkgs#tailscale`
Configuring your Tailscale client to connect to /dev/hack
Run this command:
sudo tailscale up --accept-routes --login-server=https://headscale.devhack.net --operator=$USER
After tailscale is up your node will need to be signed by a tailscale admin on a signing node device (ask in chat for this)
You'll then be prompted to SSO in, and once you've SSO'd, you're in.
To enable non-sudo tailscale up run sudo tailscale set --operator=$USER