Tailscale has partnered with @mullvadnet to make its high-speed global network of servers available as exit nodes. Bring a trusted name in privacy and security right to your tailnet—now in beta https://tailscale.com/blog/mullvad-integration
Mullvad on Tailscale: Privately browse the web

Tailscale has partnered with Mullvad to make its global network of VPN servers available for our customers. You can now easily browse the web using any one of Mullvad’s available servers as a Tailscale exit node while maintaining the user privacy that’s synonymous with Mullvad. Mullvad is a Virtual Private Network (VPN) service that’s known for its strong commitment to user privacy, anonymity, and security. This new partnership means that even when you’re far from home, you can stay connected to the things you care about via Tailscale and maintain private internet browsing thanks to Mullvad’s secure and high-speed global network.

Tailscale

@tailscale @mullvadnet this is fantastic.

Only thing left that I can think Tailscale can do is offer a way to put up a login/access page in front of a serve site to protect things exposed from the tailnet for those not on the tailnet. Like Okta or Cloudflare Access.

@tailscale hey @protonvpn @nordvpn look at this. This is amazing.
@tailscale @mullvadnet just to clarify my understanding of the blog post: if Mullvad was secretly keeping logs, then Tailscale could (be forced to) answer who a given user was, but Mullvad doesn't normally have that information?

@tailscale @mullvadnet

Do you have any documentation for configuring the access controls manually? I have my configuration in github and the UI won’t let me configure tailscale devices. I’m not sure what the format should be for the access controls file and couldn’t find documentation.

@tailscale @mullvadnet it’d be great to be able to use an existing Mullvad account rather than having to pay for a separate subscription through Tailscale
@tailscale @mullvadnet That's neat! I probably won't end up using this, but it's good to see that Tailscale is adding interoperability with hosted VPN proxy services!
@tailscale @mullvadnet Now imagine if they didn't break port forwarding and you could expose ports just with Tailscale.
Would've been a gamechanger. But alas.

@privateger @tailscale

The usage of Tailscale could eliminate the need for forwarded ports, if what you want to access is something like media or computers remotely.

Mullvad on Tailscale: Privately browse the web

Tailscale has partnered with Mullvad to make its global network of VPN servers available for our customers. You can now easily browse the web using any one of Mullvad’s available servers as a Tailscale exit node while maintaining the user privacy that’s synonymous with Mullvad. Mullvad is a Virtual Private Network (VPN) service that’s known for its strong commitment to user privacy, anonymity, and security. This new partnership means that even when you’re far from home, you can stay connected to the things you care about via Tailscale and maintain private internet browsing thanks to Mullvad’s secure and high-speed global network.

Tailscale
@tailscale
Enabled it on my tailnet, following your docs. Don't see any options to select a mullvad exit node on either Mac or Android, both running 1.48.1. ACLs resemble what docs describe... any tips?
@seekingvainly @tailscale do you have tailnet lock enabled?
@aitvaras
@tailscale Yep, I do...guessing the mullvad exit nodes need to be signed too? I can see how that might be an unsupported case on day 1.
@seekingvainly @tailscale yes the lock is preventing nodes to pop up. You could see the nodes and thier node keys if you'd run `tailscale lock status`. Then you could sign the ones you want to use.

@seekingvainly @tailscale

You have Tailnet Lock enabled? Seems Tailnet Lock and Mullvad add-on might not be compatible