{"id":"019d0b69-3461-76d5-8493-f2fd2f87a783","title":"Tela: A userspace private cloud","slug":"2026/03/tela-a-userspace-private-cloud","renderedHtml":"<p><a href=\"https://github.com/paulmooreparks/tela\" title=\"a FOSS remote-access fabric using outbound-only tunnels, multiplexed TCP channels, and zero-install client access\">Tela</a>, written by Paul Parks, is aiming at a very specific pain point: getting to TCP services like SSH, RDP, HTTP, or database ports when the machine you want is behind NAT, the client machine is locked down, and a conventional VPN is either too heavy or simply not allowed. The repo describes Tela as a remote-access fabric built around encrypted WireGuard tunnels relayed over WebSocket, with no TUN device and no admin privileges required on either end.</p>\n<p>That implies that spinning up a Tela network has a relatively light administrative burden in terms of system permissions. In this, it'd fit in the same space as <a href=\"https://tailscale.com\" title=\"a mesh VPN built on WireGuard with a hosted coordination server, zero-config peer discovery, and open-source clients\">Tailscale</a> (or <a href=\"https://github.com/juanfont/headscale\" title=\"a community-built open-source reimplementation of the Tailscale control server for self-hosted deployments\">Headscale</a> as a cleaner analog), or <a href=\"https://wireguard.com\" title=\"a modern, minimal VPN protocol using Curve25519 + ChaCha20-Poly1305 encryption, built into the Linux kernel and available as a pure Go userspace implementation\">Wireguard</a> or <a href=\"https://ngrok.com\" title=\"a hosted reverse tunnel service for exposing local services over HTTP/HTTPS/TCP without firewall configuration, with no self-hosted option and no end-to-end encryption by default\">ngrok</a> or <a href=\"https://developers.cloudflare.com/cloudflare-one/connections/connect-networks/\" title=\"a reverse tunnel service that routes inbound traffic to local services through Cloudflare's network using the cloudflared daemon\">Cloudflare</a>.</p>\n<p>The access levels required makes it interesting: Tela is not &quot;just another tunnel.” The project is explicitly built around outbound-only connectivity, userspace WireGuard via gVisor netstack, and a hub that relays ciphertext rather than terminating the tunnel. The current stack consists of a client (tela), an agent/daemon (telad), a hub (telahubd), and a desktop UI called TelaVisor. The design doc is unusually explicit about the separation between the core fabric and any future platform wrapped around it.</p>\n<p>The practical pitch is easy to understand: connect to home lab systems, dev machines, production boxes, or customer endpoints without opening inbound ports or forcing a full-network VPN onto every device. (Thus the &quot;light administrative burden.&quot; Systems access doesn't require elevation the same way many tunnels would.) The use-cases doc keeps coming back to the same advantages: no port forwarding, no dynamic DNS, no client-side admin access, and service-level exposure instead of broad network access.</p>\n<p>The project also appears to be honest about where it is. The status document says the core pieces work at proof-of-concept level, including the client, agent, hub, userspace WireGuard transport, UDP relay, and direct P2P fallback, while some of the more formal protocol machinery - like multiplexed channels and full token design - still remains unfinished. The <a href=\"https://github.com/google/gvisor\" title=\"Google's application kernel for containers in Go, providing a userspace TCP/IP stack (netstack) usable without kernel networking interfaces or root privileges\">gVisor</a> dependency is going to impact network performance measurably, but given the project's targeting, may not matter.</p>\n<p>All of that makes Tela <em>more</em> interesting, not less: it reads like a serious system under active construction rather than a marketing shell around vapor. It's also implemented and designed using &quot;modern tooling,&quot; using AI as a partner rather than a source, and the strength of the design suggests that the technology is being used well rather than as a replacement for understanding.</p>","excerpt":"Tela is a remote-access fabric built around encrypted WireGuard tunnels relayed over WebSocket, with no TUN device and no admin privileges required on either end. That implies that spinning up a Tela network has a relatively light administrative burden in terms of system permissions. The access levels required makes it interesting: Tela is not \"just another tunnel,” but a userspace tunnel that would be appropriate for all kinds of constrained access deployments.","authorId":"019c5c8a-609d-7cd4-975b-50bbcc412a33","authorDisplayName":"dreamreal","status":"APPROVED","publishedAt":"2026-03-20T13:22:30.531Z","sortOrder":0,"createdAt":"2026-03-20T13:22:17.312756Z","updatedAt":"2026-03-20T14:16:46.713541Z","commentCount":0,"tags":["ai","cloud","cloudflare","tunnel","vpn","wireguard"],"categories":[],"markdownSource":null}