Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124

Estimated reading time: 5 minutes
Tailscale’s state file—typically found at /var/lib/tailscale/tailscaled.state—contains configuration data, cryptographic keys, keys to authenticate your device with the Tailscale network, and metadata about your session. Previously, many Tailscale installations on Linux used a mechanism that encrypted this file using the underlying OS (such as via systemd or file system encryption options).
As of early 2026, Tailscale has changed its behavior so that state file encryption is no longer enabled by default on some platforms. According to the official Tailscale changelog, this change affects newer installations or upgrades where encrypted state is not explicitly configured.
Removing default encryption puts the burden of security configuration back onto developers and IT administrators. In fast-paced SMB environments, especially those relying on automation or self-hosted endpoints, that can lead to misconfigured systems or unencrypted sensitive data.
In practical terms: if you’re running a Docker container with Tailscale or using it to secure remote access to your cloud platforms—you might now be storing unencrypted credentials on disk unless you’ve configured otherwise.
This decision isn’t arbitrary. Tailscale engineers cited growing challenges with compatibility and support complexity when encryption was enabled by default on systems lacking secure key storage or full disk encryption. To prevent misconfigured scenarios or false security assumptions, the team opted to make state file encryption opt-in rather than opt-out.
Although this makes best practices a manual responsibility, it also aligns with common behavior in infrastructure tools—giving operators clearer visibility into implemented security models.
For example, systems already using full disk encryption (FDE) or locked container images may already be meeting these security goals without needing per-file cryptography.
If you’re a small business, startup, or growth-stage SaaS company using Tailscale for automation or secure developer access, here’s who this change immediately affects:
In short, anyone who integrates Tailscale into their self-hosted or cloud-based stack should audit their encryption settings ASAP.
There are several ways to respond to this change, each with trade-offs:
| Option | Description | Pros | Cons |
|---|---|---|---|
| Enable manual state file encryption via environment variables or config | Use Tailscale’s --state-encrypt option (experimental) |
Adds a layer of file-based encryption | May require custom automation routines |
| Rely on full disk encryption (FDE) | Use OS-level encryption for the entire filesystem | Simpler to implement on VMs or laptops | Not always viable in containers |
| Use secure infrastructure-as-code (IaC) tools | Provision systems with state file storage hardening baked in | Repeatable; fits CI/CD culture | Requires more technical setup |
| Avoid storing state at all via ephemeral nodes | Run Tailscale in ephemeral mode (e.g., infrastructure workers) | No persistent state to secure | Sessions must be recreated each time |
Whichever route you choose, the critical takeaway is: make a conscious decision—don’t rely on an outdated assumption that encryption is built into the defaults.
Use these actionable steps to audit and adjust your Tailscale environment to respond effectively to this default change:
/var/lib/tailscale/tailscaled.state. In Docker containers, it may be volume-mounted elsewhere.file or manually inspect encryption headers. Alternatively, check system logs or deployment scripts to confirm whether encryption was ever enabled.--state=encrypt.Security and automation often evolve on parallel tracks—but we help unify them. At AI Naanji, we work with small-to-mid-sized businesses to build secure, performant automation stacks with tools like n8n, Tailscale, and self-hosted infrastructure.
We offer services such as:
When security defaults change—as with the Tailscale state file encryption no longer enabled by default—we help you adapt without slowing down innovation.
The update that Tailscale state file encryption is no longer enabled by default may seem like a small implementation detail—but for businesses running automation stacks or security-sensitive integrations, it can have broad consequences. Misconfigured systems can lead to data leakage, reputational risks, and compliance headaches.
By reviewing your infrastructure, applying best practices, and integrating reliable security checks into your automation workflows, you can stay proactive. AI Naanji offers tailored support to help your business keep moving fast and securely—so reach out if you need help auditing automation components or enhancing your self-hosted tool stack.