Tailscale

SSH rule with autogroup:nonroot exposes unintended user access when dst changes

warning
securityUpdated Feb 2, 2026(via Exa)
Technologies:
How to detect:

When SSH rules use `autogroup:nonroot` in the `users` field with a `dst` field other than `autogroup:self` (such as ACL tags), anyone permitted by the `src` setting can SSH as any nonroot user on the destination device. This creates broader access than intended.

Recommended action:

When changing SSH rule `dst` from `autogroup:self` to another destination like tags, also replace `autogroup:nonroot` in the `users` field with specific user accounts or SSH principals. Review existing SSH rules to ensure `autogroup:nonroot` is only used with `autogroup:self` destinations.