I work for a school district and the AD is going to get rid of the hudl cameras and go with a company called snipbackai. From what I can tell these cameras are running tailscale on them and I am refusing to put them on the network. I am fearful that they will advertise our routes and be able to access everything on the subnet that the cameras are on. I know everyone is going to say well set up a different subnet, vlan, firewall rules etc and keep them in their play ground. It is the point that they have this running on the cameras and can at anytime do this and everyone seems to be fine with it. Does anyone have any experience with this company or cameras? I am paranoid in thinking this way? Here is their requirements that they sent me.
Snipback Facility Cam Controller
Network Requirements – Technical
- Deployment Model
Linux-based
Outbound-only connectivity (no inbound firewall rules required)
All application traffic encrypted (TLS 1.2+)
No public IP address required
No port forwarding required
Controller Device: - Required Outbound Access
A. Core Application Traffic (HTTPS)
Allow outbound:
TCP 443
To the following domains:
*.snipback.com
*.cloudflare.com
*.r2.cloudflarestorage.com
ports.ubuntu.com
*.ubuntu.com
*.docker.io
*.docker.com
TCP 8443
stream.snipback.com
UDP 123
Allow outbound NTP traffic for pool.ntp.org via port UDP port 123
pool.ntp.org
Notes:DNS-based allowlisting is preferred.
Cloudflare IP ranges are dynamic and may change.
All traffic is encrypted via HTTPS.
B. Tailscale Secure Connectivity (Required)
Tailscale is used to manage and monitor our controller.
Allow outbound:
UDP 41641 (Preferred)
UDP 3478
TCP 443 (Fallback)
TCP 80 (Fallback)
To:
.tailscale.com
login.tailscale.com
controlplane.tailscale.com
derp.tailscale.com
Important:
No inbound firewall rules required.
All connectivity is outbound-initiated.
End-to-end encrypted using WireGuard.
If outbound UDP is blocked, Tailscale can operate over TCP 443 (with reduced
performance). - DNS Requirements
Allow outbound DNS resolution:
UDP 53 and/or TCP 53 to district DNS servers
Device must resolve public DNS records for:
*.snipback.com
*.cloudflare.com
*.tailscale.com4. Security Notes
No inbound ports required
No exposed services
No public-facing endpoints
No static public IP required
If SSL/TLS inspection is enabled, exclude:
*.snipback.com
*.tailscale.com
In order to ensure secure and stable connection with our network please ensure all traffic
for Tailscale is not intercpeted by SSL inspection.