I’m assuming they’re plain text. There’s is no perceivable way they can only use those data points to to figure out which hash it is. Unless of course they’re using their own “hashing” function which isn’t secure at all since it’s probably reversible.
This is the exact script I use to install tailscale on my VPN server
Installing Tailscale
Enable IP forwarding
Advertise subenets and exit node