mirror of
https://github.com/tailscale/tailscale.git
synced 2024-11-29 13:05:46 +00:00
223126fe5b
The Lufthansa in-flight wifi generates a synthetic 204 response to the DERP server's /generate_204 endpoint. This PR adds a basic challenge/response to the endpoint; something sufficiently complicated that it's unlikely to be implemented by a captive portal. We can then check for the expected response to verify whether we're being MITM'd. Follow-up to #5601 Signed-off-by: Andrew Dunham <andrew@du.nham.ca> Change-Id: I94a68c9a16a7be7290200eea6a549b64f02ff48f |
||
---|---|---|
.. | ||
bootstrap_dns_test.go | ||
bootstrap_dns.go | ||
cert.go | ||
depaware.txt | ||
derper_test.go | ||
derper.go | ||
mesh.go | ||
websocket.go |