The easiest, most secure way to use WireGuard and 2FA.
Go to file
Brad Fitzpatrick 3ae701f0eb net/tsaddr, wgengine/netstack: add IPv6 range that forwards to site-relative IPv4
This defines a new magic IPv6 prefix, fd7a:115c:a1e0:b1a::/64, a
subset of our existing /48, where the final 32 bits are an IPv4
address, and the middle 32 bits are a user-chosen "site ID". (which
must currently be 0000:00xx; the top 3 bytes must be zero for now)

e.g., I can say my home LAN's "site ID" is "0000:00bb" and then
advertise its 10.2.0.0/16 IPv4 range via IPv6, like:

    tailscale up --advertise-routes=fd7a:115c:a1e0:b1a::bb:10.2.0.0/112

(112 being /128 minuse the /96 v6 prefix length)

Then people in my tailnet can:

     $ curl '[fd7a:115c:a1e0:b1a::bb:10.2.0.230]'
     <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" ....

Updates #3616, etc

RELNOTE=initial support for TS IPv6 addresses to route v4 "via" specific nodes

Change-Id: I9b49b6ad10410a24b5866b9fbc69d3cae1f600ef
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2022-04-11 17:26:07 -07:00
.bencher bencher: add config to suppress failures on benchmark regressions. 2021-10-01 16:16:02 -07:00
.github .github: Bump actions/checkout from 2 to 3 2022-03-22 16:07:00 -07:00
atomicfile atomicfile: don't Chmod on windows 2020-07-15 12:31:40 -07:00
chirp all: use any instead of interface{} 2022-03-17 11:35:09 -07:00
client/tailscale client/tailscale, cmd/tailscale, localapi: add 'tailscale nc' 2022-03-24 10:28:53 -07:00
cmd net/tsaddr, wgengine/netstack: add IPv6 range that forwards to site-relative IPv4 2022-04-11 17:26:07 -07:00
control control/controlbase: don't enforce a max protocol version at handshake time. 2022-04-07 17:55:29 -07:00
derp derp: add (*Server).IsClientConnectedForTest func. (#4331) 2022-03-30 10:50:50 -07:00
disco types/key: export constants for key size, not a method. 2021-10-29 17:39:04 -07:00
docs fix minor typo 2021-11-16 11:03:43 -08:00
envknob envknob: use the correct key when logging (#4319) 2022-03-29 14:04:12 -07:00
health net/dns: add health check for particular broken-ish Linux DNS config 2022-02-16 10:40:04 -08:00
hostinfo tsnet: set Hostinfo.Package to "tsnet" on use 2022-03-25 09:26:02 -07:00
internal/tooldeps util/deephash: move internal/deephash to util/deephash 2021-07-02 21:33:02 -07:00
ipn net/tsaddr, wgengine/netstack: add IPv6 range that forwards to site-relative IPv4 2022-04-11 17:26:07 -07:00
kube all: use any instead of interface{} 2022-03-17 11:35:09 -07:00
log all: use any instead of interface{} 2022-03-17 11:35:09 -07:00
logpolicy all: use any instead of interface{} 2022-03-17 11:35:09 -07:00
logtail all: use any instead of interface{} 2022-03-17 11:35:09 -07:00
metrics all: use testingutil.MinAllocsPerRun 2021-10-28 12:48:37 -07:00
net net/tsaddr, wgengine/netstack: add IPv6 range that forwards to site-relative IPv4 2022-04-11 17:26:07 -07:00
packages/deb all: use any instead of interface{} 2022-03-17 11:35:09 -07:00
paths cmd/tailscaled: default to userspace-networking mode on gokrazy, set paths 2022-03-01 20:34:45 -08:00
portlist envknob: add new package for all the strconv.ParseBool(os.Getenv(..)) 2022-01-24 11:51:23 -08:00
prober prober: used keyed initializer for LimitedReader. 2022-03-26 21:45:27 -07:00
safesocket safesocket: add ConnectionStrategy, provide control over fallbacks 2021-12-09 15:46:38 -08:00
scripts scripts: install gnupg only when apt-key is needed 2022-03-17 15:11:25 -07:00
smallzstd smallzstd: new package that constructs zstd small encoders/decoders. 2020-07-02 16:13:06 -07:00
ssh/tailssh go.mod, ssh/tailssh, tempfork/gliderlabs: bump x/crypto/ssh fork for NoClientAuthCallback 2022-03-29 18:17:34 -07:00
syncs syncs: use TryLock and TryRLock instead of unsafe 2022-03-17 10:57:41 -07:00
tailcfg ipn/localapi: add endpoint to request id token 2022-04-05 14:48:45 -07:00
tempfork go.mod, ssh/tailssh, tempfork/gliderlabs: bump x/crypto/ssh fork for NoClientAuthCallback 2022-03-29 18:17:34 -07:00
tool tool/go: add wrapper to download and use go.toolchain.rev go version. 2022-01-04 09:45:29 -08:00
tsconst net/interfaces/windows: update Tailscale interface detection logic to 2021-11-08 07:44:33 -08:00
tsnet tsnet: set Hostinfo.Package to "tsnet" on use 2022-03-25 09:26:02 -07:00
tstest tstest/integration/vms: test on stable nixos (21.11) 2022-04-11 12:54:56 -07:00
tstime tstime/mono: fix Before function comment 2022-03-05 15:05:57 -08:00
tsweb tsweb: add PrometheusVar, for vars that want to output varz themselves. 2022-03-21 12:33:18 -07:00
types tailcfg: add omitempty to all fields of Hostinfo (#4360) 2022-04-05 13:25:14 -07:00
util util/groupmember: remove redundant code (#4298) 2022-03-26 21:45:06 -07:00
version version: use Go 1.18's git stamping as default implementation 2022-03-16 14:53:51 -07:00
wf all: use any instead of interface{} 2022-03-17 11:35:09 -07:00
wgengine net/tsaddr, wgengine/netstack: add IPv6 range that forwards to site-relative IPv4 2022-04-11 17:26:07 -07:00
words words: more hamsters, less hampsters (#3938) 2022-02-14 15:15:30 -05:00
.gitattributes .: add .gitattributes entry to use Go hunk-header driver 2021-12-03 17:56:02 -08:00
.gitignore Makefile: update make spk target to use the new go spk builder 2022-01-21 12:27:00 -08:00
api.md api: update acl/validate data format (#4366) 2022-04-07 10:33:52 -07:00
AUTHORS Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
build_dist.sh tool/go: add wrapper to download and use go.toolchain.rev go version. 2022-01-04 09:45:29 -08:00
build_docker.sh tool/go: add wrapper to download and use go.toolchain.rev go version. 2022-01-04 09:45:29 -08:00
CODE_OF_CONDUCT.md Add a code of conduct. 2020-02-10 22:16:30 -08:00
Dockerfile Dockerfile: require Go 1.18 2022-03-16 12:45:28 -07:00
Dockerfile.base Dockerfile.base: update to alpine:3.15 2022-01-07 07:33:25 -08:00
go.mod go.mod: bump rtnetlink for address label encoding (#4386) 2022-04-08 14:17:53 -07:00
go.sum go.mod: bump rtnetlink for address label encoding (#4386) 2022-04-08 14:17:53 -07:00
go.toolchain.branch go.toolchain.branch: upgrade to Go 1.18 2022-03-16 12:45:28 -07:00
go.toolchain.rev go.toolchain.rev: pick up httptest race fix 2022-03-25 09:53:10 -07:00
LICENSE LICENSE: Reformat for Github 2021-01-24 16:20:22 -08:00
Makefile Makefile: add tidy target 2022-03-21 11:06:13 -07:00
PATENTS Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
pull-toolchain.sh go.toolchain.rev: add update script 2022-01-10 14:55:04 -08:00
README.md README.md: update current Go release 2022-03-16 12:45:28 -07:00
SECURITY.md Add a SECURITY.md for vulnerability reports. 2020-02-11 10:26:41 -08:00
shell.nix shell.nix: use tailscale-go for compilation 2022-04-08 14:10:50 -07:00
staticcheck.conf staticcheck.conf: remove unnecessary warning 2021-06-22 12:26:13 -07:00
version-embed.go go.toolchain.rev: add Go toolchain rev, tool to print it out 2022-01-03 11:56:27 -08:00
VERSION.txt VERSION.txt: This is 1.23. 2022-02-23 15:51:28 -08:00

Tailscale

https://tailscale.com

Private WireGuard® networks made easy

Overview

This repository contains all the open source Tailscale client code and the tailscaled daemon and tailscale CLI tool. The tailscaled daemon runs on Linux, Windows and macOS, and to varying degrees on FreeBSD, OpenBSD, and Darwin. (The Tailscale iOS and Android apps use this repo's code, but this repo doesn't contain the mobile GUI code.)

The Android app is at https://github.com/tailscale/tailscale-android

The Synology package is at https://github.com/tailscale/tailscale-synology

Using

We serve packages for a variety of distros at https://pkgs.tailscale.com .

Other clients

The macOS, iOS, and Windows clients use the code in this repository but additionally include small GUI wrappers that are not open source.

Building

go install tailscale.com/cmd/tailscale{,d}

If you're packaging Tailscale for distribution, use build_dist.sh instead, to burn commit IDs and version info into the binaries:

./build_dist.sh tailscale.com/cmd/tailscale
./build_dist.sh tailscale.com/cmd/tailscaled

If your distro has conventions that preclude the use of build_dist.sh, please do the equivalent of what it does in your distro's way, so that bug reports contain useful version information.

We only guarantee to support the latest Go release and any Go beta or release candidate builds (currently Go 1.18) in module mode. It might work in earlier Go versions or in GOPATH mode, but we're making no effort to keep those working.

Bugs

Please file any issues about this code or the hosted service on the issue tracker.

Contributing

PRs welcome! But please file bugs. Commit messages should reference bugs.

We require Developer Certificate of Origin Signed-off-by lines in commits.

About Us

Tailscale is primarily developed by the people at https://github.com/orgs/tailscale/people. For other contributors, see:

WireGuard is a registered trademark of Jason A. Donenfeld.