tailscale/cmd/derper
Andrew Dunham 223126fe5b cmd/derper, net/netcheck: add challenge/response to generate_204 endpoint
The Lufthansa in-flight wifi generates a synthetic 204 response to the
DERP server's /generate_204 endpoint. This PR adds a basic
challenge/response to the endpoint; something sufficiently complicated
that it's unlikely to be implemented by a captive portal. We can then
check for the expected response to verify whether we're being MITM'd.

Follow-up to #5601

Signed-off-by: Andrew Dunham <andrew@du.nham.ca>
Change-Id: I94a68c9a16a7be7290200eea6a549b64f02ff48f
2022-10-19 11:10:18 -04:00
..
bootstrap_dns_test.go cmd/derper: add support for unpublished bootstrap DNS entries (#5529) 2022-09-02 14:48:30 -04:00
bootstrap_dns.go cmd/derper: add support for unpublished bootstrap DNS entries (#5529) 2022-09-02 14:48:30 -04:00
cert.go cmd/derper: fix data race & server panic in manual cert mode 2022-08-10 15:14:09 -07:00
depaware.txt net/wsconn: add back custom wrapper for turning a websocket.Conn into a net.Conn 2022-10-18 15:39:32 -07:00
derper_test.go cmd/derper, net/netcheck: add challenge/response to generate_204 endpoint 2022-10-19 11:10:18 -04:00
derper.go cmd/derper, net/netcheck: add challenge/response to generate_204 endpoint 2022-10-19 11:10:18 -04:00
mesh.go derp: use new node key type. 2021-10-28 16:02:11 -07:00
websocket.go net/wsconn: add back custom wrapper for turning a websocket.Conn into a net.Conn 2022-10-18 15:39:32 -07:00