The easiest, most secure way to use WireGuard and 2FA.
Go to file
Brad Fitzpatrick 756d6a72bd wgengine: lazily create peer wireguard configs more explicitly
Rather than consider bigs jumps in last-received-from activity as a
signal to possibly reconfigure the set of wireguard peers to have
configured, instead just track the set of peers that are currently
excluded from the configuration. Easier to reason about.

Also adds a bit more logging.

This might fix an error we saw on a machine running a recent unstable
build:

2020-08-26 17:54:11.528033751 +0000 UTC: 8.6M/92.6M magicsock: [unexpected] lazy endpoint not created for [UcppE], d:42a770f678357249
2020-08-26 17:54:13.691305296 +0000 UTC: 8.7M/92.6M magicsock: DERP packet received from idle peer [UcppE]; created=false
2020-08-26 17:54:13.691383687 +0000 UTC: 8.7M/92.6M magicsock: DERP packet from unknown key: [UcppE]

If it does happen again, though, we'll have more logs.
2020-08-26 12:26:06 -07:00
.github Switch to Go 1.15. 2020-08-18 15:48:30 -07:00
atomicfile atomicfile: don't Chmod on windows 2020-07-15 12:31:40 -07:00
cmd cmd/tailscale/cli: add basic 'down' subcommand 2020-08-25 18:54:29 -07:00
control/controlclient tailcfg, wgengine, controlclient: add control-side gating of lazy WG config 2020-08-20 13:21:25 -07:00
derp derp: set NotBefore and NotAfter in DERP server's metacert 2020-08-24 14:57:44 -07:00
disco wgengine/magicsock: run test DERP in mode where only disco packets allowed 2020-07-16 12:58:35 -07:00
internal/deepprint all: dns refactor, add Proxied and PerDomain flags from control (#615) 2020-07-31 16:27:09 -04:00
ipn cmd/tailscale/cli: add basic 'down' subcommand 2020-08-25 18:54:29 -07:00
log/logheap log/logheap: appease staticcheck 2020-06-12 10:31:42 -07:00
logpolicy net/tshttpproxy: new package, support WPAD/PAC proxies on Windows 2020-08-18 15:40:56 -07:00
logtail backoff: update to Go style, document a bit, make 30s explicit 2020-08-09 09:36:26 -07:00
metrics metrics: add LabelMap.GetFloat 2020-07-19 12:31:12 -07:00
net net/tshttpproxy: add start of Kerberos Negotiate auth to proxies on Windows 2020-08-25 13:49:06 -07:00
paths paths, cmd/tailscaled: on Windows, don't try to migrate from legacy relay.conf 2020-07-13 08:59:54 -07:00
portlist portlist: avoid syscall audit violation logspam on Android 2020-07-28 13:21:42 -07:00
safesocket safesocket: gofmt 2020-07-20 14:40:19 -07:00
scripts wgengine/router: split out from wgengine. 2020-04-30 13:31:24 -07:00
smallzstd smallzstd: new package that constructs zstd small encoders/decoders. 2020-07-02 16:13:06 -07:00
syncs syncs: add AtomicBool 2020-05-29 12:41:30 -07:00
tailcfg tailcfg, tsdns: derive root domains from list of nodes (#708) 2020-08-24 17:27:21 -04:00
tempfork tempfork: add lite fork of net/http/pprof w/o html/template or reflect 2020-07-21 16:17:03 -07:00
tstest ipn: tag and test for grinder log lines (#711) 2020-08-25 12:42:54 -06:00
tstime tstime: hand-implement parseInt for specific needs of rfc3339 parsing. 2020-04-14 12:36:55 -07:00
tsweb tsweb: rewrite JSONHandler without using reflect (#684) 2020-08-18 17:37:01 -04:00
types types/key: restore Curve25519 clamping in NewPrivate 2020-08-20 14:25:28 -07:00
util/lineread util/lineread: add little package to read lines from files/Readers 2020-07-06 10:34:33 -07:00
version version: bump date 2020-08-20 20:21:58 -07:00
wgengine wgengine: lazily create peer wireguard configs more explicitly 2020-08-26 12:26:06 -07:00
.gitattributes .gitattributes: add a smudge filter for go.mod. 2020-02-19 20:02:02 -05:00
.gitignore cmd/relaynode: drop local --acl-file in favour of central packet filter. 2020-02-20 00:15:43 -05:00
AUTHORS Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
CODE_OF_CONDUCT.md Add a code of conduct. 2020-02-10 22:16:30 -08:00
Dockerfile Dockerfile: install iproute2 in the container image. 2020-05-10 17:12:17 -07:00
go.mod net/tshttpproxy: add start of Kerberos Negotiate auth to proxies on Windows 2020-08-25 13:49:06 -07:00
go.sum net/tshttpproxy: add start of Kerberos Negotiate auth to proxies on Windows 2020-08-25 13:49:06 -07:00
LICENSE Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
Makefile cmd/tailscale/cli: fix vet warning 2020-08-24 21:35:27 -07:00
PATENTS Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
README.md Switch to Go 1.15. 2020-08-18 15:48:30 -07:00
SECURITY.md Add a SECURITY.md for vulnerability reports. 2020-02-11 10:26:41 -08:00

Tailscale

https://tailscale.com

Private WireGuard® networks made easy

Overview

This repository contains all the open source Tailscale client code and the tailscaled daemon and tailscale CLI tool. The tailscaled daemon runs primarily on Linux; it also works to varying degrees on FreeBSD, OpenBSD, Darwin, and Windows.

The Android app is at https://github.com/tailscale/tailscale-android

Using

We serve packages for a variety of distros at https://pkgs.tailscale.com .

Other clients

The macOS, iOS, and Windows clients use the code in this repository but additionally include small GUI wrappers that are not open source.

Building

go install tailscale.com/cmd/tailscale{,d}

We only guarantee to support the latest Go release and any Go beta or release candidate builds (currently Go 1.15) in module mode. It might work in earlier Go versions or in GOPATH mode, but we're making no effort to keep those working.

Bugs

Please file any issues about this code or the hosted service on the issue tracker.

Contributing

PRs welcome! But please file bugs. Commit messages should reference bugs.

We require Developer Certificate of Origin Signed-off-by lines in commits.

About Us

We are apenwarr, bradfitz, crawshaw, danderson, dfcarney, josharian from Tailscale Inc. You can learn more about us from our website.

WireGuard is a registered trademark of Jason A. Donenfeld.