mirror of
https://github.com/tailscale/tailscale.git
synced 2024-11-29 21:15:39 +00:00
f9550e0bed
Use the packet filter rules to determine if any device is allowed to connect on port 5252. This does not check whether a specific device can connect (since we typically don't know the source device when this is used). Nor does it specifically check for wide-open ACLs, which is something we may provide a warning about in the future. Update the login popover content to display information when the src device is unable to connect to the dst device over its Tailscale IP. If we know it's an ACL issue, mention that, otherwise list a couple of things to check. In both cases, link to a placeholder URL to get more information about web client connection issues. Updates #10261 Signed-off-by: Will Norris <will@tailscale.com> |
||
---|---|---|
.. | ||
apitype | ||
example/servetls | ||
acl.go | ||
devices.go | ||
dns.go | ||
keys.go | ||
localclient_test.go | ||
localclient.go | ||
required_version.go | ||
routes.go | ||
tailnet.go | ||
tailscale.go |