The easiest, most secure way to use WireGuard and 2FA.
Go to file
Andrew Lytvynov d45af7c66f
release/dist/cli: add sign-key and verify-key-signature commands (#9041)
Now we have all the commands to generate the key hierarchy and verify
that signing keys were signed correctly:
```
$ ./tool/go run ./cmd/dist gen-key --priv-path root-priv.pem --pub-path root-pub.pem --root
wrote private key to root-priv.pem
wrote public key to root-pub.pem

$ ./tool/go run ./cmd/dist gen-key --priv-path signing-priv.pem --pub-path signing-pub.pem --signing
wrote private key to signing-priv.pem
wrote public key to signing-pub.pem

$ ./tool/go run ./cmd/dist sign-key --root-priv-path root-priv.pem --sign-pub-path signing-pub.pem
wrote signature to signature.bin

$ ./tool/go run ./cmd/dist verify-key-signature --root-pub-path root-pub.pem --sign-pub-path signing-pub.pem --sig-path signature.bin
signature ok
```

Updates #8760

Signed-off-by: Andrew Lytvynov <awly@tailscale.com>
2023-08-24 10:54:42 -07:00
.bencher bencher: add config to suppress failures on benchmark regressions. 2021-10-01 16:16:02 -07:00
.github .github: update flakehub workflow to support existing tags (#9067) 2023-08-24 11:09:16 -04:00
atomicfile various: add golangci-lint, fix issues (#7905) 2023-04-17 18:38:24 -04:00
chirp all: update copyright and license headers 2023-01-27 15:36:29 -08:00
client client/web: refresh on tab focus 2023-08-24 12:22:47 -04:00
clientupdate release/dist/cli: add sign-key and verify-key-signature commands (#9041) 2023-08-24 10:54:42 -07:00
cmd util/osdiag, util/osdiag/internal/wsc: add code to probe the Windows Security Center for installed software 2023-08-24 11:51:18 -06:00
control types/netmap: remove redundant Netmap.Hostinfo 2023-08-22 09:54:02 -07:00
derp derp: include src IPs in mesh watch messages 2023-08-16 08:46:52 -07:00
disco wgengine,ipn,cmd/tailscale: add size option to ping (#8739) 2023-08-08 13:11:28 +01:00
docs docs/k8s: don't call kubectl directly from Makefile 2023-07-01 11:44:09 -07:00
doctor doctor/permissions: add new check to print process permissions 2023-03-29 11:50:23 -04:00
envknob types/netmap, all: make NetworkMap.SelfNode a tailcfg.NodeView 2023-08-21 13:34:49 -07:00
health cmd/tailscale: warn if node is locked out on bringup 2023-07-19 12:31:21 -05:00
hostinfo tailcfg: Add FirewallMode to NetInfo to record wether host using iptables or nftables 2023-08-15 18:52:51 -04:00
internal/tooldeps various: add golangci-lint, fix issues (#7905) 2023-04-17 18:38:24 -04:00
ipn all: replace deprecated ioutil references 2023-08-23 23:53:19 +01:00
jsondb all: update copyright and license headers 2023-01-27 15:36:29 -08:00
kube ipn/store: add support for stores to hook into a custom dialer 2023-03-29 16:35:46 -07:00
licenses licenses: update tailscale{,d} licenses 2023-08-21 12:36:37 -07:00
log tailcfg: move LogHeapPprof from Debug to c2n [capver 69] 2023-08-16 20:35:04 -07:00
logpolicy util/testenv: add new package to hold InTest 2023-08-08 19:51:44 -06:00
logtail net/netmon: make ChangeFunc's signature take new ChangeDelta, not bool 2023-08-23 10:42:14 -07:00
metrics all: use Go 1.21 slices, maps instead of x/exp/{slices,maps} 2023-08-17 08:42:35 -07:00
net cmd/tailscale/cli: make netcheck run even if machine lacks TLS certs 2023-08-23 21:11:04 -07:00
packages/deb go.mod: upgrade nfpm to v2 (#8786) 2023-08-03 13:00:45 -07:00
paths paths: remove wasm file, no-op stubs, make OS-specific funcs consistent 2023-08-24 03:40:52 -07:00
portlist all: use Go 1.21 slices, maps instead of x/exp/{slices,maps} 2023-08-17 08:42:35 -07:00
prober prober: fix data race when altering derpmap (#8397) 2023-06-21 10:16:31 -07:00
release release/dist/cli: add sign-key and verify-key-signature commands (#9041) 2023-08-24 10:54:42 -07:00
safesocket safesocket: enable test to run on Windows unpriviliged 2023-04-19 19:06:18 -07:00
scripts scripts/installer.sh: add CloudLinux and Alibaba Linux 2023-08-23 15:29:17 -07:00
smallzstd all: update copyright and license headers 2023-01-27 15:36:29 -08:00
ssh/tailssh all: replace deprecated ioutil references 2023-08-23 23:53:19 +01:00
syncs all: use Go 1.21 slices, maps instead of x/exp/{slices,maps} 2023-08-17 08:42:35 -07:00
tailcfg tailcfg: bump capver to 72 to restore UPnP 2023-08-23 13:55:39 -07:00
tempfork all: use Go 1.21 slices, maps instead of x/exp/{slices,maps} 2023-08-17 08:42:35 -07:00
tka all: implement lock revoke-keys command 2023-08-01 15:37:55 -05:00
tool release/dist: run yarn build before building CLI 2023-08-22 11:12:47 -07:00
tsconst all: update copyright and license headers 2023-01-27 15:36:29 -08:00
tsd tsd: add package with System type to unify subsystem init, discovery 2023-05-04 14:21:59 -07:00
tsnet client/web: cache csrf key when running in CGI mode 2023-08-24 09:17:04 -07:00
tstest all: replace deprecated ioutil references 2023-08-23 23:53:19 +01:00
tstime tstime/mono: remove unsafe 2023-08-11 13:23:16 -07:00
tsweb tsweb: clean up pprof handler registration, document why it's there 2023-08-23 10:16:14 -07:00
types types/logger, cmd/tailscale/cli: flesh out, simplify some non-unix build tags 2023-08-24 03:41:13 -07:00
util util/osdiag, util/osdiag/internal/wsc: add code to probe the Windows Security Center for installed software 2023-08-24 11:51:18 -06:00
version cmd/tailscale/cli,version/distro: update support for Alpine (#8701) 2023-07-24 16:53:15 -07:00
wf all: update copyright and license headers 2023-01-27 15:36:29 -08:00
wgengine ipn/ipnlocal, wgengine/magicsock: move UpdateStatus stuff around 2023-08-23 13:35:47 -07:00
words words: ack Miles Prower (#8479) 2023-07-06 11:29:09 -04:00
.gitattributes .: add .gitattributes entry to use Go hunk-header driver 2021-12-03 17:56:02 -08:00
.gitignore client/web: copy existing UI to basic react components 2023-08-15 12:01:36 -07:00
.golangci.yml ci: add more lints (#7909) 2023-04-19 21:54:19 -04:00
ALPINE.txt Docker: add ALPINE.txt to manage alpine versions 2022-06-29 11:47:09 -07:00
api.md api.md: update device authorize API docs to allow for deauth (#8728) 2023-07-27 15:30:14 +01:00
AUTHORS Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
build_dist.sh build_dist.sh: use $go consistently. 2023-06-05 10:21:03 -07:00
build_docker.sh Dockerfile: fix docker build 2023-02-14 00:59:09 +00:00
CODE_OF_CONDUCT.md Add a code of conduct. 2020-02-10 22:16:30 -08:00
CODEOWNERS CODEOWNERS: add the start of an owners file 2023-08-16 15:57:29 -07:00
Dockerfile all: require Go 1.21 2023-08-08 21:15:08 -07:00
Dockerfile.base Dockerfile.base: install iputils 2023-06-18 07:54:05 -07:00
flake.lock nix: update nixpkgs flake, override go_1_20 for tailscale_go (#7139) 2023-02-01 12:27:04 -05:00
flake.nix go.mod.sri: update SRI hash for go.mod changes 2023-08-21 12:04:38 -07:00
go.mod util/winutil: add RegisterForRestart, allowing programs to indicate their preferences to the Windows restart manager 2023-08-22 15:06:48 -06:00
go.mod.sri go.mod.sri: update SRI hash for go.mod changes 2023-08-21 12:04:38 -07:00
go.sum util/winutil: add RegisterForRestart, allowing programs to indicate their preferences to the Windows restart manager 2023-08-22 15:06:48 -06:00
go.toolchain.branch go.toolchain: switch to tailscale.go1.21 (#8415) 2023-06-23 09:12:19 -04:00
go.toolchain.rev tstime/mono: remove unsafe 2023-08-11 13:23:16 -07:00
LICENSE all: update tools that manage copyright headers 2023-01-27 15:36:29 -08:00
Makefile release/dist/synology: build synology packages with cmd/dist 2023-05-29 14:18:37 -07:00
PATENTS Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
pull-toolchain.sh pull-toolchain.sh: don't run update-flake.sh 2023-02-09 15:04:01 -08:00
README.md all: require Go 1.21 2023-08-08 21:15:08 -07:00
SECURITY.md Add a SECURITY.md for vulnerability reports. 2020-02-11 10:26:41 -08:00
shell.nix go.mod.sri: update SRI hash for go.mod changes 2023-08-21 12:04:38 -07:00
staticcheck.conf staticcheck.conf: remove unnecessary warning 2021-06-22 12:26:13 -07:00
update-flake.sh .github/workflows: add workflow to update go.mod Nix SRI hash 2023-02-14 03:28:43 +00:00
version_test.go all: update copyright and license headers 2023-01-27 15:36:29 -08:00
version-embed.go version: return correct Meta.MajorMinorPatch in non-dev builds 2023-02-10 13:00:44 -08:00
VERSION.txt VERSION.txt: this is v1.49.0 (#8907) 2023-08-16 09:37:36 -07:00

Tailscale

https://tailscale.com

Private WireGuard® networks made easy

Overview

This repository contains the majority of Tailscale's open source code. Notably, it includes the tailscaled daemon and the tailscale CLI tool. The tailscaled daemon runs on Linux, Windows, macOS, and to varying degrees on FreeBSD and OpenBSD. The Tailscale iOS and Android apps use this repo's code, but this repo doesn't contain the mobile GUI code.

Other Tailscale repos of note:

For background on which parts of Tailscale are open source and why, see https://tailscale.com/opensource/.

Using

We serve packages for a variety of distros and platforms at https://pkgs.tailscale.com.

Other clients

The macOS, iOS, and Windows clients use the code in this repository but additionally include small GUI wrappers. The GUI wrappers on non-open source platforms are themselves not open source.

Building

We always require the latest Go release, currently Go 1.21. (While we build releases with our Go fork, its use is not required.)

go install tailscale.com/cmd/tailscale{,d}

If you're packaging Tailscale for distribution, use build_dist.sh instead, to burn commit IDs and version info into the binaries:

./build_dist.sh tailscale.com/cmd/tailscale
./build_dist.sh tailscale.com/cmd/tailscaled

If your distro has conventions that preclude the use of build_dist.sh, please do the equivalent of what it does in your distro's way, so that bug reports contain useful version information.

Bugs

Please file any issues about this code or the hosted service on the issue tracker.

Contributing

PRs welcome! But please file bugs. Commit messages should reference bugs.

We require Developer Certificate of Origin Signed-off-by lines in commits.

See git log for our commit message style. It's basically the same as Go's style.

About Us

Tailscale is primarily developed by the people at https://github.com/orgs/tailscale/people. For other contributors, see:

WireGuard is a registered trademark of Jason A. Donenfeld.