tailscale/ipn
Avery Pennarun d7429b9a8d Add prefs.ShieldsUp and --shields-up option.
This sets a default packet filter that blocks all incoming requests,
giving end users more control over who can get into their machine, even
if the admin hasn't set any central ACLs.

Signed-off-by: Avery Pennarun <apenwarr@tailscale.com>
2020-04-29 05:25:45 -04:00
..
ipnserver all: remove unnecessary trailing newlines in format patterns for consistency 2020-04-11 08:35:34 -07:00
ipnstate cmd/tailscale: add status subcommand 2020-03-27 20:34:36 -07:00
policy ipn, ipn/policy: filter portlist to a short list of "interesting" ports 2020-04-01 10:03:44 -07:00
backend.go ipn: add auth key 2020-04-09 20:17:09 +10:00
doc.go Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
e2e_test.go tstest: rename from testy. 2020-04-28 20:45:12 -07:00
fake_test.go cmd/tailscale: add status subcommand 2020-03-27 20:34:36 -07:00
handle.go all: remove unnecessary trailing newlines in format patterns for consistency 2020-04-11 08:35:34 -07:00
local.go Add prefs.ShieldsUp and --shields-up option. 2020-04-29 05:25:45 -04:00
message_test.go tstest: rename from testy. 2020-04-28 20:45:12 -07:00
message.go ipn/message: fix some message encoding problems. 2020-04-29 05:25:45 -04:00
prefs_test.go Add prefs.ShieldsUp and --shields-up option. 2020-04-29 05:25:45 -04:00
prefs.go Add prefs.ShieldsUp and --shields-up option. 2020-04-29 05:25:45 -04:00
store_test.go Introduce a state store to LocalBackend. 2020-02-13 19:26:53 -08:00
store.go ipn: have NewFileStore try to create directories as needed 2020-03-03 11:51:44 -08:00