The easiest, most secure way to use WireGuard and 2FA.
Go to file
Denton Gentry d7f452c0a1 net/portmapper: send discovery packet for IGD specifically.
There appear to be devices out there which send only their
first descriptor in response to a discovery packet for
`ssdp:all`, for example the Sagemcom FAST3890V3 only sends
urn:schemas-wifialliance-org:device:WFADevice:1

Send both ssdp:all and a discovery frame for
InternetGatewayDevice specifically.

Updates https://github.com/tailscale/tailscale/issues/3557

Signed-off-by: Denton Gentry <dgentry@tailscale.com>
2022-06-28 03:55:17 -07:00
.bencher bencher: add config to suppress failures on benchmark regressions. 2021-10-01 16:16:02 -07:00
.github .github/workflows: windows-race: print gcc version 2022-06-24 15:30:36 -07:00
atomicfile atomicfile: don't Chmod on windows 2020-07-15 12:31:40 -07:00
chirp all: use any instead of interface{} 2022-03-17 11:35:09 -07:00
client/tailscale client/tailscale: update ACLRow and ACLTest with new ACL fields 2022-06-24 12:20:08 -07:00
cmd cmd/tailscale: move call to cli.CleanUpArgs() from main() into cli.Run() (#4954) 2022-06-27 14:56:25 -07:00
control control/controlclient, ipn/ipnlocal: remove Client.SetExpirySooner, fix race 2022-06-19 22:08:29 -07:00
derp net/wsconn: remove homegrown wrapper for turning a websocket.Conn into a net.Conn 2022-06-07 09:28:56 -07:00
disco types/key: export constants for key size, not a method. 2021-10-29 17:39:04 -07:00
docs build_docker.sh: add run.sh as an entrypoint to the docker image 2022-06-07 00:45:49 +05:00
envknob ipn/ipnlocal: reject tailscale up --ssh if disabled on tailnet 2022-04-20 11:38:27 -07:00
health cmd/tailscale: surface authentication errors in status.Health (#4748) 2022-06-03 10:52:07 -07:00
hostinfo hostinfo,distro: Identify Western Digital MyCloud devices. 2022-06-05 08:22:42 -07:00
internal/tooldeps util/deephash: move internal/deephash to util/deephash 2021-07-02 21:33:02 -07:00
ipn control/controlclient, ipn/ipnlocal: remove Client.SetExpirySooner, fix race 2022-06-19 22:08:29 -07:00
kube all: use any instead of interface{} 2022-03-17 11:35:09 -07:00
log wasm: drop pprof dependency 2022-06-07 12:16:16 -07:00
logpolicy tsnet: use proper log ID 2022-06-07 10:09:21 -07:00
logtail logtail: do not panic in PrivateID.PublicID (#4815) 2022-06-07 17:25:05 -07:00
metrics all: use testingutil.MinAllocsPerRun 2021-10-28 12:48:37 -07:00
net net/portmapper: send discovery packet for IGD specifically. 2022-06-28 03:55:17 -07:00
packages/deb all: use any instead of interface{} 2022-03-17 11:35:09 -07:00
paths net/dns, paths, util/winutil: change net/dns/windowsManager NRPT management to support more than 50 domains. 2022-05-27 14:56:09 -06:00
portlist wasm: exclude code that's not used on iOS for Wasm too 2022-06-06 13:52:52 -07:00
prober prober: used keyed initializer for LimitedReader. 2022-03-26 21:45:27 -07:00
safesocket safesocket: log warning when running sandboxed Mac binary as root 2022-04-28 16:22:19 -07:00
scripts Adding pkg for Freebsd installation 2022-06-20 11:31:10 -07:00
smallzstd smallzstd: new package that constructs zstd small encoders/decoders. 2020-07-02 16:13:06 -07:00
ssh/tailssh ssh/tailssh: fix logging typo 2022-06-27 13:23:09 -07:00
syncs syncs: use TryLock and TryRLock instead of unsafe 2022-03-17 10:57:41 -07:00
tailcfg tailcfg: define some Node.Capabilities about SSH, its config 2022-06-17 12:14:50 -07:00
tempfork ssh/tailssh: send banner messages during auth, move more to conn 2022-04-20 18:34:11 -07:00
tool tool/go: add wrapper to download and use go.toolchain.rev go version. 2022-01-04 09:45:29 -08:00
tsconst net/interfaces/windows: update Tailscale interface detection logic to 2021-11-08 07:44:33 -08:00
tsnet tsnet: add Server.AuthKey field 2022-06-27 21:57:57 -07:00
tstest net/portmapper: enable for iOS 2022-06-09 10:40:25 -07:00
tstime tstime/mono: fix Before function comment 2022-03-05 15:05:57 -08:00
tsweb tsweb: implement interceptor for error page presentation 2022-06-08 15:21:16 -07:00
types control/controlclient, types/netmap: remove unused LocalPort field 2022-06-19 17:22:00 -07:00
util util/deephash: add canMemHash func + typeInfo property 2022-06-25 13:09:30 -07:00
version hostinfo,distro: Identify Western Digital MyCloud devices. 2022-06-05 08:22:42 -07:00
wf all: use any instead of interface{} 2022-03-17 11:35:09 -07:00
wgengine wgengine/router: windows: set SkipAsSource on IPv6 LL addresses 2022-06-22 15:26:40 -07:00
words words: The lists continue to drag-on. (#4780) 2022-06-03 10:55:17 -04:00
.gitattributes .: add .gitattributes entry to use Go hunk-header driver 2021-12-03 17:56:02 -08:00
.gitignore Makefile: update make spk target to use the new go spk builder 2022-01-21 12:27:00 -08:00
api.md api.md: document preauthorized and tags fields 2022-05-17 09:25:13 -07:00
AUTHORS Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
build_dist.sh tool/go: add wrapper to download and use go.toolchain.rev go version. 2022-01-04 09:45:29 -08:00
build_docker.sh build_docker.sh: add run.sh as an entrypoint to the docker image 2022-06-07 00:45:49 +05:00
CODE_OF_CONDUCT.md Add a code of conduct. 2020-02-10 22:16:30 -08:00
Dockerfile Dockerfile: require Go 1.18 2022-03-16 12:45:28 -07:00
Dockerfile.base Dockerfile.base: update to alpine:3.15 2022-01-07 07:33:25 -08:00
go.mod go.mod: bump go4.org/unsafe/assume-no-moving-gc for Go 1.19beta1 2022-06-16 20:40:22 -07:00
go.sum go.mod: bump go4.org/unsafe/assume-no-moving-gc for Go 1.19beta1 2022-06-16 20:40:22 -07:00
go.toolchain.branch go.toolchain.branch: upgrade to Go 1.18 2022-03-16 12:45:28 -07:00
go.toolchain.rev go.toolchain.rev: bump Go to 1.18.3 (+ Tailscale patches) 2022-06-06 15:46:28 -07:00
LICENSE LICENSE: Reformat for Github 2021-01-24 16:20:22 -08:00
Makefile Makefile: add tidy target 2022-03-21 11:06:13 -07:00
PATENTS Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
pull-toolchain.sh go.toolchain.rev: add update script 2022-01-10 14:55:04 -08:00
README.md README.md: update current Go release 2022-03-16 12:45:28 -07:00
SECURITY.md Add a SECURITY.md for vulnerability reports. 2020-02-11 10:26:41 -08:00
shell.nix shell.nix: use 1.18 from system nixpkgs 2022-06-21 15:36:39 -07:00
staticcheck.conf staticcheck.conf: remove unnecessary warning 2021-06-22 12:26:13 -07:00
version-embed.go go.toolchain.rev: add Go toolchain rev, tool to print it out 2022-01-03 11:56:27 -08:00
VERSION.txt VERSION.txt: this is v1.27.0 2022-06-06 16:11:18 -07:00

Tailscale

https://tailscale.com

Private WireGuard® networks made easy

Overview

This repository contains all the open source Tailscale client code and the tailscaled daemon and tailscale CLI tool. The tailscaled daemon runs on Linux, Windows and macOS, and to varying degrees on FreeBSD, OpenBSD, and Darwin. (The Tailscale iOS and Android apps use this repo's code, but this repo doesn't contain the mobile GUI code.)

The Android app is at https://github.com/tailscale/tailscale-android

The Synology package is at https://github.com/tailscale/tailscale-synology

Using

We serve packages for a variety of distros at https://pkgs.tailscale.com .

Other clients

The macOS, iOS, and Windows clients use the code in this repository but additionally include small GUI wrappers that are not open source.

Building

go install tailscale.com/cmd/tailscale{,d}

If you're packaging Tailscale for distribution, use build_dist.sh instead, to burn commit IDs and version info into the binaries:

./build_dist.sh tailscale.com/cmd/tailscale
./build_dist.sh tailscale.com/cmd/tailscaled

If your distro has conventions that preclude the use of build_dist.sh, please do the equivalent of what it does in your distro's way, so that bug reports contain useful version information.

We only guarantee to support the latest Go release and any Go beta or release candidate builds (currently Go 1.18) in module mode. It might work in earlier Go versions or in GOPATH mode, but we're making no effort to keep those working.

Bugs

Please file any issues about this code or the hosted service on the issue tracker.

Contributing

PRs welcome! But please file bugs. Commit messages should reference bugs.

We require Developer Certificate of Origin Signed-off-by lines in commits.

About Us

Tailscale is primarily developed by the people at https://github.com/orgs/tailscale/people. For other contributors, see:

WireGuard is a registered trademark of Jason A. Donenfeld.