The easiest, most secure way to use WireGuard and 2FA.
Go to file
Brad Fitzpatrick e8ae355bb8
ipn: delete domainsForProxying, require explicit DNS search domains (mapver 9) (#1078)
Previously the client had heuristics to calculate which DNS search domains
to set, based on the peers' names. Unfortunately that prevented us from
doing some things we wanted to do server-side related to node sharing.

So, bump MapRequest.Version to 9 to signal that the client only uses the
explicitly configured DNS search domains and doesn't augment it with its own
list.

Updates tailscale/corp#1026

Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2021-01-05 10:37:15 -08:00
.github .github/workflows: use cache to speed up Windows tests 2020-11-02 07:45:48 -08:00
atomicfile atomicfile: don't Chmod on windows 2020-07-15 12:31:40 -07:00
cmd wgkey: new package 2020-12-30 17:33:02 -08:00
control/controlclient ipn: delete domainsForProxying, require explicit DNS search domains (mapver 9) (#1078) 2021-01-05 10:37:15 -08:00
derp version: use OSS repo's version when building. 2020-10-28 16:17:21 -07:00
disco wgengine/magicsock: run test DERP in mode where only disco packets allowed 2020-07-16 12:58:35 -07:00
internal all: replace wgcfg.IP and wgcfg.CIDR with netaddr types 2020-12-28 13:00:42 -08:00
ipn ipn: delete domainsForProxying, require explicit DNS search domains (mapver 9) (#1078) 2021-01-05 10:37:15 -08:00
log log/filelogger: move our Windows disk file writing+rotation package here 2020-10-29 14:59:44 -07:00
logpolicy cmd/tailscaled, logpolicy, logtail: support log levels 2020-12-21 12:59:33 -08:00
logtail cmd/tailscaled, logpolicy, logtail: support log levels 2020-12-21 12:59:33 -08:00
metrics metrics: add LabelMap.GetFloat 2020-07-19 12:31:12 -07:00
net net/tsaddr: add ChromeOS contains tests 2020-12-28 16:48:43 -08:00
paths paths, cmd/tailscaled: on Windows, don't try to migrate from legacy relay.conf 2020-07-13 08:59:54 -07:00
portlist tempfork/osexec: remove old fork of os/exec 2020-11-18 08:42:43 -08:00
safesocket safesocket: gofmt 2020-07-20 14:40:19 -07:00
scripts scripts: don't descend into .git for license header check 2020-09-10 09:23:33 -07:00
smallzstd smallzstd: new package that constructs zstd small encoders/decoders. 2020-07-02 16:13:06 -07:00
syncs Fix receiver in order to be consistent: syncs.WaitGroupChan 2020-11-24 17:20:34 -08:00
tailcfg ipn: delete domainsForProxying, require explicit DNS search domains (mapver 9) (#1078) 2021-01-05 10:37:15 -08:00
tempfork/pprof go.mod: upgrade staticcheck to 0.1.0 2020-12-14 14:01:29 -08:00
tsconst net/netns: add windows support. 2020-09-14 16:28:49 -07:00
tstest wgengine/magicsock: make test pass on Windows and without firewall dialog box 2020-10-28 09:02:08 -07:00
tstime tstime: add Parse3339B, for byte slices 2020-11-19 14:47:11 -08:00
tsweb tsweb: add an endpoint to manually trigger a GC. 2020-12-08 16:49:42 -08:00
types wgkey: new package 2020-12-30 17:33:02 -08:00
util util/systemd: don't log warnings when not running under systemd 2020-12-17 12:59:05 -08:00
version version: new version for a new year 2021-01-04 08:58:05 -08:00
wgengine ipn: delete domainsForProxying, require explicit DNS search domains (mapver 9) (#1078) 2021-01-05 10:37:15 -08:00
.gitattributes .gitattributes: add a smudge filter for go.mod. 2020-02-19 20:02:02 -05:00
.gitignore add nix-shell boilerplate (#1028) 2020-12-29 12:17:03 -05:00
AUTHORS Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
build_dist.sh build_dist: fix after version refactor. 2020-11-03 14:40:09 -08:00
CODE_OF_CONDUCT.md Add a code of conduct. 2020-02-10 22:16:30 -08:00
Dockerfile Patch docker to use valid Go version 2020-11-11 06:27:15 -08:00
go.mod go.mod: update wireguard-go version 2020-12-30 17:41:14 -08:00
go.sum go.sum: update to match wireguard-go version update. 2021-01-02 16:27:06 -08:00
LICENSE Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
Makefile Makefile: remove tsshd from depaware 2020-09-11 11:09:32 -07:00
PATENTS Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
README.md version: use OSS repo's version when building. 2020-10-28 16:17:21 -07:00
SECURITY.md Add a SECURITY.md for vulnerability reports. 2020-02-11 10:26:41 -08:00
shell.nix add nix-shell boilerplate (#1028) 2020-12-29 12:17:03 -05:00
VERSION.txt VERSION.txt: this is now 1.3.x. 2020-11-03 15:09:02 -08:00

Tailscale

https://tailscale.com

Private WireGuard® networks made easy

Overview

This repository contains all the open source Tailscale client code and the tailscaled daemon and tailscale CLI tool. The tailscaled daemon runs primarily on Linux; it also works to varying degrees on FreeBSD, OpenBSD, Darwin, and Windows.

The Android app is at https://github.com/tailscale/tailscale-android

Using

We serve packages for a variety of distros at https://pkgs.tailscale.com .

Other clients

The macOS, iOS, and Windows clients use the code in this repository but additionally include small GUI wrappers that are not open source.

Building

go install tailscale.com/cmd/tailscale{,d}

If you're packaging Tailscale for distribution, use build_dist.sh instead, to burn commit IDs and version info into the binaries:

./build_dist.sh tailscale.com/cmd/tailscale
./build_dist.sh tailscale.com/cmd/tailscaled

If your distro has conventions that preclude the use of build_dist.sh, please do the equivalent of what it does in your distro's way, so that bug reports contain useful version information.

We only guarantee to support the latest Go release and any Go beta or release candidate builds (currently Go 1.15) in module mode. It might work in earlier Go versions or in GOPATH mode, but we're making no effort to keep those working.

Bugs

Please file any issues about this code or the hosted service on the issue tracker.

Contributing

PRs welcome! But please file bugs. Commit messages should reference bugs.

We require Developer Certificate of Origin Signed-off-by lines in commits.

About Us

We are apenwarr, bradfitz, crawshaw, danderson, dfcarney, josharian from Tailscale Inc. You can learn more about us from our website.

WireGuard is a registered trademark of Jason A. Donenfeld.