The easiest, most secure way to use WireGuard and 2FA.
Go to file
Mihai Parparita ec649e707f ipn/ipnlocal: prefer to use one CGNAT route on the Mac
Together with 06aa141632 this minimizes
the number of NEPacketTunnelNetworkSettings updates that we have to do,
and thus avoids Chrome interrupting outstanding requests due to
(perceived) network changes.

Updates #3102

Signed-off-by: Mihai Parparita <mihai@tailscale.com>
2022-06-30 13:18:52 -07:00
.bencher bencher: add config to suppress failures on benchmark regressions. 2021-10-01 16:16:02 -07:00
.github .github/workflows: downgrade MinGW to work around windows-race failures 2022-06-29 14:27:57 -07:00
atomicfile atomicfile: don't Chmod on windows 2020-07-15 12:31:40 -07:00
chirp all: use any instead of interface{} 2022-03-17 11:35:09 -07:00
client/tailscale client/tailscale: update ACLRow and ACLTest with new ACL fields 2022-06-24 12:20:08 -07:00
cmd cmd/tailscale: exit loop when timeout and pingArgs.num are met 2022-06-30 11:52:56 -07:00
control control/controlclient, ipn/ipnlocal: remove Client.SetExpirySooner, fix race 2022-06-19 22:08:29 -07:00
derp net/wsconn: remove homegrown wrapper for turning a websocket.Conn into a net.Conn 2022-06-07 09:28:56 -07:00
disco types/key: export constants for key size, not a method. 2021-10-29 17:39:04 -07:00
docs build_docker.sh: add run.sh as an entrypoint to the docker image 2022-06-07 00:45:49 +05:00
envknob ipn/ipnlocal: reject tailscale up --ssh if disabled on tailnet 2022-04-20 11:38:27 -07:00
health cmd/tailscale: surface authentication errors in status.Health (#4748) 2022-06-03 10:52:07 -07:00
hostinfo hostinfo,distro: Identify Western Digital MyCloud devices. 2022-06-05 08:22:42 -07:00
internal/tooldeps util/deephash: move internal/deephash to util/deephash 2021-07-02 21:33:02 -07:00
ipn ipn/ipnlocal: prefer to use one CGNAT route on the Mac 2022-06-30 13:18:52 -07:00
kube all: use any instead of interface{} 2022-03-17 11:35:09 -07:00
log wasm: drop pprof dependency 2022-06-07 12:16:16 -07:00
logpolicy tsnet: use proper log ID 2022-06-07 10:09:21 -07:00
logtail logtail: do not panic in PrivateID.PublicID (#4815) 2022-06-07 17:25:05 -07:00
metrics all: use testingutil.MinAllocsPerRun 2021-10-28 12:48:37 -07:00
net ipn/ipnlocal: prefer to use one CGNAT route on the Mac 2022-06-30 13:18:52 -07:00
packages/deb all: use any instead of interface{} 2022-03-17 11:35:09 -07:00
paths net/dns, paths, util/winutil: change net/dns/windowsManager NRPT management to support more than 50 domains. 2022-05-27 14:56:09 -06:00
portlist wasm: exclude code that's not used on iOS for Wasm too 2022-06-06 13:52:52 -07:00
prober prober: used keyed initializer for LimitedReader. 2022-03-26 21:45:27 -07:00
safesocket safesocket: log warning when running sandboxed Mac binary as root 2022-04-28 16:22:19 -07:00
scripts Adding pkg for Freebsd installation 2022-06-20 11:31:10 -07:00
smallzstd smallzstd: new package that constructs zstd small encoders/decoders. 2020-07-02 16:13:06 -07:00
ssh/tailssh ssh/tailssh: fix Tailscale SSH to Linux Arch machines 2022-06-28 15:35:51 -07:00
syncs syncs: use TryLock and TryRLock instead of unsafe 2022-03-17 10:57:41 -07:00
tailcfg tailcfg: define some Node.Capabilities about SSH, its config 2022-06-17 12:14:50 -07:00
tempfork ssh/tailssh: send banner messages during auth, move more to conn 2022-04-20 18:34:11 -07:00
tool tool/go: add wrapper to download and use go.toolchain.rev go version. 2022-01-04 09:45:29 -08:00
tsconst net/interfaces/windows: update Tailscale interface detection logic to 2021-11-08 07:44:33 -08:00
tsnet tsnet: add Server.AuthKey field 2022-06-27 21:57:57 -07:00
tstest net/portmapper: enable for iOS 2022-06-09 10:40:25 -07:00
tstime tstime/mono: fix Before function comment 2022-03-05 15:05:57 -08:00
tsweb tsweb: implement interceptor for error page presentation 2022-06-08 15:21:16 -07:00
types control/controlclient, types/netmap: remove unused LocalPort field 2022-06-19 17:22:00 -07:00
util ipn/ipnlocal, net/dns*, util/cloudenv: add AWS DNS support 2022-06-29 20:37:44 -07:00
version Docker: add ALPINE.txt to manage alpine versions 2022-06-29 11:47:09 -07:00
wf all: use any instead of interface{} 2022-03-17 11:35:09 -07:00
wgengine wgengine/router: avoid unncessary routing configuration changes 2022-06-28 16:59:37 -07:00
words words: The lists continue to drag-on. (#4780) 2022-06-03 10:55:17 -04:00
.gitattributes .: add .gitattributes entry to use Go hunk-header driver 2021-12-03 17:56:02 -08:00
.gitignore Makefile: update make spk target to use the new go spk builder 2022-01-21 12:27:00 -08:00
ALPINE.txt Docker: add ALPINE.txt to manage alpine versions 2022-06-29 11:47:09 -07:00
api.md api.md: document preauthorized and tags fields 2022-05-17 09:25:13 -07:00
AUTHORS Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
build_dist.sh tool/go: add wrapper to download and use go.toolchain.rev go version. 2022-01-04 09:45:29 -08:00
build_docker.sh Dockerfile: bump alpine to 3.16 2022-06-29 10:29:37 -07:00
CODE_OF_CONDUCT.md Add a code of conduct. 2020-02-10 22:16:30 -08:00
Dockerfile Dockerfile: fix build 2022-06-29 08:18:01 -07:00
Dockerfile.base Dockerfile: bump alpine to 3.16 2022-06-29 10:29:37 -07:00
go.mod ipn/ipnlocal, net/dns*, util/cloudenv: specialize DNS config on Google Cloud 2022-06-29 17:39:13 -07:00
go.sum ipn/ipnlocal, net/dns*, util/cloudenv: specialize DNS config on Google Cloud 2022-06-29 17:39:13 -07:00
go.toolchain.branch go.toolchain.branch: upgrade to Go 1.18 2022-03-16 12:45:28 -07:00
go.toolchain.rev go.toolchain.rev: bump Go to 1.18.3 (+ Tailscale patches) 2022-06-06 15:46:28 -07:00
LICENSE LICENSE: Reformat for Github 2021-01-24 16:20:22 -08:00
Makefile Makefile: add tidy target 2022-03-21 11:06:13 -07:00
PATENTS Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
pull-toolchain.sh go.toolchain.rev: add update script 2022-01-10 14:55:04 -08:00
README.md README.md: update current Go release 2022-03-16 12:45:28 -07:00
SECURITY.md Add a SECURITY.md for vulnerability reports. 2020-02-11 10:26:41 -08:00
shell.nix shell.nix: use 1.18 from system nixpkgs 2022-06-21 15:36:39 -07:00
staticcheck.conf staticcheck.conf: remove unnecessary warning 2021-06-22 12:26:13 -07:00
version-embed.go Docker: add ALPINE.txt to manage alpine versions 2022-06-29 11:47:09 -07:00
VERSION.txt VERSION.txt: this is v1.27.0 2022-06-06 16:11:18 -07:00

Tailscale

https://tailscale.com

Private WireGuard® networks made easy

Overview

This repository contains all the open source Tailscale client code and the tailscaled daemon and tailscale CLI tool. The tailscaled daemon runs on Linux, Windows and macOS, and to varying degrees on FreeBSD, OpenBSD, and Darwin. (The Tailscale iOS and Android apps use this repo's code, but this repo doesn't contain the mobile GUI code.)

The Android app is at https://github.com/tailscale/tailscale-android

The Synology package is at https://github.com/tailscale/tailscale-synology

Using

We serve packages for a variety of distros at https://pkgs.tailscale.com .

Other clients

The macOS, iOS, and Windows clients use the code in this repository but additionally include small GUI wrappers that are not open source.

Building

go install tailscale.com/cmd/tailscale{,d}

If you're packaging Tailscale for distribution, use build_dist.sh instead, to burn commit IDs and version info into the binaries:

./build_dist.sh tailscale.com/cmd/tailscale
./build_dist.sh tailscale.com/cmd/tailscaled

If your distro has conventions that preclude the use of build_dist.sh, please do the equivalent of what it does in your distro's way, so that bug reports contain useful version information.

We only guarantee to support the latest Go release and any Go beta or release candidate builds (currently Go 1.18) in module mode. It might work in earlier Go versions or in GOPATH mode, but we're making no effort to keep those working.

Bugs

Please file any issues about this code or the hosted service on the issue tracker.

Contributing

PRs welcome! But please file bugs. Commit messages should reference bugs.

We require Developer Certificate of Origin Signed-off-by lines in commits.

About Us

Tailscale is primarily developed by the people at https://github.com/orgs/tailscale/people. For other contributors, see:

WireGuard is a registered trademark of Jason A. Donenfeld.