The easiest, most secure way to use WireGuard and 2FA.
Go to file
Mihai Parparita fa932fefe7 net/interfaces: redo how we get the default interface on macOS and iOS
With #6566 we added an external mechanism for getting the default
interface, and used it on macOS and iOS (see tailscale/corp#8201).
The goal was to be able to get the default physical interface even when
using an exit node (in which case the routing table would say that the
Tailscale utun* interface is the default).

However, the external mechanism turns out to be unreliable in some
cases, e.g. when multiple cellular interfaces are present/toggled (I
have occasionally gotten my phone into a state where it reports the pdp_ip1
interface as the default, even though it can't actually route traffic).

It was observed that `ifconfig -v` on macOS reports an "effective interface"
for the Tailscale utn* interface, which seems promising. By examining
the ifconfig source code, it turns out that this is done via a
SIOCGIFDELEGATE ioctl syscall. Though this is a private API, it appears
to have been around for a long time (e.g. it's in the 10.13 xnu release
at https://opensource.apple.com/source/xnu/xnu-4570.41.2/bsd/net/if_types.h.auto.html)
and thus is unlikely to go away.

We can thus use this ioctl if the routing table says that a utun*
interface is the default, and go back to the simpler mechanism that
we had before #6566.

Updates #7184
Updates #7188

Signed-off-by: Mihai Parparita <mihai@tailscale.com>
2023-02-10 16:23:37 -08:00
.bencher bencher: add config to suppress failures on benchmark regressions. 2021-10-01 16:16:02 -07:00
.github .github/workflows: re-enable CIFuzz job 2023-02-08 13:51:14 -08:00
atomicfile all: update copyright and license headers 2023-01-27 15:36:29 -08:00
chirp all: update copyright and license headers 2023-01-27 15:36:29 -08:00
client/tailscale all: implement pcap streaming for datapath debugging 2023-02-04 15:54:20 -10:00
cmd net/interfaces: redo how we get the default interface on macOS and iOS 2023-02-10 16:23:37 -08:00
control control/controlhttp: don't require valid TLS cert for Noise connection 2023-02-08 12:47:01 -08:00
derp all: use Go 1.20's bytes.Clone 2023-02-01 17:39:18 -08:00
disco all: update to Go 1.20, use strings.CutPrefix/Suffix instead of our fork 2023-02-01 15:23:54 -08:00
docs all: update copyright and license headers 2023-01-27 15:36:29 -08:00
doctor all: update copyright and license headers 2023-01-27 15:36:29 -08:00
envknob all: update copyright and license headers 2023-01-27 15:36:29 -08:00
health health, net/tlsdial: add healthcheck for self-signed cert 2023-02-01 23:17:41 -05:00
hostinfo tailcfg, localapi: plumb device token to server 2023-02-03 10:28:11 -08:00
internal/tooldeps all: update copyright and license headers 2023-01-27 15:36:29 -08:00
ipn net/interfaces: redo how we get the default interface on macOS and iOS 2023-02-10 16:23:37 -08:00
jsondb all: update copyright and license headers 2023-01-27 15:36:29 -08:00
kube all: update copyright and license headers 2023-01-27 15:36:29 -08:00
licenses licenses: update win/apple licenses 2023-02-09 15:35:39 -08:00
log all: update copyright and license headers 2023-01-27 15:36:29 -08:00
logpolicy all: update copyright and license headers 2023-01-27 15:36:29 -08:00
logtail logtail: increase maximum log line size in low memory mode 2023-02-07 22:00:14 -08:00
metrics all: update copyright and license headers 2023-01-27 15:36:29 -08:00
net net/interfaces: redo how we get the default interface on macOS and iOS 2023-02-10 16:23:37 -08:00
packages/deb all: update copyright and license headers 2023-01-27 15:36:29 -08:00
paths all: update copyright and license headers 2023-01-27 15:36:29 -08:00
portlist all: update copyright and license headers 2023-01-27 15:36:29 -08:00
prober cmd/derpprobe: migrate to the prober framework 2023-01-31 10:47:42 +00:00
safesocket safesocket: remove the now unused WindowsLocalPort 2023-01-30 10:33:02 -08:00
scripts all: update tools that manage copyright headers 2023-01-27 15:36:29 -08:00
smallzstd all: update copyright and license headers 2023-01-27 15:36:29 -08:00
ssh/tailssh all: update to Go 1.20, use strings.CutPrefix/Suffix instead of our fork 2023-02-01 15:23:54 -08:00
syncs all: update copyright and license headers 2023-01-27 15:36:29 -08:00
tailcfg net/interfaces, net/netns: add node attributes to control default interface getting and binding 2023-02-08 13:15:10 -08:00
tempfork all: remove old +build tags 2022-11-04 07:25:42 -07:00
tka all: update copyright and license headers 2023-01-27 15:36:29 -08:00
tool go.toolchain.rev: use new statically built toolchain 2023-02-02 20:44:12 -08:00
tsconst all: update copyright and license headers 2023-01-27 15:36:29 -08:00
tsnet ipn/ipnlocal: drop not required StateKey parameter 2023-01-30 17:58:55 -08:00
tstest all: use Go 1.20's bytes.Clone 2023-02-01 17:39:18 -08:00
tstime all: update copyright and license headers 2023-01-27 15:36:29 -08:00
tsweb all: update to Go 1.20, use strings.CutPrefix/Suffix instead of our fork 2023-02-01 15:23:54 -08:00
types all: use Go 1.20's bytes.Clone 2023-02-01 17:39:18 -08:00
util util/linuxfw: initial implementation of package 2023-02-09 14:20:24 -05:00
version version: undo previous "optimization", do more work lazily 2023-02-10 15:27:14 -08:00
wf all: update copyright and license headers 2023-01-27 15:36:29 -08:00
wgengine wgengine: start logging DISCO frames to pcap stream 2023-02-10 11:22:34 -10:00
words all: update copyright and license headers 2023-01-27 15:36:29 -08:00
.gitattributes .: add .gitattributes entry to use Go hunk-header driver 2021-12-03 17:56:02 -08:00
.gitignore gitignore: ignore direnv nix-shell environment cache (#6520) 2022-11-26 09:30:00 -05:00
ALPINE.txt Docker: add ALPINE.txt to manage alpine versions 2022-06-29 11:47:09 -07:00
api.md api.md: change "admin panel" to "admin console" 2022-12-05 11:21:55 -08:00
AUTHORS Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
build_dist.sh cmd/tailscaled, net/tstun: add build tags to omit BIRD and TAP 2022-11-07 11:13:14 -05:00
build_docker.sh build_docker.sh: use docker hub for base image hosting. 2023-01-27 18:33:05 -08:00
CODE_OF_CONDUCT.md Add a code of conduct. 2020-02-10 22:16:30 -08:00
Dockerfile all: update to Go 1.20, use strings.CutPrefix/Suffix instead of our fork 2023-02-01 15:23:54 -08:00
Dockerfile.base all: update copyright and license headers 2023-01-27 15:36:29 -08:00
flake.lock nix: update nixpkgs flake, override go_1_20 for tailscale_go (#7139) 2023-02-01 12:27:04 -05:00
flake.nix go.toolchain.rev: update toolchain to test iOS Go fix 2023-02-09 12:59:51 -08:00
go.mod util/linuxfw: initial implementation of package 2023-02-09 14:20:24 -05:00
go.mod.sri go.toolchain.rev: update toolchain to test iOS Go fix 2023-02-09 12:59:51 -08:00
go.sum util/linuxfw: initial implementation of package 2023-02-09 14:20:24 -05:00
go.toolchain.branch go.toolchain.branch: update to Go 1.20 2023-02-01 15:14:05 -08:00
go.toolchain.rev go.toolchain.rev: bump Go toolchain 2023-02-09 15:07:55 -08:00
LICENSE all: update tools that manage copyright headers 2023-01-27 15:36:29 -08:00
Makefile all: update to Go 1.20, use strings.CutPrefix/Suffix instead of our fork 2023-02-01 15:23:54 -08:00
PATENTS Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
pull-toolchain.sh pull-toolchain.sh: don't run update-flake.sh 2023-02-09 15:04:01 -08:00
README.md all: update to Go 1.20, use strings.CutPrefix/Suffix instead of our fork 2023-02-01 15:23:54 -08:00
SECURITY.md Add a SECURITY.md for vulnerability reports. 2020-02-11 10:26:41 -08:00
shell.nix go.toolchain.rev: update toolchain to test iOS Go fix 2023-02-09 12:59:51 -08:00
staticcheck.conf staticcheck.conf: remove unnecessary warning 2021-06-22 12:26:13 -07:00
update-flake.sh go.toolchain.rev: use new statically built toolchain 2023-02-02 20:44:12 -08:00
version_test.go all: update copyright and license headers 2023-01-27 15:36:29 -08:00
version-embed.go version: return correct Meta.MajorMinorPatch in non-dev builds 2023-02-10 13:00:44 -08:00
VERSION.txt VERSION.txt: this is 1.37 2023-01-24 15:32:02 -08:00

Tailscale

https://tailscale.com

Private WireGuard® networks made easy

Overview

This repository contains the majority of Tailscale's open source code. Notably, it includes the tailscaled daemon and the tailscale CLI tool. The tailscaled daemon runs on Linux, Windows, macOS, and to varying degrees on FreeBSD and OpenBSD. The Tailscale iOS and Android apps use this repo's code, but this repo doesn't contain the mobile GUI code.

Other Tailscale repos of note:

For background on which parts of Tailscale are open source and why, see https://tailscale.com/opensource/.

Using

We serve packages for a variety of distros and platforms at https://pkgs.tailscale.com.

Other clients

The macOS, iOS, and Windows clients use the code in this repository but additionally include small GUI wrappers. The GUI wrappers on non-open source platforms are themselves not open source.

Building

We always require the latest Go release, currently Go 1.20. (While we build releases with our Go fork, its use is not required.)

go install tailscale.com/cmd/tailscale{,d}

If you're packaging Tailscale for distribution, use build_dist.sh instead, to burn commit IDs and version info into the binaries:

./build_dist.sh tailscale.com/cmd/tailscale
./build_dist.sh tailscale.com/cmd/tailscaled

If your distro has conventions that preclude the use of build_dist.sh, please do the equivalent of what it does in your distro's way, so that bug reports contain useful version information.

Bugs

Please file any issues about this code or the hosted service on the issue tracker.

Contributing

PRs welcome! But please file bugs. Commit messages should reference bugs.

We require Developer Certificate of Origin Signed-off-by lines in commits.

See git log for our commit message style. It's basically the same as Go's style.

About Us

Tailscale is primarily developed by the people at https://github.com/orgs/tailscale/people. For other contributors, see:

WireGuard is a registered trademark of Jason A. Donenfeld.