You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 
Go to file
Nick Khyl 551d6ae0f3 ipn, ipn/ipnauth: implement API surface for LocalBackend access checking
We have a lot of access checks spread around the
ipnserver, ipnlocal, localapi, and ipnauth
packages, with a significant number of
platform-specific checks that are used exclusively
on either Windows or Unix-like platforms.
Additionally, with the exception of a few
Windows-specific checks, most of these checks are
per-device rather than per-profile, which is not
always correct even on single-user/single-session
environments, but even more problematic on
multi-user/multi-session environments such as
Windows.

We initially attempted to map all possible
operations onto the permitRead/permitWrite access
flags. However, these flags are not utilized on
Windows and prove insufficient on Unix machines.
Specifically, on Windows, the first user to
connect is granted full access, while subsequent
logged-in users have no access to the LocalAPI at
all. This restriction applies regardless of the
environment, local user roles (e.g., whether a
Windows user is a local admin), or whether they
are the active user on a shared Windows client
device. Conversely, on Unix, we introduced the
permitCert flag to enable granting non-root web
servers (such as www-data, caddy, nginx, etc.)
access to certificates. We also added additional
access check to distinguish local admins (root
on Unix-like platforms, elevated admins on
Windows) from users with permitWrite access,
and used it as a fix for the serve path LPE.

A more fine-grained access control system could
better suit our current and future needs, especially
in improving the UX across various scenarios on
corporate and personal Windows devices.

This adds an API surface in ipnauth that will be
used in LocalBackend to check access to individual
Tailscale profiles as well as any device-wide
information and operations.

Updates tailscale/corp#18342

Signed-off-by: Nick Khyl <nickk@tailscale.com>
2 weeks ago
.bencher bencher: add config to suppress failures on benchmark regressions. 3 years ago
.github Revert "licenses: add gliderlabs/ssh license" 3 weeks ago
appc appc: optimize dns response observation for large route tables 3 months ago
atomicfile various: add golangci-lint, fix issues (#7905) 1 year ago
chirp all: update copyright and license headers 1 year ago
client build(deps-dev): bump vite from 5.1.4 to 5.1.7 in /client/web 2 weeks ago
clientupdate ipn/ipnlocal,clientupdate: disallow auto-updates in containers (#11814) 2 weeks ago
cmd ipn, ipn/ipnauth: implement API surface for LocalBackend access checking 2 weeks ago
control all: use Go 1.22 range-over-int 2 weeks ago
derp all: use Go 1.22 range-over-int 2 weeks ago
disco disco: correct noun for nacl box type in disco docs 5 months ago
docs docs/windows/policy: add missing key expiration warning interval 2 weeks ago
doctor doctor/ethtool, ipn/ipnlocal: add ethtool bugreport check 3 months ago
drive drive: rewrite Location headers 2 weeks ago
envknob envknob: ensure f is not nil before using it 2 months ago
health all: use Go 1.22 range-over-int 2 weeks ago
hostinfo hostinfo: use Distro field for distinguishing Windows Server builds 2 weeks ago
internal/tooldeps various: add golangci-lint, fix issues (#7905) 1 year ago
ipn ipn, ipn/ipnauth: implement API surface for LocalBackend access checking 2 weeks ago
jsondb all: update copyright and license headers 1 year ago
k8s-operator cmd/k8s-operator,k8s-operator: document tailscale.com Custom Resource Definitions better. (#11665) 2 weeks ago
kube cmd/k8s-operator,ipn/store/kubestore: patch secrets instead of updating 8 months ago
licenses licenses: update license notices 3 weeks ago
log all: use zstdframe where sensible (#11491) 1 month ago
logpolicy all: use zstdframe where sensible (#11491) 1 month ago
logtail all: use Go 1.22 range-over-int 2 weeks ago
metrics all: use Go 1.22 range-over-int 2 weeks ago
net interfaces: create android impl (#11784) 2 weeks ago
packages/deb go.mod: upgrade nfpm to v2 (#8786) 9 months ago
paths all: use Go 1.22 range-over-int 2 weeks ago
portlist all: use Go 1.22 range-over-int 2 weeks ago
posture cmd/tailscaled, net/tstun: build for aix/ppc64 3 weeks ago
prober all: use Go 1.22 range-over-int 2 weeks ago
proxymap wgengine, proxymap: split out port mapping from Engine to new type 8 months ago
release version/mkversion: enforce synology versions within int32 range 2 months ago
safesocket all: use Go 1.22 range-over-int 2 weeks ago
safeweb safeweb: allow object-src: self in CSP (#11782) 2 weeks ago
scripts scripts/installer.sh: add rpm GPG key import (#11686) 3 weeks ago
smallzstd all: use Go 1.22 range-over-int 2 weeks ago
ssh/tailssh all: use Go 1.22 range-over-int 2 weeks ago
syncs all: use Go 1.22 range-over-int 2 weeks ago
tailcfg tailcfg: rename exit node destination network flow log node attribute (#11779) 2 weeks ago
taildrop all: use new AppendEncode methods available in Go 1.22 (#11079) 3 months ago
tempfork cmd/tailscale: add shell tab-completion 2 weeks ago
tka all: use Go 1.22 range-over-int 2 weeks ago
tool tool/gocross: add android autoflags (#11465) 1 month ago
tsconst all: update copyright and license headers 1 year ago
tsd tailscale: update tailfs functions and vars to use drive naming (#11597) 4 weeks ago
tsnet all: use Go 1.22 range-over-int 2 weeks ago
tstest wgengine/magicsock: disable portmapper in tunchan-faked tests 2 weeks ago
tstime all: use Go 1.22 range-over-int 2 weeks ago
tsweb all: use Go 1.22 range-over-int 2 weeks ago
types all: use Go 1.22 range-over-int 2 weeks ago
util all: use Go 1.22 range-over-int 2 weeks ago
version all: use Go 1.22 range-over-int 2 weeks ago
wf go.mod, all: move away from inet.af domain seized by Taliban 3 months ago
wgengine wgengine\router: fix the Tailscale-In firewall rule to work on domain networks 2 weeks ago
words words: add a list of things you should yahoo! 3 months ago
.gitattributes .: add .gitattributes entry to use Go hunk-header driver 2 years ago
.gitignore client/web: always use new web client; remove old client 8 months ago
.golangci.yml ci: run 'go vet' in golangci-lint; fix errors in tests 5 months ago
ALPINE.txt ALPINE.txt,Dockerfile{.base},build_docker.sh: bump alpine (#10543) 5 months ago
AUTHORS Move Linux client & common packages into a public repo. 4 years ago
CODEOWNERS CODEOWNERS: add the start of an owners file 9 months ago
CODE_OF_CONDUCT.md Add a code of conduct. 4 years ago
Dockerfile Dockerfile: use Go 1.22 3 months ago
Dockerfile.base ALPINE.txt,Dockerfile{.base},build_docker.sh: bump alpine (#10543) 5 months ago
LICENSE all: update tools that manage copyright headers 1 year ago
Makefile Makefile: fix default SYNO_ARCH in Makefile 3 weeks ago
PATENTS Move Linux client & common packages into a public repo. 4 years ago
README.md go.mod, README.md: use Go 1.22 3 months ago
SECURITY.md Add a SECURITY.md for vulnerability reports. 4 years ago
VERSION.txt VERSION.txt: this is v1.65.0 3 weeks ago
api.md api.md: add missing backtick to GET searchpaths doc (#11459) 1 month ago
build_dist.sh cmd/tailscale: add shell tab-completion 2 weeks ago
build_docker.sh ipn/store: omit AWS & Kubernetes support on 'small' Linux GOARCHes 2 weeks ago
flake.lock flake.nix: build tailscale with go 1.22 3 months ago
flake.nix go.mod.sri: update SRI hash for go.mod changes 3 weeks ago
go.mod go.mod: bump golang.org/x/net (#11775) 2 weeks ago
go.mod.sri go.mod.sri: update SRI hash for go.mod changes 3 weeks ago
go.sum go.mod: bump golang.org/x/net (#11775) 2 weeks ago
go.toolchain.branch go.toolchain.rev: bump to Go 1.22.0 (#11055) 3 months ago
go.toolchain.rev go.toolchain.rev: bump to Go 1.22.2 4 weeks ago
gomod_test.go go.mod: add test that replace directives aren't added in oss 7 months ago
header.txt cmd/k8s-operator: operator can create subnetrouter (#9505) 5 months ago
pull-toolchain.sh pull-toolchain.sh: don't run update-flake.sh 1 year ago
shell.nix go.mod.sri: update SRI hash for go.mod changes 3 weeks ago
staticcheck.conf all: cleanup unused code, part 2 (#10670) 4 months ago
update-flake.sh Code Improvements (#11311) 2 months ago
version-embed.go version: return correct Meta.MajorMinorPatch in non-dev builds 1 year ago
version_test.go go.mod,wgengine/netstack: bump gvisor 3 months ago

README.md

Tailscale

https://tailscale.com

Private WireGuard® networks made easy

Overview

This repository contains the majority of Tailscale's open source code. Notably, it includes the tailscaled daemon and the tailscale CLI tool. The tailscaled daemon runs on Linux, Windows, macOS, and to varying degrees on FreeBSD and OpenBSD. The Tailscale iOS and Android apps use this repo's code, but this repo doesn't contain the mobile GUI code.

Other Tailscale repos of note:

For background on which parts of Tailscale are open source and why, see https://tailscale.com/opensource/.

Using

We serve packages for a variety of distros and platforms at https://pkgs.tailscale.com.

Other clients

The macOS, iOS, and Windows clients use the code in this repository but additionally include small GUI wrappers. The GUI wrappers on non-open source platforms are themselves not open source.

Building

We always require the latest Go release, currently Go 1.22. (While we build releases with our Go fork, its use is not required.)

go install tailscale.com/cmd/tailscale{,d}

If you're packaging Tailscale for distribution, use build_dist.sh instead, to burn commit IDs and version info into the binaries:

./build_dist.sh tailscale.com/cmd/tailscale
./build_dist.sh tailscale.com/cmd/tailscaled

If your distro has conventions that preclude the use of build_dist.sh, please do the equivalent of what it does in your distro's way, so that bug reports contain useful version information.

Bugs

Please file any issues about this code or the hosted service on the issue tracker.

Contributing

PRs welcome! But please file bugs. Commit messages should reference bugs.

We require Developer Certificate of Origin Signed-off-by lines in commits.

See git log for our commit message style. It's basically the same as Go's style.

About Us

Tailscale is primarily developed by the people at https://github.com/orgs/tailscale/people. For other contributors, see:

WireGuard is a registered trademark of Jason A. Donenfeld.