You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 
Go to file
David Anderson d05b0500ac wgengine: loop back tuntap packets destined for local IPs.
macOS incorrectly sends packets for the local Tailscale IP
into our tunnel interface. We have to turn the packets around
and send them back to the kernel.

Fixes tailscale/corp#189.

Signed-off-by: David Anderson <danderson@tailscale.com>
4 years ago
.github Disable staticcheck for tempfork packages. 5 years ago
atomicfile scripts: add a license header checker. 5 years ago
cmd cmd/derper: support forwarding packets amongst set of peer DERP servers 4 years ago
control/controlclient net/netns: move SOCKS dialing to netns for now 4 years ago
derp derp: fix tracking problem if conn starts local, then also joins mesh peer 4 years ago
ipn wgengine/tsdns: add test and prevent useless updates (#449) 4 years ago
log/logheap tailcfg: add MapResponse.Debug mechanism to trigger logging heap pprof 5 years ago
logpolicy logpolicy: don't check version.CmdName on Windows unnecessarily 4 years ago
logtail logtail: we missed a case for the backoff timer. 4 years ago
metrics metrics: add a LabelMap type for variables with 1 label dimension. 5 years ago
net net/netns: move SOCKS dialing to netns for now 4 years ago
paths paths: use /var/db for state on BSDs, and /var/run for sockets. 5 years ago
portlist portlist: set SysProcAttr.HideWindow on Windows 4 years ago
safesocket safesocket: gofmt 5 years ago
scripts wgengine/router: split out from wgengine. 5 years ago
syncs syncs: add AtomicBool 4 years ago
tailcfg tailcfg: remove unused, unimplemented DERPNode.CertFingerprint for now 4 years ago
tempfork tempfork/registry: work around issue with Tailscale's redo build system 4 years ago
tstest tstest: document PanicOnLog 5 years ago
tstime tstime: hand-implement parseInt for specific needs of rfc3339 parsing. 5 years ago
tsweb tsweb: JSONHandler: supports HTTPError 4 years ago
types types/logger: add TS_DEBUG_LOG_RATE knob to easily turn off rate limiting 4 years ago
version version: fix typo in comment 4 years ago
wgengine wgengine: loop back tuntap packets destined for local IPs. 4 years ago
.gitattributes .gitattributes: add a smudge filter for go.mod. 5 years ago
.gitignore cmd/relaynode: drop local --acl-file in favour of central packet filter. 5 years ago
AUTHORS Move Linux client & common packages into a public repo. 5 years ago
CODE_OF_CONDUCT.md Add a code of conduct. 5 years ago
Dockerfile Dockerfile: install iproute2 in the container image. 5 years ago
LICENSE Move Linux client & common packages into a public repo. 5 years ago
PATENTS Move Linux client & common packages into a public repo. 5 years ago
README.md Dockerfile: add some usage docs, bump to Go 1.14 5 years ago
SECURITY.md Add a SECURITY.md for vulnerability reports. 5 years ago
go.mod go.mod: require Go 1.14, since we use some of its features. 4 years ago
go.sum Update go4.org/mem, adjust to revised API. 4 years ago

README.md

Tailscale

https://tailscale.com

Private WireGuard® networks made easy

Overview

This repository contains all the open source Tailscale code. It currently includes the Linux client.

The Linux client is currently cmd/relaynode, but will soon be replaced by cmd/tailscaled.

Using

We serve packages for a variety of distros at https://pkgs.tailscale.com .

Building

go install tailscale.com/cmd/tailscale{,d}

We only guarantee to support the latest Go release and any Go beta or release candidate builds (currently Go 1.14) in module mode. It might work in earlier Go versions or in GOPATH mode, but we're making no effort to keep those working.

Bugs

Please file any issues about this code or the hosted service on the issue tracker.

Contributing

under_construction.gif

PRs welcome, but we are still working out our contribution process and tooling.

We require Developer Certificate of Origin Signed-off-by lines in commits.

About Us

We are apenwarr, bradfitz, crawshaw, danderson, dfcarney, from Tailscale Inc. You can learn more about us from our website.

WireGuard is a registered trademark of Jason A. Donenfeld.