You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 
Go to file
Nick Khyl d837e0252f wf/firewall: allow link-local multicast for permitted local routes when the killswitch is on on Windows
When an Exit Node is used, we create a WFP rule to block all inbound and outbound traffic,
along with several rules to permit specific types of traffic. Notably, we allow all inbound and
outbound traffic to and from LocalRoutes specified in wgengine/router.Config. The list of allowed
routes always includes routes for internal interfaces, such as loopback and virtual Hyper-V/WSL2
interfaces, and may also include LAN routes if the "Allow local network access" option is enabled.
However, these permitting rules do not allow link-local multicast on the corresponding interfaces.
This results in broken mDNS/LLMNR, and potentially other similar issues, whenever an exit node is used.

In this PR, we update (*wf.Firewall).UpdatePermittedRoutes() to create rules allowing outbound and
inbound link-local multicast traffic to and from the permitted IP ranges, partially resolving the mDNS/LLMNR
and *.local name resolution issue.

Since Windows does not attempt to send mDNS/LLMNR queries if a catch-all NRPT rule is present,
it is still necessary to disable the creation of that rule using the disable-local-dns-override-via-nrpt nodeAttr.

Updates #13571

Signed-off-by: Nick Khyl <nickk@tailscale.com>
3 weeks ago
.bencher
.github .github: Bump github/codeql-action from 3.26.8 to 3.26.9 (#13625) 3 weeks ago
appc appc: track metrics for route info storing 3 months ago
atomicfile
chirp
client client/web: use tsaddr helpers 4 weeks ago
clientupdate
cmd cmd/tailscale/cli: make 'tailscale debug ts2021' try twice 3 weeks ago
control control/control{client,http}: don't noise dial localhost:443 in http-only tests 3 weeks ago
derp derp: document the RunWatchConnectionLoop callback gotchas 4 weeks ago
disco
docs docs/windows/policy: add ADMX policy setting to configure the AuthKey 3 weeks ago
doctor
drive drive/driveimpl: use su instead of sudo 2 months ago
envknob kube,cmd/{k8s-operator,containerboot},envknob,ipn/store/kubestore,*/depaware.txt: rename packages (#13418) 2 months ago
gokrazy gokrazy, various: use point versions of Go and update Nix deps 1 month ago
health control/controlhttp: fix connectivity on Alaska Air wifi 3 weeks ago
hostinfo hostinfo: add hostinfo.IsNATLabGuestVM 3 months ago
internal
ipn ipn/ipnlocal: add advertised and primary route metrics 4 weeks ago
jsondb
k8s-operator cmd/k8s-operator,k8s-operator: add ProxyGroup CRD (#13591) 4 weeks ago
kube cmd/containerboot,kube,util/linuxfw: configure kube egress proxies to route to 1+ tailnet targets (#13531) 4 weeks ago
licenses licenses: update license notices 1 month ago
log
logpolicy logpolicy: don't create a filch buffer if logging is disabled 3 weeks ago
logtail
metrics metrics: revert changes to MultiLabelMap's String method 4 weeks ago
net net/dns: tweak DoH timeout, limit MaxConnsPerHost, require TLS 1.3 (#13564) 3 weeks ago
omit
packages/deb
paths
portlist
posture control/controlclient,posture,util/syspolicy: use predefined syspolicy keys instead of string literals 2 months ago
prober prober: make status page more clear 3 months ago
proxymap ipnlocal,proxymap,wgengine/netstack: add optional WhoIs/proxymap debug 1 month ago
release {release,version}: add DSM7.2 specific synology builds (#13405) 4 weeks ago
safesocket all: fix new lint warnings from bumping staticcheck 2 months ago
safeweb safeweb: add a ListenAndServe method to the Server type (#13498) 1 month ago
scripts
sessionrecording sessionrecording,ssh/tailssh,k8s-operator: log connected recorder address (#13382) 2 months ago
smallzstd
ssh/tailssh ssh: Add logic to set accepted environment variables in SSH session (#13559) 3 weeks ago
syncs
tailcfg tailcfg: add AcceptEnv field to SSHRule (#13523) 1 month ago
taildrop
tempfork
tka tka: truncate long rotation signature chains 2 months ago
tool tool/gocross: make gocross-wrapper.sh keep multiple Go toolchains around 4 weeks ago
tsconst cmd/tailscale/cli: support passing network lock keys via files 2 months ago
tsd util/usermetrics: make usermetrics non-global 4 weeks ago
tsnet ipn/ipnlocal: add advertised and primary route metrics 4 weeks ago
tstest wf/firewall: allow link-local multicast for permitted local routes when the killswitch is on on Windows 3 weeks ago
tstime
tsweb usermetric: add initial user-facing metrics 2 months ago
types cli: add `tailscale dns query` (#13368) 4 weeks ago
util cmd/containerboot,kube,util/linuxfw: configure kube egress proxies to route to 1+ tailnet targets (#13531) 4 weeks ago
version {release,version}: add DSM7.2 specific synology builds (#13405) 4 weeks ago
wf wf/firewall: allow link-local multicast for permitted local routes when the killswitch is on on Windows 3 weeks ago
wgengine cmd/containerboot,kube,util/linuxfw: configure kube egress proxies to route to 1+ tailnet targets (#13531) 4 weeks ago
words words: raccoon dog, dog with the raccoon in 'im 3 months ago
.gitattributes
.gitignore tstest/tailmac: add customized macOS virtualization tooling (#13146) 2 months ago
.golangci.yml
ALPINE.txt
AUTHORS
CODEOWNERS
CODE_OF_CONDUCT.md
Dockerfile all: switch to and require Go 1.23 2 months ago
Dockerfile.base
LICENSE
Makefile ssh/tailssh: fix SSH on busybox systems 2 months ago
PATENTS
README.md all: switch to and require Go 1.23 2 months ago
SECURITY.md
VERSION.txt VERSION.txt: this is v1.75.0 (#13454) 1 month ago
api.md {api.md,publicapi}: remove old API docs (#13468) 1 month ago
build_dist.sh
build_docker.sh build_docker.sh: update script comment (#12970) 3 months ago
flake.lock nix: update nix and use go 1.23 2 months ago
flake.nix gokrazy, various: use point versions of Go and update Nix deps 1 month ago
go.mod go.mod: upgrade golangci-lint 4 weeks ago
go.mod.sri go.mod.sri: update SRI hash for go.mod changes 2 months ago
go.sum go.mod: upgrade golangci-lint 4 weeks ago
go.toolchain.branch all: switch to and require Go 1.23 2 months ago
go.toolchain.rev go.toolchain.rev: bump oss, test toolchain matches go.toolchain.rev 1 month ago
gomod_test.go
header.txt
pkgdoc_test.go
pull-toolchain.sh
shell.nix go.mod.sri: update SRI hash for go.mod changes 2 months ago
staticcheck.conf
update-flake.sh
version-embed.go
version_tailscale_test.go go.toolchain.rev: bump oss, test toolchain matches go.toolchain.rev 1 month ago
version_test.go

README.md

Tailscale

https://tailscale.com

Private WireGuard® networks made easy

Overview

This repository contains the majority of Tailscale's open source code. Notably, it includes the tailscaled daemon and the tailscale CLI tool. The tailscaled daemon runs on Linux, Windows, macOS, and to varying degrees on FreeBSD and OpenBSD. The Tailscale iOS and Android apps use this repo's code, but this repo doesn't contain the mobile GUI code.

Other Tailscale repos of note:

For background on which parts of Tailscale are open source and why, see https://tailscale.com/opensource/.

Using

We serve packages for a variety of distros and platforms at https://pkgs.tailscale.com.

Other clients

The macOS, iOS, and Windows clients use the code in this repository but additionally include small GUI wrappers. The GUI wrappers on non-open source platforms are themselves not open source.

Building

We always require the latest Go release, currently Go 1.23. (While we build releases with our Go fork, its use is not required.)

go install tailscale.com/cmd/tailscale{,d}

If you're packaging Tailscale for distribution, use build_dist.sh instead, to burn commit IDs and version info into the binaries:

./build_dist.sh tailscale.com/cmd/tailscale
./build_dist.sh tailscale.com/cmd/tailscaled

If your distro has conventions that preclude the use of build_dist.sh, please do the equivalent of what it does in your distro's way, so that bug reports contain useful version information.

Bugs

Please file any issues about this code or the hosted service on the issue tracker.

Contributing

PRs welcome! But please file bugs. Commit messages should reference bugs.

We require Developer Certificate of Origin Signed-off-by lines in commits.

See git log for our commit message style. It's basically the same as Go's style.

About Us

Tailscale is primarily developed by the people at https://github.com/orgs/tailscale/people. For other contributors, see:

WireGuard is a registered trademark of Jason A. Donenfeld.