Mirror of tailscale/tailscale@github.com
Go to file
Will Norris 236531c5fc ipn/ipnserver: always allow Windows SYSTEM user to connect
When establishing connections to the ipnserver, we validate that the
local user is allowed to connect.  If Tailscale is currently being
managed by a different user (primarily for multi-user Windows installs),
we don't allow the connection.

With the new device web UI, the inbound connection is coming from
tailscaled itself, which is often running as "NT AUTHORITY\SYSTEM".
In this case, we still want to allow the connection, even though it
doesn't match the user running the Tailscale GUI. The SYSTEM user has
full access to everything on the system anyway, so this doesn't escalate
privileges.

Eventually, we want the device web UI to run outside of the tailscaled
process, at which point this exception would probably not be needed.

Updates tailscale/corp#16393

Signed-off-by: Will Norris <will@tailscale.com>
2024-01-12 14:37:53 -08:00
.bencher
.github .github/workflows/govulncheck: migrate to a Github App (#10793) 2024-01-09 11:51:08 -08:00
appc appc,ipn: prevent undesirable route advertisements 2023-12-19 10:33:25 -08:00
atomicfile various: add golangci-lint, fix issues (#7905) 2023-04-17 18:38:24 -04:00
chirp all: update copyright and license headers 2023-01-27 15:36:29 -08:00
client client/web: skip connectivity check on https 2024-01-11 14:51:29 -08:00
clientupdate clientupdate: add explicit Track to Arguments (#10548) 2023-12-11 09:20:42 -08:00
cmd cmd/tailscale/cli: add description to exit-node CLI command 2024-01-12 10:06:09 -08:00
control controlclient,tailcfg,types: expose MaxKeyDuration via localapi (#10401) 2024-01-05 12:06:12 +00:00
derp derp: optimize another per client field alignment 2024-01-12 13:05:39 -08:00
disco disco: correct noun for nacl box type in disco docs 2023-12-14 16:41:53 -08:00
docs docs: add Windows administrative template 2024-01-05 19:44:19 -05:00
doctor all: cleanup unused code, part 2 (#10670) 2023-12-21 17:40:03 -08:00
envknob client/web: show features based on platform support 2023-12-01 17:01:13 -05:00
health net/netcheck: use DERP frames as a signal for home region liveness 2023-12-13 16:33:46 -05:00
hostinfo hostinfo: fix a couple of logic simplification lints 2023-11-01 13:14:25 -07:00
internal/tooldeps various: add golangci-lint, fix issues (#7905) 2023-04-17 18:38:24 -04:00
ipn ipn/ipnserver: always allow Windows SYSTEM user to connect 2024-01-12 14:37:53 -08:00
jsondb all: update copyright and license headers 2023-01-27 15:36:29 -08:00
k8s-operator cmd/k8s-operator,k8s-operator: allow the operator to deploy exit nodes via Connector custom resource (#10724) 2024-01-09 14:13:22 +00:00
kube cmd/k8s-operator,ipn/store/kubestore: patch secrets instead of updating 2023-08-29 13:24:05 -07:00
licenses licenses: update win/apple licenses 2024-01-08 11:49:52 -08:00
log tailcfg: move LogHeapPprof from Debug to c2n [capver 69] 2023-08-16 20:35:04 -07:00
logpolicy logpolicy: use syspolicy to override LogTarget 2024-01-03 10:34:35 -05:00
logtail tailscale/logtail: redact public ipv6 and ipv4 ip addresses within tailscaled. (#10531) 2023-12-15 15:15:49 -08:00
metrics metrics: add missing comma in histogram JSON export 2023-09-07 15:28:12 -07:00
net net/netutil: allow 16-bit 4via6 site IDs 2024-01-09 10:30:46 -05:00
packages/deb go.mod: upgrade nfpm to v2 (#8786) 2023-08-03 13:00:45 -07:00
paths safesocket, paths: add Plan 9 support 2023-09-07 08:48:21 -07:00
portlist all: cleanup unused code, part 2 (#10670) 2023-12-21 17:40:03 -08:00
posture ci: run 'go vet' in golangci-lint; fix errors in tests 2023-12-07 15:08:28 -05:00
prober prober: log HTTP response body on failure 2023-12-13 14:30:16 +00:00
proxymap wgengine, proxymap: split out port mapping from Engine to new type 2023-09-17 20:06:43 +01:00
release release: add shebang to the debian postinst script 2024-01-03 02:30:00 +00:00
safesocket safesocket: detect macsys from within tailscaled 2024-01-10 08:15:40 -08:00
scripts cmd/k8s-operator: operator can create subnetrouter (#9505) 2023-12-14 13:51:59 +00:00
smallzstd all: update copyright and license headers 2023-01-27 15:36:29 -08:00
ssh/tailssh ssh/tailssh: use a local error instead of gossh.ErrDenied (#10743) 2024-01-05 08:02:42 -08:00
syncs Fix potential goroutine leak in syncs/watchdog.go 2023-11-18 10:37:29 -08:00
tailcfg client/web: add initial types for using peer capabilities 2024-01-11 11:20:24 -05:00
taildrop taildrop: remove breaking abstraction layers for apple (#10728) 2024-01-09 14:11:34 -06:00
tempfork all: use Go 1.21 slices, maps instead of x/exp/{slices,maps} 2023-08-17 08:42:35 -07:00
tka all: cleanup unused code, part 1 (#10661) 2023-12-20 14:50:30 -08:00
tool all: cleanup unused code, part 1 (#10661) 2023-12-20 14:50:30 -08:00
tsconst all: update copyright and license headers 2023-01-27 15:36:29 -08:00
tsd cmd/tailscaled,*: add start of configuration file support 2023-10-16 10:40:27 -07:00
tsnet cmd/tailscaled, tsnet: don't return an interface containing a nil pointer 2024-01-05 11:44:17 -05:00
tstest tstest/integration: add tests for auto-update defaulting behavior (#10763) 2024-01-08 09:32:18 -08:00
tstime all: cleanup unused code, part 1 (#10661) 2023-12-20 14:50:30 -08:00
tsweb tsweb: use object-src instead of plugin-types (#10719) 2024-01-03 09:00:57 -08:00
types controlclient,tailcfg,types: expose MaxKeyDuration via localapi (#10401) 2024-01-05 12:06:12 +00:00
util util/winutil: add some missing docs to restartmgr errors 2024-01-05 10:12:08 -08:00
version version/mkversion: allow version override with $TS_VERSION_OVERRIDE (#10799) 2024-01-10 09:03:11 -08:00
wf all: update copyright and license headers 2023-01-27 15:36:29 -08:00
wgengine wgengine/router: look up absolute path to netsh.exe on Windows 2024-01-10 20:20:19 -05:00
words words: some stellar additions 2023-12-12 17:35:48 -08:00
.gitattributes
.gitignore client/web: always use new web client; remove old client 2023-08-28 11:11:16 -07:00
.golangci.yml ci: run 'go vet' in golangci-lint; fix errors in tests 2023-12-07 15:08:28 -05:00
ALPINE.txt ALPINE.txt,Dockerfile{.base},build_docker.sh: bump alpine (#10543) 2023-12-11 07:03:18 +00:00
AUTHORS
CODEOWNERS CODEOWNERS: add the start of an owners file 2023-08-16 15:57:29 -07:00
CODE_OF_CONDUCT.md
Dockerfile ALPINE.txt,Dockerfile{.base},build_docker.sh: bump alpine (#10543) 2023-12-11 07:03:18 +00:00
Dockerfile.base ALPINE.txt,Dockerfile{.base},build_docker.sh: bump alpine (#10543) 2023-12-11 07:03:18 +00:00
LICENSE all: update tools that manage copyright headers 2023-01-27 15:36:29 -08:00
Makefile Makefile,build_docker.sh: allow to configure target platform. (#10806) 2024-01-10 19:19:20 +00:00
PATENTS
README.md client/web: switch to using prebuilt web client assets 2023-09-19 10:09:54 -07:00
SECURITY.md
VERSION.txt VERSION.txt: this is v1.57.0 2023-12-13 15:30:30 -05:00
api.md api.md: add docs for setting an IP address 2023-12-20 12:59:17 -08:00
build_dist.sh client/web: switch to using prebuilt web client assets 2023-09-19 10:09:54 -07:00
build_docker.sh Makefile,build_docker.sh: allow to configure target platform. (#10806) 2024-01-10 19:19:20 +00:00
flake.lock flake.nix: use Go 1.21 to build tailscale flake 2023-08-26 21:05:25 -07:00
flake.nix go.mod.sri: update SRI hash for go.mod changes 2024-01-10 09:25:32 -08:00
go.mod go.mod: update web-client-prebuilt module 2024-01-12 16:04:58 -05:00
go.mod.sri go.mod.sri: update SRI hash for go.mod changes 2024-01-10 09:25:32 -08:00
go.sum go.mod: update web-client-prebuilt module 2024-01-12 16:04:58 -05:00
go.toolchain.branch go.toolchain: switch to tailscale.go1.21 (#8415) 2023-06-23 09:12:19 -04:00
go.toolchain.rev go.toolchain.rev: bump to 1.21.5 (#10475) 2023-12-05 16:16:33 -06:00
gomod_test.go go.mod: add test that replace directives aren't added in oss 2023-09-29 12:31:52 -07:00
header.txt cmd/k8s-operator: operator can create subnetrouter (#9505) 2023-12-14 13:51:59 +00:00
pull-toolchain.sh pull-toolchain.sh: don't run update-flake.sh 2023-02-09 15:04:01 -08:00
shell.nix go.mod.sri: update SRI hash for go.mod changes 2024-01-10 09:25:32 -08:00
staticcheck.conf all: cleanup unused code, part 2 (#10670) 2023-12-21 17:40:03 -08:00
update-flake.sh .github/workflows: add workflow to update go.mod Nix SRI hash 2023-02-14 03:28:43 +00:00
version-embed.go version: return correct Meta.MajorMinorPatch in non-dev builds 2023-02-10 13:00:44 -08:00
version_test.go all: update copyright and license headers 2023-01-27 15:36:29 -08:00

README.md

Tailscale

https://tailscale.com

Private WireGuard® networks made easy

Overview

This repository contains the majority of Tailscale's open source code. Notably, it includes the tailscaled daemon and the tailscale CLI tool. The tailscaled daemon runs on Linux, Windows, macOS, and to varying degrees on FreeBSD and OpenBSD. The Tailscale iOS and Android apps use this repo's code, but this repo doesn't contain the mobile GUI code.

Other Tailscale repos of note:

For background on which parts of Tailscale are open source and why, see https://tailscale.com/opensource/.

Using

We serve packages for a variety of distros and platforms at https://pkgs.tailscale.com.

Other clients

The macOS, iOS, and Windows clients use the code in this repository but additionally include small GUI wrappers. The GUI wrappers on non-open source platforms are themselves not open source.

Building

We always require the latest Go release, currently Go 1.21. (While we build releases with our Go fork, its use is not required.)

go install tailscale.com/cmd/tailscale{,d}

If you're packaging Tailscale for distribution, use build_dist.sh instead, to burn commit IDs and version info into the binaries:

./build_dist.sh tailscale.com/cmd/tailscale
./build_dist.sh tailscale.com/cmd/tailscaled

If your distro has conventions that preclude the use of build_dist.sh, please do the equivalent of what it does in your distro's way, so that bug reports contain useful version information.

Bugs

Please file any issues about this code or the hosted service on the issue tracker.

Contributing

PRs welcome! But please file bugs. Commit messages should reference bugs.

We require Developer Certificate of Origin Signed-off-by lines in commits.

See git log for our commit message style. It's basically the same as Go's style.

About Us

Tailscale is primarily developed by the people at https://github.com/orgs/tailscale/people. For other contributors, see:

WireGuard is a registered trademark of Jason A. Donenfeld.