tailscale/ipn/ipnserver
Will Norris 236531c5fc ipn/ipnserver: always allow Windows SYSTEM user to connect
When establishing connections to the ipnserver, we validate that the
local user is allowed to connect.  If Tailscale is currently being
managed by a different user (primarily for multi-user Windows installs),
we don't allow the connection.

With the new device web UI, the inbound connection is coming from
tailscaled itself, which is often running as "NT AUTHORITY\SYSTEM".
In this case, we still want to allow the connection, even though it
doesn't match the user running the Tailscale GUI. The SYSTEM user has
full access to everything on the system anyway, so this doesn't escalate
privileges.

Eventually, we want the device web UI to run outside of the tailscaled
process, at which point this exception would probably not be needed.

Updates tailscale/corp#16393

Signed-off-by: Will Norris <will@tailscale.com>
2024-01-12 14:37:53 -08:00
..
proxyconnect.go all: fix nilness issues 2023-12-05 11:43:14 -05:00
proxyconnect_js.go all: update copyright and license headers 2023-01-27 15:36:29 -08:00
server.go ipn/ipnserver: always allow Windows SYSTEM user to connect 2024-01-12 14:37:53 -08:00
server_test.go all: update copyright and license headers 2023-01-27 15:36:29 -08:00