Mirror of tailscale/tailscale@github.com
Go to file
Andrew Dunham c5abbcd4b4 wgengine/netstack: add a per-client limit for in-flight TCP forwards
This is a fun one. Right now, when a client is connecting through a
subnet router, here's roughly what happens:

1. The client initiates a connection to an IP address behind a subnet
   router, and sends a TCP SYN
2. The subnet router gets the SYN packet from netstack, and after
   running through acceptTCP, starts DialContext-ing the destination IP,
   without accepting the connection¹
3. The client retransmits the SYN packet a few times while the dial is
   in progress, until either...
4. The subnet router successfully establishes a connection to the
   destination IP and sends the SYN-ACK back to the client, or...
5. The subnet router times out and sends a RST to the client.
6. If the connection was successful, the client ACKs the SYN-ACK it
   received, and traffic starts flowing

As a result, the notification code in forwardTCP never notices when a
new connection attempt is aborted, and it will wait until either the
connection is established, or until the OS-level connection timeout is
reached and it aborts.

To mitigate this, add a per-client limit on how many in-flight TCP
forwarding connections can be in-progress; after this, clients will see
a similar behaviour to the global limit, where new connection attempts
are aborted instead of waiting. This prevents a single misbehaving
client from blocking all other clients of a subnet router by ensuring
that it doesn't starve the global limiter.

Also, bump the global limit again to a higher value.

¹ We can't accept the connection before establishing a connection to the
remote server since otherwise we'd be opening the connection and then
immediately closing it, which breaks a bunch of stuff; see #5503 for
more details.

Updates tailscale/corp#12184

Signed-off-by: Andrew Dunham <andrew@du.nham.ca>
Change-Id: I76e7008ddd497303d75d473f534e32309c8a5144
2024-02-27 15:25:40 -05:00
.bencher bencher: add config to suppress failures on benchmark regressions. 2021-10-01 16:16:02 -07:00
.github .github/workflows: fix typo in XDG_CACHE_HOME 2024-02-23 16:44:29 -08:00
appc appc: optimize dns response observation for large route tables 2024-02-07 14:11:41 -08:00
atomicfile various: add golangci-lint, fix issues (#7905) 2023-04-17 18:38:24 -04:00
chirp all: update copyright and license headers 2023-01-27 15:36:29 -08:00
client client/web: use grants on web UI frontend 2024-02-26 12:59:37 -05:00
clientupdate clientupdate: disable auto update on NixOS (#11136) 2024-02-14 11:58:29 -08:00
cmd cmd/k8s-operator: reconcile tailscale Ingresses when their backend Services change. (#11255) 2024-02-27 15:19:53 +00:00
control all: remove LenIter, use Go 1.22 range-over-int instead 2024-02-25 12:29:45 -08:00
derp cmd/derper, derp, tailcfg: add admission controller URL option 2024-02-21 16:57:45 -08:00
disco disco: correct noun for nacl box type in disco docs 2023-12-14 16:41:53 -08:00
docs cmd/k8s-operator/deploy: allow modifying operator tags via Helm values 2024-01-19 21:22:23 +00:00
doctor doctor/ethtool, ipn/ipnlocal: add ethtool bugreport check 2024-02-15 10:17:05 -05:00
envknob client/web: show features based on platform support 2023-12-01 17:01:13 -05:00
health health: warn about reverse path filtering and exit nodes 2024-02-27 00:43:01 +00:00
hostinfo hostinfo: fix a couple of logic simplification lints 2023-11-01 13:14:25 -07:00
internal/tooldeps various: add golangci-lint, fix issues (#7905) 2023-04-17 18:38:24 -04:00
ipn ipn/ipnstate, wgengine/wgint: add handshake attempts accessors 2024-02-26 19:09:12 -08:00
jsondb all: update copyright and license headers 2023-01-27 15:36:29 -08:00
k8s-operator cmd/k8s-operator,k8s-operator,go.{mod,sum},tstest/tools: add Tailscale Kubernetes operator API docs (#11246) 2024-02-27 14:51:53 +00:00
kube cmd/k8s-operator,ipn/store/kubestore: patch secrets instead of updating 2023-08-29 13:24:05 -07:00
licenses licenses: update win/apple licenses 2024-02-08 08:42:15 -08:00
log tailcfg: move LogHeapPprof from Debug to c2n [capver 69] 2023-08-16 20:35:04 -07:00
logpolicy logpolicy: allow longer idle log upload connections 2024-02-16 18:06:09 -08:00
logtail tailscale/logtail: redact public ipv6 and ipv4 ip addresses within tailscaled. (#10531) 2023-12-15 15:15:49 -08:00
metrics metrics: add missing comma in histogram JSON export 2023-09-07 15:28:12 -07:00
net health: warn about reverse path filtering and exit nodes 2024-02-27 00:43:01 +00:00
packages/deb go.mod: upgrade nfpm to v2 (#8786) 2023-08-03 13:00:45 -07:00
paths safesocket, paths: add Plan 9 support 2023-09-07 08:48:21 -07:00
portlist all: cleanup unused code, part 2 (#10670) 2023-12-21 17:40:03 -08:00
posture ci: run 'go vet' in golangci-lint; fix errors in tests 2023-12-07 15:08:28 -05:00
prober prober: add TLS probe constructor to split dial addr from cert name 2024-02-19 09:03:13 -08:00
proxymap wgengine, proxymap: split out port mapping from Engine to new type 2023-09-17 20:06:43 +01:00
release cmd/dist: update logs for synology builds 2024-02-08 14:36:55 -05:00
safesocket safesocket: detect macsys from within tailscaled 2024-01-10 08:15:40 -08:00
scripts scripts/installer.sh: auto-start tailscale on Alpine (#11214) 2024-02-27 09:17:12 -05:00
smallzstd all: update copyright and license headers 2023-01-27 15:36:29 -08:00
ssh/tailssh all: use reflect.TypeFor now available in Go 1.22 (#11078) 2024-02-08 17:34:22 -08:00
syncs Fix potential goroutine leak in syncs/watchdog.go 2023-11-18 10:37:29 -08:00
tailcfg tailcfg: add latitude, longitude for node location (#11162) 2024-02-27 15:02:06 -05:00
taildrop all: use new AppendEncode methods available in Go 1.22 (#11079) 2024-02-08 17:55:03 -08:00
tailfs tailfs: fix race condition in tailfs_test 2024-02-27 08:31:04 -06:00
tempfork all: use Go 1.21 slices, maps instead of x/exp/{slices,maps} 2023-08-17 08:42:35 -07:00
tka all: use new AppendEncode methods available in Go 1.22 (#11079) 2024-02-08 17:55:03 -08:00
tool tool/gocross: pass flags for visionOS and visionOS Simulator (#11127) 2024-02-16 11:14:17 -08:00
tsconst all: update copyright and license headers 2023-01-27 15:36:29 -08:00
tsd tailfs: clean up naming and package structure 2024-02-09 20:00:42 -06:00
tsnet all: remove LenIter, use Go 1.22 range-over-int instead 2024-02-25 12:29:45 -08:00
tstest cmd/k8s-operator,k8s-operator,go.{mod,sum},tstest/tools: add Tailscale Kubernetes operator API docs (#11246) 2024-02-27 14:51:53 +00:00
tstime tstime/rate: implement Value.{Marshal,Unmarshal}JSON (#8481) 2024-01-16 13:48:34 -08:00
tsweb Revert "tsweb: update ServeMux matching to 1.22.0 syntax (#11090)" (#11125) 2024-02-13 10:49:36 -08:00
types types/key: remove copy returning array by value 2024-02-26 19:09:12 -08:00
util util/syspolicy: add 'ResetToDefaults' (#11194) 2024-02-22 10:10:31 -08:00
version version/mkversion: allow version override with $TS_VERSION_OVERRIDE (#10799) 2024-01-10 09:03:11 -08:00
wf go.mod, all: move away from inet.af domain seized by Taliban 2024-02-13 19:21:09 -08:00
wgengine wgengine/netstack: add a per-client limit for in-flight TCP forwards 2024-02-27 15:25:40 -05:00
words words: add a list of things you should yahoo! 2024-02-07 14:47:20 -08:00
.gitattributes .: add .gitattributes entry to use Go hunk-header driver 2021-12-03 17:56:02 -08:00
.gitignore client/web: always use new web client; remove old client 2023-08-28 11:11:16 -07:00
.golangci.yml ci: run 'go vet' in golangci-lint; fix errors in tests 2023-12-07 15:08:28 -05:00
ALPINE.txt ALPINE.txt,Dockerfile{.base},build_docker.sh: bump alpine (#10543) 2023-12-11 07:03:18 +00:00
AUTHORS Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
CODEOWNERS CODEOWNERS: add the start of an owners file 2023-08-16 15:57:29 -07:00
CODE_OF_CONDUCT.md Add a code of conduct. 2020-02-10 22:16:30 -08:00
Dockerfile Dockerfile: use Go 1.22 2024-02-07 18:10:15 -08:00
Dockerfile.base ALPINE.txt,Dockerfile{.base},build_docker.sh: bump alpine (#10543) 2023-12-11 07:03:18 +00:00
LICENSE all: update tools that manage copyright headers 2023-01-27 15:36:29 -08:00
Makefile Makefile,build_docker.sh: allow to configure target platform. (#10806) 2024-01-10 19:19:20 +00:00
PATENTS Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
README.md go.mod, README.md: use Go 1.22 2024-02-07 18:10:15 -08:00
SECURITY.md Add a SECURITY.md for vulnerability reports. 2020-02-11 10:26:41 -08:00
VERSION.txt VERSION.txt: this is v1.61.0 2024-02-15 17:24:49 -06:00
api.md api.md: add docs for setting an IP address 2023-12-20 12:59:17 -08:00
build_dist.sh client/web: switch to using prebuilt web client assets 2023-09-19 10:09:54 -07:00
build_docker.sh Makefile,build_docker.sh: allow to configure target platform. (#10806) 2024-01-10 19:19:20 +00:00
flake.lock flake.nix: build tailscale with go 1.22 2024-02-11 20:43:40 -08:00
flake.nix go.mod.sri: update SRI hash for go.mod changes 2024-02-13 19:39:53 -08:00
go.mod cmd/k8s-operator,k8s-operator,go.{mod,sum},tstest/tools: add Tailscale Kubernetes operator API docs (#11246) 2024-02-27 14:51:53 +00:00
go.mod.sri go.mod.sri: update SRI hash for go.mod changes 2024-02-13 19:39:53 -08:00
go.sum cmd/k8s-operator,k8s-operator,go.{mod,sum},tstest/tools: add Tailscale Kubernetes operator API docs (#11246) 2024-02-27 14:51:53 +00:00
go.toolchain.branch go.toolchain.rev: bump to Go 1.22.0 (#11055) 2024-02-07 14:57:57 -07:00
go.toolchain.rev go.toolchain.rev: bump to Go 1.22.0 (#11055) 2024-02-07 14:57:57 -07:00
gomod_test.go go.mod: add test that replace directives aren't added in oss 2023-09-29 12:31:52 -07:00
header.txt cmd/k8s-operator: operator can create subnetrouter (#9505) 2023-12-14 13:51:59 +00:00
pull-toolchain.sh pull-toolchain.sh: don't run update-flake.sh 2023-02-09 15:04:01 -08:00
shell.nix go.mod.sri: update SRI hash for go.mod changes 2024-02-13 19:39:53 -08:00
staticcheck.conf all: cleanup unused code, part 2 (#10670) 2023-12-21 17:40:03 -08:00
update-flake.sh .github/workflows: add workflow to update go.mod Nix SRI hash 2023-02-14 03:28:43 +00:00
version-embed.go version: return correct Meta.MajorMinorPatch in non-dev builds 2023-02-10 13:00:44 -08:00
version_test.go go.mod,wgengine/netstack: bump gvisor 2024-01-19 18:23:53 -08:00

README.md

Tailscale

https://tailscale.com

Private WireGuard® networks made easy

Overview

This repository contains the majority of Tailscale's open source code. Notably, it includes the tailscaled daemon and the tailscale CLI tool. The tailscaled daemon runs on Linux, Windows, macOS, and to varying degrees on FreeBSD and OpenBSD. The Tailscale iOS and Android apps use this repo's code, but this repo doesn't contain the mobile GUI code.

Other Tailscale repos of note:

For background on which parts of Tailscale are open source and why, see https://tailscale.com/opensource/.

Using

We serve packages for a variety of distros and platforms at https://pkgs.tailscale.com.

Other clients

The macOS, iOS, and Windows clients use the code in this repository but additionally include small GUI wrappers. The GUI wrappers on non-open source platforms are themselves not open source.

Building

We always require the latest Go release, currently Go 1.22. (While we build releases with our Go fork, its use is not required.)

go install tailscale.com/cmd/tailscale{,d}

If you're packaging Tailscale for distribution, use build_dist.sh instead, to burn commit IDs and version info into the binaries:

./build_dist.sh tailscale.com/cmd/tailscale
./build_dist.sh tailscale.com/cmd/tailscaled

If your distro has conventions that preclude the use of build_dist.sh, please do the equivalent of what it does in your distro's way, so that bug reports contain useful version information.

Bugs

Please file any issues about this code or the hosted service on the issue tracker.

Contributing

PRs welcome! But please file bugs. Commit messages should reference bugs.

We require Developer Certificate of Origin Signed-off-by lines in commits.

See git log for our commit message style. It's basically the same as Go's style.

About Us

Tailscale is primarily developed by the people at https://github.com/orgs/tailscale/people. For other contributors, see:

WireGuard is a registered trademark of Jason A. Donenfeld.