tailscale/net/dnsfallback
Brad Fitzpatrick 7cf8ec8108 net/tlsdial: bake in LetsEncrypt's ISRG Root X1 root
We still try the host's x509 roots first, but if that fails (like if
the host is old), we fall back to using LetsEncrypt's root and
retrying with that.

tlsdial was used in the three main places: logs, control, DERP. But it
was missing in dnsfallback. So added it there too, so we can run fine
now on a machine with no DNS config and no root CAs configured.

Also, move SSLKEYLOGFILE support out of DERP. tlsdial is the logical place
for that support.

Fixes #1609

Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2021-10-01 08:30:07 -07:00
..
dns-fallback-servers.json net/dnsfallback: update static map for new derp11. 2021-09-22 15:35:42 -07:00
dnsfallback.go net/tlsdial: bake in LetsEncrypt's ISRG Root X1 root 2021-10-01 08:30:07 -07:00
dnsfallback_test.go net/dnsfallback: don't depend on derpmap.Prod 2021-06-27 22:07:40 -07:00
update-dns-fallbacks.go all: gofmt with Go 1.17 2021-08-05 15:54:00 -07:00