Commit Graph

  • 25fb6b9615 Accepting request 1323401 from network:vpn factory Ana Guerrero 2025-12-18 17:32:15 +00:00
  • f506379a86 - Update to version 1.92.3: * WireGuard configuration that occurs automatically in the client, no longer results in a panic Richard Rahl 2025-12-17 17:54:35 +00:00
  • c7d4a8edbd Accepting request 1322628 from network:vpn Ana Guerrero 2025-12-12 20:43:17 +00:00
  • fce1b2083b - Update to version 1.92.2: * cmd/derper: add GCP Certificate Manager support Richard Rahl 2025-12-12 14:29:49 +00:00
  • d2c4ec3e11 Accepting request 1321351 from network:vpn Ana Guerrero 2025-12-08 10:54:26 +00:00
  • e599b7f0f3 - Update to version 1.92.1: * fix LocalBackend deadlock when packet arrives during profile switch * wgengine: fix TSMP/ICMP callback leak - Update to version 1.92.0: * no changelog provided - Update to version 1.90.9: * tailscaled no longer deadlocks during event bursts * The client no longer hangs after wake up Richard Rahl 2025-12-06 11:46:21 +00:00
  • 97d6a0d4fd Accepting request 1318742 from network:vpn Ana Guerrero 2025-11-20 13:50:45 +00:00
  • d8cbdec28e - Update to version 1.90.8: * tka: move RemoveAll() to CompactableChonk - Update to version 1.90.7: * wgengine/magicsock: validate endpoint.derpAddr * wgengine/magicsock: fix UDPRelayAllocReq/Resp deadlock * net/udprelay: replace VNI pool with selection algorithm * feature/relayserver,ipn/ipnlocal,net/udprelay: plumb DERPMap * feature/relayserver: fix Shutdown() deadlock * net/netmon: do not abandon a subscriber when exiting early * tka: don't try to read AUMs which are partway through being written * tka: rename a mutex to mu instead of single-letter l * ipn/ipnlocal: use an in-memory TKA store if FS is unavailable Richard Rahl 2025-11-19 18:22:06 +00:00
  • 05d0c2a1df Accepting request 1315613 from network:vpn Ana Guerrero 2025-11-05 15:19:22 +00:00
  • 6e9945886e - Update to version 1.90.6: * Routes no longer stall and fail to apply when updated repeatedly in a short period of time * Tailscale SSH no longer hangs for 10s when connecting to tsrecorder. This affected tailnets that use Tailscale SSH recording Richard Rahl 2025-11-04 22:44:16 +00:00
  • 1650468da8 Accepting request 1314302 from network:vpn Ana Guerrero 2025-10-29 20:08:12 +00:00
  • 9e65c6f447 - Update to version 1.90.4: * deadlock issue no longer occurs in the client when checking for the network to be available * tailscaled no longer sporadically panics when a Trusted Platform Module (TPM) device is present Richard Rahl 2025-10-29 09:57:27 +00:00
  • 0dde72b3c5 Accepting request 1314049 from network:vpn Ana Guerrero 2025-10-28 13:49:25 +00:00
  • 9909462d9e - Update to version 1.90.3: * tailscaled shuts down as expected and without panic * tailscaled starts up as expected in a no router configuration environment Richard Rahl 2025-10-28 11:23:52 +00:00
  • 5338fd9fa3 Accepting request 1313598 from network:vpn Ana Guerrero 2025-10-27 13:38:42 +00:00
  • ce56400c01 - Update to version 1.90.2: * util/linuxfw: fix 32-bit arm regression with iptables * health: compare warnable codes to avoid errors on release branch * feature/tpm: check TPM family data for compatibility Richard Rahl 2025-10-24 18:25:48 +00:00
  • 1f04778326 - Upate to version 1.90.1: * Clients can use configured DNS resolvers for all domains * Node keys will be renewed seamlessly * Unnecessary path discovery packets over DERP servers are suppressed * Node key sealing is GA (generally available) and enabled by default Richard Rahl 2025-10-24 10:11:41 +00:00
  • db30034e27 Accepting request 1308397 from network:vpn Ana Guerrero 2025-10-01 16:58:02 +00:00
  • be10986d82 - update to version 1.88.3: * cmd/tailscale/cli: add ts2021 debug flag to set a dial plan * control/controlhttp: simplify, fix race dialing, remove priority concept - update to version 1.88.2: * k8s-operator: reset service status before append - require the minimum go version directly, in comparison to using the golang(API) symbol Richard Rahl 2025-10-01 12:22:36 +00:00
  • e31a9023ed Accepting request 1305111 from network:vpn Ana Guerrero 2025-09-16 16:18:50 +00:00
  • c6036422ee - remove fix-CVE-2025-58058.patch, fixed upstream Richard Rahl 2025-09-16 08:39:20 +00:00
  • 566209601a - update to version 1.88.1: * Tailscale CLI prompts users to confirm impactful actions * Tailscale SSH works as expected when using an IP address instead of a hostname and MagicDNS is disabled * fixed: Taildrive sharing when su not present * Taildrive files remain consistently accessible * new: Tailscale tray GUI * DERP IPs changed for Singapore and Tokyo - remove patch fix-CVE-2025-58058, fixed upstream Richard Rahl 2025-09-12 12:20:11 +00:00
  • e8033b8603 Accepting request 1301939 from network:vpn Ana Guerrero 2025-08-29 16:37:33 +00:00
  • c80d751fc0 - add patch fix-CVE-2025-58058.patch, fixing bsc#1248920 Richard Rahl 2025-08-29 12:59:17 +00:00
  • c327f5e3dc - update to version 1.86.5: * cmd/k8s-proxy,k8s-operator: fix serve config for userspace mode - update to version 1.86.4: * nothing of relevance - update to version 1.86.3: * nothing of relevance Richard Rahl 2025-08-29 11:17:32 +00:00
  • 8f8f1f7b2c Accepting request 1296390 from network:vpn Dominique Leuenberger 2025-07-30 09:45:45 +00:00
  • 9967c0490e - update to version 1.86.2: * A deadlock issue that may have occurred in the client * An occasional crash when establishing a new port mapping with a gateway or firewall Richard Rahl 2025-07-29 21:54:32 +00:00
  • acc0d6f69f Accepting request 1295907 from network:vpn Dominique Leuenberger 2025-07-27 14:26:56 +00:00
  • 7b1310a217 - update to version 1.86.0: * tsStateEncrypted device posture attribute for checking whether the Tailscale client state is encrypted at rest * Cross-site request forgery (CSRF) issue that may have resulted in a log in error when accessing the web interface * Recommended exit node when the previously recommended exit node is offline * tailscale up --exit-node=auto:any and tailscale set --exit-node=auto:any CLI commands track the recommended exit node and automatically switches to it when available exit nodes or network conditions change * tailscaled CLI command flag --encrypt-state encrypts the node state file on the disk using trusted platform module (TPM) Richard Rahl 2025-07-26 16:32:16 +00:00
  • 8da1898a50 Accepting request 1288739 from network:vpn Ana Guerrero 2025-06-27 21:01:27 +00:00
  • e3e3aab1be - update to 1.84.3: * ipn/ipnlocal: Update hostinfo to control on service config change Richard Rahl 2025-06-26 17:44:30 +00:00
  • df641df7e5 Accepting request 1284535 from network:vpn Ana Guerrero 2025-06-11 14:24:01 +00:00
  • 422d112069 - update to 1.84.2: * Re-enable setting —accept-dns by using TS_EXTRA_ARGS. This issue resulted from stricter CLI arguments parsing introduced in Tailscale v1.84.0 Richard Rahl 2025-06-10 15:45:21 +00:00
  • e8ca381df8 Accepting request 1281270 from network:vpn Dominique Leuenberger 2025-05-30 12:39:07 +00:00
  • 93386dca72 - update to 1.84.1: * net/dns: cache dns.Config for reuse when compileConfig fails Richard Rahl 2025-05-30 06:50:23 +00:00
  • 8fb2bf4c3f Accepting request 1279266 from network:vpn Ana Guerrero 2025-05-22 14:57:32 +00:00
  • f05ff0fb44 - update to 1.84.0: * The --reason flag is added to the tailscale down command * ReconnectAfter policy setting, which configures the maximum period of time between a user disconnecting Tailscale and the client automatically reconnecting * Tailscale CLI commands throw an error if multiple of the same flag are detected * Network connectivity issues when creating a new profile or switching profiles while using an exit node * DNS-over-TCP fallback works correctly with upstream servers reachable only via the tailnet - remove fix-CVE-2025-22869.patch, as upstream updated their dependencies Richard Rahl 2025-05-22 12:04:31 +00:00
  • 6b4a306d68 Accepting request 1270797 from network:vpn Ana Guerrero 2025-04-18 14:22:03 +00:00
  • 2d570b44dc - update to 1.82.5: * A panic issue related to CUBIC congestion control in userspace mode is resolved. Richard Rahl 2025-04-18 07:42:58 +00:00
  • 0aeff92068 Accepting request 1264694 from network:vpn Ana Guerrero 2025-03-28 06:36:15 +00:00
  • 93c5b928dc - update to 1.82.0: * DERP functionality within the client supports certificate pinning for self-signed IP address certificates for those unable to use Let's Encrypt or WebPKI certificates. * Go is updated to version 1.24.1 * NAT traversal code uses the DERP connection that a packet arrived on as an ultimate fallback route if no other information is available * Captive portal detection reliability is improved on some in-flight Wi-Fi networks * Port mapping success rate is improved * Helsinki is added as a DERP region. Richard Rahl 2025-03-27 19:53:04 +00:00
  • 4fc563b752 Accepting request 1252354 from network:vpn leap-16.1 leap-16.0 Ana Guerrero 2025-03-12 19:13:52 +00:00
  • e301c435ed - add patch fix-CVE-2025-22869.patch, fixes bsc#1239353 Richard Rahl 2025-03-12 09:22:16 +00:00
  • cc303292a9 Accepting request 1250085 from network:vpn Ana Guerrero 2025-03-04 17:33:44 +00:00
  • 91a96b1ce6 - update to 1.80.3: * appc: fix a deadlock in route advertisements * client/web: fix CSRF handler order in web UI Richard Rahl 2025-03-04 13:49:59 +00:00
  • 786d0d5383 Accepting request 1245709 from network:vpn Ana Guerrero 2025-02-13 17:47:55 +00:00
  • 66c1141099 - update to 1.80.2: * Use ip:country as a geolocation device posture attribute (generally available). Richard Rahl 2025-02-13 15:36:34 +00:00
  • c81f735328 Accepting request 1244263 from network:vpn Dominique Leuenberger 2025-02-09 19:01:34 +00:00
  • 82875da72a - update to 1.80.1: * net/netmon: add extra panic guard around ParseRIB Richard Rahl 2025-02-07 19:13:40 +00:00
  • b055a4dece Accepting request 1241760 from network:vpn Ana Guerrero 2025-02-03 20:42:23 +00:00
  • aa509b69e0 - update to 1.80.0: * Hostname system policy is added for overriding the device hostname configured by the operating system, using an MDM solution. * Web interface displays a Login button instead of the Reauthenticate button when adding a new device to your tailnet. * Tailscale Funnel configuration on devices displays errors when incoming connections are not permitted and connections are disallowed. * Connections to a custom coordination server that does not support HTTPS will no longer fail when a custom port number is specified. * TLS certificate requests from Let’s Encrypt include the device's DNS name in the CSR’s SAN extension and set the Common Name field. * Tailscale Funnel disabled on a device no longer displays enabled in the admin console. * GitHub username change automatically updates tailnet name * 4via6 subnet routers GA * Auto approvers GA * Node attributes GA * Download invoices GA * Fast user switching GA * Configuration log streaming integration with S3 buckets GA * Network flow log streaming integration with S3 buckets GA * NextDNS profiles per device GA * GitHub secret scanning - remove fix-CVE-2024-45337.patch, as it's now included Richard Rahl 2025-01-31 17:27:15 +00:00
  • 938c433b47 Accepting request 1231944 from network:vpn Ana Guerrero 2024-12-18 20:09:08 +00:00
  • a1960b58af - add patch fix-CVE-2024-45337.patch, to circumevent a possibility of exploiting the golang-x-crypto security hole. (fix #1234506) Richard Rahl 2024-12-18 17:43:39 +00:00
  • 263e5eef59 Accepting request 1230718 from network:vpn Ana Guerrero 2024-12-13 21:38:17 +00:00
  • 2b5ad6f362 Accepting request 1230717 from home:rrahl0 Richard Rahl 2024-12-13 06:21:17 +00:00
  • 9d3afc6a46 Accepting request 1228636 from network:vpn Ana Guerrero 2024-12-06 13:26:06 +00:00
  • c22a0bd619 OBS-URL: https://build.opensuse.org/package/show/network:vpn/tailscale?expand=0&rev=57 Richard Rahl 2024-12-06 01:25:57 +00:00
  • f85219504a - update to 1.78.1: * health: fix TestHealthMetric Richard Rahl 2024-12-06 01:23:23 +00:00
  • d6af84c7b6 - update to 1.78.0: * Client metrics have been added, to provide insights into Tailscale client behavior, health, and performance. * tailscale metrics command has been added, to expose and collect client metrics for use with third-party monitoring systems. * tailscale syspolicy command has been added, to list system policies, reload system policies, or view errors related to the system policies configured on the device. * Tailscale system policies are applied immediately when pushed via mobile device management (MDM) or Group Policy, without requiring a client restart. * Tailscale SSH session recording detects the disappearance of the recorder node sooner. This fix addresses a security vulnerability described in TS-2024-013. * New scopes for OAuth clients have been added with more granular permissions. Existing OAuth clients using the previous set of scopes, and keys generated using these clients, are still valid. Richard Rahl 2024-12-05 22:13:03 +00:00
  • 6cfd54f698 Accepting request 1222620 from network:vpn Ana Guerrero 2024-11-08 11:01:03 +00:00
  • 36177afc8e - update to 1.76.6: * Logging for when clients move home DERP regions is improved. * Tailscale clients no longer move their home DERP server prematurely in response to unusual latency at very specific times. Richard Rahl 2024-11-08 03:52:44 +00:00
  • 67362537a0 Accepting request 1218078 from network:vpn Ana Guerrero 2024-10-25 17:19:32 +00:00
  • ad6ad67137 - update to 1.76.3: * no relevant changelog - update to 1.76.2: * no relevant changelog - switch over to the new %{default_fw_backend} macro - create old init file only for < leap 16 Richard Rahl 2024-10-24 15:01:48 +00:00
  • 2c42f71626 Accepting request 1208651 from network:vpn Ana Guerrero 2024-10-17 16:41:04 +00:00
  • e211ce0614 - update to 1.76.1: * tailscale netcheck CLI command no longer crashes when performing diagnostics on networks lacking UDP connectivity. * Improperly formatted SERVFAIL responses no longer cause DNS timeouts when using an exit node. * dbus login sessions no longer fail on systems where /bin/login is missing. Richard Rahl 2024-10-17 14:19:57 +00:00
  • d4132497a4 Accepting request 1208074 from network:vpn Ana Guerrero 2024-10-15 13:02:21 +00:00
  • 8e754bbadc require a fw backend Richard Rahl 2024-10-15 09:09:37 +00:00
  • aaa9f77fac Accepting request 1207052 from network:vpn Ana Guerrero 2024-10-11 15:03:00 +00:00
  • 52790f3e74 - update to 1.76.0: * Clients lacking UDP connectivity no longer skip performing fallback latency measurements with DERP servers. * Warnings no longer display unnecessarily. * Tailscale connectivity on in-flight internet on airplanes (such as Alaska Airlines) no longer fails. * Service-related processes no longer run unnecessarily when services are disabled on the tailnet. * Error messages include explanations in addition to the HTTP status code. * Tailscale SSH supports sending environment variables to hosts. It's also possible to specify permitted environment variables using the acceptEnv field. * Tailscale SSH no longer breaks some terminal applications by omitting pixel width and height when resizing the application window. Richard Rahl 2024-10-11 06:11:52 +00:00
  • d7157acdb9 Accepting request 1202314 from network:vpn Ana Guerrero 2024-09-23 13:19:17 +00:00
  • 29c031e93c Fix to zsh completions file path Richard Rahl 2024-09-21 06:46:14 +00:00
  • 4648ba845d Accepting request 1201856 from network:vpn Ana Guerrero 2024-09-19 19:17:13 +00:00
  • 4de2c08f5a OBS-URL: https://build.opensuse.org/package/show/network:vpn/tailscale?expand=0&rev=41 Richard Rahl 2024-09-18 19:48:04 +00:00
  • 789db47c2a - update to 1.74.1: * wgengine/magicsock: disable raw disco by default; add envknob to enable Richard Rahl 2024-09-18 19:45:04 +00:00
  • cf7e451ca1 Accepting request 1200808 from network:vpn Ana Guerrero 2024-09-15 10:35:41 +00:00
  • 45a8d4c807 - update to 1.74.0 * AuthKey system policy can be used to authenticate a device with Tailscale using an MDM solution. * tailscale dns CLI command is added for accessing Tailscale DNS settings and status. * Tailnet Lock long rotation signatures are truncated automatically to avoid excessive growth. * Log In option in the client works as expected. * TCP generic receive offload (GRO) support is added for improved userspace mode throughput. * TCP generic segmentation offload (GSO) is re-introduced for supporting improved userspace mode throughput. This was initially introduced in Tailscale v1.72.0 and then rolled back in v1.72.1. * Device posture integration with CrowdStrike Falcon can now use MAC addresses to match devices that lack serial numbers. When Falcon integration is configured, Device Identity Collection will automatically collect MAC addresses. Richard Rahl 2024-09-13 11:05:19 +00:00
  • d967e912f2 Accepting request 1195619 from network:vpn Ana Guerrero 2024-08-23 20:26:49 +00:00
  • 03d95338db - update to 1.72.1: * DNS over TCP failures when querying the Tailscale-internal resolver are fixed. Richard Rahl 2024-08-22 22:14:21 +00:00
  • 2a2c5d5d46 Accepting request 1195170 from network:vpn Ana Guerrero 2024-08-22 16:13:25 +00:00
  • 9793d04207 - Update to version 1.72.0: * posture: deduplicate MAC addresses before returning them * health/dns: reduce severity of DNS unavailable warning * safeweb: add Server.Close method * go.mod.sri: update SRI hash for go.mod changes * go.{mod,sum}: migrate from nhooyr.io/websocket to github.com/coder/websocket * cmd/viewer: add support for map-like container types - update golang(API) to 1.23 - export version variables, to circumvent a bug Richard Rahl 2024-08-21 16:33:03 +00:00
  • a5412847f3 Accepting request 1188315 from network:vpn Ana Guerrero 2024-07-19 13:26:59 +00:00
  • ccc2356f80 - update to 1.70.0: * New: Restrict recommended and automatically selected exit nodes using the new AllowedSuggestedExitNodes system policy. Applies only to platforms that support system policies. * Changed: Improved NAT traversal for some uncommon scenarios. * Changed: Optimized sending firewall rules to clients more efficiently. * Fixed: Exit node suggestion CLI command now prints the hostname. * Fixed: Taildrive share paths configured through the CLI resolve relative to where you run the tailscale command. Richard Rahl 2024-07-18 06:39:12 +00:00
  • 673644643e Accepting request 1185700 from network:vpn Ana Guerrero 2024-07-05 17:50:21 +00:00
  • ee6befb779 Accepting request 1185699 from home:rrahl0:upgrades Richard Rahl 2024-07-05 00:17:07 +00:00
  • 9ba05860f4 Accepting request 1181177 from network:vpn Ana Guerrero 2024-06-17 17:30:02 +00:00
  • 2b8a3a8246 Accepting request 1181176 from home:rrahl0:upgrades Richard Rahl 2024-06-16 14:02:30 +00:00
  • 9d187e3f86 Accepting request 1175719 from network:vpn Ana Guerrero 2024-05-22 19:32:10 +00:00
  • 7e88365b18 Accepting request 1175718 from home:rrahl0:upgrades Richard Rahl 2024-05-22 08:53:26 +00:00
  • 3af4b2639c Accepting request 1173205 from network:vpn Dominique Leuenberger 2024-05-11 16:21:13 +00:00
  • f80c1963ae Accepting request 1173203 from home:rrahl0:upgrades Richard Rahl 2024-05-10 15:52:27 +00:00
  • 4de44add30 Accepting request 1163652 from network:vpn Ana Guerrero 2024-04-02 14:41:14 +00:00
  • bda965ca60 Accepting request 1163651 from home:rrahl0:branches:network:vpn Richard Rahl 2024-03-30 08:39:45 +00:00
  • d4dc6088a3 Accepting request 1157799 from network:vpn Ana Guerrero 2024-03-14 16:44:38 +00:00
  • 4afb89d537 Accepting request 1157798 from home:rrahl0:branches:network:vpn Richard Rahl 2024-03-14 05:33:47 +00:00
  • 12e5a362ba Accepting request 1148805 from network:vpn Ana Guerrero 2024-02-22 19:56:26 +00:00
  • 3947a3aa3a Accepting request 1148797 from home:avicenzi:branches:network:vpn Richard Rahl 2024-02-21 16:28:28 +00:00
  • 5cb17dca2f Accepting request 1148119 from home:rrahl0:branches:network:vpn Richard Rahl 2024-02-20 14:53:34 +00:00
  • a47e393dd9 Accepting request 1147777 from home:avicenzi:branches:network:vpn Richard Rahl 2024-02-20 14:50:20 +00:00
  • 78d29a75b0 Accepting request 1146985 from home:rrahl0:upgrades Richard Rahl 2024-02-16 02:26:24 +00:00
  • ed5541e453 Accepting request 1144955 from home:rrahl0:upgrades Richard Rahl 2024-02-07 15:00:35 +00:00