Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: tailscale | Distribution: openSUSE Tumbleweed |
Version: 1.72.1 | Vendor: openSUSE |
Release: 1.1 | Build date: Fri Aug 23 00:08:51 2024 |
Group: Productivity/Networking/Security | Build host: reproducible |
Size: 38949313 | Source RPM: tailscale-1.72.1-1.1.src.rpm |
Packager: http://bugs.opensuse.org | |
Url: https://github.com/tailscale/tailscale | |
Summary: The easiest, most secure way to use WireGuard and 2FA |
Tailscale is a modern VPN built on top of Wireguard. It works like an overlay network between the computers of your networks using NAT traversal.
BSD-3-Clause
* Thu Aug 22 2024 Richard Rahl <rrahl0@opensuse.org> - update to 1.72.1: * DNS over TCP failures when querying the Tailscale-internal resolver are fixed. * Wed Aug 21 2024 rrahl0@opensuse.org - Update to version 1.72.0: * posture: deduplicate MAC addresses before returning them * health/dns: reduce severity of DNS unavailable warning * safeweb: add Server.Close method * go.mod.sri: update SRI hash for go.mod changes * go.{mod,sum}: migrate from nhooyr.io/websocket to github.com/coder/websocket * cmd/viewer: add support for map-like container types - update golang(API) to 1.23 - export version variables, to circumvent a bug * Thu Jul 18 2024 Richard Rahl <rrahl0@opensuse.org> - update to 1.70.0: * New: Restrict recommended and automatically selected exit nodes using the new AllowedSuggestedExitNodes system policy. Applies only to platforms that support system policies. * Changed: Improved NAT traversal for some uncommon scenarios. * Changed: Optimized sending firewall rules to clients more efficiently. * Fixed: Exit node suggestion CLI command now prints the hostname. * Fixed: Taildrive share paths configured through the CLI resolve relative to where you run the tailscale command. * Tue Jul 02 2024 Richard Rahl <rrahl0@opensuse.org> - update to 1.68.2: * Fixed: Tailnet lock validation of rotation signatures now permits multiple nodes signed by the same pre-signed reusable auth key. * Sun Jun 16 2024 Richard Rahl <rrahl0@disroot.org> - update to 1.68.1: * Fixed: 4via6 subnet router advertisement works as expected. * Fixed: Tailscale SSH access to Security-Enhanced Linux (SELinux) machines works as expected. - update to 1.68.0: * New: Auto-updates are allowed in containers, but ignore the tailnet-wide default * New: Apply auto-updates even if the node is down or disconnected from the coordination server. * New: tailscale lock status now prints the node's signature. * Wed May 22 2024 Richard Rahl <rrahl0@disroot.org> - update to 1.66.4: * Fixed: Restored UDP connectivity through Mullvad exit nodes * Stateful filtering is now off by default - update to 1.66.3: * Login URLs did not always appear in the console when running tailscale up * Starting with v1.66, the Kubernetes operator must always run the same or later version as the proxies it manages. * Expose cloud services on cluster network to the tailnet, using Kubernetes ExternalName Services * Expose tailnet services that use Tailscale HTTPS to cluster workloads * Cluster workloads can now refer to Tailscale Ingress resources by their MagicDNS names * Configure environment variables for Tailscale Kubernetes operator proxies using ProxyClass CRD * Expose tailscaled metrics endpoint for Tailscale Kubernetes operator proxies through ProxyClass CRD * Configure labels for the Kubernetes operator Pods with Helm chart values * Configure affinity rules for Kubernetes operator proxy Pods with ProxyClass * Kubernetes operator proxy init container no longer attempts to enable IPv6 forwarding on systems that don't have IPv6 module loaded * Tailscale containers running on Kubernetes no longer error if an empty Kubernetes Secret is pre-created for the tailscaled state * Improved the ambiguous error messages when Tailscale running on Kubernetes does not have the right permissions to perform actions against the tailscaled state Secret * Fri May 10 2024 Richard Rahl <rrahl0@disroot.org> - update to 1.66.1: * Resolved issues with nftables rules for stateful filtering, introduced in v1.66.0. * tailscale set command flags --netfilter-mode, --snat-subnet-routes, and --stateful-filtering are added. - update to 1.66.0: * Implemented client-side quarantining for shared-in exit nodes, as a mitigation for a security vulnerability described in TS-2024-005. * Use the --stateful-filtering flag for the tailscale up to enable stateful filtering for subnet routers and exit nodes, as a mitigation for a security vulnerability described in TS-2024-005. * Added tab completions * Use the tailscale exit-node suggest command to automatically pick an available exit node that is likely to perform best. * Site-to-site networking now also requires --stateful-filtering=false in addition to - -snat-subnet-routes=false on new subnet routers. Existing subnet routers with --snat-subnet-routes=false will default to --stateful-filtering=false. - update to 1.64.2: * nothing relevant for linux - update to 1.64.1: * nothing relevant for linux - update to 1.64.0: * New: tailscale configure kubeconfig now respects KUBECONFIG environment variable. * Fixed: tailscale configure kubeconfig now works with partially empty kubeconfig. * Fixed: MSS clamping for Kubernetes operator proxies using nftables. * Fixed: Containers on hosts with partial support for ip6tables no longer crash. - turn of changelog generation - add completions for bash * Sat Mar 30 2024 Richard Rahl <rrahl0@proton.me> - update to 1.62.1: * Send load balancing hint HTTP request header * Fixed: Kubernetes operator proxies should not accept subnet routes * Thu Mar 14 2024 rrahl0@proton.me - update to 1.62.0: * IPv6 support detection in a container environment is improved * New: Web interface now uses ACL grants to manage access on tagged devices * Tailscale SSH connections now disable unnecessary hostname canonicalization * tailscale bugreport command for generating diagnostic logs now contain ethtool information * Mullvad's family-friendly server is added to the list of well known DNS over HTTPS (DoH) servers * DNS over HTTP requests now contain a timeout * TCP forwarding attempts in userspace mode now have a per-client limit * Endpoints with link-local IPv6 addresses is preferred over private addresses * WireGuard logs are less verbose * Go min. version 1.22.1 * DERP server region no longer changes if connectivity to the new DERP region is degraded - update to 1.60.1: * Exposing port 8080 to other devices on your tailnet works as expected * Tue Feb 20 2024 Alexandre Vicenzi <alexandre.vicenzi@suse.com> - Add disable-auto-update.patch to prevent auto updates and instead ask users to use Zypper to update manually * Tue Feb 20 2024 Richard Rahl <rrahl0@proton.me> - change to the non deprecated manualrun * Fri Feb 16 2024 alexandre.vicenzi@suse.com - Spec cleanup * Use tar_scm to avoid commit hashes in the spec * Use tailscale build scripts * Drop ProtectClock fix for Leap, DeviceAllow fixes it - Add build-verbose.patch to get go flags into build log - Enable PrivateDevices but allow access to /dev/net/tun in tailscaled.service * Fri Feb 16 2024 Richard Rahl <rrahl0@proton.me> - update to 1.60.0: * minimum go version 1.22 * authentication: present users with a valid login page when attempting to login even after leaving device unattended for several days * networking: mute noisy peer mtu discovery errors * networking: expose gVisor metrics in debug mode * port mapper: support legacy "urn:dslforum-org" port mapping services * port mapper: fix crash when no support mapping services found * ssh: log warning when unable to find SSH host keys * serve: improve error message when running as non-root * Detect when Tailscale is running on Digital Ocean and automatically use Digital Ocean's DNS resolvers * enable app connectors to install routes for domains that resolve to CNAME records * support pre-configured routes from control server * add new read-only mode * tailscale status command: fix output formatting Tailnet includes location-based exit nodes * a new ProxyClass custom resource that allows to provide custom configuration for cluster resources that the operator creates * ACL tags for the operator can now be configured via Helm chart values * routing to Ingress backends that require an exact path without a slash * Wed Feb 07 2024 Richard Rahl <rrahl0@proton.me> - make rpm not overwrite /etc/default/taiscaled - defattr everything to root * Sat Feb 03 2024 Richard Rahl <rrahl0@proton.me> - no stripping of binaries - add commitID to binaries for upstream - add directory for saved configs * Tue Jan 23 2024 Richard Rahl <rrahl0@proton.me> - switch services to manual - update to version 1.58.2: * Fixed: [App connectors][app-connectors] have improved scheduling and merging of route changes under some conditions * Fixed: Crash when performing UPnP portmapping on older routers with no supported portmapping services * Fri Jan 19 2024 Richard Rahl <rrahl0@proton.me> - update to version 1.58.0: * portmap: check the epoch from NAT-PMP & PCP, establish new portmapping if it changes * portmap: better handle multiple interfaces * portmap: handle multiple UPnP discovery responses * increase the number of 4via6 site IDs from 256 to 65,536 * taildrop: allow category Z unicode characters * increased binary size with 1.56 is resolved in 1.58 * Reduce home DERP flapping when there's still an active connection * device web ui: fixed issue when accessing shared devices * device web ui: fixed login issue when accessed over https * Wed Jan 10 2024 Richard Rahl <rrahl0@proton.me> - fix an issue with Leap, where ProtectClock prevents to connect to /dev/net/tun * Fri Dec 15 2023 Richard Rahl <rrahl0@proton.me> - update to version 1.56.1: * Fixed: Web interface redirects to the correct self IP known by source peer * Fixed: Usage of slices.Compact from app connector domains list * Fri Dec 15 2023 Richard Rahl <rrahl0@proton.me> - fix version output to what upstream expects * Wed Dec 13 2023 rrahl0@proton.me - Update to version 1.56.0: * improve responsiveness under load, especially with bidirectional traffic * improve UPnP portmapping * add tailscale whois subcommand to observe metadata associated with a Tailscale IP * include tailnet name and profile ID in tailscale switch --list to disambiguate profiles with common login names * improve tailscale web interface for configuring some device settings such as exit nodes, subnet routers, and Tailscale SSH * improve containerboot to symlink its socket file if possible, making the tailscale CLI work without --socket=/tmp/tailscale.sock * add support in Kubernetes operator cluster egress for referring to a tailnet service by its MagicDNS name - Update to version 1.54.1: * no relevant updates to the linux version * Fri Nov 24 2023 Richard Rahl <rrahl0@proton.me> - tailscale couldn't connect to /dev/net/tun * Thu Nov 23 2023 rrahl0@proton.me - Update to version 1.54.0: * improve throughput substantially for UDP packets over TUN device with recent Linux kernels - Update to version 1.52.1: * no linux improvements - Update to version 1.52.0: * tailscale set command flag --auto-update is added to opt in to automatic client updates * tailscale serve and tailscale funnel commands are updated for improved usability * tailscale update command for manual updates is now in beta * Taildrop file transfer displays a progress meter * nftables auto-detection is improved when TS_DEBUG_FIREWALL_MODE=auto is used * DNS detection of NetworkManager with configured but absent systemd-resolved * Taildrop now resumes file transfers after partial transfers are interrupted * tailscale up command displays a message about client updates when newer versions are available * tailscale status command displays a message about client updates when newer versions are available * tailscale cert command renews in the background. The current certificate only displays if it has expired. * Mon Oct 02 2023 rrahl0@proton.me - Update to version 1.50.1: * fix bug where serve config could get wiped * Funnel support for tsnet apps * fix potential crash with UPnP * Sat Sep 30 2023 rrahl0@proton.me - Update to version 1.50.0: * Update tailscale{,d} licenses * Update Quad9 addresses and references * Adds support for Wikimedia DNS using DNS-over-HTTPS - Update to version 1.48.1: * no relevant updates - Update to version 1.48.2: * Improvements to Mullvad exit nodes * Fri Aug 18 2023 Richard Rahl <rrahl0@proton.me> - Initial revision
/etc/default/tailscaled /usr/bin/tailscale /usr/lib/systemd/system/tailscaled.service /usr/sbin/rctailscaled /usr/sbin/tailscaled /usr/share/doc/packages/tailscale /usr/share/doc/packages/tailscale/README.md /usr/share/doc/packages/tailscale/SECURITY.md /usr/share/licenses/tailscale /usr/share/licenses/tailscale/LICENSE /usr/share/licenses/tailscale/PATENTS /var/lib/tailscale
Generated by rpm2html 1.8.1
Fabrice Bellet, Wed Sep 11 00:44:36 2024