Changelog for
tailscale-1.70.0-lp156.19.1.x86_64.rpm :
* Thu Jul 18 2024 Richard Rahl
- update to 1.70.0:
* New: Restrict recommended and automatically selected exit nodes using the new AllowedSuggestedExitNodes system policy. Applies only to platforms that support system policies.
* Changed: Improved NAT traversal for some uncommon scenarios.
* Changed: Optimized sending firewall rules to clients more efficiently.
* Fixed: Exit node suggestion CLI command now prints the hostname.
* Fixed: Taildrive share paths configured through the CLI resolve relative to where you run the tailscale command.
* Tue Jul 02 2024 Richard Rahl - update to 1.68.2:
* Fixed: Tailnet lock validation of rotation signatures now permits multiple nodes signed by the same pre-signed reusable auth key.
* Sun Jun 16 2024 Richard Rahl - update to 1.68.1:
* Fixed: 4via6 subnet router advertisement works as expected.
* Fixed: Tailscale SSH access to Security-Enhanced Linux (SELinux) machines works as expected.- update to 1.68.0:
* New: Auto-updates are allowed in containers, but ignore the tailnet-wide default
* New: Apply auto-updates even if the node is down or disconnected from the coordination server.
* New: tailscale lock status now prints the node\'s signature.
* Wed May 22 2024 Richard Rahl - update to 1.66.4:
* Fixed: Restored UDP connectivity through Mullvad exit nodes
* Stateful filtering is now off by default- update to 1.66.3:
* Login URLs did not always appear in the console when running tailscale up
* Starting with v1.66, the Kubernetes operator must always run the same or later version as the proxies it manages.
* Expose cloud services on cluster network to the tailnet, using Kubernetes ExternalName Services
* Expose tailnet services that use Tailscale HTTPS to cluster workloads
* Cluster workloads can now refer to Tailscale Ingress resources by their MagicDNS names
* Configure environment variables for Tailscale Kubernetes operator proxies using ProxyClass CRD
* Expose tailscaled metrics endpoint for Tailscale Kubernetes operator proxies through ProxyClass CRD
* Configure labels for the Kubernetes operator Pods with Helm chart values
* Configure affinity rules for Kubernetes operator proxy Pods with ProxyClass
* Kubernetes operator proxy init container no longer attempts to enable IPv6 forwarding on systems that don\'t have IPv6 module loaded
* Tailscale containers running on Kubernetes no longer error if an empty Kubernetes Secret is pre-created for the tailscaled state
* Improved the ambiguous error messages when Tailscale running on Kubernetes does not have the right permissions to perform actions against the tailscaled state Secret
* Fri May 10 2024 Richard Rahl - update to 1.66.1:
* Resolved issues with nftables rules for stateful filtering, introduced in v1.66.0.
* tailscale set command flags --netfilter-mode, --snat-subnet-routes, and --stateful-filtering are added.- update to 1.66.0:
* Implemented client-side quarantining for shared-in exit nodes, as a mitigation for a security vulnerability described in TS-2024-005.
* Use the --stateful-filtering flag for the tailscale up to enable stateful filtering for subnet routers and exit nodes, as a mitigation for a security vulnerability described in TS-2024-005.
* Added tab completions
* Use the tailscale exit-node suggest command to automatically pick an available exit node that is likely to perform best.
* Site-to-site networking now also requires --stateful-filtering=false in addition to - -snat-subnet-routes=false on new subnet routers. Existing subnet routers with --snat-subnet-routes=false will default to --stateful-filtering=false.- update to 1.64.2:
* nothing relevant for linux- update to 1.64.1:
* nothing relevant for linux- update to 1.64.0:
* New: tailscale configure kubeconfig now respects KUBECONFIG environment variable.
* Fixed: tailscale configure kubeconfig now works with partially empty kubeconfig.
* Fixed: MSS clamping for Kubernetes operator proxies using nftables.
* Fixed: Containers on hosts with partial support for ip6tables no longer crash.- turn of changelog generation- add completions for bash
* Sat Mar 30 2024 Richard Rahl - update to 1.62.1:
* Send load balancing hint HTTP request header
* Fixed: Kubernetes operator proxies should not accept subnet routes
* Thu Mar 14 2024 rrahl0AATTproton.me- update to 1.62.0:
* IPv6 support detection in a container environment is improved
* New: Web interface now uses ACL grants to manage access on tagged devices
* Tailscale SSH connections now disable unnecessary hostname canonicalization
* tailscale bugreport command for generating diagnostic logs now contain ethtool information
* Mullvad\'s family-friendly server is added to the list of well known DNS over HTTPS (DoH) servers
* DNS over HTTP requests now contain a timeout
* TCP forwarding attempts in userspace mode now have a per-client limit
* Endpoints with link-local IPv6 addresses is preferred over private addresses
* WireGuard logs are less verbose
* Go min. version 1.22.1
* DERP server region no longer changes if connectivity to the new DERP region is degraded- update to 1.60.1:
* Exposing port 8080 to other devices on your tailnet works as expected
* Tue Feb 20 2024 Alexandre Vicenzi - Add disable-auto-update.patch to prevent auto updates and instead ask users to use Zypper to update manually
* Tue Feb 20 2024 Richard Rahl - change to the non deprecated manualrun
* Fri Feb 16 2024 alexandre.vicenziAATTsuse.com- Spec cleanup
* Use tar_scm to avoid commit hashes in the spec
* Use tailscale build scripts
* Drop ProtectClock fix for Leap, DeviceAllow fixes it- Add build-verbose.patch to get go flags into build log- Enable PrivateDevices but allow access to /dev/net/tun in tailscaled.service
* Fri Feb 16 2024 Richard Rahl - update to 1.60.0:
* minimum go version 1.22
* authentication: present users with a valid login page when attempting to login even after leaving device unattended for several days
* networking: mute noisy peer mtu discovery errors
* networking: expose gVisor metrics in debug mode
* port mapper: support legacy \"urn:dslforum-org\" port mapping services
* port mapper: fix crash when no support mapping services found
* ssh: log warning when unable to find SSH host keys
* serve: improve error message when running as non-root
* Detect when Tailscale is running on Digital Ocean and automatically use Digital Ocean\'s DNS resolvers
* enable app connectors to install routes for domains that resolve to CNAME records
* support pre-configured routes from control server
* add new read-only mode
* tailscale status command: fix output formatting Tailnet includes location-based exit nodes
* a new ProxyClass custom resource that allows to provide custom configuration for cluster resources that the operator creates
* ACL tags for the operator can now be configured via Helm chart values
* routing to Ingress backends that require an exact path without a slash
* Wed Feb 07 2024 Richard Rahl - make rpm not overwrite /etc/default/taiscaled- defattr everything to root
* Sat Feb 03 2024 Richard Rahl - no stripping of binaries- add commitID to binaries for upstream- add directory for saved configs
* Tue Jan 23 2024 Richard Rahl - switch services to manual- update to version 1.58.2:
* Fixed: [App connectors][app-connectors] have improved scheduling and merging of route changes under some conditions
* Fixed: Crash when performing UPnP portmapping on older routers with no supported portmapping services
* Fri Jan 19 2024 Richard Rahl - update to version 1.58.0:
* portmap: check the epoch from NAT-PMP & PCP, establish new portmapping if it changes
* portmap: better handle multiple interfaces
* portmap: handle multiple UPnP discovery responses
* increase the number of 4via6 site IDs from 256 to 65,536
* taildrop: allow category Z unicode characters
* increased binary size with 1.56 is resolved in 1.58
* Reduce home DERP flapping when there\'s still an active connection
* device web ui: fixed issue when accessing shared devices
* device web ui: fixed login issue when accessed over https
* Wed Jan 10 2024 Richard Rahl - fix an issue with Leap, where ProtectClock prevents to connect to /dev/net/tun
* Fri Dec 15 2023 Richard Rahl - update to version 1.56.1:
* Fixed: Web interface redirects to the correct self IP known by source peer
* Fixed: Usage of slices.Compact from app connector domains list
* Fri Dec 15 2023 Richard Rahl - fix version output to what upstream expects
* Wed Dec 13 2023 rrahl0AATTproton.me- Update to version 1.56.0:
* improve responsiveness under load, especially with bidirectional traffic
* improve UPnP portmapping
* add tailscale whois subcommand to observe metadata associated with a Tailscale IP
* include tailnet name and profile ID in tailscale switch --list to disambiguate profiles with common login names
* improve tailscale web interface for configuring some device settings such as exit nodes, subnet routers, and Tailscale SSH
* improve containerboot to symlink its socket file if possible, making the tailscale CLI work without --socket=/tmp/tailscale.sock
* add support in Kubernetes operator cluster egress for referring to a tailnet service by its MagicDNS name- Update to version 1.54.1:
* no relevant updates to the linux version
* Fri Nov 24 2023 Richard Rahl - tailscale couldn\'t connect to /dev/net/tun
* Thu Nov 23 2023 rrahl0AATTproton.me- Update to version 1.54.0:
* improve throughput substantially for UDP packets over TUN device with recent Linux kernels- Update to version 1.52.1:
* no linux improvements- Update to version 1.52.0:
* tailscale set command flag --auto-update is added to opt in to automatic client updates
* tailscale serve and tailscale funnel commands are updated for improved usability
* tailscale update command for manual updates is now in beta
* Taildrop file transfer displays a progress meter
* nftables auto-detection is improved when TS_DEBUG_FIREWALL_MODE=auto is used
* DNS detection of NetworkManager with configured but absent systemd-resolved
* Taildrop now resumes file transfers after partial transfers are interrupted
* tailscale up command displays a message about client updates when newer versions are available
* tailscale status command displays a message about client updates when newer versions are available
* tailscale cert command renews in the background. The current certificate only displays if it has expired.
* Mon Oct 02 2023 rrahl0AATTproton.me- Update to version 1.50.1:
* fix bug where serve config could get wiped
* Funnel support for tsnet apps
* fix potential crash with UPnP
* Sat Sep 30 2023 rrahl0AATTproton.me- Update to version 1.50.0:
* Update tailscale{,d} licenses
* Update Quad9 addresses and references
* Adds support for Wikimedia DNS using DNS-over-HTTPS- Update to version 1.48.1:
* no relevant updates- Update to version 1.48.2:
* Improvements to Mullvad exit nodes
* Fri Aug 18 2023 Richard Rahl - Initial revision