Documentation
¶
Overview ¶
Package blockblame blames specific firewall manufacturers for blocking Tailscale, by analyzing the SSL certificate presented when attempting to connect to a remote server.
Index ¶
Constants ¶
This section is empty.
Variables ¶
View Source
var Manufacturers = []*Manufacturer{ { Name: "Aruba Networks", // contains filtered or unexported fields }, { Name: "Cisco", // contains filtered or unexported fields }, { Name: "Fortinet", // contains filtered or unexported fields }, { Name: "Huawei", // contains filtered or unexported fields }, { Name: "Palo Alto Networks", // contains filtered or unexported fields }, { Name: "Sophos", // contains filtered or unexported fields }, { Name: "Ubiquiti", // contains filtered or unexported fields }, }
Functions ¶
This section is empty.
Types ¶
type Manufacturer ¶
type Manufacturer struct { // Name is the name of the firewall manufacturer to be // mentioned in health warning messages, e.g. "Fortinet". Name string // contains filtered or unexported fields }
Manufacturer represents a firewall manufacturer that may be blocking Tailscale.
func VerifyCertificate ¶
func VerifyCertificate(c *x509.Certificate) (m *Manufacturer, ok bool)
VerifyCertificate checks if the given certificate c is issued by a firewall manufacturer that is known to block Tailscale connections. It returns true and the Manufacturer of the equipment if it is, or false and nil if it is not.
Click to show internal directories.
Click to hide internal directories.