blockblame

package
v1.81.0-pre Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Jan 30, 2025 License: BSD-3-Clause Imports: 2 Imported by: 0

Documentation

Overview

Package blockblame blames specific firewall manufacturers for blocking Tailscale, by analyzing the SSL certificate presented when attempting to connect to a remote server.

Index

Constants

This section is empty.

Variables

View Source
var Manufacturers = []*Manufacturer{
	{
		Name: "Aruba Networks",
		// contains filtered or unexported fields
	},
	{
		Name: "Cisco",
		// contains filtered or unexported fields
	},
	{
		Name: "Fortinet",
		// contains filtered or unexported fields
	},
	{
		Name: "Huawei",
		// contains filtered or unexported fields
	},
	{
		Name: "Palo Alto Networks",
		// contains filtered or unexported fields
	},
	{
		Name: "Sophos",
		// contains filtered or unexported fields
	},
	{
		Name: "Ubiquiti",
		// contains filtered or unexported fields
	},
}

Functions

This section is empty.

Types

type Manufacturer

type Manufacturer struct {
	// Name is the name of the firewall manufacturer to be
	// mentioned in health warning messages, e.g. "Fortinet".
	Name string
	// contains filtered or unexported fields
}

Manufacturer represents a firewall manufacturer that may be blocking Tailscale.

func VerifyCertificate

func VerifyCertificate(c *x509.Certificate) (m *Manufacturer, ok bool)

VerifyCertificate checks if the given certificate c is issued by a firewall manufacturer that is known to block Tailscale connections. It returns true and the Manufacturer of the equipment if it is, or false and nil if it is not.

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL