tailscale/tailcfg
Brad Fitzpatrick 73128e2523 ssh/tailssh: remove unused public key support
When we first made Tailscale SSH, we assumed people would want public
key support soon after. Turns out that hasn't been the case; people
love the Tailscale identity authentication and check mode.

In light of CVE-2024-45337, just remove all our public key code to not
distract people, and to make the code smaller. We can always get it
back from git if needed.

Updates tailscale/corp#25131
Updates golang/go#70779

Co-authored-by: Percy Wegmann <percy@tailscale.com>
Change-Id: I87a6e79c2215158766a81942227a18b247333c22
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2024-12-12 11:16:55 -08:00
..
c2ntypes.go posture: add network hardware addresses to posture identity 2024-07-10 18:28:30 +01:00
derpmap.go all: make more tests pass/skip in airplane mode 2024-05-06 09:19:53 -07:00
proto_port_range_test.go tailcfg: implement text encoding for ProtoPortRange 2023-10-11 23:59:42 -07:00
proto_port_range.go tailcfg: implement text encoding for ProtoPortRange 2023-10-11 23:59:42 -07:00
tailcfg_clone.go ssh/tailssh: remove unused public key support 2024-12-12 11:16:55 -08:00
tailcfg_test.go ipn,tailcfg: add VIPService struct and c2n to fetch them from client (#14046) 2024-11-15 16:14:06 -05:00
tailcfg_view.go ssh/tailssh: remove unused public key support 2024-12-12 11:16:55 -08:00
tailcfg.go ssh/tailssh: remove unused public key support 2024-12-12 11:16:55 -08:00
tka.go tailcfg: add RPC structs for /tka/affected-sigs 2023-02-21 21:58:38 +00:00