WireGuardMeshes
knock
WireGuardMeshes | knock | |
---|---|---|
10 | 5 | |
435 | 510 | |
- | - | |
6.2 | 0.0 | |
25 days ago | about 1 year ago | |
C | ||
- | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
WireGuardMeshes
- Just dropped Webmesh v0.4.1 with some fun new features
- A text repo to feature-track all the WireGuard mesh software
- Tailscale changes its Android app to support the open source Headscale server
-
Headscale-UI is now in beta!
The URL is: https://github.com/HarvsG/WireGuardMeshes
- Port Forward Security & Alternatives
- NetBird - Open Source P2P overlay network with WireGuard, WebRTC, SSO, blackjack, and Zero Trust
-
tailscale is magic. That is all.
Is anyone using Netmaker to manage multiple networks? We have been using ztncui to manage multiple Zerotier networks, occasionally we have trouble with locked down routers, so we are looking at alernatives. For the uninitiated, here are a few comparison charts: https://github.com/HarvsG/WireGuardMeshes https://github.com/gravitl/netmaker https://github.com/cedrickchee/awesome-wireguard
-
Is automatic peer connection (use server as coordinator) possible?
You're looking to automatically set up a Wireguard mesh. Luck would have it that there's a great overview of solutions for this. I personally use innernet, but something like Tailscale or Netmaker may be more user-friendly.
-
Our User Mode WireGuard Year
How do they manage their mesh?
I've just been doing research on setting up my own wireguard mesh (currently using a spoke/hub setup with pi-hole/pivpn).
I found https://github.com/HarvsG/WireGuardMeshes today which is awesome, but I'm curious what fly.io / other readers here may be using.
- Find the best WireGuard Auto-Mesh project! (Help wanted)
knock
-
Port Forward Security & Alternatives
As other's have suggested, I use wireguard to get into these services. One other thing I would suggest though is to setup SSH with external access using port knocking along with SSH keys. That means if your VPN is failing for some reason you can at least diagnose it.
-
UFW setup for decent security
Sure, few links for when you dig in: http://iplists.firehol.org/, https://crowdsec.net/, https://www.zeroflux.org/projects/knock/, https://www.cipherdyne.org/fwknop/
-
Linux automated shutdown from windows batch file.
Maybe port knocking would work. https://www.zeroflux.org/projects/knock
-
SSH safety measure
I can recommend another protection method: port-knocking. For example with this excellent little helper: https://github.com/jvinet/knock
- knock: a "port knocking" daemon that grants access to services based on sequentially opening a series of network ports.
What are some alternatives?
slirp4netns - User-mode networking for unprivileged network namespaces
fwknop - Single Packet Authorization > Port Knocking
headscale - An open source, self-hosted implementation of the Tailscale control server
blocklist-ipsets - ipsets dynamically updated with firehol's update-ipsets.sh script
Netmaker - Netmaker makes networks with WireGuard. Netmaker automates fast, secure, and distributed virtual networks.
crowdsec - CrowdSec - the open-source and participative security solution offering crowdsourced protection against malicious IPs and access to the most advanced real-world CTI.
wireguard-go-docker - Wireguard docker image
wireguard-install - WireGuard road warrior installer for Ubuntu, Debian, AlmaLinux, Rocky Linux, CentOS and Fedora
wormhole-william-mobile - End-to-end encrypted file transfer for Android and iOS. A Magic Wormhole Mobile client.
tailscale - The easiest, most secure way to use WireGuard and 2FA.
pivpn - The Simplest VPN installer, designed for Raspberry Pi