algo
fly-tailscale-exit
algo | fly-tailscale-exit | |
---|---|---|
155 | 10 | |
28,315 | 1,495 | |
0.3% | - | |
6.5 | 7.1 | |
30 days ago | 18 days ago | |
Jinja | Dockerfile | |
GNU Affero General Public License v3.0 | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
algo
- Show HN: WireHole New UI Makes Managing WireGuard Clients Easy
-
Wireguard with Algo VPN on VPS with tunnel-all traffic
Since we're already presuming you have a functional PFSense box with Wireguard installed and a VPS stood up, now you need to get Algo installed on the VPS. I'm not going to write this part out in detail, but basically you need to follow the procedures here to get Algo installed. However, *before* running ./algo you probably want to edit some of the config.cfg settings. I disabled IPSec (which saves a bunch of package installs and prevents a bunch of failures I saw on some of my VPSs), set my reduce_mtu setting to 80 just to prevent any MTU issues down the line, turned off DNS encryption, and renamed my users to the servers in question (for example: pfsense, vps_server, etc)
-
Best Platform to run Stable Diffusion REMOTELY: Answers Needed
Check out the command line args for Auto1111, it talks about a gradio setup that can be accessed remotely. There's a time limit on gradio links though, I think. You could also set up a vpn that will allow you to access your PC remotely, then run A1111 with the --listen command and access it that way. I've done this with an Algo VPN on Azure and a Wireguard client for Windows for Android, but any VPN that lets you access your PC remotely would work.
-
School does not allow VPN
One way you could try to get around is building your own VPN service, like this: https://github.com/trailofbits/algo/blob/master/README.md
-
Internet Kill switch not working
Things I have tried so far: Clear network cache and reset adapters - IDK it fix aprevious problem I had https://github.com/trailofbits/algo/discussions/14504
- Any servers working in Russia left?
-
Ubuntu Port Forwarding on Oracle. Is it just broken??? HELP!
(I can simply install Algo and get the Wireguard tunnel working, easy peasy... But from there, I can never get Plex port 32400 open... so I'm just trying from scratch now...)
-
Wireguard docker container - route traffic to host
Maybe try running algo vpn (following the road-warrior setup) in a VM instead? It has very light requirements. https://github.com/trailofbits/algo/blob/master/docs/deploy-to-ubuntu.md
- Quick VPN Setup with AWS Lightsail and WireGuard
- Onlyfans'in Türkiye'de yasaklanması için CİMER'e şikayet kampanyası başlatıldı.
fly-tailscale-exit
-
Show HN: Serverless VPN, pay as you go, unlimited devices, no subscriptions
I used to do Algo with a VM on GCP. But fly.io and tailscale has made this really simple. Try this if you are looking for an easier alternative https://github.com/patte/fly-tailscale-exit
-
Make your own VPN with Fly.io, tailscale and GitHub
Yes, fly.io allows you to expose a UDP port. See the [fly.toml](https://github.com/patte/fly-tailscale-exit/blob/main/fly.to...) in the repo. To make, the tailscale port [is pinned](https://github.com/patte/fly-tailscale-exit/blob/main/start....) to the exposed port (41641 in that case).
I just tested it again and the connections are made directly (after the first 2,3 go via DERP):
- Cheapest way to run an exit node
- Run a VPN with global exit nodes with fly.io, tailscale and GitHub
- Show HN: Run a global VPN with tailscale and fly for you and your friends
What are some alternatives?
streisand - Streisand sets up a new server running your choice of WireGuard, OpenConnect, OpenSSH, OpenVPN, Shadowsocks, sslh, Stunnel, or a Tor bridge. It also generates custom instructions for all of these services. At the end of the run you are given an HTML file with instructions that can be shared with friends, family members, and fellow activists.
outline-apps - Outline Client and Manager, developed by Jigsaw. Outline Manager makes it easy to create your own VPN server. Outline Client lets you share access to your VPN with anyone in your network, giving them access to the free and open internet.
tailscale - The easiest, most secure way to use WireGuard and 2FA.
headscale - An open source, self-hosted implementation of the Tailscale control server
zrok - Geo-scale, next-generation peer-to-peer sharing platform built on top of OpenZiti.
Visual Studio Code - Visual Studio Code
flyio-tailscale-gateway - Custom crappy alternative to Tailscale Funnel
pivpn - The Simplest VPN installer, designed for Raspberry Pi
tailscale-tailwings - Run a Personal VPN with global exit nodes and proxy via Tailscale IPN
openvpn-install - OpenVPN road warrior installer for Ubuntu, Debian, AlmaLinux, Rocky Linux, CentOS and Fedora
fly-wireguard-vpn-proxy