boringtun
Userspace WireGuard® Implementation in Rust (by cloudflare)
prometheus_wireguard_exporter
A Prometheus exporter for WireGuard, written in Rust. (by MindFlavor)
boringtun | prometheus_wireguard_exporter | |
---|---|---|
16 | 4 | |
6,283 | 514 | |
0.7% | 0.0% | |
2.5 | 0.0 | |
5 months ago | over 1 year ago | |
Rust | Rust | |
BSD 3-clause "New" or "Revised" License | MIT License |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
boringtun
Posts with mentions or reviews of boringtun.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2024-08-11.
-
WireGuard-rs – Official Rust implementation of WireGuard
I am hesitant to use this, it appears to be basically unmaintained
https://github.com/cloudflare/boringtun/issues/344
https://github.com/cloudflare/boringtun/issues/407
-
WireGuard client that exposes itself as a HTTP/SOCKS5 proxy
Maybe https://github.com/cloudflare/boringtun or https://github.com/WireGuard/wireguard-go ?
-
I did some benchmarks of Linux WireGuard implementations
Right now the three major Linux implementations are wireguard-linux, wireguard-go and BoringTun. With some recent improvements to wireguard-go I decided to benchmark each one of them with ping and iPerf 3 over TCP and UDP.
-
Wireguard user space Implementation not working after switching network connection
It seems to be a known problem with boringtun: IP Roaming not working when using boringtun as a client (#187)
-
How Rust and Wasm power Cloudflare's 1.1.1.1
They’ve been on the Rust train since at least 2019. Just look at projects like quiche, wrangler, and boringtun
-
Show HN: TunnlTo – Windows WireGuard split tunnel client built with Rust, Tauri
I assume since Wiresock is using BoringTun(https://github.com/cloudflare/boringtun) under the hood, it works similar to other userspace implementations of wireguard, (e.g. wireguard-go, wireguard-rs) in that it uses a TUN device to deliver packets to the userspace implementation, and back out to the network. So, no driver installation required, but CAP_NET_ADMIN is required to create the TUN device.
- Boringtun - Userspace WireGuard® Implementation in Rust
-
Set up your own VPN at home with Raspberry Pi – Wolfang's Blog
It's using some sort of a custom installer that also downloads Cloudflare's BoringTun (https://github.com/cloudflare/boringtun) directly from the author's website (nyr[.]be), since Cloudflare doesn't seem to offer it as a binary release. Example:
{ wget -qO- https://wg.nyr[.]be/1/latest/download 2>/dev/null || curl -sL https://wg.nyr.be/1/latest/download ; } | tar xz -C /usr/local/sbin/ --wildcards 'boringtun-*/boringtun' --strip-components 1
-
Wireguard not working on Xen virtualization
https://github.com/cloudflare/boringtun https://github.com/WireGuard/wireguard-go
- BoringTun: Userspace WireGuard Implementation in Rust
prometheus_wireguard_exporter
Posts with mentions or reviews of prometheus_wireguard_exporter.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-12-04.
-
Monitoring external application outside of cluster
I have a wireguard VPN set up between a node on SITE A and a machine on SITE B. I want to utilize prometheus that is running inside the cluster to monitor the VPN connection using WireGuard Exporter (running on the SITE A node) and setting it up in accordance with this: WireGuard-vpn-s2s.
-
WireGuard show all dump not updating latest handshake
I'm using [Prometheus](https://prometheus.io/) NMS And [Grafana](https://grafana.com/) as a graphical display to monitor WireGuard connections and data metrics in general.I'm using a [WireGuard Metrics Exporter](https://github.com/MindFlavor/prometheus_wireguard_exporter/tree/master/src) that relies on the stdout of ` wg show all dump`
-
Self Hosted VPN Billing / User Management Software ?
Looks like a Prometheus exporter here: https://github.com/MindFlavor/prometheus_wireguard_exporter
- Question About Two Different Containers Interacting With Each other
What are some alternatives?
When comparing boringtun and prometheus_wireguard_exporter you can also consider the following projects:
wireguard-go - Mirror only. Official repository is at https://git.zx2c4.com/wireguard-go
wg-easy - The easiest way to run WireGuard VPN + Web-based Admin UI.
boringtun-example - A real world ping example of boring tun
wg-easy - The easiest way to run WireGuard VPN + Web-based Admin UI. [Moved to: https://github.com/wg-easy/wg-easy]
mullvadvpn-app - The Mullvad VPN client app for desktop and mobile
Grafana - The open and composable observability and data visualization platform. Visualize metrics, logs, and traces from multiple sources like Prometheus, Loki, Elasticsearch, InfluxDB, Postgres and many more.