cjdns
Netmaker
Our great sponsors
cjdns | Netmaker | |
---|---|---|
16 | 165 | |
5,135 | 8,952 | |
- | 2.3% | |
2.8 | 9.6 | |
14 days ago | 2 days ago | |
C | Go | |
GNU General Public License v3.0 only | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
cjdns
-
The Hidden World Of Dumps Store | CVV Shops: The Lucrative World of Credit Card Fraud!
This sub is not about TOR and all the seediness that goes on there but rather about creating darknets, by which we/they mean mesh networks and encrypted networks using tools like https://github.com/cjdelisle/cjdns/
-
Question for Network Admins, do you use IPv6?
One of my favorite projects in IPv6 space is the CJDNS project: LINK TO GITHUB
-
Tailscale/golink: A private shortlink service for tailnets
From a purely networking perspective, there are far better solutions than tailscale.
Have a look at full mesh VPNs like:
https://github.com/cjdelisle/cjdns
https://github.com/yggdrasil-network/yggdrasil-go
https://github.com/gsliepen/tinc
https://github.com/costela/wesher
These build actual mesh networks where every node is equal and can serve as a router for other nodes to resolve difficult network topologies (where some nodes might not be connected to the internet, but do have connections to other nodes with an internet connection).
Sending data through multiple routers is also possible. They also deal with nodes disappearing and change routes accordingly.
tailscale (and similar solutions like netbird) still use a bunch of "proxy servers" for that. You can set them up on intermediate nodes, but that have to be dealt with manually (and you get two kinds of nodes).
-
Ask HN: What's in Networking?
I'm excited about P2P/decentralized/distributed overlay networks. Still catching up so would be grateful for tips on resources.
Pinecone[0][1], newer initiative made by former Yggdrasil[2] maker(s).
CJDNS[3].
AIUI CJDNS relies on intermediary high-uptime discoverable router nodes which is what is motivating Pinecone. POKT[4][5] to CJDNS seems like what Filecoin is to IPFS.
I'm yet to get around to doing the groundwork of grokking more established solutions like B.A.T.M.A.N. and how all these pieces fit together,
[0]: https://fosdem.org/2022/schedule/event/matrix_p2p_pinecone/
[1]: https://github.com/matrix-org/pinecone
[2]: https://yggdrasil-network.github.io/
[3]: https://github.com/cjdelisle/cjdns/
[4]: https://www.pokt.network/
[5]: https://piped.kavin.rocks/watch?v=-xgRUAA_p5E
-
Analysis of new data on the Bitcoin network. There may be more of us than we think!
CJDNS, a further step towards automatic and cryptographically secure nodes at the protocol level#23077
- PKT is the only layer 1 protocol blockchain that is powered by bandwidth. We believe access to the internet is a human right and the PKT Network was created to connect the next billion people. Caleb James DeLisle is here to answer your questions in this AMA
-
CJDNS Information
I know there is the Whitepaper. Maybe I miss the part, but I am looking how the path/next Hop is generated.
-
Yggdrasil P2P mesh E2EE IPv6 network
yggdrasil is a cjdns clone with different routing
cjdns has a whitepaper
https://github.com/cjdelisle/cjdns/blob/master/doc/Whitepape...
-
Remote code execution in cdnjs of Cloudflare
I was really excited for a moment, because I thought this was cjdns https://github.com/cjdelisle/cjdns.
- Wiretrustee: WireGuard-Based Mesh Network
Netmaker
- Netmaker: An open source WireGuard VPN
-
Connecting several hundreds IoT (raspberry pi's) devices with a VPN
My plan is to set up an EC2 instance and host a VPN, considering options like Netmaker, OpenVPN, or Tailscale. The goal is to connect these devices to the VPN, enabling SSH access from any connected node. This method seems cost-effective(Considering I want to use 100s of devices and potentially 1000s) and straightforward, requiring a simple setup with a sudo apt command on the Raspberry Pi.
-
Remote access to a NAS from another location?
I'm wondering if there are any alternative approaches to achieve this. Is something like Netmaker or Tailscale feasible enough? If you have any suggestions, I'd greatly appreciate it.
-
Would we still create Nebula today?
https://github.com/gravitl/netmaker
Honorable mention:
SuperHighway84 - more of a Usenet-inspired darknet, but I love the concept + the author's personal website:
https://github.com/mrusme/superhighway84
- Show HN: Netmaker – Netmaker Goes Open Source
-
Netmaker Transitions to Open source: Embracing the Apache-2.0 License
Exciting news to share! Netmaker has officially embraced open source. This momentous decision was unveiled at the Open Source Summit in Europe when the pull request successfully merged, transitioning their server from the SSPL to the widely recognized Apache License 2.0.
-
SD-WAN and SASE Solutions
While we've encountered some challenges and worked with vendors like Cisco to find solutions, I'm curious about recommendations for SD-WAN providers that are well-suited for SASE users. This includes not only Zscaler but also other options like Netmaker, Palo Alto, Cloudflare, Cisco, and Forcepoint.
-
Only allowing my home network to access all my EC2 Instances?
Now, my main question is how I can link my DDNS host endpoint with my EC2 instances, allowing only my home network to access them. I've come across a variety of suggestions, such as Netmaker, OpenVPN, Tailscale etc. but I'm curious to hear your opinions on these solutions.
-
CLAs create different issues than making (small) open source contributions
HN is somehow always timely. Currently, these folks expect me to sign a CLA for a one-byte change to their README: https://github.com/gravitl/netmaker/pull/2516
- NetMaker: Connect Everything with a WireGuard VPN
What are some alternatives?
yggdrasil-go - An experiment in scalable routing as an encrypted IPv6 overlay network
tailscale - The easiest, most secure way to use WireGuard and 2FA.
tinc - a VPN daemon
headscale - An open source, self-hosted implementation of the Tailscale control server
ZeroTier - A Smart Ethernet Switch for Earth
netbird - Connect your devices into a single secure private WireGuard®-based mesh network with SSO/MFA and simple access controls.
Nebula - A scalable overlay networking tool with a focus on performance, simplicity and security
firezone - Open-source VPN server and egress firewall for Linux built on WireGuard. Firezone is easy to set up (all dependencies are bundled thanks to Chef Omnibus), secure, performant, and self hostable.
wg-meshconf - WireGuard full mesh configuration generator.