coturn
netbird
Our great sponsors
coturn | netbird | |
---|---|---|
25 | 104 | |
10,499 | 8,805 | |
2.4% | 10.1% | |
8.6 | 9.7 | |
1 day ago | 7 days ago | |
C | Go | |
GNU General Public License v3.0 or later | BSD 3-clause "New" or "Revised" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
coturn
-
Golang WebRTC. How to use Pion 🌐Remote Controller
Both TURN and STUN can be self hosted, the most popular project i have found is coturn
-
How to setup and configure TURN server using coTURN?
# TURN server name and realm realm=DOMAIN server-name=turnserver # Use fingerprint in TURN message fingerprint # IPs the TURN server listens to listening-ip=0.0.0.0 # External IP-Address of the TURN server external-ip=IP_ADDRESS # Main listening port listening-port=3478 # Further ports that are open for communication min-port=10000 max-port=20000 # Log file path log-file=/var/log/turnserver.log # Enable verbose logging verbose # Specify the user for the TURN authentification user=turnuser:turn456 # Enable long-term credential mechanism lt-cred-mech # If running coturn version older than 4.5.2, uncomment these rules and ensure # that you have listening-ip set to ipv4 addresses only. # Prevent Loopback bypass https://github.com/coturn/coturn/security/advisories/GHSA-6g6j-r9rf-cm7p #denied-peer-ip=0.0.0.0-0.255.255.255 #denied-peer-ip=127.0.0.0-127.255.255.255 #denied-peer-ip=::1
-
How to deploy TURN server(coturn) inside Kubernetes
I am trying to deploy coturn server in the Kubernetes cluster.
-
SIM card at home
That is an excellent use case for a webrtc server rather than an usual voice communication. If you decide to go that way, you don't need any sim card. You just need an internet access. You install a webrtc client (the usual one is coturn). I don't know if you also need to set up some kind of chat server in addition.
-
Nextcloud-AIO Backup error
I've found this issue for you: https://github.com/coturn/coturn/issues/492
-
Matrix 2.0: How we’re making Matrix go voom
If you host yourself on a VPS you can hook in coturn (it's enabled by the linked playbook by default):
https://github.com/spantaleev/matrix-docker-ansible-deploy/b...
https://github.com/coturn/coturn
-
WebRTC for p2p voice calling app?
You're welcome! If this is for mission-critical or commercial use, you will want to invest in a good TURN server to ensure a reliable connection between peers. You can either self-host your own Coturn server or pay for a service like Twilio. But if this is just a hobby project, you can just use the free Open Relay Project.
-
[coTurn] Add TURN users into a database
schema.sql - coturn - GitHub
-
[Xubuntu22.04] Try coTurn for WebRTC 1
I tried http://turnserver.open-sys.org/ and cloning the GitHub repository, but I got the same results.
-
NetBird - Open Source P2P overlay network with WireGuard, WebRTC, SSO, blackjack, and Zero Trust
NetBird and Netmaker are similar in their capabilities and mesh offering, the same goes for Tailscale, but if we compare technical implementations, Netbird relies on the ICE and STUN protocols to discover the best path for p2p connectivity between peers. These are open WebRTC protocols with battle-tested software around them. Similarly, we use TURN for securely relaying traffic, when a p2p connection isn't possible (hard NAT). This protocol also comes from the WebRTC world and has stable and popular implementations like Coturn.
netbird
- JIT WireGuard
- Nebula is Not the Fastest Mesh VPN (But neither are any of the others)
-
A word of caution about Tailscale
Netmaker (https://www.netmaker.io/) Netbird (https://netbird.io/)
-
Free Tech Tools and Resources - Multi-clock Display, Networking Tools, Digital Forensics & More
NetBird is a configuration-free, peer-to-peer private network combined with a centralized access control system. Utilizing a WireGuard-based overlay network, it ensures encrypted connections between machines without the need for complex configurations such as port openings, intricate firewall rules, or VPN gateways. Prioritizes security with intuitive management of granular access policies for secure remote access, applicable universally across any infrastructure. petr205 explains, "Their SaaS version is free up to 100 machines and 5 users, but the self-hosted version is exactly the same and has very low requirements."
-
Show HN: WireHub – easily create and share WireGuard networks
It is always great to see another solution using Wireguard, which is a great technology for modern private connectivity.
I built https://github.com/netbirdio/netbird, which can be self-hosted and offers an option to run Wireguard without managing firewalls for P2P connectivity.
- Would we still create Nebula today?
-
Netbirdio/netbird: Connect devices into a single private WireGuard mesh network
https://github.com/netbirdio/netbird#quickstart-with-netbird...
-
NetMaker: Connect Everything with a WireGuard VPN
I'd add to that list Netbird, which is the one I ended up using after trying all of the above.
https://netbird.io/
What are some alternatives?
peerjs - Simple peer-to-peer with WebRTC.
tailscale - The easiest, most secure way to use WireGuard and 2FA.
stunner - A Kubernetes media gateway for WebRTC. Contact: [email protected]
Netmaker - Netmaker makes networks with WireGuard. Netmaker automates fast, secure, and distributed virtual networks.
ice - A Go implementation of ICE
ZeroTier - A Smart Ethernet Switch for Earth
awesome-compose - Awesome Docker Compose samples
headscale - An open source, self-hosted implementation of the Tailscale control server
Remotely - A remote control and remote scripting solution, built with .NET 8, Blazor, and SignalR.
Nebula - A scalable overlay networking tool with a focus on performance, simplicity and security
turn - A pure Rust implementation of TURN
firezone - Open-source VPN server and egress firewall for Linux built on WireGuard. Firezone is easy to set up (all dependencies are bundled thanks to Chef Omnibus), secure, performant, and self hostable.