dumbproxy
wg-setup
dumbproxy | wg-setup | |
---|---|---|
7 | 1 | |
375 | 8 | |
2.4% | - | |
7.1 | 5.2 | |
8 days ago | 3 months ago | |
Go | Shell | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
dumbproxy
-
Linux Networking Shallow Dive: WireGuard, Routing, TCP/IP and Nat
Or instead you can have HTTP proxy over TLS in just four steps: https://github.com/Snawoot/dumbproxy/wiki/Quick-deployment
You don't even need a client for this, any modern browser can work with it right away: https://github.com/Snawoot/dumbproxy#using-http-over-tls-pro...
-
Build your own private WireGuard VPN with PiVPN
Or just consider some HTTP over TLS proxy like this one: https://github.com/Snawoot/dumbproxy
It may appear a bit more flexible option, especially if forwarding all traffic to VPN entirely is undesirable.
- dumbproxy - HTTP/HTTPS (secure) proxy with automatic certificate management
-
Spin up secure HTTPS proxy in less than 10 minutes
[Unit] Description=Dumb Proxy Documentation=https://github.com/Snawoot/dumbproxy/ After=network.target network-online.target Requires=network-online.target [Service] EnvironmentFile=/etc/default/dumbproxy User=root Group=root ExecStart=/usr/local/bin/dumbproxy $OPTIONS TimeoutStopSec=5s PrivateTmp=true ProtectSystem=full LimitNOFILE=20000 [Install] WantedBy=default.target
- Show HN: Run secure proxy with LE certs in just one command
wg-setup
-
Build your own private WireGuard VPN with PiVPN
I have a WireGuard VPN with about 250 devices, most of them POS machines in the wild. I adopted WireGuard for our first machines about half a year before the 1.0 release, so there weren't much tools yet.
I piggybacked onto the original configuration file format and built myself https://github.com/WolleTD/wg-setup, which helps me validating the correctness and uniqueness of new entries, hacks names into the entries and even updates an internal DNS zone.
I really don't have to care much for key rotation, though. As most of the devices are out of our control anyway, they aren't allowed to connect to anything inside the VPN. It's just for us to connect to them.
What are some alternatives?
Armor - Uncomplicated, modern HTTP server
ropi - Prepare read-only raspbian images for raspberry pi
easy-wg-quick - Creates Wireguard configuration for hub and peers with ease
pivpn - The Simplest VPN installer, designed for Raspberry Pi
aws-s3-proxy - Reverse proxy for AWS S3 with basic authentication.
VxWireguard-Generator - Utility to generate VXLAN over Wireguard mesh SD-WAN configuration
dolores - Local development reverse proxy
gpn - 'guard Private Network
algo - Set up a personal VPN in the cloud