firezone
algo
Our great sponsors
firezone | algo | |
---|---|---|
74 | 155 | |
6,131 | 28,216 | |
3.8% | 0.6% | |
9.9 | 6.7 | |
1 day ago | 12 days ago | |
Elixir | Jinja | |
Apache License 2.0 | GNU Affero General Public License v3.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
firezone
-
Self-Hosted Mesh Network / VPN For User-Friendly LAN Gaming Network?
https://github.com/firezone/firezone (4.4k stars)
- Anyone centrally managing clients VPN connections/users/settings?
- Upgrading VPN solutions in a remote working Environment
- Self-hosted Tailscale alternative?
- Wireguard self-hosted solution for large number of users
-
Most used selfhosted services in 2022?
Firezone (https://github.com/firezone/firezone) Wireguard-VPN Server with SSO capability
- What’s the best selfhosted VPN?
-
Tailscale Funnel
I'm fine with companies making profit off of protocols, as long as their code is open source like https://github.com/firezone/firezone or https://github.com/zerotier/ZeroTierOne Tailscale seems great now, but its risky to trust their closed source for this type of service.
-
Which vpn server setup do you use? Container / no Container, GUI / CLI?
When I look into vpn servers, I find easy installers, which directly work on linux (e.g. angristan/wireguard-install) or also vpns, which operate from docker (like kylemanna/docker-openvpn). Then there are options, where multiple things are included, like firezone or this. I am not so sure how well they integrate with my reverse proxy and some seem to be much more complicated than others.
- VPNs for Accessing your Sweet, Sweet Home Lab from Afar | What are y'all using?
algo
- Show HN: WireHole New UI Makes Managing WireGuard Clients Easy
-
Best Platform to run Stable Diffusion REMOTELY: Answers Needed
Check out the command line args for Auto1111, it talks about a gradio setup that can be accessed remotely. There's a time limit on gradio links though, I think. You could also set up a vpn that will allow you to access your PC remotely, then run A1111 with the --listen command and access it that way. I've done this with an Algo VPN on Azure and a Wireguard client for Windows for Android, but any VPN that lets you access your PC remotely would work.
-
School does not allow VPN
One way you could try to get around is building your own VPN service, like this: https://github.com/trailofbits/algo/blob/master/README.md
- Any servers working in Russia left?
- Quick VPN Setup with AWS Lightsail and WireGuard
-
Make your own VPN with Fly.io, tailscale and GitHub
If you want a quick way to setup wiregaurd on your cloud provider of choice there's this easy tool by the security company trailofbits https://github.com/trailofbits/algo
they specifically try to remove extraneous features and make it easy to use, I'm surprised more people don't use it
Isn't the problem that the exit IPs will be flagged / blocked, meaning at best you'll get a ton of captchas etc.? I have set up personal Wireguard VPNs with Algo[1] before on DO, and while they work fine, they cause a lot of friction for that reason.
-
Opening up geth RPC endpoints publically?
To make matters slightly more complicated, I am using algo which is a DIY wireguard VPN for all my devices (including my validator machine). So all traffic likely needs to get routed to/from the VPN machine running in the cloud (though I might be wrong about this).
-
Build your own private WireGuard VPN with PiVPN
Algo project still works well. Very quickly launch a WireGuard VPN to several popular cloud providers, or any Linux instance you already have access to, including your rPi.
What are some alternatives?
Netmaker - Netmaker makes networks with WireGuard. Netmaker automates fast, secure, and distributed virtual networks.
wg-easy - The easiest way to run WireGuard VPN + Web-based Admin UI. [Moved to: https://github.com/wg-easy/wg-easy]
wireguard-ui - Wireguard web interface
headscale - An open source, self-hosted implementation of the Tailscale control server
streisand - Streisand sets up a new server running your choice of WireGuard, OpenConnect, OpenSSH, OpenVPN, Shadowsocks, sslh, Stunnel, or a Tor bridge. It also generates custom instructions for all of these services. At the end of the run you are given an HTML file with instructions that can be shared with friends, family members, and fellow activists.
tailscale - The easiest, most secure way to use WireGuard and 2FA.
outline-apps - Outline Client and Manager, developed by Jigsaw. Outline Manager makes it easy to create your own VPN server. Outline Client lets you share access to your VPN with anyone in your network, giving them access to the free and open internet.
wg-easy - The easiest way to run WireGuard VPN + Web-based Admin UI.
wirehole - WireHole is a combination of WireGuard, Pi-hole, and Unbound in a docker-compose project with the intent of enabling users to quickly and easily create a personally managed full or split-tunnel WireGuard VPN with ad blocking capabilities thanks to Pi-hole, and DNS caching, additional privacy options, and upstream providers via Unbound.
Pritunl - Enterprise VPN server
netbird - Connect your devices into a single secure private WireGuard®-based mesh network with SSO/MFA and simple access controls.
Visual Studio Code - Visual Studio Code