Netmaker
tinc
Our great sponsors
Netmaker | tinc | |
---|---|---|
165 | 19 | |
8,868 | 1,833 | |
2.5% | - | |
9.6 | 4.5 | |
2 days ago | 26 days ago | |
Go | C | |
GNU General Public License v3.0 or later | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Netmaker
-
Connecting several hundreds IoT (raspberry pi's) devices with a VPN
My plan is to set up an EC2 instance and host a VPN, considering options like Netmaker, OpenVPN, or Tailscale. The goal is to connect these devices to the VPN, enabling SSH access from any connected node. This method seems cost-effective(Considering I want to use 100s of devices and potentially 1000s) and straightforward, requiring a simple setup with a sudo apt command on the Raspberry Pi.
-
Would we still create Nebula today?
https://github.com/gravitl/netmaker
Honorable mention:
SuperHighway84 - more of a Usenet-inspired darknet, but I love the concept + the author's personal website:
- NetMaker: Connect Everything with a WireGuard VPN
-
Admin-Friendly Mesh VPN with WireGuard?
After browsing through, I've noticed that three options seem to be gaining traction: Netmaker, wg-easy, and headscale. I'm curious to know if these solutions are interchangeable, and if there are specific reasons to choose one over the others. I'd also like to understand if they are complete stacks, meaning, once set up, could I easily replace one admin GUI with another, or would I need to tear down and rebuild the VPN?
-
Netmaker/Tailscale Vs Traditional VPNs
I've been contemplating the idea of using Netmaker or a similar solution like Tailscale instead of a traditional VPN to access my home network. I would love to hear from those who are already using Netmaker or Tailscale for VPN access to their home network.
-
Self-Hosted Mesh Network / VPN For User-Friendly LAN Gaming Network?
https://github.com/gravitl/netmaker (7k stars)
-
Upgrading VPN solutions in a remote working Environment
NetMaker: This VPN solution has been frequently recommended within my professional circle, and I have personal experience using it for my homelab. It's incredibly user-friendly with great integrations. I'm particularly interested in hearing from anyone who has successfully implemented NetMaker in a production environment within their company.
-
Looking for Alternatives to ZeroTier and TailScale
The code is available on Github, licensed under the Server Side Public License https://github.com/gravitl/netmaker
-
Tailscale increased free plan user limit form 1 to 3 and device cap to 100 also... unlimited subnets
Do the net maker https://github.com/gravitl/netmaker worth trying to use instead of Tailscale? Tailscale is good, but I can watch YouTube over Wi-Fi in another country, but when I try to use Jellyfin to watch movies it’s not loading well
-
Tips & Tricks for Productivity with Android E-Ink Devices (Obsidian, Syncthing, Weylus, RustDesk, Termux, KDE Connect, ZeroTier)
Very relatable! At first, I struggled for days trying to make Netmaker or Innernet functional for my personal home server (Raspberry Pi behind multiple routers). But then I stumbled upon ZeroTier, and everything worked seamlessly within a couple of hours. Tailscale was actually the next one on my list because I heard many positive things about it over at r/selfhosted (especially about headscale). However, I did not end up testing it after ZeroTier worked.
tinc
-
Would we still create Nebula today?
But both Nebula and tinc max out at around 1 Gbit/s on my Hetzner servers, thus not using most of my 10 Gbit/s connectivity. This is because they cap out at 100% of 1 CPU. The Nebula issue about that was closed due to "inactivity" [2].
I also observed that when Nebula operates at 100% CPU usage, you get lots of package loss. This causes software that expects reasonable timings on ~0.2ms links to fail (e.g. consensus software like Consul, or Ceph). This in turn led to flakiness / intermittent outages.
I had to resolve to move the big data pushing softwares like Ceph outside of the VPN to get 10 Gbit/s speed for those, and to avoid downtimes due to the packet loss.
Such software like Ceph has its own encryption, but I don't trust it, and that mistrust was recently proven right again [3].
So I'm currently looking to move the Ceph into WireGuard.
Summary: For small-data use, tinc and Nebula are fine, but if you start to push real data, they break.
[1]: https://github.com/gsliepen/tinc/issues/218
[2]: https://github.com/slackhq/nebula/issues/637
[3]: https://github.com/google/security-research/security/advisor...
No love for tinc[1]?
It's the granddaddy of mesh networking, long before Wireguard, and while it's not quite zeroconf, it's very simple to setup and maintain. It also runs on everything.
- Which overlay network?
-
Tailscale/golink: A private shortlink service for tailnets
From a purely networking perspective, there are far better solutions than tailscale.
Have a look at full mesh VPNs like:
https://github.com/cjdelisle/cjdns
https://github.com/yggdrasil-network/yggdrasil-go
https://github.com/gsliepen/tinc
https://github.com/costela/wesher
These build actual mesh networks where every node is equal and can serve as a router for other nodes to resolve difficult network topologies (where some nodes might not be connected to the internet, but do have connections to other nodes with an internet connection).
Sending data through multiple routers is also possible. They also deal with nodes disappearing and change routes accordingly.
tailscale (and similar solutions like netbird) still use a bunch of "proxy servers" for that. You can set them up on intermediate nodes, but that have to be dealt with manually (and you get two kinds of nodes).
-
Tunneling to Synology NAS without opening ports.
Two other options are Tinc https://tinc-vpn.org/ or Nebula https://www.defined.net/nebula/
-
Port Forward Security & Alternatives
And there is Tinc; the OG overlay network. I don't have experience with this. Seemed a bit of a pain to setup. https://tinc-vpn.org
-
WireGuard multihop available in the Mullvad app
For what its worth I have used the open source Tinc VPN [1] for mesh multihop routing for ages. It is nowhere near as fast as Wireguard but I could envision Tinc incorporating support for Wireguard if the author were so inclined. Like you mentioned Tinc does not mesh with other VPN's AFAIK.
[1] - https://tinc-vpn.org/
-
Tinc Is Not Catan
I clicked expected some broken analogy between https://tinc-vpn.org/ and the Catan board game, but instead it is a Catan implementation. Fair enough.
-
Graphviz: Open-source graph visualization software
will generate a real-time network graph using the Graphviz DOT language. It's a cool feature that I find quite useful.
What are some alternatives?
tailscale - The easiest, most secure way to use WireGuard and 2FA.
headscale - An open source, self-hosted implementation of the Tailscale control server
netbird - Connect your devices into a single secure private WireGuard®-based mesh network with SSO/MFA and simple access controls.
OpenVPN - OpenVPN is an open source VPN daemon
Nebula - A scalable overlay networking tool with a focus on performance, simplicity and security
firezone - Open-source VPN server and egress firewall for Linux built on WireGuard. Firezone is easy to set up (all dependencies are bundled thanks to Chef Omnibus), secure, performant, and self hostable.
ZeroTier - A Smart Ethernet Switch for Earth
innernet - A private network system that uses WireGuard under the hood.
SoftEther - Cross-platform multi-protocol VPN software. Pull requests are welcome. The stable version is available at https://github.com/SoftEtherVPN/SoftEtherVPN_Stable.
network-manager-wireguard - NetworkManager VPN Plugin: Wireguard