super
openvpn-install
super | openvpn-install | |
---|---|---|
10 | 109 | |
94 | 11,926 | |
- | - | |
8.7 | 3.7 | |
4 days ago | about 1 month ago | |
JavaScript | Shell | |
BSD 3-clause "New" or "Revised" License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
super
-
PiVPN v4.6.0: The End
You can give us a try, https://github.com/spr-networks/super, http://supernetworks.org/. Wireguard is well integrated. We also have a tailscale plugin, and more vpn plugins on the way
-
You shouldn't run NSA-grade Wi-Fi at home
Somewhat related -- with the project I work on, https://github.com/spr-networks/super, we do support wireguard peers (and also support combining that wireguard identity with a wifi peer identity as well).
Devices are provisioned by assigning or generating a wireguard keypair in the API.
Next the peers are routed together by policy and by default can't access one another. There's support for bidirectional network groups or one-way firewall rules with NAT.
One are of improvement is multicast support with wireguard, it's doable, just not ready yet.
-
Securely Chaining Wi-Fi Routers (2022)
golang-based SPR is open-source and can be run on RPi: https://github.com/spr-networks/super
> An unspoofable device identity is established with a MAC address and Per-Device Passphrase for WiFi (or a VPN Public Key for Remote Devices). From there, each device gets its own /30 subnet to exist on. Hardening and strict firewall rules block network spoofing and impersonation, and routing rules redefine connectivity between devices and to the internet.
- Building a freedom-friendly WiFi pocket-router (2021)
- Secure Programmable Router
-
Raspberry Pi 4 Showcase: A Secure Programmable Router
The other thing we've been tasked to work on is load balancing across uplink interfaces, and we're happy for more feedback for how the feature should work. That's tracked under here https://github.com/spr-networks/super/issues/134. We will likely use the fwmark capabilities (which we already use for redirecting traffic to site-to-site vpn connections)
- Upgrade to next-level WiFi with an open-source, secure programmable router
- SPR: Open Source, Secure Programmable Routers
- Show HN: Supernetworks' Secure Programmable Router
-
MacStealer allow for WiFi client isolation bypasses (CVE-2022-47522)
Yes -- except for limited wireguard support, usability for multicast is mostly solved. SPR services mDNS and Zeroconf/SSDP with a udp proxy[1].
[1] https://github.com/spr-networks/super/blob/main/multicast_ud...
openvpn-install
-
PiVPN v4.6.0: The End
https://github.com/angristan/openvpn-install or if you want to be free from your distro's OpenSSL version: https://github.com/ix-ai/openvpn (recommended, just rebuild the container if it becomes outdated)
-
Looking for vpn service that use random ports
Buy your own cloud server and run https://github.com/angristan/openvpn-install to make it TCP over 443
-
OpenVPN only routing Local IP's through VPN Server
Hey! I set up an OpenVPN Server on an Ubuntu Server VM inside ESXi 6.7 using this script: https://github.com/angristan/openvpn-install I need to access the local services running on the, e.g. 192.168.xxx.xxx, which works just fine. But I dont want all my network traffic being routed through the VPN Server. So if i reach out to 192.168.xxx.xxx I get the Service running on this IP in the local network where the server is in, but if I try to reach e.g. google.com the request does not get routed through the VPN. How can I achieve this? OpenVPN-Host: Ubuntu Server 22.04.3 LTS | OpenVPN 2.5.5 Connecting Client: EndeavourOS | OpenVPN 2.6.6
- Only local IP's getting routed through VPN Server
-
Is it possible to Tie specific system usernames to certificates on a PAM auth setup?
EDIT: I should add that the setup was done with angristan's OpenVPN installer. There's nothing particularly interesting about the conf files.
- Need DPI-proof VPN protocol
- Π¦Π Π£ Π·Π°ΠΏΡΡΡΠΈΠ»ΠΎ ΠΊΠ°ΠΌΠΏΠ°Π½ΠΈΡ ΠΏΠΎ Π²Π΅ΡΠ±ΠΎΠ²ΠΊΠ΅ ΡΠΎΡΡΠΈΡΠ½
-
OpenVPN Webadmin 2.0 - Manage your OpenVPN servers from a web browser
Very good, does it support https://github.com/angristan/openvpn-install ?
- VPN Premium Apa yang Kamu Pakai? Dan Kenapa Kamu Memilih VPN tsb?
-
Using OpenVPN instead of port forwarding to reach systems in my LAN - how hard is this?
Pretty trivial actually. I set up my server on a VPS with https://github.com/angristan/openvpn-install, it generates the configs that I deployed to my devices, and when connected they can see each other. For resolving the domain name you'd need to set up the DNS during the wizard.
What are some alternatives?
macstealer
Outline - The fastest knowledge base for growing teams. Beautiful, realtime collaborative, feature packed, and markdown compatible.
router7 - router7 is a small home internet router completely written in Go. It is implemented as a gokrazy appliance.
outline-apps - Outline Client and Manager, developed by Jigsaw. Outline Manager makes it easy to create your own VPN server. Outline Client lets you share access to your VPN with anyone in your network, giving them access to the free and open internet.
homelab - Monorepo for my homelab configuration π‘
pivpn-docker - Run PiVPN in a Container!
openvpn-install - OpenVPN road warrior installer for Ubuntu, Debian, AlmaLinux, Rocky Linux, CentOS and Fedora
docker-pihole-unbound - Run Pi-Hole + Unbound on Docker
pivpn - The Simplest VPN installer, designed for Raspberry Pi
wireguard-install - WireGuard road warrior installer for Ubuntu, Debian, AlmaLinux, Rocky Linux, CentOS and Fedora
Trilium Notes - Build your personal knowledge base with Trilium Notes
aws-vpn-client - Connect to the AWS Client VPN with SAML using OSS Client